Five Star Security Officer Training Program
Fourth Star
Student Workbook
Chapter 1
Self Check
1. The right to gather is protected under the ______Amendment of the
______.
2. At which point is a crowd no longer protected by the First Amendment?
3. What are your two duties in monitoring a crowd?
a.
b.
4. What is the difference between a “crowd” and a “mob”?
5. What is your role as a security officer when a crowd becomes unruly?
Self Check
1. What are the three main purposes of crowd control?
a.
b.
c.
2. List the benefits of a centrally located command post.
3. What are two specific duties you may be asked to perform when maintaining the
peace?
Chapter 2
Self Check
1.What are the three objectives of a proprietary alarm system?
2.What is the purpose of an access-control system?
3.Access is either granted or denied based on the ______of an individual, through
PIN number or attribute.
Chapter 3
Self Check
Place a check () next to the information that must be protected at your site.
Computer Hardware/Software Blueprints/Drawings
DataPatent Information
Strategic Marketing Plans Experimental Equipment
Laptop Computers Classified Information
Trade secrets Personnel Information
New Technologies Legal Documents
Contract Information Customer Data Base
Information that needs protection can be found in a number of places. Place a check () next to any of the areas listed below that are relevant to your site.
Brief Cases Floppy Discs
Conference Rooms Filing Cabinets
Main Computers Voice Mail
Desktop Computers Personal Information
Laptop Computers Mail
Chapter 4
Self Check
1.List the three types of evidence and provide an example of each.
a.
b.
c.
2.What is the primary difference between circumstantial evidence and direct
evidence?
3.What is the court’s responsibility regarding guilt in both civil and
criminal trials?
4.How do civil and criminal cases differ in regard to establishing
reasonable doubt?
Self Check
1. What are the four criteria governing evidence admissibility?
a. ______
b. ______
c. ______
d. ______
2. Define relevancy in your own words.
3. When collecting evidence, ______
your steps to ensure materials were collected, stored and transported correctly.
4. What steps are taken to ensure evidence is ruled admissible?
Self Check
1. Name three forms of admissible evidence.
a) ______
b) ______
c) ______
2. ______is generally
known to the public as information which is revealed to another in a professional
setting.
3. In your own words, define “privilege against self-incrimination.”
Chapter 5
Self-Check
1. ______to a crime scene is a basic duty of all security
personnel.
2. The acronym SCANNED describes the ______you need to
follow when arriving at a crime scene.
3. What does the “S” stand for in the acronym “SCANNED?”
Self Check
1. Name the four basic search methods.
a.
b.
c.
d.
2.Which of the four search methods is more effective when working with a partner?
Self Check
Using the space below, sketch the room you are now sitting in with the same detail used to sketch a crime scene.
Chapter 6
Self Check
1. A written legal order summoning or requiring a person to appear in court
and possibly testify is called a ______.
2. A deposition is ______
taken by the opposing attorney with a court recorder present.
Chapter 7
Self Check
1. Name the four classifications listed in the NISPOM.
2. Classified information appearing in the public media is automatically declassifid.
_____True _____False
3. How is a document’s overall classification marking determined?
a. By the CSA
b. By the lowest level of classified information contained
c. By the highest level of classified information contained
d. By the overall amount of classified information contained
f. All of the above
4. Each section, part, paragraph, or similar portion of a classified documentshall be
marked to show the highest level of its classification, or that theportion is unclassified.
_____True _____False
Overview of the Security Classification System
Classified Materials may be any type of information, hardware, equipment, raw data, computer media, memos, letters, drawings, production procedures, pictures, technical information, etc., which the Government has designated to be protected in the interest of national security.
General Definitions:
Top Secret- Information or material which, if disclosed to unauthorized persons will cause "Extremely Grave Damage" to the security of the United States.
Secret- Information or material which, if disclosed to unauthorized persons will cause "Serious Damage" to the security of the United States.
Confidential- Information or material which, if disclosed to unauthorized persons will cause "Damage" to the security of the United States.
How will I know if it is classified?
Classified information must be marked as such. "Physically marking classified information with appropriate classification marks serve to warn and inform holders of the degree of protection required to protect it…" This will be conspicuously marked on the outside front cover (coversheet), on the title page, on the first page and on the outside back cover of the document. Further, markings will be placed on the top and bottom of each page of the document. Documents are marked to highest level of classified information that it contains.
To view the complete National Industrial Security Operations Manual (NISPOM) go to:
Pinkerton Government Services, LLC Fourth Star Workbook
Version 1A Page 1 of 8