Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 29

Lesson 4: PRESIDENTIAL DECREE No.

1612 ANTI-FENCING LAW OF 1979


The Anti-Fencing Law of 1979 (PD 1612) defines and punishes “fencing,” or the act of any
person who, with intent to gain for himself or for another, shall buy, receive, possess, keep,
acquire, conceal, sell, or shall buy and sell, an item which he knows, or should be known to
him, to have been derived from the proceeds of robbery or theft.
Definition of Terms
1. Fencing is the act of any person who, with intent to gain for himself or for another, shall
buy, receive, possess, keep, acquire, conceal, sell or dispose of, or shall buy and sell, or in
any other manner deal in any article, item, object or anything of value which he knows, or
should be known to him, to have been derived from the proceeds of the crime of robbery or
theft.

2. Fence includes any person, firm, association corporation or partnership or other


organization who/which commits the act of fencing.

Essential elements of the crime of fencing

(1) a crime of robbery or theft has been committed;

(2) the accused, who is not a principal or on accomplice in the commission of the crime of
robbery or theft, buys, receives, possesses, keeps, acquires, conceals, sells or disposes, or
buys and sells, or in any manner deals in any article, item, object or anything of value, which
has been derived from the proceeds of the crime of robbery or theft;

(3) the accused knew or should have known that the said article, item, object or anything of
value has been derived from the proceeds of the crime of robbery or theft; and

(4) there is, on the part of one accused, intent to gain for oneself or for another.

Circumstances/conditions of Anti- Penalty


Fencing
1. If the value of the property involved is Prision mayor
more than 12,000 pesos but not exceeding
22,000 pesos
2. If the value of such property exceeds Prision mayor maximum period adding one
22,000 year for each additional 10,000 but the total
penalty which may be imposed shall not
exceed twenty years. In such cases, the
penalty shall be termed reclusion temporal
and the accessory penalty pertaining
thereto provided in the Revised Penal
Code shall also be imposed.

3. If the value of the property robbed or Prision correccional in its medium and
stolen is more than 6,000 pesos but not maximum periods
exceeding 12,000 pesos.
4. If the value of the property involved is Prision correccional in its minimum and
more than 200 pesos but not exceeding medium periods
6,000 pesos.
5. If the value of the property involved is Arresto mayor in its medium period to
over 50 pesos but not exceeding 200 pesos. prision correccional in its minimum period
6. If the value is over five (5) pesos but not arresto mayor in its medium period

lcn cdi3 1
exceeding 50 pesos.
7. If the value does not exceed 5 pesos. of arresto mayor in its minimum period

Section 4. Liability of Officials of Juridical Persons. If the fence is a partnership, firm,


corporation or association, the president or the manager or any officer thereof who knows or
should have known the commission of the offense shall be liable.
Section 5. Presumption of Fencing. Mere possession of any good, article, item, object, or
anything of value which has been the subject of robbery or thievery shall be prima facie
evidence of fencing.

https://lawphil.net/judjuris/juri2013/apr2013/gr_190475_2013.html

lcn cdi3 2
Lesson 5: Bombing and Explosion

Terms to ponder:

Black Powder - A low explosive traditionally consisting of potassium nitrate, sulfur and charcoal.
Sodium nitrate may be found in place of potassium nitrate.

Blasting Agent - A high explosive with low sensitivity usually based on ammonium nitrate and not
containing additional high explosive(s).

Blasting Cap - A metal tube containing a primary high explosive capable of initiating most explosives.

Bomb - A device containing an explosive, incendiary, or chemical material designed to explode.

Cannon Fuse - A coated, thread-wrapped cord filled with black powder designed to initiate flame-
sensitive explosives.

Combustion - Any type of exothermic oxidation reaction, including, but not limited to burning,
deflagration and/or detonation.

Deflagration - An exothermic reaction that occurs particle to particle at subsonic speed.

Detonation - An exothermic reaction that propagates a shockwave through an explosive at


supersonic speed (greater than 3,300ft/sec).

Dynamite - Originally, a mixture of nitroglycerine and an absorbent filler now used to designate an
entire class of high explosives.

Explosion - A rapid expansion of gases resulting from a chemical or physical action that produces a
pressure wave.

Explosive - A chemical substance or mixture capable of producing an explosion.

Explosive Compound - A single chemical compound capable of causing an explosion.

Explosive Mixture - A mixture of chemical compounds capable of causing an explosion.

Explosive Ordnance Disposal (EOD) - Bomb squad; term generally used more for a military context.

Explosive Precursor - Any chemical material that can be mixed with one or more other chemical
substances that consist of fuels and oxidizers that result in the intended production on an explosive.

Improvised Explosive Device (IED) - A non-commercially produced device designed to explode.

Incendiary - A compound, metal or mixture capable of producing intense heat.

Incendiary devices - A common incendiary device used by rioters to start fires is the Molotov
cocktail. A Molotov cocktail is a glass bottle containing a mixture of flammable liquids; a rag or fuse is
attached and lit just before the bottle is thrown. This ignites the liquid upon impact

Principles of Explosives Analysis

Explosives are used for a variety of legitimate applications from mining to military operations.
However, these materials can also be used by criminals and terrorists to threaten harm or
cause death and destruction.

lcn cdi3 3
Bombs can be either explosive or incendiary devices, or a combination of the two. An
explosive device employs either a liquid, a powder, or a solid explosive material; an
incendiary device is flammable and is intended to start a fire.

Explosives are classified according to the speed at which they react. High explosive
materials, such as dynamite, Trinitrotoluene (TNT), C-4 and acetone peroxide, react at a rate
faster than the speed of sound in that material, causing a loud detonation. These substances
are tightly controlled to ensure they are not easily procured.

Bomb Blast Effects

The effects of an explosion are created through the action of several rapidly occurring
events. The most damaging phase of the explosion is the initial blast wave that radiates
rapidly outward from the epicenter. This wave of highly compressed air inflicts the primary
damage to structures and people.

The initial blast wave, also called shock waves, violently expel fragments of the casing and
shrapnel such as nails or screws that may have been added to the device. In addition to the
shrapnel from the device, when an explosion occurs in or near a building, fragments from
high-velocity glass shards or other building materials can be a large contributor to injuries.

The blast may also produce high heat and a fireball that could start secondary fires or
explosions. In most explosions the seat of the explosion should be apparent, but structural
damage and physical damage to vehicles can be used to approximate the location of the
seat of the explosion.

Common Explosive/Incendiary Devices

Common pipe bomb (Courtesy of NFSTC)

lcn cdi3 4
One of the most common explosives encountered by a bomb squad is a pipe bomb. A pipe
bomb is a section of pipe that usually contains a low explosive powder mixture. The ends are
capped and a fuse is inserted into the explosive powder. Upon explosion, the bomb sends
shards of the pipe outward at a rapid speed. If a bomb has a hard casing, such as a steel
pipe, large fragments may be found around the blast site. If a bomb has a soft casing, it will
generally leave smaller fragments behind. (Image courtesy of FBI

Improvised explosive devices (IED) - The term “IED” has become commonplace since
U.S. involvement in the Iraq and Afghanistan wars. These homemade devices can be
delivered in a myriad of different designs—from letter bombs to roadside bombs. IEDs
employ at least four key components: a power supply, initiator, explosive material and a
switch. A typical IED marries an explosive main charge with electrical fusing system that can
contain components from a device such as a mobile phone or garage door opener.

Common IEDs (left to right): remote controlled IED, victim-operated IEDs (2) (Courtesy of
NFSTC)

Remote controlled IEDs often use radios or cell phones as the triggering device. Victim-
operated IED (VOIED) fusing systems require someone or something to complete an
electronic circuit such as stepping on two pieces of metal wire, held apart by an insulator. A
VOIED using two metal strips wired, but separated by matchboxes achieve the same effect
as the saw blades above and show the diversity of materials that IED triggers can be made
from.

lcn cdi3 5
INVESTIGATION OF BOMBINGS
The increasing challenges posed by the growing sophistication of terrorist organizations not
only in the Philippines but elsewhere in the world have become a major concern among law
enforcement and security officers. In the light of this concern, this section is formulated to
guide investigators, such as the bomb technicians, criminal investigators and forensic
personnel during the investigation of bombing incidents and other incidents involving
explosive devices and materials.
SPECIFIC INVESTIGATIVE PROCEDURES: A General Procedure Upon Receipt of
Explosive-Related Incident such as discovery of IED/explosive materials, bomb
threats and explosion:
a. Desk Officer shall ask for and record in the Police Blotter the following from the
source of information:
1. Name of the source
2. Contact information of the source
3. Exact location of the incident
4. Time and date of the incident
5. Details of the incident
b. Desk Officer shall inform the Chief of Police about the incident.
c. Desk Officer shall dispatch mobile or foot-patrol police personnel to verify the
incident.
d. Desk Officer shall direct the TOC to call the following emergency service agencies,
request them to be on standby while verification of the incident is on-going and seek
their assistance once the incident is verified:
1. Police Bomb Squad Units/EOD Team
2. SOCO Operatives
3. Fire Services
4. Emergency Medical Services/Rescue
5. Engineering Services (for lighting, heavy equipment, etc.)
6. Utility Services (Electric and Water)
7. Other agencies (Philippine Red Cross, Metro Manila Development Authority,
NDCC, etc.)

e. Desk Officer shall inform his Commander (Station Commander, Chief of Police,
etc.) about the incident and all actions taken.

DURING VERIFICATION OF THE INCIDENT BY THE FIRST RESPONDER/S OR


INVESTIGATORS:

a. The First Responder/Investigator shall record the information about the nature of their
dispatch in their notebooks or ticklers. They should be equipped with a camera or video
recorder for capturing the condition of the scene upon their arrival and any succeeding
events.

b. They shall proceed to the incident scene.

c. They shall assess the situation at the scene of the incident and immediately notify the
Desk Officer who will in turn inform his Chief of Police about the confirmation of the
incident.

d. In case IED/explosive materials are found, request for the immediate assistance of the
Bomb Squad/EOD Team.

lcn cdi3 6
e. They shall cordon the area to preserve and secure the crime scene and wait for the
arrival of the Bomb Squad/EOD Team.

f. If the scene is obvious for signs of an explosion, First Responders/Investigators shall


cause the immediate evacuation of people who were injured from the crime scene.
Whenever possible, immediately maintain order and control of the crowd. THEY SHALL
NOT TOUCH, REMOVE, OR ALTER ANY PIECE OF EVIDENCE (INCLUDING DEAD
PEOPLE).

g. Initiate immediate investigation.

KEY INFORMATION NEEDED FOR EXPLODED ITEM


a. Time of detonation/explosion.
b. Sound of explosion. Description of the sound produced by the explosion.
c. Force of the explosion and its direction. Description of the extent and direction of blast
wave.
d. Color of smoke. Example: black, gray, white
e. Color of flame. Example: red, yellow, etc.
f. Odor of the gases produced. Example: LPG, natural gas, etc.
g. Record names and addresses of person(s) such as, medical and fire personnel, etc.
accessing the scene and submit list to the Investigator-on-Case.
h. Do not issue press releases or any statements. It is the job of the Incident
Commander or his designated spokesman.

POST-BLAST INVESTIGATION (PBI) PROCEDURE:

a) Conduct preliminary evaluation of the crime scene. First Responders must assess the
scene quickly yet thoroughly to determine the course of action to be taken.

b) Exercise scene safety. First Responders must take steps to identify and remove or
mitigate safety hazards (e.g. secondary device(s), hanging live electric wires, weak
building structure) that may further threaten victims, bystanders and public safety
personnel.

c) Administer life-saving efforts. First Responders must rescue living victims and provide
treatment for life-threatening injuries.

d) Establish security and control. First Responders will establish control and restrict
scene access to essential personnel (EMS), thereby aiding rescue efforts and scene
preservation.

e) Ensure scene integrity. The Incident Commander must ensure the integrity of the
scene by establishing security perimeters and staging areas, contamination control
procedures and evidence collection and control procedures.

f) Conduct scene walkthrough. The Incident Commander must conduct walkthrough with
respective Team Leader of Investigators, Bomb Squad Unit and SOCO to establish
scene parameters, entry/exit path, and to acquire overview of the incident.

lcn cdi3 7
g) Secure required resources. Following the walkthrough, the Incident Commander
should meet the available emergency responders and PBI Team for updates of the
scene and to determine what resources, equipment and additional personnel may be
needed.

h) Develop written documentation. There should be a Decision Logbook, wherein every


crucial decision made related to the incident should be documented and signed by
whoever made the decision such as, allowing entry to crime scene by person(s) not
member of PBI Team; removal of any object inside the scene. First Responders and
SOCO Team will prepare scene documentation (e.g. person who access the scene,
sketches, floor plans and architectural or engineering drawings); while the Investigators
document activities, noting dates and time associated with the incident, physical and
environmental conditions, statement given by the victims/witnesses, etc.

i) Photograph/Videotape the scene. Aside from the SOCO documentation, Investigator


must have his/her own documentation of the overall views and assembled crowd.

j) Locate and interview victims and witnesses. Investigators should obtain


victim’s/witnesses identities/details, statements and information concerning their injuries
and accounts of the incident.

k) Request the assistance of Bomb Squad Unit and SOCO. Secure the assistance of
these technical personnel to ensure a tight case.

l) Collect, preserve, inventory, package, transport of evidence to Crime Laboratory.


Refer to Crime Lab Manual.

m) Ensure that all investigative steps are documented. The Investigators must review all
documentation before releasing the scene.

n) Ensure crime processing is completed. The scene may be released only upon
conclusion of the on-site investigation and thorough evidence collection.

o) Release of crime scene by SOCO to Investigator-on-Case. Release the scene with


the notion that there is only one chance to perform the job correctly and completely and
after completion of the final survey and proper documentation.

p) Turnover of crime scene by the Investigator-on-Case to authorized person. The


release of the scene must be documented. The Investigator should ensure
communication of known scene-related health and safety issues to a receiving authority
at the time of release.
PNP Criminal Investigation Manual 2011

How the Evidence Is Collected

If an undetonated device is located, it must first be rendered safe. A bomb should


never be moved from where it was found because it could detonate. This should only
be conducted by a qualified bomb technician. Safety is the primary consideration;
damage to a structure can be repaired, but injury to a person could be life-altering or
fatal.

lcn cdi3 8
To examine the type of explosive, bomb technicians use remote robotic equipment to
take pictures of the device, or even to detonate the bomb. Robots are commonly
fitted with a device that can shoot a high velocity jet of water into the device,
disrupting it. The bomb squad technician can then move in to confirm the area is
safe and law enforcement can begin an investigation.

A bomb squad technician may also use a portable X-ray tool to examine a
suspicious package to determine if it contains an explosive. X-rays are commonly
used in airports to examine luggage to ensure baggage does not contain explosive
devices.

Before being transported from the scene, all physical evidence is photographed,
packaged, placed into containers, labeled and secured. Evidence could even be
lodged in the bodies of victims or a suicide bomber. The body can be examined via
X-ray images and the evidence retrieved if necessary.

If a community doesn’t have its own specialized unit to handle explosives, it will have
an agreement with a nearby bomb squad to handle these types of situations.

Who Conducts the Analysis

Several professionals may be involved in examining explosives evidence or a


destructive device. A chemist who is specially trained examines items for explosive
residues. This practitioner may work in concert with explosive device specialists who
have knowledge of electrical components, expertise in device reconstruction and an
understanding of post-blast damage.

GENERAL GUIDELINES in Bombing and Explosive Incident

a. Consistent with its mandate, the PNP is the lead agency that will conduct
investigations on bombing and other explosives-related incidents.

b. In case of an explosives-related incident, the responsibility for responding is often but


not always shared by a variety of professionals. PNP foot and mobile patrol personnel,
EOD personnel from the AFP, NBI and PCG, fire-fighters from the Bureau of Fire
Protection (BFP), medical teams and local volunteer organizations, invariably are the
first to respond to calls for assistance. Medical personnel are expected to treat those
injured and evacuate them to hospitals, fire-fighters from BFP and local fire brigades to
put out fires, and the PNP first responders to cordon the area to secure and preserve the
crime scene.

c. Render safe procedures (RSP) and Improvised Explosive Device (IED) recovery will
be the sole discretion of the responding PNP Bomb Squad Unit/AFP EOD personnel that
has already taken first cognizance of an IED in the incident scene.

d. Police Bomb Squad Unit and the PNP Crime Laboratory should be notified. Before the
EOD and bomb technicians are allowed entry to the scene, they should allow
themselves to be swabbed by PNP CL/SOCO personnel. If no secondary device exists
and the area is declared safe by the EOD and bomb technicians, the PNP CL can

lcn cdi3 9
proceed with Scene of Crime Operation (SOCO) to collect and document evidences.
(PNP Forensic Group Forensic Divisions such as the Medico-Legal, Chemistry, DNA
Laboratory Branch, Physical Identification, Firearms Identification, Questioned
Document Examination, Polygraph, and Fingerprint Identification )

e. Security/Protection of the crime scene shall be the responsibility of the local police
unit assisted by the military units in the area. Police line must be established as soon as
applicable. In case of bombing/explosion incident, the police line should be extended at
a distance of 50% of the total distance from the seat of explosion to the farthest
fragment.

f. Incident Commander must identify the area designated for the command post,
media area, etc. outside the police line. ONLY AUTHORIZED PERSONS ARE
ALLOWED TO ENTER THE CRIME SCENE.

Note: Only authorized personnel should enter the crime scene after it is declared
safe by Bomb Squad/EOD Team personnel. They MUST wear gloves, shoe covers,
mask, and if needed hard hats before entering the crime scene and avoid touching
any piece of evidence thereat to ensure that no cross contamination will occur.

Authorized persons are: For Bombing and Explosions: Members of the Post-
Blast Investigation Team

For Raids, Searches and Seizures: Investigators, Searching and Seizing


Officer and Bomb Squad/EOD Team Personnel.

For Bomb Threat: Bomb Squad/EOD Team Personnel.

i. SOCO personnel are the only authorized persons to handle, document, and
conduct laboratory examination of gathered physical evidences. Bomb
technicians/EOD personnel however, may join the search for bomb parts/fragments
in tandem with PNP Crime Laboratory personnel. The assistance can be extended
during the reconstruction of the device.

j. In cases where an explosion resulted in a subsequent conflagration/fire,


responding BFP or fire volunteer brigade personnel should be advised beforehand of
the location of the alleged explosion. Fire in the specific area of explosion should
only be contained and not be over-flooded with water to assure the collection of
pieces of evidence that might be crucial in the conduct of investigation.

k. In the absence of a Bomb Squad/EOD Team and SOCO Team, designated


investigator can collect pieces of evidence using the proper procedure and preserve
items in appropriate labelled containers. Bear in mind that the assistance of both
technical units (Bomb Squad and Crime Lab) is very crucial in establishing a case
and for further filing of appropriate charges against identified suspect/s.

l. Chemical examination/analysis of collected evidence will be the responsibility of


the PNP Crime Laboratory with the assistance of the National Bureau of
Investigations (NBI), if requested.

lcn cdi3 10
m. Evidence explosive material/s must be rendered safe before safekeeping of
authorized bomb squad unit in a magazine or ammo dam.

Lesson 6: ECONOMIC CRIMES

Economic crime, also known as financial crime, refers to illegal acts committed by an
individual or a group of individuals to obtain a financial or professional advantage. The
principal motive in such crimes is economic gain. https://www.europol.europa.eu/crime-
areas-and-statistics/crime-areas/economic-crime

Bribery and corruption is another obstinate (unyielding/unbending) threat, the second most
disruptive economic crime in the Philippines.

In the Philippines, the main laws relevant to fraud/corporate fraud are


contained in:
 Article 315 on Swindling/Estafa of the Revised Penal Code (Penal Code).
 Access Devices Law (Republic Act No 8484).
 Civil Code of the Philippines (Civil Code).
 National Internal Revenue Code (Tax Code).
 Cybercrime Prevention Act (Cybercrime Act).

Specific offences relevant to corporate fraud

Swindling

The main crime involving fraud in the Philippines is "swindling" (estafa), which is punishable under
Article 315 of the Penal Code. This offence involves defrauding another through the means of
(among others):
 Misappropriating or converting to the prejudice of another, money, goods or other personal
property received by the offender in trust or commission, or for administration or under any
other obligation involving the duty to deliver or return such money/goods/property.
 Taking undue advantage of the signature of the offended party in blank, and by writing
any document above such signature in blank, to the prejudice of another (forgery).
 Using a fictitious name, or falsely pretending to possess qualifications, property, credit,
agency, business or imaginary transactions, or by means of other similar deceits.

Access Devices Law

The Access Devices Law prohibits fraud committed in relation to an "access device" or "any
card, plate, code, account number, electronic serial number, personal identification number,
or other telecommunications service, equipment, or instrumental identifier, or other means of
account access that can be used to obtain money, good, services, or any other thing of
value or to initiate a transfer of funds (other than a transfer originated solely by paper
instrument)". The following are prohibited:

 Producing, using, trafficking in one or more counterfeit access devices.


 Using, with intent to defraud, an unauthorised access device.
 Inducing, enticing, permitting or in manner allowing another, to produce, use, traffic in
counterfeit access devices or unauthorised access devices.

lcn cdi3 11
 Disclosing any information imprinted on the access device (such as the account number or
name or address of the device holder) without the latter's authority or permission.

*Obtaining money or anything of value through the use of an access device, with the intent
to defraud or with intent to gain and then fleeing thereafter.

Cybercrime Act

The Cybercrime Act punishes computer-related fraud, which is defined as any unauthorized
input, alteration, or deletion of computer data or program or interference in the functioning of
a computer system, which causes damage with fraudulent intent (section 4b[2], Cybercrime
Act).

Swindling under Article 315 of the Penal Code will be considered a cybercrime if the offence
was committed by, through and with the use of information and communications
technologies (section, 6, Cybercrime Act). https://uk.practicallaw.thomsonreuters.com/w-
017-9057?transitionType=Default&contextData=(sc.Default)&firstPage=true

What is Republic Act No 8792?


- Electronic Commerce Act 2000

This Act shall apply to any kind of electronic data message and electronic document
used in the context of commercial and non-commercial activities to include domestic
and international dealings, transactions, arrangements, agreements, contracts and
exchanges and storage of information.

Definition of Terms
a) Addressee refers to a person who is intended by the originator to receive the
electronic data message or electronic document, but does not include a person
acting as an intermediary with respect to that electronic data message or electronic
document.

b) Computer refers to any device or apparatus singly or interconnected which, by


electronic, electro-mechanical, optical and/or magnetic impulse, or other means with
the same function, can receive, record, transmit, store, process, correlate, analyze,
project, retrieve and/or produce information, data, text, graphics, figures, voice,
video, symbols or other modes of expression or perform any one or more of these
functions.

c) Electronic data message refers to information generated, sent, received or stored


by electronic, optical or similar means.

d) Information and Communication System refers to a system for generating,


sending, receiving, storing or otherwise processing electronic data messages or
electronic documents and includes the computer system or other similar device by or
in which data is recorded or stored and any procedures related to the recording or
storage of electronic data message or electronic document.

e) Electronic signature refers to any distinctive mark, characteristic and/or sound in


electronic form, representing the identity of a person and attached to or logically
associated with the electronic data message or electronic document or any

lcn cdi3 12
methodology or procedures employed or adopted by a person and executed or
adopted by such person with the intention of authenticating or approving an
electronic data message or electronic document.

f) Electronic document refers to information or the representation of information,


data, figures, symbols or other modes of written expression, described or however
represented, by which a right is established or an obligation extinguished, or by
which a fact may be proved and affirmed, which is received, recorded, transmitted,
stored, processed, retrieved or produced electronically.

g) Electronic key refers to a secret code which secures and defends sensitive
information that crosses over public channels into a form decipherable only with a
matching electronic key.

h) Intermediary refers to a person who in behalf of another person and with respect
to a particular electronic data message or electronic document sends, receives
and/or stores or provides other services in respect of that electronic data message or
electronic document.

Presumption Relating to Electronic Signatures. — In any proceedings involving an


electronic signature, it shall be presumed that,

a.) The electronic signature is the signature of the person to whom it correlates; and

b.) The electronic signature was affixed by that person with the intention of signing or
approving the electronic document unless the person relying on the electronically
signed electronic document knows or has notice of defects in or unreliability of the
signature or reliance on the electronic signature is not reasonable under the
circumstances.

Acts in violations of Electronic Commerce Act


1. Any acts of hacking or cracking or unauthorized access into or interference in a
computer system/server or information and communication system; or any access in
order to corrupt, alter, steal, or destroy using a computer or other similar information
and communication devices including the introduction of computer viruses and the
like, resulting in the corruption, destruction, alteration, theft or loss of electronic data
messages or electronic documents.

2. Any act of Piracy or the unauthorized copying, reproduction, dissemination, or


distribution, importation, use, removal, alteration, substitution, modification, storage,
uploading, downloading, communication, making available to the public, or
broadcasting of protected material, electronic signature or copyrighted works
including legally protected sound recording or phonograms or information material on
protected works, through the use of telecommunication networks, such as, but not
limited to, the internet, in a manner that infringes intellectual property rights.

3. The access is without the knowledge and consent of the owner of the computer or
information and communications system.

4. Other analogous acts

lcn cdi3 13
Evidence needed to file a case for violation of Electronic Commerce Act

1. Testimonial Evidence – Affidavit of Complainants and witnesses


2. Documentary Evidence –Cyber or Computer Forensic Results, Police records, transaction
records and other documents
3. Object Evidence - Computer and any device used to hack or crack or pirate the computer
information, Original Documents copied or pirated Documents.
4. Other relevant evidence

PROCEDURES IN HANDLING OF COMPUTER/CYBERCRIME CASES

LEGAL BASIS
1. R.A. 8792 Electronic Commerce Act of 2000
2. R.A. 8484 Access Device Act

PURPOSE:

The standard operating procedure prescribes a uniform and step-by-step process to


be observed by all personnel of CIDG in the conduct of investigation regarding
Computer/Cybercrime cases.

SCOPE OF APPLICATION

This procedure shall be strictly observed by investigators handling


computer/cybercrime cases. The head of office or Chief must always be informed of
the disposition or action taken on complaints. Computer and Network can be
involved in crimes in several ways:

a. Computer or network can be a tool of crime (used to commit the crime)


b. Computer or network can be a target of the crime (the “victim”)
c. Computer or network can be used for incidental purposes related to the crime

DEFINITION OF TERMS

a. Computer Server – is a computer or device on a network that manages network


resources. For example, a file server is a computer and storage device dedicated to
storing files. Any user in the network can store files on the server. A print server is a
computer that manages one or more printer, and a network server is a computer that
manages network traffic. A database server is a computer system that processes
database queries.

b. Computer Network – is a collection of computers and devices connected to each


other. The network allows computers to communicate with each other and share
resources and information.

c. Computer Crime – Any illegal behavior directed by means of electronic operations


that targets the security of computer systems and the data processed by them. (UN
Definition)

d. Cyber Crime – Any illegal behavior committed by means of, or in relation to, a
computer system or network, including such crimes as illegal possession, offering or
distributing information by means of a computer system or network. (UN Definition)

lcn cdi3 14
e. Domain Name – is an identification label to define realms of administrative autonomy,
authority, or control in the internet, based on the Domain Name System.

f. Electronic Mail – often abbreviated as e-mail or email, is a method of exchanging


digital messages, designed primarily for human use. A message at least consists of its
content, an author, address, and one or more recipient addresses.

g. Internet Protocol (IP) Address – a numerical identification and logical address that
is assigned to devices participating in a computer network utilizing the Internet Protocol
for communication.
h. Electronic Evidence – is any probative information stored or transmitted in digital
form that a party to a court case may use at trial.
i. Electronic Crime Scene - A crime scene where there are electronic evidence found.

j. Web Hosting Service – is an individual or organizations providing website or Internet


hosting service that allows individuals or organizations to provide their own website
accessible via the World Wide Web.
k. Web site (Group of Web pages) – is a collection of related web pages, images,
videos or other digital assets that are addressed with a common domain name or IP
address in an Internet Protocol-based network. A web site is hosted on at least one web
serer, accessible via the Internet or a private local area network.

l. Social Network Website – a web site that focuses on building online communities of
people who share interests and/or activities, or who are interested in exploring the
interests and activities of others.

Step Action
1 Secure and take control of the area containing the suspected electronic media.
Always be aware of officer’s safety and securely take control of the scene.

lcn cdi3 15
2 The investigator should move individuals at the scene away from all computer
equipment to ensure no last-minute changes or corruption to the data occur.

lcn cdi3 16
If suspect is allowed to access computer equipment, he or she may be
able to destroy or alter the evidence making it much more difficult to
conduct the forensic analysis at a later time.

3 Once all individuals have been removed from the areas containing the electronic
evidence, investigators can start conducting interviews of either the suspects on

lcn cdi3 17
the scene or potential witnesses.

Interviewing the individuals on the scene may provide a substantial amount of


information pertaining to the case and may help lead the investigators in the
right direction. The interviews should take place in an area where the
interviews will not be interrupted and allow for the individual to talk freely to
the investigator.

At this time, conduct your interviews with individuals found on the scene or
the crime or the reporting person who provided the information.

4a. The investigator should avoid switching the computer system on if it is turned off
upon your arrival. Make sure there is no active screen saver by pressing one of

lcn cdi3 18
the arrow keys located on the keyboard connected to the computer system. The
arrow keys will not alter any documents if the system is active.

Photograph the monitor to show the status of the system upon your arrival on the scene.
4b If the screen is blank and the system is turned on, again, press the arrow keys to
. ensure a screen saver is not active. If the monitor power is off, turn the monitor
power on.

Once the monitor comes on, photograph the monitor to show what was on the screen at
the time of your arrival.

5 Check to see if the system is connected to the internet or has network

lcn cdi3 19
capabilities. Some systems may not have a CAT5 or other type of network cable
attached; the system could be utilizing a wireless connection.

If the system is networked, the investigator will want to capture the volatile
data contained in the systems memory. If the systems power is
disconnected before volatile data has been collected, the data will be lost
and the investigator will not be able to retrieve that data at a later time.

lcn cdi3 20
6. Once the investigator has collected the volatile data, he will want to disconnect
the power from the machine in order to shut it down. The forensic practice is to
disconnect the power source from the rear of the machine and NOT from the wall
outlet.

This will make sure the investigator is removing the correct power supply and not
another systems power. Shutting down (using the Operating System) will alter the
registry and it will be considered as tampering of evidence.

7. The investigator will then document the crime scene by taking photographs.
These photographs will help the investigator remember where everything was
located on the crime scene and how the crime scene looked when he or she
arrived.

The investigator should take pictures of the entrance to the crime scene, and then

lcn cdi3 21
take photographs from each corner of the crime scene. Additionally as evidence
is located and recovered, the investigator should photograph the evidence before
it is moved to document the location it was found on the scene.
8. The next step is to document the crime scene even further by drawing a sketch of
the entire crime scene. The sketch will show the measurements of the crime
scene and where the evidence is located on the crime scene by their exact
distance from other objects on the crime scene.

The investigator can find two unmovable points on the crime scene and conduct
all measurements from that location.

lcn cdi3 22
9. After taking all the necessary photographs, the investigator must to label and tag
all the evidence located in the crime scene. When labeling the computer system,
the investigator should label each connector and port attached to the system. This
will help ensure the investigator will be able to reconstruct the system in a court of
law.

The investigator can place a tag on the video cable labeled “A.” Then label the
video port on the back of the system also with the letter “A.” This way the
investigator will know that cable “A” connects to port “A.” This method, also known
as “Bagging and Tagging,” should be done for each cable connected to the
system.

At this time, label all the connections to the computer system.

lcn cdi3 23
10 Once the system has been labeled correctly, the investigator can place evidence
. tape over the 3 ½ inch drive and the drive case. This will help the investigator
know if anyone tampers with the computer system in transit back to the forensic
lab.

If there is any media located in the drives, the media should be photographed
and then removed to protect the evidence from being destroyed or altered.
CD-ROMS may be scratched in transit and therefore may become
unreadable. At this time, remove any media in the drive bays and place
evidence tape over the drives.

lcn cdi3 24
11 Now it is time to package all the equipment for transportation. All electronic evidence
. should be packaged in anti-static bags to help ensure the integrity of the data is
maintained. As each piece of evidence is packaged, an evidence label should be
attached.

This evidence label will help identify the evidence, the date and time it was found
on the scene, the location it was recovered from, and the investigator who found
the evidence. Additional information can be added to include the Case Number
and the primary investigating officer. At this time, please ensure all evidence has
been packaged and labeled from the crime scene.

lcn cdi3 25
12 Before each item is removed from the crime scene, a chain of custody must be
. filled out to ensure the evidence is properly tracked from investigator to
investigator. A chain of custody will contain the name of the recovering officer
and the date and time he transferred the evidence to the primary investigating
officer. Additionally, the chain of custody may contain the item number or
evidence number along with the case number of the crime.

lcn cdi3 26
13 Search through all documentation to find passwords or other physical evidence
. that may pertain to the crime.

Passwords or hidden notes may be located on the scene inside documentation


manuals or books.

c. Requirements for Computer/Cellphone Forensic Examination at Computer


Forensic Laboratory, ATCD, CIDG. For Hard Disk

1. Letter Request for Examination (From RC, RCIDU/RD, PRO/ DD, NCRPO District/Dir,
NSU/Head of Agency/Corporate Secretary of Private Corporations/Private Complainant)
2. One (1) piece Hard Disk (Double the Size of the Hard Disk for examination)
3. One (1) piece Compact Disk (CD) Recordable for the Forensic Result

For Cellphone One (1) piece Compact Disk (CD) Recordable for the Forensic Result

Note: The requesting party or the Court can only request for the Examination results
and pieces of evidence after filling up the Chain of Custody form.

lcn cdi3 27
Lesson 7: Hit-and-Run

The crime of a driver of a vehicle who is involved in a collision with another vehicle, property 
or human being, who knowingly fails to stop to give his/her name, license number, and other 
information as required by statute to the injured party, a witness, or law enforcement officers.
https://legal-dictionary.thefreedictionary.com/hit+and+run

Hit and runs include any accident where a vehicle hits a person, object or vehicle and the
driver knowingly leaves the scene without providing their information.

 https://www.idrivesafely.com/defensive-driving/trending/what-exactly-hit-and-run-accident

Under RA 4136 Section 55, Hit-and-Run means the evading responsibility applied to a traffic
accident in which a driver fails to stop and help/assist the victim or other party involve.

No driver of a motor vehicle concerned in a vehicular accident shall leave the scene of the
accident without aiding the victim, except under any of the following circumstances:

1. If he is in imminent danger of being seriously harmed by any person or persons by reason


of the accident;
2. If he reports the accident to the nearest officer of the law; or
3. If he has to summon a physician or nurse to aid the victim.

https://lawphil.net/statutes/repacts/ra1964/ra_4136_1964.html

Steps in the Hit-and-Run Investigation

1. Refer to checklist on Accident investigation.


2. Obtain the best possible descriptions of the car and driver.
a. A good description may be obtained from partial descriptions given by witnesses.
b. Get the license plate and any unusual features of the vehicle .
c. Concentrate on the cars description first.
d. Dispatch initial description and all subsequent information to the headquarters and
to police agencies that may assist in spotting and stopping the suspects vehicle.
e. Broadcast descriptions of the suspected car and driver to all police units and
offices.
f. Try to determine the damage of the fleeing car.

3. Appeal for information through local newspapers, radio, TV etc

4. Carefully search the hit-and-run scene for physical evidence


a. These may include broken glasses and fragments, hubcaps, paint scrapping from
hit-and-run car other evidence such as dirt from subject car, radiator, ornament etc.,
b. carefully preserve and label all evidence found at the scene.
c. Request laboratory study of evidence.
d. Watch out for the possible return of the hit-and-run driver to the scene of the
accident. This has been known to happen.

5. The Victim
a. Check his clothing; other parts of his body, tire marks, grease, paint chips,
fragments and such things that might have been left on him by the suspect car.
b. If the victim is killed, get samples of uncontaminated blood from him at the morgue
and samples of hair, skin etc.

lcn cdi3 28
c. Collect and preserve for laboratory examination, the clothes, shoes, and other
items he was wearing at the time of accident.

Follow-up Investigation
The following should be considered by the investigator during the follow-up investigation;
1. Interview persons living along the route taken by the hit-and-run driver; also operators of
filling stations and garages.

2. Canvass parking lots and other filling stations and garages.


3. Return to the accident scene at the same time on the subsequent days and on the same
day of the following weeks to obtain additional witnesses such as delivery men operating on
scheduled routes.
4. Follow-up phone calls to garages and dealers of auto parts.
5. Continue appealing for information through the press, radio and TV.

Search for Suspected Car


If the suspected car is located and recovered, the followings must be undertaken;

1. Look for physical evidence, such as latent fingerprints, pieces of clothing, marks, damaged parts,
hair, blood etc., which will identify the car as that involved in the hit-and-run accident.
2. Search the undercarriage of the suspect car. Determine also if there is indication of disturbance in
the grease or dirty adhering to it.
3. Make a careful investigation for replaced parts.

Interview of Suspect

When the suspects is apprehended the following must be undertaken;

1. Obtain a signed statement if you can.


2. Get a full account of suspects whereabouts and write down just in case he refutes in later.
3. Approach and apprehend the driver of the suspect car as soon as his identity and whereabouts are
ascertained.
4. Place the driver in a defensive position by properly directed questions upon approach.

lcn cdi3 29

You might also like