Professional Documents
Culture Documents
Lea 122 Module 1
Lea 122 Module 1
LEA122 MODULE 1
Learning Content:
: Introduction to Comparative Models in Policing
: Globalization and Its Effect to Policing
: Transnational Crimes
What is Policing?
- means, "controlling, monitoring, tracking, and altering, if required, public
conduct". Its core concept is identified by its relation with the potential use of
force in ensuring obedience to the law, within the rule of law. (Manning 1977)
plays a significant role to the extent of theocracy, where the country is ruled by
religious leaders.
1. Fragmented Police System — This system, which is found in the United States
of America, is directly attributed to the federated nature of the political system
and local communities asserting their right to home rule.
2. Combined Police System — This system is marked by the national and local
governments cooperating and sharing in the responsibility for establishing a
police service. England 's police organization is an example of this system.
3. National Centralized Police System — In this system, the central government
creates a national police force for the community. This was originated in Rome
and found in democratic countries like France as well as in some non-
democratic countries.
3. As to the way police officers use their authority and power in street police work
Republic of the Philippines
Southern Philippines Agri-business and Marine and Aquatic School of Technology
Malita, Davao Occidental
LEA122 – MARIA LUZ J VILLACUATRO, RCrim
a. Professional, where police officers have the necessary passion and perspective
to be valuable police officers.
b. Enforcers, where police officers have passion in responding to human problems
but do not recognize limits on their power to resolve them.
c. Reciprocators, where police officers often are too objective in that they have
perspective but virtually no passion, resulting in a detachment from the suffering
they encounter and often a failure to take action.
d. Avoiders, where police officers have neither passion nor perspective, resulting in
no intellectual recognition of people's problems and no action to resolve them.
What is Globalization?
- It refers to the process by which regional economies, societies, and culture,
as well as information, ideas and even authority become integrated by a
global network of political ideas through communication, transportation, and
trade. In addition, it pertains to the increasing interconnectedness of the
different parts of the world through common processes of economic,
environmental, political and cultural changes.
CAUSES OF GLOBALIZATION
1. International division of labor
2. Internationalization of finance i.e., the emergence of global banking and
globally integrated financial markets
3. The new technology system based on a combination of innovations, including
solar energy, robotics, microelectronics, and digital communications and
information system
4. The growth of the consumer markets among the more affluent populations of
the world; similar trends in consumer tastes have been created by similar
processes
- The police were preoccupied solving craft local crimes. With globalization,
they are now faced with highly organized and sophisticated crimes, like
terrorism, bank robbery, drug trafficking, money laundering, and kidnap for
ransom, among others. Moreover, crimes have crossed borders. Like big
corporations, organized crimes have evolved into transnational crimes, with
operations in different parts of the world (McCarthy, 2011).
A. TERRORISM
Terrorism is not easy to define. For one, attempts of the United Nations to postulate
a universal definition through the UN Comprehensive Convention on International
Terrorism has yet to produce any solid fruit owing to a confluence of factors. Primary of
which is the resistance of the members of the Organization of the Islamic States to
include armed struggle for liberation and self-determination as among the acts that may
fall under the umbrella of terrorist acts.
• The use or threatened use of force designed to bring about a political change [Brian
Jinkins, 19841. • Constitutes the illegitimate use of force to achieve a political
objective by targeting innocent people [Walter Liqueur, 19701.
• Unlawful use of force or violence designed to intimidate or coerce a government or
civilian population in the furtherance of political or social objectives. [Omnibus
• Diplomatic Security, An Anti-Terrorism Act of 19861 Socially and politically
unacceptable violence aimed at an innocent target to achieve psychological effect
(Martha Crenshaw, 1983).
• Method of combat in which the victims serve as symbolic targets.
• A premeditated, perpetrated against non-combatant targets by subnational groups.
Any act intended to cause death or serious bodily harm to civilians or non-
combatants with the purpose of:
History of Terrorism
Terrorism originated from the French Revolution (1789-1795) which describe the
actions of the French government during the so- called 'Reign of Terror'.
In the political upheavals in Europe in 1848 dubbed as the 'Revolutions of 1848 or the
Springtime of the Peoples', it was employed to describe violent revolutionaries who
revolted against the government. By the end of 1800-1900, terrorism was used to
describe the violent activities of a number of groups including: labor organizations,
anarchists, nationalist groups revolting against the foreign powers and ultranationalist
political organizations.
After the Second World War, as the colonized people revolted from European
domination. nationalist groups were declared as terrorist groups by most colonial
powers:
From the 1960s to early 1980s, it was applied to violent left-wing groups, as well as
to nationalist groups in Asia, Africa, the Middle East and even Latin America. In the
mid-1980s, the US defined terrorism as a violent activity of the hate movement12.
Internationally, terrorism was viewed as sub-national warfare. A number of terrorists
were sponsored by rogue regimes. Today, terrorism also refers to a large group who
are independent from a state, violent religious fanatics, and violent groups who
terrorize for a particular cause such as the environment.
Kinds of Terrorism
2. Revolutionary Terrorism — Its primary purpose is the destabilize and topple the
Republic of the Philippines
Southern Philippines Agri-business and Marine and Aquatic School of Technology
Malita, Davao Occidental
LEA122 – MARIA LUZ J VILLACUATRO, RCrim
These are some of the legal instruments that have been drafted by the United
Nations and its specialized agencies to fight terrorism. Any member state of the UN is
welcome to adopt these in their territories.
1. Command — The smallest group, is at the top, and responsible for the
command. As in military circles, leadership makes policy and plans while
providing general direction.
2. Active Cadre [military term] — They are the people who we call "terrorists".
They are responsible for carrying out the mission of the terrorist organization.
They have one or more specialties. Other terrorists support each specialty, but
the active cadre is the striking arm of the terrorist group.
3. Active Supporters — They are the people who keep the terrorists in the field.
They maintain communication channels, provide safe houses, gather
Republic of the Philippines
Southern Philippines Agri-business and Marine and Aquatic School of Technology
Malita, Davao Occidental
LEA122 – MARIA LUZ J VILLACUATRO, RCrim
intelligence, and ensure all other logistical needs are met. This is the largest
internal group in the organization.
4. Passive supporters — They complement active supporters. People who do
not readily join terrorist groups but simply represent a favorable element of the
political climate. Many times, they were used without their knowledge.
“The Al Qaeda”
Arabic for "The Base"; founded by Osama bin Laden, Muhammed Atef, and Ayman
al-Zawahiri to continue the Jihad internationally.
4. The Committees.
a. The Military Committee – oversees recruitment, war, training, and the
purchase of the arms. b. The Islamic Study Committee — makes rulings on
religious law and trains all recruits in the teachings of the Koran and Jihad.
c. The Finance Committee – oversees corporate holdings, including the
travel office and several other companies.
5. The Cells. The network of terrorist recruitment and training has sites throughout
the world. Each cell engages in missions independent of the others, and the
members and activities of the other cells are kept secret.
History
Formerly, the Islamic State of lraq and the Levant [ISIL], it is a self-proclaimed
Islamic State (IS) composed of Sunni, extremist, jihadist unrecognized state and
caliphate based in Iraq and Syria. Later on, it renamed as the Islamic State of Iraq
and Syria [ISIS] Arabic acronym Dä'ish or Daesh}
This group originated as Jama'at al-Tawhid wal-Jihad in 1999 and the forerunner of
Tanzim Qaidat al-Jihad fi Bilad al- Rafidayn, commonly known as Al-Qaeda in Iraq
(AQI). During the 2003 invasion of Iraq, it took part in the Iraqi insurgency against
coalition forces and Iraqi security forces. In 2006, it joined other Sunni insurgent
Republic of the Philippines
Southern Philippines Agri-business and Marine and Aquatic School of Technology
Malita, Davao Occidental
LEA122 – MARIA LUZ J VILLACUATRO, RCrim
groups to form the Mujahideen Shura Council, which consolidated further into the
Islamic State of Iraq (ISI). It gained a significant presence in Al Anbar, Nineveh,
Kirkuk and other areas, but around 2008, its violent
methods led to a backlash from Sunni Iraqis and other insurgent groups and a
temporary decline. In April 2013, the group changed its name to the Islamic State of
Iraq and the Levant. It grew significantly under the leadership of Abu Bakr al-
Baghdadi, gaining support in Iraq in the context of perceived economic and political
discrimination against Iraqi Sunnis. After entering the Syrian Civil War, it established
a large presence in the Syrian governorates of Ar-Raqqah, Idlib, Deir ez-Zor and
Aleppo. It had close links to al-Qaeda until February 2014 when, after an eight-month
power struggle, al-Qaeda cut all ties with the group, citing its failure to consult and
notorious intransigence.
Cause
Originally, it aimed to establish an Islamic state in Sunni-majority regions of Iraq.
Following its involvement in the Syrian Civil War however, this expanded to include
controlling Sunni-majority areas of Syria. It proclaimed a worldwide caliphate on 29
June 2014, and Abu Bakr al-Baghdadi—known by his supporters as Amir al
Mu'minin, Caliph Ibrahim—was named as its caliph, and the group was renamed the
Islamic State [IS].
Founder
The ISIS is founded by Abu Bakr al-Baghdadi, who is known to his supporters as
Amir al-Mu'minin Caliph Ibrahim. Formerly known as Abu Du'a. He claims descent
from the Islamic prophet Muhammad, he is called Abu Bakr Al-Baghdadi Al-Husseini
Al-Qurashi.
Baghdad. — Helped to found the militant group Jamaat Jaysh Ahl al- Sunnah wa-l-
Jamaah (JJASJ) in 2003, in which he served as head of the sharia committee. His
group joined the Mujahideen Shura Council (MSC) in 2006, which he served as a
member of the MSC's Sharia Committee. Later on, the MSC was renamed as the
Islamic State of Iraq (ISI) in 2006, and al-Baghdadi became the general supervisor of
the ISI's Sharia Committee, and a member of the group's Senior Consultative
Council.
The Islamic State of Iraq (ISI), also known as al-Qaeda in Iraq (AQI), was the Iraqi
division of al-Qaeda, and Al Baghdadi was announced as its leader on 16 May 2010,
following the death of his predecessor Abu Omar al Baghdadi. As the leader of the
ISI, al-Baghdadi was responsible for masterminding large-scale operations such as
28 August 2011 attack on the Umm al-Qura Mosque in Baghdad, which killed
Following the death of founder and head of al-Qaeda, Osama bin Laden, on 2 May
2011, in Abbottabad, Pakistan, al-Baghdadi released a statement praising bin Laden
and threatening violent retaliation for his death. on 5 May 2011, al-Baghdadi claimed
responsibility for an attack in Hilla, 62 miles south of Baghdad, that killed 24
policemen and wounded 72 others. Al-Baghdadi remained leader of the ISI until its
formal expansion into Syria in 2013, when in a statement on 8 April 2013, he
announced the formation of the Islamic State of Iraq and the Levant (ISIL)—
alternatively translated from the Arabic as the Islamic State in Iraq and Syria (ISIS).
REPUBLIC ACT NO. 9372 (AN ACT TO SECURE THE STATE AND PROTECT
OUR PEOPLE FROM TERRORISM), otherwise known as Human Security Act of
2007" defined Terrorism as " Any person who commits an act punishable under any
of the following provisions of the Revised Penal Code:
or under
Act of 1990);
3. Republic Act No. 5207, (Atomic Energy Regulatory and
4. Republic Act No. 6235 (Anti-Hijacking Law);
5. Presidential Decree No. 532 (Anti-piracy and Anti- highway Robbery Law of
1974); and, 6. Presidential Decree No. 1866, as amended (Decree Codifying the
Laws on Illegal and Unlawful Possession, Manufacture, dealing in, Acquisition or
Disposition of Firearms, Ammunitions or Explosives) thereby sowing and creating
a condition of widespread and extraordinary fear and panic among the populace,
in order to coerce the government to give in to an unlawful demand shall be guilty
of the crime of terrorism and shall suffer the penalty of forty (40) years of
imprisonment, without the benefit of parole as provided for under Act No. 4103,
otherwise known as the Indeterminate Sentence Law, as amended. (Section I
and 3, RA 9372)
2. Any person who, not being a principal under Article 17 of the Revised Penal
Code or a conspirator as defined in Section 4 hereof, cooperates in the
execution of either the crime of terrorism or conspiracy to commit terrorism by
previous or simultaneous acts.
3. Any person who, having knowledge of the commission of the crime of terrorism
or conspiracy to commit terrorism, and without having participated therein,
either as principal or accomplice under Articles 17 and 18 of the Revised
Penal Code, takes part subsequent to its commission in any of the following
manner: (a) by profiting himself or assisting the offender to profit by the effects
of the crime; (b) by concealing or destroying the body of the crime, or the
effects, or instruments thereof, in order to prevent its discovery; (c) by
harboring, concealing, or assisting in the escape of the principal or conspirator
of the crime.
Notwithstanding the above paragraph, the penalties prescribed for accessories shall
not be imposed upon those who are such with respect to their spouses, ascendants,
descendants, legitimate, natural, and adopted brothers and sisters, or relatives by
affinity within the same degrees, with the single exception of accessories falling within
the provisions of subparagraph
Republic of the Philippines
Southern Philippines Agri-business and Marine and Aquatic School of Technology
Malita, Davao Occidental
LEA122 – MARIA LUZ J VILLACUATRO, RCrim
B. DRUG TRAFFICKING
1. Drugs That Originates from the Golden Crescent: Afghanistan; Pakistan; Iran &
India in Southeast Asia, the Golden Crescent is the major supplier of opium poppy,
Marijuana and heroin products in the Western part of Asia. It produces at least 85%
to 90% of all heroin channeled in the drug underworld market.
2. Golden Triangle: Myanmar (Burma), Laos and Thailand Approximately 60% of the
world's opium is produced, and 90% in the Eastern part of Asia.
3. The Silver Triangle: Peru; Bolivia and Colombia Silver Triangle [Peru and Bolivia
(70%) and Colombia (30%)), is the producer of the world's coca leaves and cocaine-
based products
1. Avoiding border checks by small aircraft and through overload smuggling routes.
2. Submitting to border checks with the drugs hidden in a vehicle, between other
merchandise, in luggage, in or under clothes, inside the body, etc.
3. Buying off diplomats to smuggle drugs in diplomatic mail/ luggage to
avoid border checks.
Republic of the Philippines
Southern Philippines Agri-business and Marine and Aquatic School of Technology
Malita, Davao Occidental
LEA122 – MARIA LUZ J VILLACUATRO, RCrim
Note:
PDEA serves as the Implementing arm of the DDB, and is responsible for the
efficient and effective law enforcement of all the provisions on any dangerous drug
and/or controlled precursor and essential chemical as provided by the
comprehensive Drug Act of 2002.
2. Supply Reduction — Refers to the activities which endeavor to reduce the supply
side/segment of illegal drugs to the barest minimum level possible. Activities are
centered to the arrest of drug personalities and seizure of illegal simultaneously drive
the prices of drugs skyrocketing high and create acute shortage of the contraband to
death knell level. Intelligence workshops, neutralization of transnational and local
drug group, arrest of foreign and local drug group, filing cases in courts, seizures of
dangerous drugs, controlled precursors and essential chemicals, and laboratory
equipment, dismantling of shabu laboratories and chemical warehouses, precursor
control, support activities [(operation private group) gathering of information
regarding illegal drug activities and personalities in the neighborhood and community
without disclosing the identity of the informants], monitoring of drug cases,
destruction of seized illegal drugs, and regulatory control.
Republic of the Philippines
Southern Philippines Agri-business and Marine and Aquatic School of Technology
Malita, Davao Occidental
LEA122 – MARIA LUZ J VILLACUATRO, RCrim
Activities
a) international interdictions
b) Coordination with Interpol
c) Linkages with the ASEAN community
d) U.N. Anti — drug Convention
C. MONEY LAUNDERING
-Covers all procedures to change, obscure or conceal the beneficial ownership or
audit trail of illegally obtained money or valuable so that it appears to have originated
from a legitimate source. It is a process through which the existence of an illegal source
of unlawful application of illicit gains is concealed or disguised to make the gains
legitimate, thereby helping to evade detection, prosecution, seizure and taxation.
• Placement. The physical disposal of cash proceeds derived from the unlawful
activity. The aim is to remove cash from the location of acquisition to avoid detection.
• Layering. Separating illicit proceeds from their source by creating complex layers of
financial transactions designed to disguise the source of money, subvert the audit
trail and provide anonymity. The purpose is to disassociate the illicit proceeds from
the unlawful activity by creating intentionally a complex web of financial transactions
aimed at concealing any audit trail as well as the source and ownership of funds.
Integration. The final stage in the process at which the money is integrated into
legitimate economic and financial systems and is assimilated with all the other assets
in the system.
Republic of the Philippines
Southern Philippines Agri-business and Marine and Aquatic School of Technology
Malita, Davao Occidental
LEA122 – MARIA LUZ J VILLACUATRO, RCrim
Money laundering originated in the 1920's when The American mafia owned
laundromats which were cash businesses. Criminals then used this laundromat to
hide illegal proceeds by investing said money in the Laundromats business, or mixing
illicit funds with clean money.
In 1986, The United States passed the Money Laundering Control Act (MLCA), and
in 1988 the United Nations Convention against Illicit Trafficking in Narcotic Drugs and
Psychotropic Substances (VIENNA CONVENTION) made drug money laundering a
criminal offense In
Republic of the Philippines
Southern Philippines Agri-business and Marine and Aquatic School of Technology
Malita, Davao Occidental
LEA122 – MARIA LUZ J VILLACUATRO, RCrim
1989 The G-7 Nations (France, Germany, Italy, Japan, United Kingdom, United
States, and Canada) formed the FINANCIAL ACTION TASK FORCE (FATF) which
were mandated to devise international standards and policies to combat money
laundering.
And in 2000 the United Nations Convention against Transnational Organized Crime
(PALERMO CONVENTION) extended the legal definition of money laundering to
include all serious crimes.
The Anti-Money Laundering Act (REPUBLIC ACT NO. 9160, otherwise known as the
"Anti-Money Laundering Act of 2001, as amended by RA 9194, RA10167, & 10365)
1. Any person who transacts or attempts to transact with any monetary instrument
knowing that it involves or relates to the proceed of an unlawful activity
2. Any person who facilitates the commission of money- laundering as defined in no.
1 by knowingly performing or failing to perform an act
3. Any person who fails to disclose Ole a report with AMLC of any instrument or
transaction report as required under the law.
D. TRAFFICKING IN PERSONS
Trafficking in persons is an illegal act and is considered a violation of human rights and
inimical to human dignity and national development. There are three (3) inter-related
and interdependent elements that must be present for a situation to be considered
within the purview of R.A. 9208 as amended by RA 10364. The three (3) elements are:
Each of these elements must be present and linked to each other: the act/s must be
achieved by one of the means and both must be linked to achieving the exploitative
purpose. If any one of the three (3) elements is absent, then the situation may not
involve trafficking in persons, except if it involves trafficking of a child. The recruitment,
transportation, transfer, harboring, adoption or receipt of a child for the purpose of
exploitation or when the adoption is induced by any form of consideration for
exploitative purposes shall also be considered as ‘trafficking in persons’ even if it does
not involve any of the means mentioned.
Republic of the Philippines
Southern Philippines Agri-business and Marine and Aquatic School of Technology
Malita, Davao Occidental
LEA122 – MARIA LUZ J VILLACUATRO, RCrim
What is the Republic Act 9208 as amended by the Republic Act 10364?
- The Republic Act (R.A.) 9208, also known as the Anti-Trafficking in Persons
Act of 2003, institute policies to eliminate trafficking in persons especially
women and children. It establishes the necessary institutional mechanisms to
protect and support trafficked persons, and provides penalties for its
violations. In 2012, the R.A. 9208 was amended through the R.A. 10364 also
known as the Expanded Anti-Trafficking in Persons Act.
The three (3) categories of trafficking in persons and its punishable acts are:
• To recruit, obtain, hire, provide, offer, transport, transfer, maintain, harbor, or receive
a person by any means, including those done under the pretext of domestic or
Republic of the Philippines
Southern Philippines Agri-business and Marine and Aquatic School of Technology
Malita, Davao Occidental
LEA122 – MARIA LUZ J VILLACUATRO, RCrim
• To offer or contract marriage, real or simulated, for the purpose of acquiring, buying,
offering, selling, or trading them to engage in prostitution, pornography, sexual
exploitation, forced labor or slavery, involuntary servitude or debt bondage;
• To recruit, hire, adopt, transport, transfer, obtain, harbor, maintain, provide, offer,
receive or abduct a person, by means of threat or use of force, fraud, deceit, violence,
coercion, or intimidation for the purpose of removal or sale of organs of said person;
• To recruit, transport, obtain, transfer, harbor, maintain, offer, hire, provide, receive or
adopt a child to engage in armed activities in the Philippines or abroad;
• To recruit, transport, transfer, harbor, obtain, maintain, offer, hire, provide or receive a
person by means mentioned in the preceding paragraph for purposes of forced labor,
slavery, debt bondage and involuntary servitude, including a scheme, plan, or pattern
intended to cause the person either:
a. To believe that if the person did not perform such labor or services, he or she or
another person would suffer serious harm or physical restraint; or
b. To abuse or threaten the use of law or the legal processes;
Republic of the Philippines
Southern Philippines Agri-business and Marine and Aquatic School of Technology
Malita, Davao Occidental
LEA122 – MARIA LUZ J VILLACUATRO, RCrim
• To recruit, transport, harbor, obtain, transfer, maintain, hire, offer, provide, adopt or
receive a child for purposes of exploitation or trading them, including but not limited to,
the act of buying and/or selling a child for any consideration or for barter for purposes of
exploitation. Trafficking for purposes of exploitation of children shall include:
a. All forms of slavery or practices similar to slavery, involuntary servitude, debt
bondage and forced labor, including recruitment of children for use in armed conflict;
b. The use, procuring or offering of a child for prostitution, for the production of
pornography, or for pornographic performances;
c. The use, procuring or offering of a child for the production and trafficking of drugs;
and
d. The use, procuring or offering of a child for illegal activities or work which, by its
nature or the circumstances in which it is carried out, is likely to harm their health,
safety or morals; and
If the victim is a child, any of the following acts shall be deemed as attempted trafficking
in persons:
a. Facilitating the travel of a child who travels alone to a foreign country or territory
without valid reason and without the required clearance or permit from the DSWD or a
written permission from the child’s parent or legal guardian;
b. Executing, for a consideration, an affidavit of consent or a written consent for
adoption;
c. Recruiting a woman to bear a child for the purpose of selling the child;
d. Simulating a birth for the purpose of selling a child; and
e. Soliciting a child and acquiring the custody through any means from among
hospitals, clinics, nurseries, daycare centers, refugee or evacuation centers, and low-
income families, for the purpose of selling the child.
• Accomplice Liability – knowingly aids, abets, and cooperates in the execution of the
offense by previous or simultaneous acts of trafficking.
• Accessories – whoever has the knowledge of the commission of the crime, and
without having participated therein, either as principal or accomplice, take part in its
commission in any of the following manners:
Republic of the Philippines
Southern Philippines Agri-business and Marine and Aquatic School of Technology
Malita, Davao Occidental
LEA122 – MARIA LUZ J VILLACUATRO, RCrim
a. Profiting themselves or assisting the offender to profit by the effects of the crime;
b. Concealing or destroying the body of the crime or effects or instruments in order to
prevent its discovery; and c. Harboring, concealing or assisting in the escape of the
principal of the crime, provided the accessory acts with abuse of his or her public
functions or is known to be habitually guilty of some other crime.
• To facilitate, assist or help in the exit and entry of persons from/to the country at
international and local airports, territorial boundaries and seaports who are in
possession of unissued, tampered or fraudulent travel documents for the purpose of
promoting trafficking in persons;
• To knowingly benefit from, financial or otherwise, or make use of, the labor or services
of a person held to a condition of involuntary servitude, forced labor, or slavery;
• When the adoption is affected through Republic Act No. 8043, otherwise known as
the “Inter-Country Adoption Act of 1995” and said adoption is for the purpose of
prostitution, pornography, sexual exploitation, forced labor, slavery, involuntary
servitude or debt bondage;
• When the trafficked person is recruited to engage in prostitution with any member of
the military or law enforcement agencies;
• When by reason or on occasion of the act of trafficking in persons, the offended party
dies, becomes insane, suffers mutilation or is afflicted with Human Immunodeficiency
Virus (HIV) or the Acquired Immune Deficiency Syndrome (AIDS);
• When the offender commits one or more violations over a period of sixty (60) or more
days, whether those days are continuous or not; and
• When the offender directs or through another manages the trafficking victim in
carrying out the exploitative purpose of trafficking.
E. CYBERCRIMES
Types of Cybercrimes
3. Cyber terrorism. An effort by covert forces to disrupt the intersection where the
virtual electronic reality of computers meets the physical world. E.g. Logic bombs use
to disrupt or destroy "secure" systems or network, Internet used to communicate
covertly with agents around the world.
PUNISHABLE ACTS
4. Other offenses, such as: aiding or abetting in the commission of cybercrime, and
Republic of the Philippines
Southern Philippines Agri-business and Marine and Aquatic School of Technology
Malita, Davao Occidental
LEA122 – MARIA LUZ J VILLACUATRO, RCrim
Note: Service provider — refers to any public private entity that provides to users of
its service the ability to communicate by means of computer system; any other entity
that process or stores computer data on behalf of such communication service or
users of such service.
CUSTODY OF THE COMPUTER DATA: Deposited under the custody of the court
within 48 hours after the examination as provided by the warrant {Section 16}.
JURISDICTION: Regional Trial Court [Special Cybercrime Court {Section 21}.
Members — PNP Chief, Head of the DOJ office of Cybercrime and 1 representative
from the private sector and academe.
Features:
a) Protocol to prevent, suppress and punish trafficking in persons,
especially women and children;
b) Protocol against smuggling of migrants by land, air and sea; and
c) Protocol against the illicit manufacturing of and trafficking of firearms, its
parts, components and ammunition.
Legal Basis
Republic of the Philippines
Southern Philippines Agri-business and Marine and Aquatic School of Technology
Malita, Davao Occidental
LEA122 – MARIA LUZ J VILLACUATRO, RCrim
1. Executive Order No.62 Series of 1999 (January 15, 1999) — PCTC is created
to establish a shared database among concerned agencies for information on
criminals, methodologies, arrest and conviction on transnational crime in all its
forms.
2. Executive Order No. 100 Series of 1999 (May 7, 1999), Executive No. 295
(September 28, 2002) and Executive Order No.146 (October 22, 2002) —
strengthen the operational, administrative and information support system of the
PCTC. Under these EO's, the center shall exercise general supervision and
control over the following:
1.) Loop Center of the National Action Committee on Anti — Hijacking and Terrorism
(NACAHT)
4.) Political attaches/ counselors for security matters of the Department of Interior
and Local Government (DILG).
1. Information Exchange
2. Strategic Studies
3. Capacity Building
Activities of the PCTC to underscore its Role in the Fight Against Transnational
Crimes
2. Support to the United Nations — PCTC is involved in the drafting of the main
text of the UN Convention against Transnational Crime and other related
protocols.
1. The PCTC is under the office of the President but placed under the general
supervision and control of the National Security Adviser
2. The Executive Director has immediate supervision and control over all
units of PCTC. As such he is authorized to designate duties and functions of
all units and Personnel of the PCTC; and
3. The Executive Director has direct operational and supervisory authority over
personnel and resources detailed with PCTC.
Presently the PCTC have two (2) Executive offices and four (4) Directorates:
Executive offices:
Directorates:
1. Directorate for Support Services (DSS) — performs its functions through its
Administrative Divisions, Security Service Division, and Budget and Finance Division
2. Directorate for Operations (DO) — performs its functions through its INTERPOL
Command and Coordination Division, Case Management Division, Capacity Building
Division, and Fugitive Investigation and International Notices Division
3. Directorate for Research (DR) — performs its functions
through its six (61 Division namely a) Drugs and Criminal
Organization Division
b) Financial and High-Tech Crimes Division
c) Special Crimes Division
d) Human Trafficking and Smuggling Division
e) Information and Technology Division
4. Directorate for Plans and Policies — performs its functions through
its three (3) Division namely: a) Strategic Research Division
b) Policy Formulation Division
Republic of the Philippines
Southern Philippines Agri-business and Marine and Aquatic School of Technology
Malita, Davao Occidental
LEA122 – MARIA LUZ J VILLACUATRO, RCrim
1. Public Safety and Terrorism: RA 9372 — Human Security Act of 2007; RA 6969
— Toxic Substances and Hazardous and Nuclear Waste Control Act of 1990; PD 532
— Anti —Piracy and Anti-Highway Robbery Law of 1974; PD 1866 as amended by
RA 8294 — Decree Codifying the Law on Illegal/ Unlawful Possession, Manufacture,
Dealing In, Acquisition or Disposition of Firearms, Ammunition and Explosives; RA
9851 —
Philippine Act on Crimes against International Humanitarian Law, Genocide, and
Other Crimes Against Humanity; and RA 10168 — Law that Punishes Terrorist
Financing
agreement covers the following crimes: drug trafficking, terrorism, arms smuggling,
human trafficking, maritime piracy, cybercrimes, commercial crimes, bank offenses,
credit card fraud, fraudulent travel documents, and other forms of commercial and
financial fraud.