Professional Documents
Culture Documents
Specialized Narrative Report
Specialized Narrative Report
COLLEGE OF CRIMINOLOGY
ACADEMIC YEAR 2022-2023
FINALS
CHAPTER 2
CYBER CRIME
Also known as computer crime, is the use of computer as an instrument to further
illegal ends. They are criminal offenses committed via a internet or otherwise aided by
various forms of computer technology.
TYPOLOGIES OF CYBER CRIMES
CYBER DEPENDENT CRIMMES are crimes that can only be committed through computer,
computer networks, or other form of ICT.
CYBER ENABLED CRIMES are traditional crimes that are increased in their scale or reach
by the use of computers, computer networks, or other form of ICT.
CYBER ASSISTED CRIMES are crimes in which the use of computer in an incidental
aspect of the commission of the crime but may afford evidence of crime.
DICTM – Directorate for Information and Communication Technology
INFORMATION AND COMMUNICATION TECHNOLOGY refers to the totality of the
electronic means employee to systematically collect, process, store, present, and share
information to end users in support of their activities.
CYBER TRESPASS – crimes that involves crossing or violating boundaries of other people
digitally.
CYBER DECEPTIONA AND THEFT – this involves offenses such as online fraud and IP
theft.
CYBER PORN AND OBSCENITY – this involves the exploitation of the children and
distribution of porn materials through the internet.
CYBER VIOLENCE - this refers to the kind of emotional violence that can be enacted online
such as bullying or harassment.
ILLEGAL ACCESS refers to the access to the whole or any part of a computer system
without right (RA10175, sec.4).
ACCESS – refers to the instructions, communication with, storing data in, retrieving data
form, or otherwise making us of any resources of a computer system or communication
network.
COMPUTER SYSTEM – refers to any devise or group of interconnected or related devices,
one or more of which, pursuant to a program, performs automated processing of data.
ILLEGAL INTERCEPTION – refers to the interception made by technical means without the
right of any non-public transmission of computer data to form or within a computer system
including electromagnetic emissions.
COMPUTER DATA – refers to any representation of facts, information or concepts in a form
suitable for processing in a computer system.
COMPUTER VIRUS is a type of malicious code or program written to alter the way a
computer operates and is designed to spread from one computer to another.
BOOT SECTOR VIRUS is a type of virus can take control when you start or boot your
computer.
WEB SCRIPTING VIRUS is a type of virus exploits the code of web browsers and web
pages.
BROWSER HIJACKER is a type of virus hijacks certain webs browser functions, and you
may be automatically directed to an unintended website.
RESIDENT VIRUS is a generally term for any virus that insert itself in a computer system’s
memory.
DIRECT ACTIONS VIRUS is a type of virus comes into actions when you execute a file
containing a virus.
CYBERSQUATING – refers to the acquisition of a domain name over the internet in bad
faith to profit, mislead, destroy reputation, and deprives other from registering the same.
CYBERSEX – refers to the willful engagement, maintenance control, or operation, directly
or indirectly, of any lascivious exhibition of sexual organs or sexual activity.
LIBEL – is a libel public and malicious imputation of a crime, or of a vice or defect, real or
imaginary, or any act or omission, condition, status, or circumstances tending to the cause the
dishonor etc.
REPUBLIC ACT No.7610 – also known as the SPECIAL PROTECTION OF CHILDREN
AGAINST, EXPLOITATION AND DISCRIMIMNATION ACT.
CHILD TRAFFICKING is the act of trading or dealing with children including, but not
limited to, the act of buying and selling of a child for money.
PHOTO OR VIDEO VOYEURISM – refers to the act of taking photo or video coverage of a
person or a group of persons performing sexual act or any similar activity.
REPUBLIC ACT No.8484 is an act regulating the issuance and use of access devices and
prohibiting, and penalizing fraudulent acts committed in relation to access device.
SKIMMING – or copying or counterfeiting any credit card, payment card or debit card, and
obtaining ay information therein with the intent of accessing the account and operating the
same whether or not cash is withdrawn.
CRIMINAL ACTS IN RELATION TO DATA PRIVACY
Unauthorized processing of personal information and sensitive personal information.
Accessing personal information and sensitive personal information due to negligence
Improper disposal of personal information and sensitive personal information
Processing of personal information and sensitive personal information for unauthorized
purposes
Unauthorized access or intentional breach
Concealment of security breaches involving sensitive personal information
Malicious disclosure Unauthorized disclosure.
CHAPTER 3
RULE OF EVIDENCE
EVIDENCE
Is the means sanctioned by the rules of court, of ascertaining on a judicial proceeding
the truth respecting a matter of Fact.
OBJECT OR REAL EVIDENCE – also known as the physical evidence, it is any type of
evidence that is real or has an objective existence.
THE CRIME SCENE – is the focus of the preliminary investigation and also the primary
source of physical evidence.
THE VICTIM – is a potential source of physical evidence, particularly in the case of sex
crimes.
THE SUSPECT – it can be prime source of physical evidence, transfers of evidence readily
occur and must be sought out on both the suspect.
DEMONSTRATIVE EVIDENCE – usually in the form of charts and diagrams, demonstrate
or illustrate the testimony of a witness.
DOCUMENTARY EVIDENCE – consist of writing or any material containing letters,
words, numbers, figures, symbols or other modes of written expressions.
PATROL EVIDENCE RULE – also called parol evidence. It bars evidence of any agreement
made before or at the same time as the actual written agreement, which were not included in
the final written agreement.
TESTIMONIAL EVIDECE – is where a person take the stands and answer the questions
about a case. It can be help in understanding motives or explaining those things found at the
crime scene.
ADMISSIONS is the act, declaration or omission of a party as to relevant fact may be given
in evidence against him.
CONFESSION is the declaration of an accused acknowledge his guilt of the offense charged
or of any offense necessarily included therein may be given in evidence against him.
HEARSAY RULE is an exclusionary rule, prohibiting hearsay or out of court statements
offered as proof of that statement from being admitted as evidence because of the inability of
other party to cross-examine the maker of the statement.
DYING DECLARATION – refers to the declaration of dying person
DECLARATION AGAINST INTEREST – statement against interest, sometimes called
admissions or confessions.
ACT OR DECLARATION ABOUT PEDIGREE – the act or declaration of a person
deceased, or unable to testify, in respect to the pedigree of another person.
A LAY WITNESS – it is a person who watched certain events and describes what they saw.
AN EXPERT WITNESS OR A SPECIALIST – is someone who is educated in a certain area.
They testify with respect to their specialty area only.
A CHARACTER WITNESS – someone who knows the victim, the defendant or other person
involved in the case.
CHAPTER 4
CRIME AGAINST PROPERTY INVESTIGATION
INVESTIGATION
Is an inquiry, judicial or otherwise, for the discovery and collection of facts
concerning the matter or matters involved? It is the process of eliciting, inquiring, soliciting
and getting vital information/facts/circumstances in order to establish the truth.
CRIME INVESTIGATION is an assembled of methods by which crimes are studied and
criminal apprehended.
SPECIAL CRIME INVESTIGATION is a special study of modern techniques in the
investigation of serious and specific crimes including murder, homicide, rape, abortion,
robbery, arson kidnapping, blackmail, carnapping and criminal negligence.
ROBBERY INESTIGATION – under revised penal code article 293-298, the act of gaining,
taking any personal property belonging to another by means of violence or intimidation of
any person, or using force upon anything is guilty of robbery.
THE EVIDENCE NEEDED TO FILE THE CRIME OF ROBBERY ARE;
TESTIMONIAL EVIDENCE – Affidavit of complainant and witnesses
DOCUMENTARY EVIDENCE – Photograph, videos, police reports and other documents
OBJECT EVIDENCE – Stolen items, weapons and other devices
OTHER RELEVANT EVIDENCE
ENTRY ROUTE – After a robbery, it is important to investigate how the offender got in. it is
important to find the entry, which is not necessary to a door.
ASK THE VICTIM – Find out from the victim what has been stolen and where are the traces
being moved by the perpetrator.
LATENT FOOTWEAR PRINTS – Collect all the paper and then look for footwear prints on
the Paper at your unit or send the papers to the crime laboratory for investigation.
TYPES OF EVIDENCE IN CONNECTION WITH ROBBERIES
Hair
Material fits
Fibers
Clothes
Tool marks
Fingerprints
Explosives
Fibers
Anti Cybercrime Agencies in the Philippines in response to the challenges of cybercrime the
Philippines enacted its first law regulating the internet on June 14 2000 Republic act No.8792
this also known as the Philippine Electronic Commerce Act of 2000.
National Computer Emergency Response Team is a division under the Cybersecurity Bureau
of the Department of information and technology.
Department of justice office of cybercrime was created under Republic act No. 10175 the
cybercrime prevention act of 2012 .
National Bureau of investigation Cybercrime Division is tasked to investigate all cyber
related crimes punishable under Cybercrime Prevention Act and related laws.
PNP Anti- cybercrime Group is a national operational support is Unit primarily responsible
for the implementation of pertinent Philippine law on cybercrimes and advocating the anti-
cybercrime campaign of the PNP.
Computer Crime response is the actual police intervention in a computer crime incident
where the acquisition of matters of evidentiary value is traceable within the computer’s
hardware, software, and its network.
The importance of this investigation is that they help people who suffered from computer
crimes and surely they are able to locate or to know who and what is the intent of the
perpetrator.
CHAPTER 6
INTERROGATION AND INVESTIGATIVE INTERVIEW
INTERROGATION
Is a process of questioning by which police obtain evidence. The purpose of
interrogation is to elicit from the suspect or from his or her relatives or associates information
that they may be surprising in order to protect the suspect from being subjected to criminal
prosecution.
INTERVIEW – Is defined as a structured conversation where one person or the “interviewer”
seeks to gather information from another or the “interviewee” as part of any investigation or
intelligence operation.
INVESTIGATIVE INITERVIEWING – Is a technique develop by practitioners to response
to the large body of scientific evidence that abusive and coercive techniques elicit unreliable
information.
REID METHOD – Also known as the “the reid technique of interviewing and interrogation”.
Is the interrogation technique widely used by police departments.
FACTUAL ANALYSIS – It is an inductive approach where each individual suspect is
evaluated with respect to specific observation relating to the crime. It relies not only on crime
scene analysis, but also on information learned about each suspect.
BEHAVIOR ANALYSIS APPROACH – It is a non-accusatory question and answer session,
involving both standard investigative questions and structured ‘behavior provoking’
questions to elicit behavior symptoms of truth or deception from the person being
interviewed.
9 STEPS OF INTERROGATION
Direct, positive confrontation
Theme development
Handling denials
Overcoming objections
Procurement and retention of suspect’s attention
Handling the suspect’s passive mood
Presenting an alternative question
Having the suspect relate details of the offense
Converting an oral confession to a written confession
PEACE METHOD – Peace model (Planning and preparation, engage and explain, account,
closure, evaluation), develop in united kingdom in response to a number of documented
forced confession and associated wrongful conviction in 1980’s.
PLANNING – refers to the process of getting ready to interview, both mentally and
strategically.
PREPARATION – covers what needs to be ready prior to the interview such as the location
of the interview, the environment, as well as technical and administrative matters.
OPEN ENDED QUESTIONS – refers to the question that allows the suspect to reply with
longer,more detailed responses and lack direction from the interviewer.
CLOSED QUESTIONS – refers to the questions which requires more definite and distinct
answers. (6 cardinals of questioning)
FORCED CHOICE QUESTIONS – refers to the question that greatly restrict the possible
answers to those what you have determined.
MULTIPLE QUESTIONS – refers to the questioning where the interviewer asks more than
one question at the same time. This can easily confuse an interviewee ad make the answers
given equally confusing the interviewer.
LEADING QUESTIONS – refers to the question that induce a particularly reply and may be
judged to have manipulated the interview.
MENDEZ METHOD – Also known as the “New Principles on Effective Interviewing for
Investigations and Information gathering” it is a concrete alternative for interrogation
methods that rely on coercion to extract confessions.
KINESIC INTERVIEW METHOD – the study of kinesics focused on the observable
outward physical behavior of the body in order to ascertain the person current emotional state
and the role of the body plays in communicating the information.
PRACTICAL KINESIC ANALYSIS PHASE – aim to observe and analyze the suspect’s
behavior in order to determine the subject’s truthful and deceptive behavior or at least to
determine those areas most sensitive to the subject.
5 WAYS TO RECOGNIZED THE CUES OF TRUTHFUL AND DECEPTIVE BEHAVIOR
GENERATED BY THE SUBJECT
Verbal cues
Practical kinesic statement analysis
Body language cues
Kinesic subject control
Confession behaviors
PRACTICAL KINESIC INTERROGATION PHASE – involves the interviewer determining
the subject’s frame of mind in response to the interview stress. Also helps the interviewer in
determining if the subject’s is suffering from personality disorder or psychosis.
CONCLUSION
As a student taking Bachelor of Science in Criminology benefits me in studying this subject
Specialized crime investigation 2 (CDI). The learning and knowledge of this subject can help
me in identifying crime mostly in crime against property. There was a designated laws which
punished different kind of crimes, the cases was usually have a specific name such as
robbery, theft, arson and etc.
The subject thought me how to identify crimes and what are the exceptions if you committed
those crimes. Especially the 6 cardinal points of questions which give a better understanding
in the subject in the reason of easy to understand. Hopefully I would study more about this
subject.