Crime Prevention Tips

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 24

Crime Prevention Tips

1. Get to know your neighbors and all those residing in your street. They will be your
partners in watching the activities in your block.
2. Organize a Street Watch composed of neighbors as members. Be concerned and
cooperate in watching activities on the block and reporting unusual or suspicious
behavior to the police and the Street Watch Officer.
3. Exchange names, home and work telephone numbers among members. Prepare
diagram of the block or neighborhood where you belong for easy identification of
households in case an emergency or crime incident occurs. The diagram should
contain the house number, telephone numbers and occupants' names. The
emergency and police department telephone numbers should be included in the
diagram.
4. Look after you neighbor’s house when he is away and ask him to look after yours.
This includes collecting your mail, newspapers and other deliveries which would
indicate at a glance that no one is home.
5. Attend meetings called by your Street Watch Officer. Find out about the crime
situation in your area and what you can do about them. Share information and
experiences with your neighbors.
6. Get to know your police chief and members of the police station in your area. Write
down the station’s emergency hotline number in a place you can easily see in case
you will need police advise or assistance. Use your police force – they are ready,
willing and able to keep you, your family and your neighborhood safe and sound.

Reporting a Crime

Emergency Call
An emergency call is defined as a situation where a person’s life or property is in danger or
threatened. In-progress calls are where crimes are being committed at the time of your
report.

Examples of Emergency Calls


1. Accidents with injuries
2. Attempted suicides
3. Rescue calls
4. Ambulance calls
5. Persons injured or bleeding
6. All fire calls
7. Strangers forcibly entering a house
8. Strangers carrying household articles, appliances from neighbor’s house
9. Someone trying to gain entrance to your home
10. Group of persons with weapons preparing to fight
11. Automobiles stopping to pick up a person walking along the street and it looks that the
person doesn’t want to go, especially young children.
12. Shootings
13. Stabbings
14. Armed robberies
15. Rape

Non-Emergency Call
A non-emergency call is a situation where a person’s life and property is not in immediate
danger. Included under this definition are crimes against property, crimes against persons

1
where the victim is not injured and offenders are not at or near the scene. However, a
police officer is needed to respond, investigate and take a report.

Examples of Non-Emergency Calls


1. Smashed doors or windows in unoccupied homes or stores
2. Abandoned car on the street.
3. Persons loitering near school.
4. Information and rumors of impending crimes.
5. Persistent anonymous calls.
6. Suspicious looking persons following your moves while shopping or on your way home.
7. Late discovery of crimes against persons or property.

Information the emergency operator will want to know:

1. A description of the emergency you are reporting. (What did you observe?)
2. The address or location of the emergency you are reporting.
3. Your name, address and telephone number.
4. Number of persons involved.
5. Descriptions of the persons involved.
6. Direction taken by the escaping suspects.
7. Is suspect in a vehicle or on foot?
8. Plate number and description of vehicle.
9. Other details and circumstances.

Keeping the family Safe

1. Make sure you and members of your family know the whereabouts of everyone for
the day. Place a “whereabouts” board in the kitchen or family room where family
members can post their schedules or destinations for the day.
2. Instruct all family members and household help not to entertain strangers at the gate
or on the phone. Children should be especially trained not to converse with
strangers on the phone. Transactions, if any, should be done outside the gate. This
will prevent closer observation of your premises or the household layout.
3. Teach your family and household helps to verify the identity of phone callers before
identifying themselves.
4. Never give out information on the whereabouts of family members to just anyone on
the phone. Friends or relatives should be politely asked to call again so they can
personally talk to the person they are looking for. Should the unknown caller insist on
asking to speak to each and every family member, ask for his name and politely say
the message will be relayed and that he should call back again. Call the police for
assistance if you
repeatedly receive anonymous phone calls.
5. Instruct family members and your house help that designated family member must
be contacted in an emergency or if there are dubious characters at your door or on
your phone. List the important phone numbers in the front or back page of your
directory for easy access.
6. Be aware of phone swindlers who call in and report that one family member has
been in an accident and is asking for the family member or household help to bring
cash or other valuable to a certain place. Verify with another family member before
acting on this.
7. Verify the identity of callers at your gate before opening the door. Use peepholes
provided on gates and doors for this purpose. Should the stranger be a repairman,
electrician or the like, verify his identity by calling the service office.
2
8. Advise your children to refrain from playing/loitering on streets outside your
residence where they are highly vulnerable to abduction. Advice your children never
to leave home without telling you of their destination and expected time of arrival.

Keeping the Children Safe

1. Do a background check of anyone you intend to employ i.e. baby-sitter, gardener,


domestic helper, driver or security guard. It is possible that the kidnappers would be
utilizing such persons to infiltrate your residence to acquire vital information on
household valuable, routines, layout and patterns.
2. Teach your children not to talk to strangers or accept anything from strangers,
especially in school. Should they be approached, tell them to report the incident to
school authorities.
3. Ask your children’s school not to give out any information regarding your children to
anybody. Insist that strict guidelines be followed regarding persons authorized to
pick-up your children. Other than those duly authorized by you, your children should
not be allowed to leave with any other person without prior authorization from you.
For security, children should be asked to talk to the parent authorizing their release.
This will help ensure protection against kidnappers who call and claim to be the
child’s parents.

Crime Prevention Starts With You And Your Family

More often than not, crimes occur because we open ourselves and our families to criminal
opportunities. Talking to strangers, absence of security procedures for anonymous callers,
taking for granted one’s safety outside the home, etc. make us easy prey to criminals. In
the fight against crime, knowing that the worst can happen makes you less prone to be a
victim and more confident of avoiding disasters.

Protecting yourself, your family and your home is a matter of responsibility that cannot be
taken on by anyone else. You can make the difference.

Securing your Home and your Belongings

There are three things you can do to help reduce burglary:

1. Make your home burglar-proof.


2. Mark your belongings that burglars are most likely to steal.
3. Be alert to report suspicious persons and unusual activities to the police before a
crime may occur.

What can you do?

1. Ensure all doors and windows have locks in working condition. Keep only that is
used to enter the house open, all other entry points to your household should be
securely locked to prevent unnoticed entry into your home.
2. Make it a habit to check that all doors and windows are locked at night before going
to sleep. The dark of night is a most ready camouflage for robbers and other
criminals.
3. Outside your home: Prune lower tree limbs – don’t provide the thief with a natural
ladder into second floor windows. Keep the view to your house open – criminals love
to hide behind tall fences or overgrown bushes while breaking into your home.

3
4. Keeps porches, yards, and all entrances to your house and garage well lighted.
Leave lights on inside your house when you go out for the evening.
5. Keep a record of the important information (especially make, model number, serial
number) of all household facilities and equipment, such as TV, radio, video cassette
recorder, refrigerator, VCR, washing machine. Have an inventory of your jewelry and
other precious items and documents like birth, baptismal and marriage certificates.
6. Store cash and other valuable in the bank. Hiding them inside locked drawers does
not guarantee that they will be safe from the knowing eyes and practiced moves of
robbers.
7. Bring in all outdoor equipment (bicycles, garden hose, mower, etc.) at night. Leaving
these valuables out in the garden or street is an open invitation to robbers and
thieves.
8. Protect your house from prying eyes by using curtains or drapes.
9. Provide family members with their own keys to the house. This is safer than leaving
the key in a “secret” place, one that can be discovered by any person who takes the
time to watch your movements when you leave your home and come back at night.
10. If you and your family are going on a vacation, ask a neighbor to watch your home,
or ask a relative to stay in your home while you are away. An empty house is a prime
target for criminal elements.

If you are under threat…


If there are suspicious sounds or shadows in your home, try to contract the police quietly so
as not to let the intruders know that you are aware of their presence. Most robbers are after
the property inside your home, and are more prone to working swiftly and quietly to avoid
any physical or violent encounters.

If you awake to the sound of an intruder, you have several options:

1. Lie quietly to avoid attracting attention to yourself, hoping that they will leave you
undisturbed.
2. You may choose to open lights and make noise by moving around thereby warning
them that you are awake, and scaring them into leaving your home. Even if you are
alone in the house, you may speak loudly to an imaginary companion.
3. If you see signs of a break-in or suspicious persons inside your home, do not
attempt to go in as the robbers may still be inside. Go to your nearest neighbor and
call the police for immediate assistance.
4. Remain calm and do not panic. Although a robber would prefer to avoid
confrontation, they are easily agitated and more prone to uncalled for abuse or
violence.
5. Try to talk it out with the robbers. If you are up to it. This will delay them, and allow
for alternative action on your part, if the situation allows.
6. Note all peculiarities and mannerisms of the robbers, if you come face-to-face with
them. Tattoo marks, physical defects, moles and speech mannerisms will help in
giving the police a more solid description of the robbers.

Safety Tips on the Streets

1. Day or night, do not walk in dark streets, alleys and unsafe shortcuts.
2. Stay away from dark isolated places or vacant lots at night. These areas are
hangouts of criminals. Do not take chances.
3. Do not walk between parked cars in parking lots. Avoid walking alone in unlit and
uncertain places. At night, wait for buses, taxicabs or jeepneys in well-lighted areas.

4
4. When going to economically depressed areas (slums/squatter’s area) communities,
do not wear expensive jewelry and carry substantial cash. If you decide to go to
such places, remove your jewelry; this may save your life or limbs.
5. Do not flash a lot of cash around when travelling. Money attracts the “bad eggs.”

Commuter Safety

1. When in a bus or jeepney, do not extend your hand out the window; your
watch/jewelry could be snatched or your hand injured by another vehicle.
2. When you ride a cab, take the habit of getting the name of the cab, its plate number,
and the cab driver’s name. This will be handy in case you leave something in the
cab or if the driver tries to hurt or rob you.
3. Be careful with what you carry when riding on a crowded bus. If you are to carry so
many things, take a cab home and check the cab well before alighting.
4. If you are to visit someone, call him/her for your expected time of arrival. This will be
helpful in case an accident happens on the way. It is also advisable to always inform
your relatives or neighbors where you are going and for how long you will be away.

Safety in Commercial Centers

1. Never try to buy something from the sidewalks; instead, go to a department store.
The goods may be a little more expensive there but it is safer since you avoid
thieves, pickpockets and sidewalk hawkers.
2. Never grab a bargain sold gold watch, diamond ring or anything from the sidewalk.
You are likely to be gypped with a stolen good and could be later on charged with
theft.
3. Never exchange your wrist watch, expensive pen or gold ring for “a found diamond
ring”. Never bargain or argue with strangers in the streets. Ignore them and just
leave.
4. Never go with a stranger to get a bargain article. You may be robbed or gypped at
the
back street.

Tips for Women

1. If someone is talking you, seek the help of security guards (when inside a building)
and then call or go to the nearest police block/station in your area.
2. Do not ride a jeepney if there are no female passengers inside, wait for the next
vehicles. It is safer to take a bus if you are commuting alone at night. Sit near the
driver if passengers are predominantly male.
3. Do not hitch a ride with a person you do not know very well. It is always safer to take
the bus, jeepney or taxicab.
4. Avoid watching movies alone; always take someone with you – a relative or trusted
friend.
5. Ask somebody to accompany you when traveling, especially if night will overtake
you.
6. Always carry in your bag a whistle or anything that may be used to sound alarm
when in danger. Scream or shout for help when you are in danger of being attacked.

5
Crime Prevention Advice

PREVENTIVE TIPS FOR THE MOTOR VEHICLES (MV) OWNERS

1. Always lock all car windows and doors before leaving your car in the parking area.
2. Always park your car in lighted areas during nighttime.
3. Park your motor vehicle in secured places.
4. Check the area where you parked against suspicious looking people.
5. Avoid displaying valuables inside your car when parking to avoid temptations.
6. Remove vital parts like ?ROTOR? if possible before leaving your car .
7. Install alarm and safety devices when possible.
8. Install hidden master switch.
9. Avoid using the street near your residence as your parking area.
10. Always lock your car windows and doors when traveling in congested areas.
11. Never entrust your car key to strangers to avoid duplicating it.
12. As much as possible, park your car inside the garage and the garage gate must
always be secured and locked.
13. Never leave your car unattended while the engine is on and the doors are unlocked.
14. When somebody hit or bumped your car don't alight from your car immediately.
Analyze the situation first.
15. Avoid hitchhikers especially beautiful women.
16. When waiting for someone don't wait inside the car.
17. Investigate and require driver applicants to submit Police and NBI Clearances.
18. Never entrust to prospective buyers the car you are selling for testing purposes
without escort.
19. Never entrust your car key to anybody except to the management when turning over
your car for repair.
20. For PUVs, don't bite for huge sum that the passengers are offering to bring them in
certain areas unless you know personally the one offering.
21. Take note of the plate numbers of the suspected vehicles tailing that hit you. Then
report it immediately to the Police.

INTERNET CRIME PREVENTION

The Internet places a vast amount of information and exciting experiences at your
command. With the click of the mouse, the Internet allows you to buy an airline ticket, book
a hotel, send flowers to a friend, or purchase your favorite stock. However, as the legitimate
use of the Internet increases throughout our nation and the world, the wrongful use of the
Internet to commit crime and victimize people also increases. The following Internet crime
prevention information is meant to help you protect yourself, your loved ones, your friends,
your neighbors and your community, and to make your journey on the Internet as safe,
secure and crime free as possible.

Common Internet Crimes :

Child Exploitation

Children can be sexually exploited, kidnapped, molested and solicited by individuals using
online service. One reason is the anonymous nature of the Internet. Another reason is the
large number of people using the Internet. Pedophiles will make contact with victims by
having children call collect so the pedophile's telephone number will not show up on their
parent's telephone bill. Pedophiles will also purchase a prepaid telephone card and give
children a toll free access number enabling children to call from anywhere they choose.
6
Pedophiles will often convince children to send them a photograph. Pedophiles will offer
children money for their photograph and/or pose as professional photographers to obtain
nude, graphic or sexually explicit photographs of children. Pedophiles commonly attempt to
lower the inhibitions of children through deception in an attempt to lead children into their
sexual conversations or acts. There are a number of ways parents can protect their
children from becoming victims of pedophiles on the Internet.

The following are some examples:

• Choose an online service that offers parental control features;


• Purchase blocking software and design your own safety system;
• Monitor children that are online and monitor the time they spend online;
• Ensure children never reveal identifying information about themselves on the
Internet in a public chat room, on an electronicbulletin board or in their E-mail
messages;
• Ensure children do not give out personal information about themselves such as their
age;
• Consider using a pseudonym or unlisting your child' s name;
• Get to know the services your child uses;
• Block out objectionable material through your Internet service provider;
• Never allow a child to arrange a face-to-face meeting with another computer user
without parental permission;
• Ensure children never respond to messages or bulletin board items that are
suggestive, obscene, belligerent or threatening;
• Encourage children to tell you whenever they encounter such messages;
• If you or your children receives a message that is harassing, sexual in nature, or
threatening, forward a copy of the message to your service provider and ask for their
assistance;
• If you become aware of the transmission, use, or viewing of child pornography while
online, report it to the National Center for Missing and Exploited Children;
• Teach children that people online may not be who they seem;
• Teach children online service providers never ask for passwords and they should
never give their password out;
• Teach children that everything they read or see on the Internet may not be true;
• Teach children to never let anyone pressure them into doing something they feel
uncomfortable doing;
• Teach children to never enter an area on the Internet that charges for services
without asking permission from a responsible adult first;
• Some children have access to the Internet at school. Check with the school
authorities to ensure your children are properly supervised and monitored by a
responsible adult;
• Know your children' s friends and their parents.

The Pump And Dump

This is a stock scam. Messages are posted on the Internet urging readers to buy stock
quickly that is poised for rapid growth. The message writer often claims to have inside
information about an impending development. The reality is that the writer stands to gain by
selling or buying stock shares after the price goes up or down. This ploy is normally used
with unregistered, little known, thinly traded stocks.

7
The Hijack

The Hijack is relatively new form of fraud unique to the Internet. Consumers are prompted
to download a purported ?viewer program? to see computer images for free. Once
downloaded, the consumer's computer is ?hijacked? by the viewer program which turns off
the consumer's modem speakers, disconnects the from local Internet provider, dials an
international number and connects the consumer to a remote site. The expensive
international costs are charged to the consumer's telephone bill until the telephone us
turned off.

Pyramid Schemes

Pyramid schemes are similar to multi-level marketing. Pyramid schemes provide financial
incentives to recruit new distributors. They are generally prohibited because it is a
mathematical certainty that the pyramids will collapse when no new distributors can be
recruited. When that happens, most people lost their money. The Internet offers a fast lane
for pyramid builders by facilitating a large-scale recruitment pool in little or no time. Be
extremely cautious if a promoter offers you an extremely large short-term return on any
investment, particularly if there is a disclaimer that the investment is ?high-risk and you
could lose all of you money?. Additionally, if there are no written claims delineating the
return on other's investments, you are quite possibly looking at a pyramid scheme. Beware
of all get rich quick schemes. If a deal seems too good to be true, it probably is.

Gambling

One of the greatest potential dangers for fraudulent loss posed for people using the Internet
is gambling. There are as many as 200 gambling sites on the Internet. Consumers can
gamble on sports, blackjack, keno, roulette, etc. Gambling on the Internet is especially risky
because gambling is an unregulated industry and currently, there is no effective way to
control it. Companies based in foreign countries using foreign bank accounts are able to
easily bilk consumers out of their money. Many times Internet ?gamblers? are unable to
contact the companies with whom they placed their bets to collect their winnings. Gambling
on the Internet exposes consumers to fraud, civil liability and possible criminal liability.

Online Auctions

Online auctions are popular to many people who use the Internet. Generally, online
auctions are person-to-person sales where individuals bid for various types of
merchandise. The highest bidder then pays in advance of receiving the merchandise. A
growing priblem is sellers failing to deliver merchandise that consumers have purchased.

Fraud

Internet fraud takes many forms. The Internet' s promise of substantial consumer benefits is
coupled with the potential for fraud and deception. Fraud operators are opportunists who
are among the first to appreciate the potential of a new technology. There is nothing new
about Internet fraud, however, the size and potential market, relative ease, low cost, and
speed with which a scam can be perpetrated has increased tremendously.

Unsolicited Commercial E-Mail

Internet service providers report handling 60 million electronic messages per day.
Estimates of Unsolicited Commercial E-mail (UCE) indicate it comprises as much as one-
8
third of the total E-mail traffic. This ever-increasing volume of UCE strains the capacity of
online service providers and threatens the development of the Internet as a conduit for
commerce. Beyond the sheer volume and potential annoyance of UCE, many UCE
messages may also be misleading or deceptive.

Teaser Pages

The Internet is rife with fraud and deception. Some web pages "tease" individuals with
promises of easy money for little or nothing. These scams include phony scholarships,
travel programs, weight loss programs and others.

High Pressure Sales

A high-pressure sales pitch may sound exciting, however, as a rule, such a pitch should be
resisted. Before you invest any money, take your time. Get a second opinion from a
financial planner, an attorney, or an accountant you can trust. Finally, research the
company's reputation. Call your local consumer protection agency in the city where the
company is headquartered for more information.

Following are lines frequently used by scam artists:

• "We don't make money unless you make money."


• "I know you get offers everyday from people who tell you they're going to make you
rich. I can make it easy for you to make your decision based on actual facts."
• "This opportunity is the best chance to make extra money for guys who work for a
living; guys like you and me."
• "I've been in this business for 20 years and I can tell you this;
• I know of no other program that is legal, easy to afford and can bring in this kind of
big money from such a small investment."
• "I know this can work for you and I personally guarantee your success, right down to
the last penny."
• "Give me one percent of your trust and I'll earn the other 99 percent when you see
the return."
• "Of course there is a risk, there is a risk in everything."
• "Sure we could finance this venture ourselves, however, we're trying to build a power
base for the future for folks like you."
• "We're talking about a cash cow here, it's going fast and I need your check tomorrow
at the latest."
• "I can't be lying, there are laws against lying." The Risk Free Scam Many times this
scam solicits its victims with exotic-sounding investments such as wireless cable
projects, prime bank securities or fictitious business ventures overseas. Promoters
misrepresent risk to "investors" by comparing their offer to something safe, such as
bank security deposits. Many times the investment offer never really exists.

CYBERSAFE KIDS: A PARENTS GUIDE

The Internet has opened up a wonderful world of information for anyone with a computer
and a connection! Your children will learn about computers. But just as you wouldn't send
children near a busy road without some safety rules, you shouldn't send them onto the
information superhighway without rules of the road. Too many dangers --from preferential
child molesters to con artists --can reach children (and adults) through the Internet.

9
Getting Started

Explain that although a person may be alone in a room using the computer, once logged on
to the Internet, he or she is no longer alone. People skilled in using the Internet can find out
who you are and where you are. They can even tap into information in your computer.

Set aside time to explore the Internet together. If your child has some computer experience,
let him or her take the lead. Visit areas of the World Wide Web that have special sites for
children.

Controlling Access

The best tool a child has for screening material found on the Internet is his or her brain.
Teach children about exploitation, pornography, hate literature, excessive violence, and
other issues that concern you, so they know how to respond when they see this material.

You can choose a commercial online service that offers parental control features. These
features can block contact that is not clearly marked as appropriate for children; chat
rooms, bulletin boards, news groups, and discussion groups; or access to the Internet
entirely.

You can purchase blocking software and design your own safety system. Different
packages can block sites by name, search for unacceptable words and block access to
sites containing those words, block entire categories of material, and prevent children from
giving out personal information.

Monitor your children when they're online and monitor the time they spend online. If a child
becomes uneasy or defensive when you walk into the room or when you linger, this could
be a sign that he or she is up to something unusual or even forbidden.

Tell Your Child...

Always to let you know immediately if they find something scary or threatening on the
Internet.

• Never to give out their name, address, telephone number, password, school name,
parent's name, or any other personal information.
• Never to agree to meet face to face with someone they've met online.
• Never to respond to messages that have bad words or seem scary or just weird.
• Never to enter an area that charges for services without asking you first
• Never to send a picture of themselves to anyone without your permission

What You Can Do In the Community

Make sure that adults monitor access to the Internet at your child's school.

Know your child's friends and their parents. If your child's friend has Internet access at
home, talk to the parents about the rules they have established. Find out if the children are
monitored while they are online.

10
Make sure that your child's school has an Acceptable Use Policy (AUP). This policy should
include a list of acceptable and unacceptable activities or resources, information on
"netiquette" (etiquette on the Internet), consequences for violations, and a place for you
and your child to sign. Your family can design its own AUP for the home computer.

If your child receives threatening e-mails or pornographic material, save the offensive
material and contact that user's Internet service provider and your local law enforcement
agency.

If you come across sites that are inappropriate for children when you are surfing the Net,
send the addresses to online services that offer parental control features or to sites
advertising protection software to add to their list to be reviewed for inclusion or exclusion.
Even if you don't subscribe to the service or own the protection software, you can help
protect other children.

UNDERSTANDING TERRORISM

It is very important for all of us, including the public, to have a clear understanding of what
terrorism is and how it works. A correct appreciation of the problem will greatly help us deal
with the situation more effectively. Following are some valuable lessons learned from past
events:

At the outset, we must consider that those faceless cowards can choose the time, place
and even the manner they would carry out an attack. Hence, all preventive measures can
only somehow reduce the threat but can not guarantee total safety.

With said reality, we must be resilient; that is, capable and always ready to surge back and
restore our lives to normal right after an incident. Never should we allow terrorists to dictate
on us.

In examining the nature of terrorism, we are dealing with a multi-dimensional problem.


Discussion is centered mostly on the criminal justice aspects: prevention and punishment.
The overriding questions are not technological or legal; they are philosophical and political.

“Terrorists usually employ the weapon of fear in a complicated sort of way. By sowing fear,
they can paralyze the will, befuddle the mind and exhaust the strength of an adversary.”

11
Political considerations form the framework in which the activity of those engaged in
terrorism is interpreted. We usually hear people say ? A man's terrorist is another man's

freedom fighter?. Simply stated, terrorism can be held to revolve around one's political point
of view and this is the major impediment standing in the path of a universally acceptable
definition of the term.

However, regardless of the diversity in our political, religious or social outlook, we should be
one in looking at the more important issue. Motivation notwithstanding,

the rhetoric of terrorists should not be allowed to conceal their true identity. They are first
and foremost, criminals. No doctrine or belief could justify killing helpless, innocent people.

Because of the enormous damage they inflict, there is a misconception that terrorists are
big in number and so strong. To the contrary, terrorism is the strategy of the weak, a
weapon of those small band of rascals who are prepared to use violence but who believe
that they would lose any contest by sheer strength.

Terrorism is means to an end, not an end in itself. Let alone, terrorism can accomplish
nothing in terms of political goals; it can only aim at obtaining a response that will achieve
those goals for it. Said another way, terrorist violence is aimed not so much on the target
upon which the initial act is committed but to much wider audience who will view and
interpret the act.

The success of terrorism is due in large part to the miscomprehension of the strategy by its
opponents; which is, failure to focus on the critical issue of how to respond properly to
provocations and threats.

Brutality and repression are induced responses that will alienate the government from the
masses, thus set the stage for revolution. In dealing with the problem of terrorism,
paramount is the rule of law and our respect for human rights.

To be able to correctly interpret events, we must clearly distinguish terrorism from an


ordinary criminal act. Not all violent incidents, however terrifying, can be categorized as
works of terrorists. The political and social objectives which drive terrorists to act give
terrorism a character of its own.

Likewise, it is different from regular, as well as guerilla war because in terrorism, innocents
are killed deliberately. Its very wickedness makes it a vulnerable strategy.

12
One possible purpose of a terrorist act is to create strife among the various sectors in a
society. Some radicals pull religious verses out of context to suit their objective. But murder
has no home in any religious faith. All of the world's major religions preach the values of
love, peace, charity and respect for the sanctity of life. Hence, we must not fall into the
enemy trap by institutionally faulting religion or its members for the upheaval.

Publicity tends to exaggerate the threats that terrorism pose to society. If we fail to
understand its nature, possibility is high that we will make our fears very much greater than
the actual threat.

Most of the victims of terrorist violence are innocent bystanders. Obviously then, terrorists
are enemies of the humanity thereby making public support an essential factor in our war
against terror.

(Note: Join the war against terror. Please reproduce this hand-out and give to friends and
neighbors)

=====================================================================

About Addiction

Addictive drugs activate the brain’s reward systems. The promise of reward is very intense,
causing the individual to crave the drug and to focus his or her activities around taking the
drug. The ability of addictive drugs to strongly activate the brain reward mechanisms and
their ability to chemically alter the normal functioning of these systems can produce an
addiction. Drugs also reduce a person’s level of consciousness, harming their ability to
think or be fully aware of present surroundings.

The Cycle of Addiction

What Is A Drug?

In medical terms, a drug is any substance that when taken into a living organism may
modify one or more of its functions. Drugs can provide temporary relief from unhealthy
symptoms and/or permanently supply the body with a necessary substance the body can
no longer make. Some drugs produce unwanted side affects. Some drugs lead to an
unhealthy dependency that has both physiological and behavioral roots.

Why People Use Drugs

No one wants to be a drug addict or alcoholic, but that doesn’t stop people from getting
addicted. The most commonly asked question is simply - how? How could my son,
daughter, father, sister, or brother become a liar, a thief, someone who cannot be trusted?
How could this happen? And why won’t they stop?

The first thing you must understand about addiction, is that alcohol and addictive drugs are
basically painkillers. They chemically kill physical or emotional pain and alter the mind’s
perception of reality. They make people numb.

For drugs to be attractive to a person there must first be some underlying unhappiness,
sense of hopelessness, or physical pain that they wish to escape.

13
Drug Addiction Follows A Cycle Like This:

The life cycle of addiction begins with a problem, discomfort, or some form of emotional or
physical pain a person is experiencing. They find this very difficult to deal with.

We start off with an individual who, like most people in our society, is basically good. This
person encounters a problem or discomfort that they do not know how to resolve or cannot
confront. This could include problems such as difficulty “fitting in” as a child or teenager,
anxiety due to peer pressure or work expectations, identity problems or divorce as an adult.
It can also include physical discomfort, such as an injury or chronic pain. The person
experiencing the discomfort has a real problem and feels their present situation is
unendurable, yet sees no good solution to the problem.

Everyone has experienced this in life to a greater or lesser degree. The difference between
an addict and the non-addict is that the addict chooses drugs or alcohol as a solution to the
unwanted problem or discomfort.

The Addiction Progresses…

Analogous to an adolescent child in his first love affair, the use of drugs or alcohol becomes
obsessive. The addicted person is trapped. Whatever problem he was initially trying to
solve by using drugs or alcohol fades from memory. At this point, all they can think about is
getting and using drugs. They lose the ability to control their usage and disregard the
horrible consequences of thier actions.

Alcohol And Drug Tolerance

In addition to the mental stress created by thier unethical behavior, the addict’s body has
also adapted to the presence of the drugs. He will experience an overwhelming obsession
with getting and using his drugs, and will do anything to avoid the pain of withdrawing from
them. This is when the newly-created addict begins to experience drug cravings.

The individual now seeks drugs both for the reward of the “pleasure” they give him, and
also to avoid the mental and physical horrors of withdrawal. Ironically, the addict’s ability to
get “high” from the alcohol or drug gradually decreases as thier body adapts to the
presence of foreign chemicals. He must take more and more, not just to get an effect but
often just to function at all.

At this point, the addict is stuck in a vicious dwindling spiral. The drugs being abused have
changed him both physically and mentally. He has crossed an invisible and intangible line.
He is now a drug addict or alcoholic.

Drugs and Problems

A person tries drugs or alcohol. The drug APPEAR to solve his problem. He feels better.
Because he now SEEMS better able to deal with life, the drugs become valuable to him.
The person looks at drugs or alcohol as a cure for unwanted feelings. The painkilling effects
of drugs or alcohol become a solution to their discomfort. Inadvertently the drug or alcohol
now becomes valuable because it helped them feel better. This release is the main reason
a person uses drugs or drinks a second or third time. It is just a matter of time before he
becomes fully addicted and loses the ability to control his drug usage. Drug addiction

14
results from excessive or continued use of physiologically habit-forming drugs in an attempt
to resolve the underlying symptoms of discomfort or unhappiness.

How Drugs Affect Behavior

The addict will now attempt to withhold the fact of thier drug use from friends and family
members. They will begin to suffer the effects of their own dishonesty and guilt. They may
become withdrawn, difficult to reason with, and possibly develop strange behavior.

The more they use drugs and alcohol, the guiltier they will feel, and the more depressed
they will become. They will sacrifice their personal integrity, relationships with friends and
family, thiers job, savings, and anything else they may possess in an attempt to get more
drugs. The drugs are now the most important things in their life. Their relationships and job
performance will go drastically downhill.

There is such a thing as a “drug personality”, which is artificially created by drugs. Drugs
can change the attitude of a person from his original personality to one secretly harboring
hostilities and hatreds he does not permit to show on the surface.

This establishes a link between drugs and increasing difficulties with crime, production and
the modern breakdown of social and industrial culture.

The drug personality includes such characteristics as:

• Mood swings.
• Unreliable. Unable to finish projects.
• Unexpressed resentment and secret hatreds.
• Dishonesty. Lies to family, friends, employers.
• Withdraws from those who love him. Isolates self.
• May appear chronically depressed.
• May begin stealing from family and friends.

Drug Metabolites

Drugs and alcohol are broken down in the liver. When a person drinks or uses drugs over a
period of time, the body becomes unable to completely eliminate them all. These
metabolites, (the substances the body converts the drugs or alcohol into) although removed
rapidly from the blood stream, become trapped in the fatty tissues. The problem that needs
to be addressed is that these drug residues remain for years.There are various types of
tissues that are high in fat content, and these tissues are turned over very slowly. When
they are turned over, the stored drug metabolites are released into the blood stream and
reactivate the same brain centers as if the person actually took the drug. The former addict
now experiences a drug restimulation (or “flashback”) and drug craving. This is common in
the months after an addict quits and can continue to occur for years, or even decades.

The Cycle Of Quitting, Withdrawal, Craving And Relapse When the addict initially tries to
quit, cells in the brain that have become used to large amounts of these metabolites are
now forced to deal with much decreased amounts. Even as the withdrawal symptoms
subside, the brain “demands” that the addict give it more of the drug. This is called drug
craving. Craving is an extremely powerful urge and can cause a person to create all kinds
of “reasons” they should begin using drugs or drinking again. He is now trapped in an
endless cycle of trying to quit, craving, relapse and fear of withdrawal. Eventually, the brain

15
cells will again become used to having lowered drug metabolites. However, because
deposits of drug or alcohol metabolites release back into the bloodstream from fatty tissues
for years, craving and relapse remain a cause for concern. Left unhandled, the presence of
metabolites, even in microscopic amounts, cause the brain to react as if the addict had
actually taken the drug again, and can set up craving and relapse even after years of
sobriety. To prevent relapse due to the above scenario the solution is the Narconon New
Life Detoxification procedure.

CLASSIFICATION OF DRUGS

Prohibited Drug - Which includes opium and its active components and derivatives, such as
heroin and morphine; coca leaf and its derivatives, principally cocaine; alpha and beta
eucaine; hallucinogenic drugs, such as mescaline, lysergic acid diethylamide (LSD) and
other substances producing similar effects; Indian hemp and its derivatives; all preparations
made from any of the foregoing; and other drugs and chemical preparations, whether
natural or synthetic, with the physiological effects of a narcotic or a hallucinogenic drug; or
(As amended by B.P. 179 dated March 2, 1982).

Regulated Drug - Which includes self-inducing sedatives, such as secobarbital,


phenobarbital, pentobarbital, barbital, amobarbital and any other drug which contains a salt
of a derivative of a salt of barbituric acid; any salt, isomer or salt of an isomer, of
amphetamine, such as benzedrine or dexedrine, or any drug which produces a
physiological action similar to amphetamine; and hypnotic drugs, such as methaqualone,
nitrazepam or any other compound producing similar physiological effects; (As amended by
PD No.1683 dated March 14, 1980).

MARIJUANA
(HARMFUL EFFECTS)

Marijuana, often called grass, pot, or weed is a crude drug made from Cannabis sativa, a
plant that contains a mind-altering (psychoactive) ingredient called tetrahydrocannabinol
(THC).

Marijuana slows down the user’s mental and psychomotor activities. Users don’t remember
what they have learned when they are high. The effects of marijuana can also impair
thinking, reading comprehension and verbal and mathematical skills. Marijuana creates
other health problems related to: the reproductive system, the heart, the lungs. It has been
found that marijuana use may lead to cancer. Long-term regular use of marijuana may lead
to psychological dependence. Once started, it may take more of the drug for the user to get
the same effect.

Young marijuana users are more likely to go on experimenting with other drugs.

IMMEDIATE EFFECTS:

1. Faster heartbeat and pulse rate


2. Bloodshot eyes
3. Dry mouth and throat
4. Altered sense of time/disorientation
5. Forgetfulness/inability to think
6. Impaired reflexes, coordination and concentration

“Acute panic anxiety reaction” – extreme fear of losing control


16
.LONG TERM EFFECTS:

1. Chest pain
2. Irregular menstrual cycle
3. Temporary loss of fertility for both sexes
4. Premature babies/low birth weights
5. Cancer

Marijuana “burn-out” (dull, slow moving, inattentive, and unaware of surroundings)

SHABU
(HARMFUL EFFECTS)

Shabu is a white odorless crystal or cyrstalline powder with a bitter numbing taste. In the
street name for the chemical substance known as Metamphetamine. It is also popularity
known as “poor man’s cocaine”. Other slang names are “shabs, ubas, S, siopao, sha and
ice”.

ACUTE:

1. Produces anxiety, irritability, irrational behavior, talkativeness and loss of self control.
2. Results in loss of appetite and inability to sleep.
3. Can lead to acute psychotic reactions, violent and destructive
4. behavior and recklessness that may result in accidents.

PHYSIOLOGICAL EFFECTS:

Include chest pain, irregularity of heartbeat, hypertension, convulsion and death from
cardiac arrest.

PSYCHOLOGICAL & PHYSICAL DEPENDENCE:

This chemical substance is known to produce psychological and physical dependency.


These are characterized by anxiety, tension and craving for the substance. This substance-
seeking behavior can lead to various criminal and other anti-social acts. Withdrawal
symptoms occur when drug use is abruptly stopped. Among these are feeling of apathy,
hypersomnia (excessive period of sleep) and depression. Depression may lead to suicide.

LONG-TERM EFFECTS:

Psychiatric consequences are the major features of chronic “Shabu” abuse and
dependency. Prolonged use and even a single exposure especially if administered
intravenously can lead to manifestations of a full blown psychosis which is similar to
schizophrenia characterized by the presence of paranoid delusions, auditory and visual
hallucinations. The paranoia may lead to violent and aggressive behavior.

Some chronic users have difficulty concentrating or remembering things. Diminished ability
to cope with problems and difficulties in facing reality are common. Loss of interest in sex,
ambition or motivation may also result.

17
Chronic snorters may suffer from severe irritation of the nasal passages and at times may
even develop tissue perforation of the nasal bleed. Renal damage, heart disease and
strokes have been documented among chronic abusers.

Injecting “shabu” from contaminated needles may lead to risk of infections resulting in
inflammation of the blood vesels (Phebitis), infection of the heart valves (Endocarditis),
blood poisoning (Septicemia), and the most dreaded disease AIDS, all of which can lead to
death.

INHALANTS
(HARMFUL EFFECTS)

IMMEDIATE EFFECTS:

1. Confusion/Disorientation
2. Distorted perception of time & distance
3. Aggressive behavior/violence
4. Hallucination
5. Illusions
6. Nausea and vomiting

LONG TERM EFFECTS:

1. Loss of memory
2. Inability to think
3. Muscle cramp and weakness
4. Numbness in limbs
5. Abdominal pains
6. Damage to the central nervous system, kidneys and liver
7. Bone marrow depression

SEDATIVE/HYNOTIC DRUGS
(HARMFUL EFFECTS)

Sedative-Hypnotics (tranquilizers, sleeping pills, sedatives) are drugs which depress or


slow down body functions. These are drugs that can be dangerous when not taken
according to a physician’s instructions.

1. Slurred speech
2. Poor judgment

Regular use of the sedative and hypnotic drugs can cause both physical and psychological
dependence. User will have to take larger doses to get the same effects.

Users feel they used the drug to function.

When regular users stop using these drugs suddenly, they may develop physical-
withdrawal symptoms such as restlessness, insomia, anxiety, convulsion or death.

18
ECSTACY

Ecstacy is the name given to 3-4 methylenedioxymethamphetamine (MDMA) by a Los


Angeles manufacturer of the drug in order to market it. Other street names of MDMA or
“Adam” or XTC is a synthetic, PSYCHOACTIVE (mind allering) drug with hallucegenic and
amphetamine like properties. Its chemical structure is similar to two other synthetic drugs,
MDA and methemphetamine which are known to cause brain damage. MDMA is a so called
“designer drug” which are known has become a worldwide problem as well as a serious
health threat. It is known to be the cause of several deaths in the US and Europe.

BOMB PREVENTION TIPS

ALWAYS BE CONSTANTLY PREPARED!

There is no excuse for not taking every step necessary to meet a bomb threat.

BOMB. A device capable of producing damage to material and injury or death to people
when detonated or ignited. Bombs are classified as explosive which causes damage by
fragmentation, heat and blast wave; and incendiary which generates fire-producing heat
without a substantial explosion when ignited.

BOMBING. A bombing occurs when an explosive bomb detonates or an incendiary bomb


ignites.

BOMB THREAT. An information or warning claiming knowledge that a dangerous device,


such as a bomb or similar type of explosive, has been or will be placed in a building, aircraft
or other facilities.

BOMBING INCIDENT. Any occurrence involving the detonation/ignition of a bomb, the


discovery of a bomb, or the execution of a bomb threat.

WHY PREPARE AGAINST BOMB INCIDENTS? The Philippine National Police


encourages every citizen and every establishment to be constantly prepared against bomb
threats and bombing incidents. Through preparation, you can reduce the accessibility of
your building and identify those areas that can be "hardened" against the potential bomber.
Proper planning can also reduce the threat of panic and decrease the potential for injury
and property damage.

Be prepared! There is no excuse for not taking every step necessary to meet the
threat.

HOW TO PREPARE. In preparing to cope with a bomb incident, it is necessary to develop


two separate plans: a security plan and a bomb incident plan.

• Security provides for the protection of property, personnel, facilities, and material
against unauthorized entry, trespass, damage, sabotage, or other illegal or criminal
acts. The security plan deals with prevention and control of access to the building.
• The bomb incident plan provides detailed procedures to be implemented when a
bomb is found or threatened.
• In planning, a command center must be designated to be located in a focal point of
telephone or radio communications. Obtain an updated blueprint of floor plan of
your building and maintain it in the command center.

19
• Contact the police department, fire department, or local government agencies for
any assistance in developing your security or bomb incident plans.
• Training is essential to deal properly with a bomb threat incident. Instruct all
personnel, especially those at the telephone switchboard, on what to do if a bomb
threat is received.

RESPONDING TO BOMB THREATS. Each threat received through any means of


communications should be treated as real and must be forwarded immediately to the
proper authorities.

Telephone Bomb Threats. The receiving party must remain calm and courteous. Try to
obtain as much information as possible from the caller. Take note of the following
procedures:

1. Get the identity of the caller.


2. Take note of the following characteristics: male or female voice; young, middle-age
or old sounding voice; accent of voice; speech impediments or peculiar voice
characteristics; any background noise; does the voice sound familiar.
3. The exact words of the person placing the call.
4. Show no emotion on the phone.
5. Know the exact location of the bomb.
6. Ask for a description of the bomb/composition of the explosive.
7. Repeat the message to the caller whenever possible and ask for confirmation.
8. The receiving party should remain calm and courteous. He should listen carefully
and write down accurately the information the caller provides.
9. If possible, refer the caller to a supervisor or a person in authority to extract more
information.
10. Apply delaying tactics and engage the caller in prolonged conversation.
11. Take note of the exact time the suspect hung up.
12. The person receiving the bomb threat should attempt to ask the caller certain
questions: When is the bomb going to explode?/ Where is the bomb right now?/
What type of bomb is it?/ What does the bomb look like?/ What will cause it to
explode?/ Why did you place the bomb?
13. Remember that the caller may not answer your questions, but any additional
information that he may relate will be helpful.
14. It may be advisable to inform the caller that the building is occupied and the
detonation of a bomb could result in death or serious injury to many innocent
people.
15. Once the telephone threat is received, notify your local police at once.

Handwritten or Typed Notes. Documents and other materials received should be


carefully handled to preserve marks, fingerprints, etc. for examination by competent
authorities. These items should be forwarded immediately to the proper authorities for
analysis and evaluation. Written messages should never be ignored.

Person-to-Person or Direct Threat

1. Notify your security supervisor immediately.


2. Keep the person making the threat or indicating knowledge of a threat under
surveillance until relieved by your supervisor.
3. Take note of the age, height, weight, sex, color of eyes/hair/skin, clothing, and
unusual characteristics such as lameness, twitching or any peculiarities of the
person under surveillance. Observe other personal behavior, if any.
20
4. If the person leaves the scene, take note of the make, model, color, plate number
and markings of the vehicle used.

PHYSICAL SEARCH OF BUILDINGS. The most effective and fastest search of a building
can be made by the normal occupants of that building. bombs can be made by the normal
occupants of that building. Bombs can be packaged in as many different ways as the
maker's imagination will allow. Since the object of the search can vary in size and shape, it
is a fundamental rule that search must be made by persons who are familiar with the area
in order to notice a strange or foreign object.

In some instances, the detonation or ignition of any explosive or incendiary might depend
on a change in environment, e.g. temperature variations or the presence of an electric
current. Therefore, the personnel assigned to conduct the search should be cautioned not
to cause, or at least minimize any change in the environment. do not go into a dark room
and turn on the lights or change the setting of the thermostats in the room.

SECURITY MEASURES IN BUSINESS ESTABLISHMENTS

1. Strictly implement the inspection procedures of all bags, knapsacks, boxes,


merchandise, etc., that will enter your store/premises.
2. Suspicious looking package, paper bags, etc. left alone should be cautiously
scrutinized as possible bomb(s).
3. When suspected bombs are noted, advice security personnel/employees to
immediately contact the proper authorities.
4. Be observant of people roaming around your area doing nothing. Vendors with
tricycles/knapsacks/bags should be driven out, as they may be used as couriers of
bombs.
5. Advice your security to always observe people leaving behind bags/packages/boxes
in the garbage cans/bins in your premises.
6. Be observant of cars/motorcycle riding individuals who are suspiciously observing
constantly your establishment(s).
7. Be cautious in opening envelopes and packages sent to you by unknown individual
or package with no return addresses.
8. The greatest safeguard against the effects of bomb threats is to prevent entry of
unauthorized persons into certain areas, whenever possible.
9. Restricted entry and positive identification of staff and visitors can be significant
factors in assessing the seriousness of any given threat.

PREVENTIVE TIPS FOR THE MOTOR VEHICLES (MV) OWNERS

1. Always lock all car windows and doors before leaving your car in the parking area.
2. Always park your car in lighted areas during nighttime.
3. Park your motor vehicle in secured places.
4. Check the area where you parked against suspicious looking people.
5. Avoid displaying valuables inside your car when parking to avoid temptations.
6. Remove vital parts like ?ROTOR? if possible before leaving your car .
7. Install alarm and safety devices when possible.
8. Install hidden master switch.
9. Avoid using the street near your residence as your parking area.
10. Always lock your car windows and doors when traveling in congested areas.
11. Never entrust your car key to strangers to avoid duplicating it.
12. As much as possible, park your car inside the garage and the garage gate must
always be secured and locked.
21
13. Never leave your car unattended while the engine is on and the doors are unlocked.
14. When somebody hit or bumped your car don't alight from your car immediately.
Analyze the situation.
15. Avoid hitchhikers especially beautiful women.
16. When waiting for someone don't wait inside the car.
17. Investigate and require driver applicants to submit Police and NBI Clearances.
18. Never entrust to prospective buyers the car you are selling for testing purposes
without escort.
19. Never entrust your car key to anybody except to the management when turning over
your car for repair.
20. For PUVs, don't bite for huge sum that the passengers are offering to bring them in
certain areas unless you know personally the one offering.
21. Take note of the plate numbers of the suspected vehicles tailing that hit you. Then
report it immediately to the Police

MODUS OPERANDI

Kidnapping Paano ginawa ng kriminal ang isang krimen ? Ireport ninyo sa amin kung
paano ginawa ang krimen (MODUS OPERANDI) at makakatulong kayo sa iba pa nating
mga kababayan na makaiwas.

Robbery and Theft

Robbery is committed by any person, who with intent to gain, shall take any personal
property belonging to another, by means of violence against or intimidation of any person,
or using force upon anything shall be guilty of robbery (Art. 293, RPC) Theft is committed
by any person who, with intent to gain but without violence or intimidation of persons nor
force upon things, shall take personal property of another without the latter's consent (Art.
204, RPC). Through the years, the most common forms of robbery and theft have
developed their own unique names that depict the means by which they are committed.
Among them are the following:

Akyat Bahay

Ang AKYAT BAHAY ang pinaka-karaniwang pamamaraan ng nakawan sa Pilipinas.


Kadalasang isinasagawa ng may tatlo hanggang lima kataong grupo. Ang mga nagiging
biktima ay bahayang pansamantalang iniwan ng may-ari upang magbakasyon o kaya
naman ay nasa trabaho. May mga pangyayari din na kahit nasa loob ang mga nakatira ay
ninanakawan pa rin dahil sa kakulangan ng pisikal na depensa. Dis-oras ng gabi lalo na
kung natataong malakas ang ulan o kaya naman ay " brown-out" . Mga alahas at
kasangkapang pang-bahay ang karaniwang tinatangay ng mga magnanakaw. May ilang
pangyayari na kung saan ang mga mag-nanakaw ay may dala-dalang sasakyan upang
paglulanan ng mga ninakaw na kasangkapan.

Salisi

Ang karaniwang nasasalisihan ay mga tindahan, tahanan, maging mga opisina na kung
saan ang bantay o nagmamayari ay pansamantalang nabaling sa ibang bagay. Sa
pagkakataong ito mabilis na isinasakatuparan ang pagnanakaw at alinmang bagay na may
halaga at mabilis na maitatago o madadala ay ninanakaw. "Nasalisihan", ika nga.

22
Bukas Kotse

Karamihang nagaganap sa mga paradahang walang nagbabantay. May mga insidente ring
nangyayari kahit na sa mga "pay parking areas" . Sa mga sanay na sa ganitong krimen,
ilang segundo lamang ang kinakailangan para mabuksan ang sasakyan. Lahat na
mahahalagang bagay sa loob ay kinukuha. May mga pagkakataon rin na kung saan ang
sasakyang pilit nabuksan ay pinapaandar papunta sa ibang lugar upang doon "kahoyan"
ng gulong, stereo, mga ilaw, upuan, at iba pang mga bagay na maaring tangalin. Kung
minsan, nauwi sa ""carnapping"" ang insidente.

Carnapping

Ang "carnapping" ay mabilisan ang pagsasagawa. Kadalasan, 20 -30 segundo lamang ang
kinakailangan para ma-carnap. Maaring marahas ang insidente. May mga driver na
sinasaktan o kaya naman ay napapatay habang inaagaw ang sasakyan. Karamihan ng
carnappers ay armado ng baril o kaya ay patalim. Ang iba pang mga "modus operandi" ay
kinabibilangan ng mga sumusunod: Mga "minor" na "traffic accident", kunwa'y nabungo sa
hulihan. Kapag lumabas ang driver upang tingnan, mabilis na tinututukan ng suspek ng
baril o kaya ay patalim at sabay kinukuha ang sasakyan. Sa mga "stop lights". Ang suspek
ay lalapit sa driver na nakatutok ang baril kasabay ang utos na lumabas. Sa mga parking
spaces. Bigla na lang haharangan ang iyong sasakyan at isang suspek ang lalapit na may
armas at palalabasi n ka sa sasakyan. O kaya naman, ang mga suspek ay nakatayo
lamang sa paligid at inaantay ang iyong pagpasok o paglabas sa iyong sasakyan.

Dugo-dugo

Ito ang tawag sa mga insidente na kung saan ang suspek ay tatawag sa telepono o kaya
naman ay personal na pupunta sa bahay at nagpapanggap na kamag-anak o kaibigan ng
isang miyembro ng pamilya na ayon sa kanya ay nadisgrasya at kinakailangan ng pera o
alahas para maipagamot.. Kadalasan katulong ang nakakatanggap ng tawag na sa takot o
pagkalito ay agad ibinibigay ang hiling ng suspek.

Budol-budol

Isang halimbawa ng budol budol ay nangyayari sa mga transaksyon ng bayaran. May


perang totoo subalit ang karamihan ay mga per-ang peke na. Isa pang halimbawa ay sa
mga bentahan ng ginto. Ang ipapakitang sample ay tunay subalit ang iba o ang karamihan
ay pawang mga peke na. Madalas ding mangyari sa transakyong pera.

Ipit-Taxi

Kadalasang mga nabibiktima ay mga kababaihan. Pagkasakay ng taxi sa hindi kalayuan,


may mga suspek na bigla na lang sasakay at pagigitnaan ang biktima. Hold-up na at ang
pera, alahas, at iba pang mahahalagang dala ay kinukuha ng mga suspek.

FIRE SAFETY TIPS

1. NEVER place a portable heater near curtains, upholstered furniture, or other


flammable materials.

2. NEVER store flammable items such as wood, paper, chemicals, or oily and dirty
rags near heat sources.

23
3. ALWAYS practice and plan a safe fire escape route with the members of your
household.

4. Test your smoke detectors regularly. Replace batteries as needed.

5. If you wake up and smell smoke, get on the floor and crawl to the nearest fire exit
or window.

6. If smoke is present in your home, NEVER open a door until you have checked it
for heat. If the door is hot, DO NOT OPEN IT. Use your alternate escape route.

7. If your clothes catch on fire, STOP, DROP, and ROLL, while covering your face
with your hands.

8. Parents, remember that children will often try to hide from the fire. Be sure to
check all closets and under beds for children during a fire emergency.

Points To Consider When Planning An Emergency Evacuation

1. Know where all viable emergency exits, including windows, are in your residence. A
"viable" exit is one that allows access to the ground or deck with not more than a 5 foot
drop.

2. Plan what secondary exit you will use if your primary exit is blocked.

3. For bedrooms that do not have a viable exit, purchase and install an emergency escape
ladder, and place it under the window to be used.

4. Establish a family meeting point away from the house. All family members should meet
there as soon as they are out of the building.

5. PRACTICE YOUR EMERGENCY ESCAPE PLAN OFTEN!

If Your Clothes Catch On Fire

STOP
DO NOT RUN - Running only makes it worse.
DROP
DROP TO THE GROUND.
Try to cover your eyes with your hands.
ROLL
ROLL and ROLL and ROLL.
Roll Your Body.
Try to smother the fire.

24

You might also like