Professional Documents
Culture Documents
Organized Crime
Organized Crime
AN ENFORCER
ENFORCER
- the one who makes for the arrangements for the killing
killi ng (injuring
(injuri ng or carrying out the task
physically, economically or psychologically) the members or non members.
CORRUPTER
A CORRUPTER
- the one who corrupts or bribes, intimidate or threatens, negotiate or “sweet talks” into a
relationship with public officials, law enforcement officer, or anyone who would be of help in
obtaining security and immunity from possible arrest, prosecution and punishments.
A CORRUPTEE
CORRUPTEE
- a public officials, law enforcement officers or anybody who not a member of the organization
who can helps the organization
Scale of Organized Criminal
Criminal
8.
9. Is
Is monopolistic
governs by explicit rules and regulations
2. Hierarchical
Hierarchical
An organized crime has a vertical power structure with at least three (3) ranks. The
authority is inherent in the position and does not depend on who happens to be occupying it at
any given time.
The criteria such as ethnic background, race, kinship, criminal record and other similar
consideration seems to be the basis for membership in an organized crime group.
Sponsorship by a ranking members and behavior characteristics also plays important
factors for recruitment such as but not limited to: willingness to commit criminal act, follow the
rules and regulations and secrecy in the organization.
5. Perpetuates itself
An organized
organized criminal group constitutes
constitutes an ongoing
ongoing criminal conspiracy designed to
persist through time; that is, beyond the life of
of the current membership. In order for the group to
survive, it must have an institutionalized process for inducting new members and inculcating
them with the values and ways of behaving of the social system. This is shown by the depth of
the sub-cultural orientation exhibited by the group.
7. Specialization/Division of Labor
There is a need for established functional position filled with qualified members.
Commonly, there is a need for:
(1) an enforcer , one who carries out difficult assignments involving the use of violence,
including murder, in a rational manner. He may use members or non members or even a
specialist to carry out the assignment; and
(2) a corrupter (fixer/money
(fixer/money mover), excels in developing contacts.
8. MONOPOLISTIC
An organized crime group eschew competition.
competition. It strives for hegemony over a particular
geographic area, a particular “industry”, legitimate or illegitimate,
il legitimate, or a combination of both.
A monopoly
monopoly misonopoly,
, of course,
maintained restrains
by violence, by “free trade”ofand
the threat increases
violence, profits.
or by corruptAnrelationships
organized
organized crime
with
law enforcement officials. A combination of both methods, violence and corruption, may be
employed.
The corporation, the police, and the military are examples of bureaucracies, that mode of
organization essential for efficiently carrying out large scale tasks.
4. Syndicated Crimes
- comes with a structure organization that participates in illicit activity in society
using force, or intimidation.
Victimizing business:
business:
Hijacking of cargo trucks
Robbery
Bankruptcy
Ban kruptcy fraud (“bust-
(“bust-out”)
out”)
Insurance Fraud
Stock Fraud (Inside Trading)
Victimizing individual persons:
persons:
Pornography
4. Miscellaneous Activities:
Activities:
- Money laundering;
- Political corruptions;
- Bullying; and
- And Piracy.
THEORIES OF CRIME
1. The strain of anomie
2. Differential association
3. Subcultures and social disorganization
4. Social control theory
5. Ethnic succession
MAFIA
- is a term used to describe a number of criminal organizations around the world
- the first organization to bear the label was the Sicilian Mafia based in Italy, known to its
members as Cosa Nostra
- in sum, mafia means protection against arrogance of the powerful, remedy to any
damage, sturdiness of body, strength and serenity of spirit, and the best and exquisite
part of life.
- apparently Sicilian-Arabic
Sicilian-Ar abic derived from terms meaning to protect and to act as
guardian; a friend or companion; to defend; preservation, power, integrity, strength,
and a condition that designates the remedy of damage and ill.
-OMERTA
OMERTA code of silence and secrecy that forbids Mafiosi from betraying their comrades to the
is a
authorities.
- Ideal of manliness
- Noncooperation
Noncooperation with authorities
- Self-control in the face of adversity
- Vendetta-blood washes blood
- Neither government nor church to be trusted
The foundation of the entire mafia is respect. Fear is the engine, and money is the
fuel. But longevity of the mafia as an enterprise is built upon an abiding and uncommon
sense of respect.
The penalty
The penalty for transgression
transgression is death,
death, and relatives of the turncoat may also be murdered .
Mafiosi generally do not associate with police (aside perhaps from corrupting individual officers
as necessary). For instance, a mafioso will not call the police when he is a victim of a crime. He
is expected to take care of the problem himself. To do otherwise would undermine his reputation
as a capable protector of others, and his enemies may see him as weak and vulnerable.
According to legend, the word Mafia was first used in the Sicilian revolt – – the Sicilian
Vespers –
Vespers – against
against rule of the Capetian House of Anjou on 30 March 1282. In this legend, Mafia
is the acronym for "Morte Alla Francia, Italia Anela" (Italian for "Death to France, Italy cries!").
However, this version is now discarded by most serious historians.
historians.
VORY V ZAKONE
- aka “ thieves with code of honor”
honor”
It first formed in the barrios in the 1920s. By 1990s, the Major Latino gangs had joined
into two syndicates, the Nortenos
Nortenos based
based in northern California and the Surteno
Surtenoss based in
Southern Califoria.
The Nortenos
Nortenos include
include such gangs as Big Hazard, the Breed Street Gang and the Silver
Leaf Nortenos (SLN).
The Surtenos
Surtenos include
include the Assasins, King Kobra and Mara Salvatrucha.
In the Midwest
The Latino gang coalesced into two syndicates, the Folk Nation and the Peoples Nation
based in Chicago.
In Texas, Mexican American gangs have proliferated with the Mexican Mafia, the PRM
(Partido Revolucionario Mexicano), and Mexicles being the most prominent.
prominent.
1. Gangs (Triad)
(Triad) = work in cooperative ventures involving black market activities,
burglaries and thefts, hijackings and extortions.
2. Criminal Syndicates =
Syndicates = commonly involved in sophisticated crimes such as prostitutions,
human trafficking and other organized form of both are involved in drug trafficking
particularly of heroin from the golden triangle as well as Exploitation of women and
JAPAN
JAPAN
Yakuza (8-9-3)
(8-9-3) or Boryokudan
Boryokudan
- is the most influential organized crime group in Japan.
- Yakuza makes billions of dollars through corporate extractions and the S ok okoiy
oiy a
(shareholders meeting men).
men).
- Other activities that they are involved include exploitation
exploitati on of women, prostitutions (mostly
coming from the Philippines, Thailand and Taiwan) and gambling den.
CAMBODIA
Drug trafficking and human smuggling are the most notable organized criminal activities
in Cambodia which are widely controlled by the Chinese
Chinese and
and Myanmorese
Myanmorese..
Other activities involved gambling, corruption, prostitution and money laundering.
Due to people’s belief of the effect of having sex with virgin women, prostitutio
prostitution
n became
one of the most expensive organized crime crime and virgin
virgin women
women are the highest valued
commodities..
commodities
REPUBLIC OF KOREA
KOREA
.attack political
Severalrivals
organized groups are associated with YAKUZA and other groups in the United
States are involved mostly in drug trafficking, prostitution and exploitation of women.
MYANMAR
Myanmar has the largest organized crime groups controlled by military Junta.
Junta. It includes
the following:
*United Wa State Army (UWSA) –
(UWSA) – under
under the command of Wei-Huseh-Kon
Wei-Huseh-Kong g –
– has
has
connection with Southeast Asian and North America.
* Kinkang Chinese –
Chinese – in
in coordination with MNDAA
MNDAA,, protects cultivation areas and refining
of drugs.
* Myanmar National Democratic Alliance Army –
Army – control
control the plantations and refine opium
into heroin and also produced methamphetamine.
Trafficking of women and children to Pakistan and Thailand and corruption are also
SINGAPORE
SINGAPORE
This is the country with the lowest cases of organized activities due
activities due to stringent laws and
severe penalties and the government’s strong will power for the implementation of laws.
THAILAND
country considered to be the most notorious in the world in terms of s ex i ndus try .
The country
Supplies or imports about one (1) million women in different countries in Asia.
VIETNAM
“Nam Cam Gang”Gang” is one of the most noted organized crime group in Vietnam and
known for drug trafficking and one of the major transit point of drugs in Laos, Myanmar, China
and Taiwan from Cambodia.
PHILIPPINES
PHILIPPINES
The country considered as the heaven for the sex industry . A number of women are sent
abroad as entertainers but later end-up as prostitutes. Thailand, Japan and other Asian
Countries are common places of their destination. Young children for pedophiles are also being
catered.
1. Francisco Group
Group
- Dragon or Kuratong Baleleng Group, now led by Manuel Francisco, operates in Visayas
and Mindanao
2. Pentagon Group
- operates in Mindanao headed by Tahir Alonto,
Alonto, a creation of MILF to generate funds.
Alonto is a nephew of MILF Chairman
Chairman AL HAJ MURAD
MURAD
3. Lexus Group
Group
TRANSNATIONAL CRIME
- a continuing illegal activity of group of person which is primari
primarily
ly concerned with the
generation of profits, irrespective of national boundaries as a result of globalization.
GLOBALIZATION
- refers to the rapid development of the western culture that ultimately
ultimat ely affects other
cultures in the world as brought by intellectual and technological advances, in which
some crimes occurring in other countries are attributed.
SERIOUS CRIME
- shall mean conduct constituting
constituti ng an offence punishable by maximum deprivation of liberty
of at least four years or a more serious penalty
-- It is
It committedininone
is committed moreStathan
te butone State; part of its preparation, planning, direction
substantial
or control takes place in another State;
- It is committed in one State but involves an organized criminal group engages in
criminal activities
activities in more than one State; or
- It is committed in one State but has substantial effects in another State.
Transnational Crimes
- Trafficking
Trafficki ng in Persons
- Terrorism
- Drug Trafficking
Trafficki ng
- Cybercrime
- Money Laundering
- Environmental
Environmental Crime
- Economic crime
- Intellectual Property Theft
- Piracy and Armed Robbery Against Ships
- Illicit Trade (smuggling) of Small Arms and Light Weapons
HUMAN TRAFFICKING
or receiving
over anotherofperson
payments or benefits
for the purposetoofachieve the consent
exploitation of a person
which includes at a having control
minimum, the
exploitation or the prostitution of others or other forms of sexual exploitation, forced labor
or services, slavery, servitude or the removal or sale of organs.
Section 3a, RA 9208
Individual level
- Lack of education and information
- History
Women’s of abuse and exploitation
aspiration
aspiration
Family
- Domestic violence or marital discord
- Desertion
- Separation
- Neglect of parents
- Breadwinner or desire to improve the family’s economic condition
condition
Community
- Congested neighborhood
- Poor housing and living conditions
Lack of employment opportunities
-- Lack of basic social services
Society
- Political and economic insecurity
- Political corruption
corruptio n
- Conflict
- Structural adjustment
adjustment policies resulting in the rising cost of living
- Poverty
- power relations and gender inequality
- Lure of migration
- Consumerism
- Supply and demand
TIP in Asia
- 9.5 million were trafficked in Asia (ILO).
(1/3 trafficked for other form of economic exploitation, the rest are for commercial sexual
exploitation)
Vulnerable sector
-- Approved Mayof26,
Consolidation 2003 Bill No. 2444 and House Bill No. 2444
Senate
Section 4. 4. Acts of Trafficking in Persons. - It shall be unlawful for any person, natural or
juridical, to commit any of the following
following acts:
(a) To recruit, transport, transfer; harbor, provide, or receive a person by any means, including
those done under the pretext of domestic or overseas employment or training or apprenticeship,
for the purpose of prostitution, pornography, sexual exploitation, forced labor, slavery,
involuntary servitude or debt bondage;
(b) To introduce or match for money, profit, or material, economic or other consideration, any
person or, as provided for under Republic Act No. 6955, any Filipino woman to a foreign
national, for marriage for the purpose of acquiring, buying, offering, selling or trading him/her to
engage in prostitution, pornography, sexual exploitation, forced labor, slavery, involuntary
servitude or debt bondage;
(c) To offer
selling, or contract
or trading themmarriage,
to engagereal or simulated,pornography,
in prostitution, for the purpose of acquiring,
sexual buying,
exploitation, offering,
forced labor
or slavery, involuntary servitude or debt bondage;
(d) To undertake or organize tours and travel plans consisting of tourism packages or activities
for the purpose of utilizing and offering persons for prostitution, pornography or sexual
exploitation;
(e) To maintain or hire a person to engage in prostitution or pornography;
(f) To adopt or facilitate the adoption of persons for the purpose of prostitution, pornography,
sexual exploitation, forced labor, slavery, involuntary servitude or debt bondage;
(g) To recruit, hire, adopt, transport or abduct a person, by means of threat or use of force,
fraud, deceit, violence, coercion, or intimidation for the purpose of removal or sale of organs of
said person; and
(h) To recruit, transport or adopt a child to engage in armed activities in the Philippines or
abroad.
country or seekingbenefit
(g) To knowingly redress fromfinancial
from, the government or appropriate
or otherwise, agencies;
or make use of, the and
labor or services of a
person held to a condition of involuntary servitude, forced labor, or slavery.
COMPUTER CRIME
- any crime accomplished through special knowledge of computer technology.
- any crime where computer is used as a tool or as a target or incidental to the
commission of a crime.
- Also known as Cybercrime.
Cybercrime.
- Any illegal act in which knowledge of of computer technology is used to commit the
offense. (L. E. Quaratiello)
- All illegal activities that are committed by or with the aid of computer or information
technology or in which the computers are the target of the criminal enterprise.
enterpris e. (Martin L.
Forst)
RA 8792
- legislated because of I love you virus
- This Act shall be known and cited as the "Electronic Commerce Act.”
Act.”
- Approved June 14, 2000
WHAT ARE COMMON METHODS AND STANDARD TERMS USED TO DESCRIBE CYBER
CRIME?
Hacking
Hacking
- is the act of illegally accessing the computer system/network of an individual, group or
business enterprise without the consent or approval of the owner of the system
system
Cracking
Cracking
- is a higher form of hacking in which the unauthorized access culminates with the
process of defeating the security system
system for the purpose of acquiring money or
information and/or availing of free servic es
es
Internet Pornography
Pornography
- The trafficking,
trafficki ng, distribution, posting, and dissemination of obscene material including
children’s nude pictures, indecent exposure, and child sex slavery posted into the
internet, live streaming videos aired through the internet
internet
A comput
computer
er vi rus
- is a computer program that can copy itself and infect a computer without permission or
knowledge of the user
Virus
Launching of Harmful Computer Virus
1. Virus
Virus
2. Worm
Worm
3. Trojan Horse
Horse
Worm
- spread itself to other computers without needing to be transferred as part of a host
Trojan hors e
Trojan
- is a file that appears harmless until executed. Trojan horses do not insert their code into
other computer files
files
-Logic bomb
bomb
a set of instructions secretly inserted into a program that is designed to execute if a
particular program is satisfied
- the bomb lies dormant until a particular date is reached or command entered
Identity theft
theft
- defined as the criminal act of assuming person’s name, address, social security number,
and date of birth in order to commit fraud
Phishing
Phishing
- sending fraudulent e-mails or website pop-ups, to get victims to divulge sensitive
financial information such as credit card numbers or social security numbers
Website defacement
defacement
- is the unauthorized modification of a website
bought from a certain e-commerce site. Upon acquisition thereof, it will be decrypted to
make it readable and all the information of the transactions will be made
available.Hackers prefer VISA, AMERICAN EXPRESS and MASTERCARD when
filtering credit card information. It is because VISA and MASTERCARD are widely
accepted by almost ALL Internet Shopping Sites. American Express on the other hand
has no CREDIT LIMIT
- American Express
Express credit cards have 15 digits Account Number while Visa and
Mastercard credit cards contain
cards contain 16 .
supplied too.
Wire Transfer of Funds from Fraudulently Acquired Credit Card Card
When a hacker knows your complete credit card information, he can extract CASH from
the acquired credit/debit card online. By signing up with Western Union Money Transfer
(http://www.westernunion.com) using the fraudulently acquired credit card information, he can
pretend that he will just send money to his relative and western union will directly debit the credit
card and it will reflect on the billing statement of the original credit card holder. Wire transfer of
funds using credit cards require the credit card security number.
number.
TECHNICAL TERMS
ISP – stands
ISP – stands for Internet Service Provider. It provides internet service to internet users.
users.
IP Address
Address –
– series of numbers assigned by an Internet Service Provider to an internet user
when it connects to the Internet
Dynamic IP Address
Address – a
– a type of IP Address that changes everytime the internet user accesses
his Internet Service Provider. It is usually assigned to dial-up or base speed broadband service
subscribers (eg. ISP Bonanza, Surfmaxx, PLDT myDSL 128kbps service etc.)
Static IP Address
Address – a
– a type of IP Address that is constant regardless of the time or number of
attempts the internet user accesses the internet. It is usually assigned to High-Speed Internet
Users or Corporate Accounts (eg. ADSL (Asymetric Digital Subscriber Line) connections, E1
Internet Connections, OC3 Internet Connections, T1 Internet Connections, Leased Line Internet
Connections)
Website –
Website – a portfolio of a person / organization / entity / company which is posted on the
Internet for accessibility
accessibility worldwide.
The INTERNET PROTOCOL (IP) ADDRESS is the anchor of the investigation of all
crimes committed via the internet. The identification of the IP Address leads to the identity of the
Internet Service Provider (ISP) used to access the internet and eventually the subscriber of the
account where the internet activity was performed.
The IP Address as given by the ISP depends on the type of internet account a subscriber
maintains, whether it is a DYNAMIC IP or STATIC IP.
If Static:
Subscriber
account, usage andinformation
costs etc.) if(name, billing address, installation address, type of internet
applicable
If Dynamic
log reports indicating telephone number used to make “dial-
“dial -up” access
access
VERY IMPORTANT:
IMPORTANT:
The address of the subscriber as given by the ISP or Phone Company should be
analyzed to determine whether it is a Billing Address or an Installation Address.
For purposes of a search warrant application, the Installation Address is the more
important matter to consider. The purpose of a Search Warrant application/ implementation in a
cyber crime investigation, as with any other offense is to confiscate and seize the
instruments/implements, tools used in the commission of the offense. Since the crime was
committed with the aid of a computer, the same and its peripherals are the instruments used in
its commission.
TOP TEN SECURITY TIPS FOR COMPUTER USERS
1. Never send an e-mail that you wouldn't let your wife or boss to read.
2. Turn off your computer whenwhen you are not using it. It is the only sure way to keep the
hackers out.
3. Use a password to log onto onto your computer. Most operating system let you set a
password and to change it regularly.
4. Don’t accept cookies. If you have to, delete them when you are finished surfing.
surfing.
5. Use the latest versions and software patches for y your
our e-mail and your browser. New
security loopholes are constantly being discovered.
6. Keep your antivirus up to date. Hackers never rest. Every email attachment can contain a
virus, so scan it before you open it.
7. Watch your laptop at the airport. Be specially careful at X-ray security machines, which is
where most laptop theft occur.
8. Don’t use the same password over and over. Make new variations.
variations.
9. Use a paper shredder. Don’t just throw out unsolicited credit card application. Shred
them.
10. Never give out your social security number, online or off. This information in a wrong
hand is license to steal.
TERRORISM
TERRORISM
-
- the
the word
use oterror
use or derives use
r threatened fromofthe Latin
force word to
design terrere,
terrere, meaning
bring “to frighten”
frighten”
about political (Brian Jenkins of
change.
the Rand Corporation)
- the unlawful use of force or violence against persons or property to intimidate or coerce a
government, the civilian population, or any segment thereof, in furtherance of political or
social objectives (FBI)
- an action the urban guerilla must execute with the cold-bloodedness,
cold-bl oodedness, calmness and decision
(Modern godfather of urban guerilla, Carlos Marighella)
- a premeditated, politically
politicall y motivated violence perpetuated against noncombatant targets by
groups of clandestine state agents, usually intended to influence an audience (U.S
Department of State)
- Paul Pillar, an erstwhile deputy chief of of the CIA counter-terrorist
counter-terr orist center, opined that terrorism
has four basic components or elements providing guides to defining it, namely:
1. It is premeditated, planned in advance, rather an impulsive act of rage;
2. It is
3. It is aimed
politicalatand not criminal,
civilians and not but designed
a military to change
targets existing
or combat readypolitical
troops;order;
and
4. Sub-national groups execute it, not the army of a given country.
- the unlawful or threatened use of force or violence by a person or an an organized group
against people or property. With the intention of intimidating or coercing societies or
governments, often for ideological or political reasons, (Webster Dictionary)
- a threat or actual use of force or violence for political or other purpose, to foster fear,
distrust, insecurity, and unrest among specific or the general population
- violence for effect not primarily, and sometimes not all for the physical effect on the actual
target, but rather for its dramatic on an audience
- the calculated use of violence or the threat of violence to attain goals, often political or
ideological in nature
- violent criminal behavior designed to generate fear in the community, or a substantial
segment of it, for political purpose
International terrorism
International
- politicall
politically-oriented
y-oriented extreme violence that is perpetrated by residents or representatives of
one or more countries against the interest of another country or by members of a violent
foreign politically directed organization not affiliated with the country being attacked for
the purpose of forcing a change in government or in how society functions
Al Qaeda
- in Arabic, this means The Base
- founded by Osama bin Laden in 1980
Hamas
-- "enthusiasm“
"enthusiasm“
an acronym of Ḥarakat al -Muqāwamah al -ʾIslāmiyyah
ʾIslāmiyyah "Islamic
"Islamic Resistance Movement")
- is the Palestinian Sunni Islamic or Islamist political party that governs the Gaza Strip.
- Sheikh Ahmed Yassin & Mahmoud Zahar
- “Hamas is an extremist
extremist group...it is one of the deadliest terrorist organizations in the world
today.” George W. Bush
Bush
Hezbollah
- literally "Party of God“
God“
- is a Shi'a Muslim militant group and political party based in Lebanon.
- receives financial and political support from Iran and Syria, and its paramilit
paramilitary
ary wing
wing is
regarded as a resistance movement throughout much of the Arab and Muslim worlds
- the United States,
States, the Netherlands United Kingdom, Israel, Australia, and Canada classify
Hezbollah as a terrorist organization, in whole or in part
Jemaah Islamiya
- Dates of operation: 1993- present
- Aliases: "Islamic Congregation, Islamic Community, Islamic Group
- Base of Operation: Indonesia;
Operation: Indonesia; Malaysia; Philippines; Singapore
- Founding Philosophy:
Philosophy: Create an Islamic state across Southeast Asia to include
Singapore, Indonesia, Malaysia, Brunei, southern Thailand, and southern Philippines.
- JI was
was added to the United Nations 1267 Committee's list of terrorist organizations linked to
al-Qaeda or the Taliban on 25 October 2002 under UN Security Council Resolution 1267
Domestic Terrorism
- politically
politicall y oriented extreme violence that is perpetrated by residents of a country within that
country in order to force a change in government or how in society functions
Founding Philosophy
Philosophy
- The Abu Sayyaf Group (ASG) was formed in 1991 during the peace process between
the Philippine government and the nationalist/separatist terrorist group, the Moro
Ethnocentric
Ethnocentric
- the category of terrorist organization which is aimed at establishing a dominant or superior
rac e that will be looked upon by the entire populace in the world.
Revolutionary
Revolutionary
- the category of terrorist group which is dedicated to overthrow an established order and
replacing it with a new political or social structure.
structure .
Political
Political
- the category of terrorist
terrori st group which aims in restructuring the society .
Nationalistic
Nationalistic
- those who commit acts of violence due to their loyalty or devotion to their country .
Jihad
Jihad
- the term which refers to the holy war waged by
by members of the Islamic religion against
the Jews.
Jews.
IDEOLOGY
- body of ideas affecting the social needs and aspirations of an individual or group, a class
or a culture”
- Bovier defines it as “a set of doctrines or beliefs that from the basis of a political,
economic and other systems”.
systems”.
TERRORIST TACTICS
TACTICS
1. Bombings
2. Assassinations and Assaults
3. Kidnapping
4. Hostage-taking/skyjacking
5. Weapons of mass destruction (WMD)
3. Chocking agents
4. Nerve agents
1. Nerve Agents
- agents that disrupt the mechanism by which nerves communicate with organs they stimulate
- in other words
words the agents gets the nerves to send the wrong signal to the muscles they
control and hence, disrupt muscle function of the body
3. Chocking Agents
- one of the deadliest choking agents is phosgene gas. This agent damages the
respiratory system and causes the lungs to fill with water, and thus chokes the victim.
Ex. chlorine
1.
2. Anthrax toxin
Botulinum
3. Brucellosis
4. Cholera
5. Plague
6. Typhoid fever
7. Rickettsia
Anthrax
- a single cell organism that is produced by a fermentation process, such as that by which
beer is made
- caused by Bacillus anthracis and the effects of exposure include a severe infection that
attacks the skin, lungs, and gastrointestinal tract
- direct contact will cause formation of dry scabs all over the victims body and can develop
into systematic infection
- when inhaled, the agent attacks the respiratory system with symptoms appearing from
one to seven days
Botulinum toxin
- a protein made by the clostridium
clostridi um botulinum bacteria
- exposure to the toxin, the nerve cell synapses are affected, causing palsy, spasms, and
then paralysis
Brucellosis
- also known as undulant fever
- symptoms can include intermittent
intermitt ent or prolonged fever, headaches, profuse
sweating, chills, pains in the joints and muscles and fatigue
Cholera
- an acute gastrointestinal
gastrointest inal disease caused by Vibrio Cholera
Plague
- in natural transmittal form, the plague may the bubonic plague, or black death that
eradicated a great number of European in the middle ages
- transmitted from person to person by respiratory
respirator y transmission,
transmissi on, through rats, or
or from the
- bite of an infected
symptoms flea fever accompanied by general aches, severe weakness, and
are high
pneumonia
Typhoid fever
- caused by an organism called salmonella typhosa which causes fever and frontal
headaches and is usually accompanied by rose colored spots on the skin
- must employed through food and limited water contamination
Rickettsia
- disease that appears in domesticated animals such as sheep, cattle, and goats
- spread to human through inhalation of particles contaminated with organism
- incubation period, ranging from 10 to 14 days
BOMBING
Terrorist commit bombings for a number of reasons:
reasons:
1. To gain media attention, particularly the target is visible or symbolic.
2. Bombing is a cost effective and efficient
efficient way to attack a facility.
3. Bombing can be accomplished with a small number of personnel.
personnel.
4. Bombing is inexpensive in comparison to alternatives such as kidnapping or hostage-
taking.
5. Random bombing make a considerable impact on the population, because more people
fear a bomb attack than being kidnapped or taken hostage.
6. Explosives are readily available through theft, sympathetic supporters, or purchase.
Explosives can be constructed through the use legitimately purchased chemicals,
fertilizers, and other material.
Types of bombers
bombers
1. Amateur
2. Professional
3. Psychopathic
4. Suicidal
1. Amateur
- can be described as experiments
2. Professional
- builds or bombs or does both for profit
3. Psychopathic
- acts without rhyme or reason
4. Suicidal
- major attack weapon in recent years, particularly among Islamic terrorist groups
- Bombings or other attacks are employed to “make a point” with target victims.
victims.
- Selection of targets and victims for maximum propaganda value-
- The use of unprovoked attacks
- Maximum publicity at minimum risk
- Use of surprise to circumvent countermeasures
- Threats, harassment, and violence
- Disregarding women and children as victims
-- Propaganda
Loyalty is used toor
to themselves maximize the effect of the violence
kindred groups
R.A. 9372
- Human Security Act of 2007
- Approved on March 6, 2007
- Effective on May 15, 2007
Terrorism
–
– any person who commits an act punishable under any of the following provisions of the RPC:
(Sec. 3)
1. Article 122 (Piracy in General and Mutiny in the
High Seas or in the Philippine Waters);
2. Article 134 (Rebellion or Insurrection);
3.
4. Article
Article 134-a
134- a (Coup d’ etat), including acts committed by private persons;
248 (Murder); persons;
5. Article 267 (Kidnapping and Serious Illegal Detention);
6. Article 324 (Crimes Involving Destruction)
or under
1. Presidential Decree No. 1613 (The Law on Arson);
2. Republic Act No. 6969 (Toxic Substances and Hazardous and Nuclear Waste Control
Act of 1990);
1990);
3. Republic Act No. 5207, (Atomic Energy Regulatory and Liability Act of 1968);
4. Republic Act No. 6235 (Anti-Hijacking Law);
5. Presidential Decree No. 532 (Anti-piracy and Anti-highway Robbery Law of 1974); and,
6. Presidential Decree No. 1866, as amended (Decree Codifying the Laws on Illegal and
Unlawful Possession, Manufacture, Dealing in, Acquisition or Disposition of Firearms,
Ammunitions or Explosives)thereby
Explosives)thereby sowing and creating a condition of widespread
widespread
and extraordinary fear and panic among the populace, in order to coerce the
government to give in to an unlawful demand shall be guilty of the crime of terrorism
terrorism
and shall suffer the penalty
the penalty of forty (40) years of imprisonment, without the benefit of
parole as provided for under Act No. 4103, otherwise known as the Indeterminate
parole
Sentence Law, as amended.
amended.
The provisions of Republic Act No. 4200 (Anti-Wire Tapping Law) Law) to the contrary
notwithstanding, a police or law enforcement official and the members of his team may, upon a
written order of the Court of Appeals, listen to, intercept and record, with the use of any mode,
form, kind or type of electronic or other surveillance equipment or intercepting and tracking
devices, or with the use of any other suitable ways and means for that purpose, any
communication, message, conversation, discussion, or spoken or written words between
members of a judicially declared and outlawed terrorist organization, association, or group of
persons or of any person charged with or suspected of the crime of terrorism or conspiracy to
commit terrorism.
MONEY LAUNDERING
LAUNDERING
- legitimate
“A processsource.”
source.” which the existence of an illegal source of unlawful application of
through
illicit gains is concealed or disguised to make the gains legitimate, thereby helping to
evade detection, prosecution, seizure and taxation.”
“Money Laundering” is called what it is because the term perfectly describes what takes
place, illegal or dirty money is put through
t hrough a cycle of transactions, or “washed”, or “laundered”,
so that it comes out the other end as legal, or clean money.
In other words, the source of illegally obtained funds is obscured through a succession
of transfers and deals in order that those funds can eventually be made to appear legitimate
income.
- Money laundering allows criminals to preserve and enjoy the proceeds of their crimes,
providing them with the incentive and means to perpetrate such activities and at the same time
expand and consolidate their forces.
- Destroys the integrity of governments. With the increasing awareness of the ill-
ill-effects
effects of
money laundering and the growing interdependence among global communities, countries that
are known to be used by money launderers could be placed in a bad light, adversely affecting
their financial institutions and relations within regional and global economies.
a. The need to conceal the origin and true ownership of the proceeds;
a. The
b.
b. The
The need to maintain control of the proceeds;
proceeds;
c. The need to change the form of the proceeds in order to shrink the huge volumes of cash
c. The
so-called “predicate offense” or “unlawful
generated by the initial criminal activity, the so-called
activity”.
activity”.
IMPUNITY
- without fear of prosecution
- without fear of confiscation
Money laundering is not a single act but is in fact a process that is accomplished in three
basic steps or stages:
a. Placement
b. Layering
c. Integration
- The physical disposal of cash proceeds derived from the unlawful activity.
- The aim is to remove cash from the location of acquisition to avoid detection.
- Separating illicit proceeds from their source by creating complex layers of financial
transactions designed to disguise the source of money, subvert the audit trail and
provide anonymity.
- The purpose is to disassociate the illicit proceeds from the unlawful activity by creating
intentionally a complex web of financial transactions aimed at concealing any audit trail
as well as the source and ownership of funds.
- The final stage in the process at which the money is integrated into legitimate economic
and financial systems and is assimilated with all the other assets in the system.
- Integration of laundered money into the economy is accomplished by making it appear to
have been legally earned. Thus, exceedingly difficult to distinguish between legal and
illegal wealth.
Proceeds
Laundering of Proceeds
- Mix dirty money with legitimate
legitimat e funds
- Use dirty money for legitimate purposes
- Invest dirty money in legitimate business/es
1. Criminalization
Criminalizat ion of money laundering
2. Establishment of a system of suspicious transaction reporting
3. Creation of a centralized financial
financ ial intelligence unit or “FIU”
“FIU”
4. Removal or relaxation of bank secrecy laws
5. Institution of a system allowing mutual assistance and cooperation between countries to
apprehend and prosecute suspected money launderers
The FATF cracks down on terrorist financing with the following nine special
recommendations:
recommendations:
6. Provide the widest possible range of assistance to other countries’ law enforcement and
regulatory authorities for terrorist financing investigations.
7. Impose anti-money laundering requirements on alternative remittance systems.
8. Strengthen customer identification
identificat ion requirements in international and domestic wire transfers.
9. Ensure that entities, in particular non-profit organizati
organizations
ons cannot be used to finance
terrorism.
- The provisions of the Anti-Money Laundering Act of 2001 (AMLA) or R.A. No.9160, as
amended, lays down the Philippine policies and principles to prevent banks, insurance
companies and the securities and capital markets and industries from being utilized by money
launderers to “wash”
“wash” their
their so-called “dirty money”.
money”.
- Thus, it is the Philippines’ policy not only to protect depositors and investors but
of equal importance is the investigation, apprehension and prosecution of suspected
money launderers.
launderers.
- Under the AMLA, money laundering is “ a crime whereby the proceeds of an unlawful
activity are transacted, thereby making them appear to have originated from legitimate
sources.”
sources.”
- Money Laundering as a crime is committed in three (3) different ways under the AMLA
- “Any person knowing that any monetary instrument or property represents, involves, or
relates to, the proceeds of any unlawful activity, transacts or attempts to transact said
monetary instrument
instrument or property.”
- Imprisonment of 7 to 14 years and a fine of not less than P 3 Million but not more than
twice the value of the monetary instrument or property involved in the transaction.
- “Any person knowing that any monetary instrument or property involves the proceeds of
an unlawful activity, performs or fails to perform any act as a result of which he facilitates
the offense of money laundering referred to in paragraph (a) above.”
above.”
- Imprisonment o off 4 to 7 years and a fine of not less than P 1 Million
Millio n but not more than P 3
Million.
- “Any person knowing that any monetary instrument or property is required under this Act
to be disclosed and filed with the Anti-Money
Anti- Money Laundering Council (AMLC), fails to do so.”
so.”
- Perpetual
Perpetual or temporary absolute disqualification
disqualification from public office, as the case may be, if
the offender be a public official or employee.
- If the offender is a corporation, partnership, association or any juridical person, the
penalty shall be imposed on the responsible officer who participated in or allowed by
gross negligence the commission of the crime.
- “Unlawful Activity”
Activity” refers to any act or omission or series or combination thereof
involving
- or having
Piracy DIRECT
on the relation to any of the following:
high seas
- Qualified Theft
- Swindling
- Smuggling
- Offenses under the E-Commerce Act
- Hijacking, destructive arson, murder,
- Violations of the Securities and Regulation Code
- Felonies or offenses of a similar nature under penal laws of other countries
The Anti-Money Laundering Council (AMLC) is the financial intelligence unit of the
Philippines and is composed of the following officials :
:
- The Governor of the Bangko Sentral ng Pilipinas
- The Chairperson of the Securities and Exchange Commission
For the prevention of money laundering, the AMLA contains specific provisions on the
following areas:
a.
a. Customer
Customer identification
b.
b. Keeping
Keeping of records
c. Recognition
c. Recognition and reporting of covered and suspicious transactions
d.
d. Training
Training
Importance of Customer Identification
The inadequacy
inadequacy or absence of “KYC” standards can subject banks to serious customer and
counter (third) party risks, especially:
especially:
1. Reputational risk
2. Operational risk
3. Legal and concentration risk
Reputational Risk
- the potential that adverse publicity regarding a bank’s business practices and
associations, whether accurate or not, will cause a loss of confidence in the integrity of
the institution.
Operational Risk
Risk
Legal Risk
Risk
- the possibility that lawsuits, adverse judgments or contracts that turn out to be
unenforceable can disrupt or adversely affect the operations or condition of a bank.
-RA 9194
approved on March 7, 2003
- An Act Amending Republic Act No. 9160, otherwise known as the Anti-Money
Laundering Act of 2001
ARM SMUGGLING
Smuggling
Smuggling
- also known as trafficking
trafficking,, is the clandestine transportation of goods or persons past a
point where prohibited, such as out of a building, into a prison, or across an international
border, in violation of the law or other rules
FIREARMS TRAFFICKING
- refers to the act of any person who, through the use of any fraudulent machinations,
shall import or bring into, or export from, the Philippines, or assist in so doing, any
firearm or parts thereof, explosive or ammunition or machine, implements, equipments
or tools for the manufacture of firearms.
- shall likewise refer to the act of any person who,
who, contrary
contrary to law, shall:
- receive, conceal, buy, sell, or in any manner facilitate the transportation,
transportati on,
concealment or sale of said firearms or parts thereof, explosive or
ammunition or machine, implements, equipments or tools for the
manufacture of firearms, ammunition or explosives after importation,
knowing the same to have been imported contrary to law.
- No region
region is immune to illicit trade and
and trafficking in small
small arms and light weapons
weapons
- Collaborative and cooperative measures are essential to address this transnational
threat.
- Firearms
hand can can
be abe tools of
disaster forviolence. Letting the control of the tools of violence get out of
any society.
RELEVANT LAWS
LAWS
- The Memorandum for the SILG recommending the phase-out of the use, manufacture or
sale of Paltik (home-made)
(home-made) Firearms; and
without the authority of the owner of the intellectual property; the facilitation of their production,
and the distribution of such goods including importation and retailing; counterfeiting or pirating of
goods facilitated by use of the Internet or satellite technologies, or piracy or theft of information
or broadcasts, or unauthorized photocopying of books for education purposes, or of
unauthorized end-user piracy of software
software beyond the purchaser’s license, or piracy of domain
names or company names, or counterfeiting of currency; the unauthorized manufacture and
distribution of copies of such goods and works which are intended to appear to be so similar to
the original
clothing not as to be passed
manufactured byoff
or as
on genuine
behalf ofexamples.
the ownerThis includes
of the use ofand
trade mark, famous
exactbrands
copiesonof
CDs containing any material or software, which are traded in a form intended to be
indistinguishable to ordinary consumers from the genuine product. Intellectual property right is
“the legal ownership by a person or business of a copyright, design, and patent, trade mark
attached to a particular product or process which protects the owner against unauthorized
copying or imitation. Such property rights are an important element of product differentiation and
confer temporary monopoly advantages to suppliers” (Pass, Lowes and Davies 1993: 265). The
term intellectual property rights include copyright and related rights, trademarks and service
marks, geographic indications, industrial designs, patents, layout-designs.
RA 10088
- known as the "Anti-Camcording
"Anti-Camco rding Act of 2010
- Approved on May 13, 2010
DRUG TRAFFICKING
R.A. 6425 –
6425 – Dangerous Drug Act of 1972 was repealed by,
R.A. 9165 –
9165 – Comprehensive Dangerous Drug Act of 2002
ENVIRONMENTAL
ENVIRONMEN TAL CRIME
Environmental Crime
- the deliberate evasion of environmental laws and regulations by individuals and
companies in the pursuit of “personal interest and benefit.” Where these activities involve
movements across national boundaries, or impacts upon the world as a whole, they can
ECONOMIC CRIME
CRIME
Economic Crime
- referred to as commercial crimes and known also as “white collar” crimes
crimes
- any act characterized by fraud, concealment, or a violation of trust and areare not
dependent upon the application or threat of physical force or violence
The definition of piracy is contained in article 101 of the 1982 United Nations
Conventions on the Sea (UNCLOS)
“Piracy consist of any of the following acts:
a. any illegal acts of violence or detention, or any act of depredation, committed for
private ends by the crew or the passengers of a private ship or a private aircraft and
directed:
a.1 on the high seas, against another ship or aircraft, or against persons or
property on board of such ship or aircraft.
a.2 against a ship, aircraft, person or property in a place outside the jurisdiction
of any State.
b. Any act of voluntary participation in the operation of a ship or an aircraft with
knowledge of facts making it a pirate ship or aicraft;
c. Any act inciting or of intentionally facilitating an act describe in sub-paragraph (a) or
(b)