Five Star Security Officer Training Program

Fourth Star

Student Workbook

Chapter 1

Self Check

1. The right to gather is protected under the ______Amendment of the

______.

2. At which point is a crowd no longer protected by the First Amendment?

3. What are your two duties in monitoring a crowd?

a.

b.

4. What is the difference between a “crowd” and a “mob”?

5. What is your role as a security officer when a crowd becomes unruly?

Self Check

1. What are the three main purposes of crowd control?

a.

b.

c.

2. List the benefits of a centrally located command post.

3. What are two specific duties you may be asked to perform when maintaining the

peace?

Chapter 2

Self Check

1.What are the three objectives of a proprietary alarm system?

2.What is the purpose of an access-control system?

3.Access is either granted or denied based on the ______of an individual, through

PIN number or attribute.

Chapter 3

Self Check

Place a check () next to the information that must be protected at your site.

Computer Hardware/Software Blueprints/Drawings

DataPatent Information

Strategic Marketing Plans Experimental Equipment

Laptop Computers Classified Information

Trade secrets Personnel Information

New Technologies Legal Documents

Contract Information Customer Data Base

Information that needs protection can be found in a number of places. Place a check () next to any of the areas listed below that are relevant to your site.

Brief Cases Floppy Discs

Conference Rooms Filing Cabinets

Main Computers Voice Mail

Desktop Computers Personal Information

Laptop Computers Mail

Chapter 4

Self Check

1.List the three types of evidence and provide an example of each.

a.

b.

c.

2.What is the primary difference between circumstantial evidence and direct

evidence?

3.What is the court’s responsibility regarding guilt in both civil and

criminal trials?

4.How do civil and criminal cases differ in regard to establishing

reasonable doubt?

Self Check

1. What are the four criteria governing evidence admissibility?

a. ______

b. ______

c. ______

d. ______

2. Define relevancy in your own words.

3. When collecting evidence, ______

your steps to ensure materials were collected, stored and transported correctly.

4. What steps are taken to ensure evidence is ruled admissible?

Self Check

1. Name three forms of admissible evidence.

a) ______

b) ______

c) ______

2. ______is generally

known to the public as information which is revealed to another in a professional

setting.

3. In your own words, define “privilege against self-incrimination.”

Chapter 5

Self-Check

1. ______to a crime scene is a basic duty of all security

personnel.

2. The acronym SCANNED describes the ______you need to

follow when arriving at a crime scene.

3. What does the “S” stand for in the acronym “SCANNED?”

Self Check

1. Name the four basic search methods.

a.

b.

c.

d.

2.Which of the four search methods is more effective when working with a partner?

Self Check

Using the space below, sketch the room you are now sitting in with the same detail used to sketch a crime scene.

Chapter 6

Self Check

1. A written legal order summoning or requiring a person to appear in court

and possibly testify is called a ______.

2. A deposition is ______

taken by the opposing attorney with a court recorder present.

Chapter 7

Self Check

1. Name the four classifications listed in the NISPOM.

2. Classified information appearing in the public media is automatically declassifid.

_____True _____False

3. How is a document’s overall classification marking determined?

a. By the CSA

b. By the lowest level of classified information contained

c. By the highest level of classified information contained

d. By the overall amount of classified information contained

f. All of the above

4. Each section, part, paragraph, or similar portion of a classified documentshall be

marked to show the highest level of its classification, or that theportion is unclassified.

_____True _____False

Overview of the Security Classification System

Classified Materials may be any type of information, hardware, equipment, raw data, computer media, memos, letters, drawings, production procedures, pictures, technical information, etc., which the Government has designated to be protected in the interest of national security.

General Definitions:

Top Secret- Information or material which, if disclosed to unauthorized persons will cause "Extremely Grave Damage" to the security of the United States.

Secret- Information or material which, if disclosed to unauthorized persons will cause "Serious Damage" to the security of the United States.

Confidential- Information or material which, if disclosed to unauthorized persons will cause "Damage" to the security of the United States.

How will I know if it is classified?

Classified information must be marked as such. "Physically marking classified information with appropriate classification marks serve to warn and inform holders of the degree of protection required to protect it…" This will be conspicuously marked on the outside front cover (coversheet), on the title page, on the first page and on the outside back cover of the document. Further, markings will be placed on the top and bottom of each page of the document. Documents are marked to highest level of classified information that it contains.

To view the complete National Industrial Security Operations Manual (NISPOM) go to:

Pinkerton Government Services, LLC Fourth Star Workbook

Version 1A Page 1 of 8