Professional Documents
Culture Documents
Sir CAS ORGANIZED CRIME
Sir CAS ORGANIZED CRIME
Page
Chapter 1- Definition, Nature and Historical
Background of Organized Crime
A. Definitions
B. Attributes Of An Organized Crime
C. Structure Of Organized Crime
D. Organized Crime In The Philippines
Chapter 5- Cybercrimes
A. Introduction
B. The Electronic Commerce Act
C. Definition Of Terms
D. Legal Recognition Of Electronic Data
Messages And Electronic Documents
E. Admissibility And Evidential Weight
Of Electronic Data Message Or Electronic
Document
F. Lawful Access
G. Unlawful Acts Punished Under The Electronic
Commerce Act
REFERENCES
E. SYLLABUS
Course Description
The study of the nature of organized crimes, their attributes and categories. It
includes international and local organized groups. This also focuses on crimes
committed by a person, group of persons, or corporations while undertaking legitimate
profession or business occupation.
No of Units: 3
Objectives:
Programmed Topics
A. Definitions
B. Attributes of An Organized Crime
C. Structure of Organized Crime
D. Organized Crime in the Philippines
A. Introduction
B. Nature of Transnational Organized Crime
C. Types of Transnational Organized Crime
D. Noted Transnational Organized Crime Group
A. Introduction
B. Categories of Terrorism
C. Characteristics of Terrorists
D. Goals of Terrorist Plots
E. Ten-Step Attack Planning Cycle
F. Types of Targets
G. Structure of Terrorist Organization
H. Sophistication of Terrorist Organization
I. Information Sharing
J. Terrorist Safe Havens
K. Terrorist Financing
L. Responses to Terrorism
M. The Al Qaeda
Chapter 5- Cybercrimes
A. Introduction
B. The Electronic Commerce Act
C. Definition Of Terms
D. Legal Recognition Of Electronic DataMessages And Electronic Documents
E. Admissibility And Evidential WeightOf Electronic Data Message Or
ElectronicDocument
F. Lawful Access
G. Unlawful Acts Punished Under The ElectronicCommerce Act
A. Definitions
B. Money Laundering Process
C. Money Laundering Methods
D. The Anti- Money Laundering Act of 2001
E. Definitions
F. Money Laundering Offense
G. Creation of Anti- Money LaunderingCouncil (AMLC)
H. Authority to Inquire into Bank Deposits
REFERENCES
Chapter 1
DEFINITION, NATURE AND HISTORICAL BACKGROUND OF
ORGANIZED CRIME
A. Definition
Attributes:
a) A complicated hierarchy
b) An extensive division of labor
c) Positions assigned on the basis if skills
d) Responsibilities carried out in an impersonal manner
e) Extensive written rules and regulations
f) Communication from top of the hierarchy to persons on the bottom,
usually in the written form
Chapter 2
A. Introduction
Modern Types
5. Making the computer itself the subject of a crime e.g. when a virus is
placed in it to destroy data.
Reasons in the Commission of Computer Crimes
1. Personal gain
2. The criminals are typically motivated by revenge for some perceived
wrong
3. A need to exhibit their technical prowess and superiority
4. A wish to highlight the vulnerability of computer security systems
5. A desire to spy on other people’s private financial and personal
information (computer voyeurism)
6. Or a philosophy of open access to all systems and programs.
Asia
Triad societies all display some degree of hierarchy, and a typical triad has
members organized by rank. The leader of the triad is known as the “Dragon
Head” or “ChorKwun”. Although hierarchical in nature, triads tend to be strictly
controlled from the top.
Chinese criminal gangs started to appear in the 1970’s with the economic
growth. At the same time, Chinese immigrants also establish the Big Circle
Gangs to protect themselves. These groups initially consisted primarily of former
soldiers who left China for Hong Kong. The Big Circle Gang members are
particularly violent, specializing in armed robberies of jewelry stores in Hong
Kong as well as heroin trafficking. The Big Circle Gang is technically not a triad
society, but most Big Circle Gang members are also members of various societies.
Big Circle Gangs started off engaging primarily in localized violent crimes such
as contract killing and armed robbery.
Two of the largest and most well-known gangs are the United Bamboo
Gang and the Four Seas Gang.
4. Japanese Gangs
5. Vietnamese Gang
New York City contains five families – the Gambino, Columbo (formerly
Profaci), Lucchese, Bonnano, and Genovese families – named after their
“founding fathers”; in contrast, Chicago contains a single mob organization
called the “outfit,” which also influence racketeering in such cities as
Melwaukee, Kansas City, and Phoenix.
Organized crime groups still persist. On January 20, 2011, the Federal
Bureau of Investigation (FBI) conducted one of the largest single-day operations
against the Mafia in FBI history. Federal agents working with local law
enforcement fanned out across Italy, New York, New Jersey and Rhode Island to
arrest 127 people allegedly involved in organized crimes.
Chapter 3
A. Introduction
B. Categories of Terrorism
C. Characteristics of Terrorists
There is no single profile exist, no predictive tests, and studies provide
general characteristics.
c) Age:
Foot soldiers and operational members: 20 to 35 years old
d) Gender
Women are increasingly used in terrorist activities such as:
Suicide bombers
Smuggling of explosives
Step 9: Escape
a) Preplanned escape routes
b) Many included diversions
F. Types of Targets
1. Soft targets- a person or thing that is relatively unprotected or vulnerable;
hard to defend against attack i.e. highly accessible and generally great in
number.
2. Hard targets- a structure that has been fortified against attack i.e. limited
accessible and generally few in numbers.
e) Maritime System
a) Use of propaganda
b) Distribution of networks
c) Use of communication techniques
I. Information Sharing
K. Terrorist Financing
1. Zakat - The giving of alms for the poor and needy, as prescribed by the
Quran. Zakat is the primary means within the Muslim world for terror
organizations to “legitimately” receive money.
d) The Internet has numerous Islamic charity sites asking believers to pay the
Zakat to them promising to apply it on their behalf.
e) The giver of Zakat knows only to whom they gave their money, for what
they believe will be the building of schools, mosques and to help the poor.
Once given however, the giver has no further control if the funds are
diverted or a portion is skimmed off for the purchase of weapons,
explosives and operating terror training camps.
f) Many Muslims send their Zakat through Islamic banks. This process is
legal but there is no assurance they have funded a legitimate charity vice a
terrorist group.
g) Zakat funds deposited in Islamic banks are taken off the books and
“disappear” because they are not considered part of the banks assets nor
its liabilities and are not reported. The bank has served only as a
collection agent. The Zakat can then be transferred, without regulation, to
worthy charities as directed by the givers, to any worthy recipient or have
some or all of it skimmed off to Islamic radicals.
h) Islamic Banking -The Islamic banking system has been a mystery to most
in the West. Islamic Banks cannot charge interest on loans. This requires
that the Islamic Bank make its money on its investments. Western style
accounting and auditing practices to monitor and track what those
investments truly involve have only recently been implemented and then
only under international pressure since the attacks on the US.
Zakat funds deposited in Islamic banks are taken off the books and
“disappear” because they are not considered part of the banks assets nor
its liabilities and are not reported. The bank has served only as a
collection agent. The Zakat can then be transferred, without regulation, to
worthy charities as directed by the givers, to any worthy recipient or have
some or all of it skimmed off to Islamic radicals. When conducted as
prescribed by the Quran, serves to legitimately facilitate funds collection
and disbursal. This is particularly true of Zakat funds.
2. Hawala
Definition of Hawala
Hawala came into public interest after the 2001 attacks on the US when
it was revealed that much of the money funding the attackers was transferred
by Hawala. It has no formal limitations on amounts but does have practical
limits. It is well suited for terror operations that cost $50-$70K to fund and
complete in a short period of time. It is illegal in many countries including the
US, yet many banks in both Islamic and Western countries utilize this system.
It was originally benign in its historical intent but is now consistently misused
by those who take advantage of its efficiencies. It remains as a cultural
alternative to regulated banking but certainly will continue to adapt further
to accommodate the modern world. The fact that it is being made illegal in
more and more countries will not end the practice in the near term.
L. Responses to Terrorism
Responses to terrorism are broad in scope. They can include realignments of the
political spectrum and reassessments of fundamental values. Specific types of
responses include:
M. The Al Qaeda
It was in the year 1988 that Al Qaeda, Arabic for “The Base” was founded by
Osama bin Laden, MuhammedAtef, and Ayman al-Zawahiri to continue the
Jihad internationally. Al Qaeda is reportedly headquartered in Afghanistan and
Peshawar, Pakistan.
4. The Committees.
5. The Cells
Emir
Consultation Council
Cells
70,000 members in
more than 60 countries
around the world
6. The Headquarters
1) Isolating the brother socially, cutting him off from the public life, placing
him in solitary confinement, and denying him news and information in
order to make him feel lonely.
2) Forbidding calling him by name, giving the brother number, and calling
him by that number in order to defeat his morale.
3) Threatening to summon his sister, mother, wife, or daughter and rape
her.
4) Threatening to rape the brother himself.
5) Threatening to confiscate his possessions and to have him fired from his
employment.
6) Threatening to cause him permanent disability or life imprisonment.
7) Offering the brother certain enticements (apartment, car, passport,
scholarship, and so on).
8) Using harsh treatment, insults and curses to defeat his morale.
Chapter 4
1. Article 122 (Piracy in General and Mutiny in the High Seas or in the
Philippine Waters);
2. Article 134 (Rebellion or Insurrection);
3. Article 134-a (Coup d‘Etat), including acts committed by private persons;
Article 248 (Murder);
4. Article 267 (Kidnapping and Serious Illegal Detention);
5. Article 324 (Crimes Involving Destruction,
or under
2. Any person who, not being a principal under Article 17 of the Revised Penal
Code or a conspirator as defined in Section 4 hereof, cooperates in the execution
of either the crime of terrorism or conspiracy to commit terrorism by previous or
simultaneous acts.
The provisions of Republic Act No. 4200 (Anti-wire Tapping Law) to the
contrary notwithstanding, a police or law enforcement official and the members of
his team may, upon a written order of the Court of Appeals, listen to, intercept and
record, with the use of any mode, form, kind or type of electronic or other
surveillance equipment or intercepting and tracking devices, or with the use of any
other suitable ways and means for that purpose, any communication, message,
conversation, discussion, or spoken or written words between members of a
judicially declared and outlawed terrorist organization, association, or group of
persons or of any person charged with or suspected of the crime of terrorism or
conspiracy to commit terrorism.
1. The identity, such as name and address, if known, of the charged or suspected
person whose communications, messages, conversations, discussions, or spoken or
written words are to be tracked down, tapped, listened to, intercepted, and recorded
and, in the case of radio, electronic, or telephonic (whether wireless or otherwise)
communications, messages, conversations, discussions, or spoken or written words,
the electronic transmission systems or the telephone numbers to be tracked down,
tapped, listened to, intercepted, and recorded and their locations or if the person
suspected of the crime of terrorism or conspiracy to commit terrorism is not fully
known, such person shall be subject to continuous surveillance provided there is a
reasonable ground to do so;
2. The identity (name, address, and the police or law enforcement organization) of
the police or of the law enforcement official, including the individual identity
(names, addresses, and the police or law enforcement organization) of the members
of his team, judicially authorized to track down, tap, listen to, intercept, and record
the communications, messages, conversations, discussions, or spoken or written
words;
4. The length of time within which the authorization shall be used or carried out.
If no case is filed within the thirty (30)-day period, the applicant police or law
enforcement official shall immediately notify the person subject of the surveillance,
interception and recording of the termination of the said surveillance, interception
and recording. The penalty of ten (10) years and one day to twelve (12) years of
imprisonment shall be imposed upon the applicant police or law enforcement
official who fails to notify the person subject of the surveillance, monitoring,
interception and recording as specified above.
All tapes, discs, and recordings made pursuant to the authorization of the
authorizing division of the Court of Appeals, including all excerpts and summaries
thereof as well as all written notes or memoranda made in connection therewith,
shall, within forty-eight (48) hours after the expiration of the period fixed in the
written order of the authorizing division of the Court of Appeals or within forty-
eight (48) hours after the expiration of any extension or renewal granted by the
authorizing division of the Court of Appeals, be deposited with the authorizing
Division of the Court of Appeals in a sealed envelope or sealed package, as the case
may be, and shall be accompanied by a joint affidavit of the applicant police or law
enforcement official and the members of his team.
1. The number of tapes, discs, and recordings that have been made, as well
as the number of excerpts and summaries thereof and the number of
written notes and memoranda, if any, made in connection therewith;
2. The dates and times covered by each of such tapes, discs, and recordings;
3. The number of tapes, discs, and recordings, as well as the number of
excerpts and summaries thereof and the number of written notes and
memoranda made in connection therewith that have been included in the
deposit; and
4. The date of the original written authorization granted by the Anti-
Terrorism Council to the applicant to file the ex parte application to
conduct the tracking down, tapping, intercepting, and recording, as well
as the date of any extension or renewal of the original written authority
granted by the authorizing division of the Court of Appeals.
The joint affidavit shall also certify under oath that no duplicates or copies
of the whole or any part of any of such tapes, discs, and recordings, and that no
duplicates or copies of the whole or any part of any of such excerpts, summaries,
written notes, and memoranda, have been made, or, if made, that all such
duplicates and copies are included in the sealed envelope or sealed package, as
the case may be, deposited with the authorizing division of the Court of Appeals.
Any person, police or law enforcement officer who violates any of the acts
proscribed in the preceding paragraph shall suffer the penalty of not less than
ten (10) years and one day to twelve (12) years of imprisonment.
G.Disposition of Deposited Materials in the Court of Appeals
The sealed envelope or sealed package and the contents thereof, which are
deposited with the authorizing division of the Court of Appeals, shall be deemed
and are hereby declared classified information, and the sealed envelope or sealed
package shall not be opened and its contents (including the tapes, discs, and
recordings and all the excerpts and summaries thereof and the notes and
memoranda made in connection therewith) shall not be divulged, revealed, read,
replayed, or used as evidence unless authorized by written order of the authorizing
division of the Court of Appeals, which written order shall be granted only upon a
written application of the Department of Justice filed before the authorizing division
of the Court of Appeals and only upon a showing that the Department of Justice has
been duly authorized in writing by the Anti-Terrorism Council to file the application
with proper written notice the person whose conversation, communication, message
discussion or spoken or written words have been the subject of surveillance,
monitoring, recording and interception to open, reveal, divulge, and use the
contents of the sealed envelope or sealed package as evidence.
Any person, law enforcement official or judicial authority who violates his
duty to notify in writing the persons subject of the surveillance as defined above
shall suffer the penalty of six (6) years and one day to eight (8) years of
imprisonment.
The written application with notice to the party concerned to open the
deposited sealed envelope or sealed package shall clearly state the purpose or
reason for:
The provisions of Article 125 of the Revised Penal Code to the contrary
notwithstanding, any police or law enforcement personnel, who, having been
duly authorized in writing by the Anti-Terrorism Council has taken custody of a
person charged with or suspected of the crime of terrorism or the crime of
conspiracy to commit terrorism shall, without incurring any criminal liability for
delay in the delivery of detained persons to the proper judicial authorities,
deliver said charged or suspected person to the proper judicial authority within a
period of three (3) days counted from the moment the said charged or suspected
person has been apprehended or arrested, detained, and taken into custody by
the said police, or law enforcement personnel: Provided, That the arrest of those
suspected of the crime of terrorism or conspiracy to commit terrorism must
result from the surveillance under Section 7 and examination of bank deposits
under Section 27 of this Act.
K. Penalty for Failure to Deliver Suspect to the Proper Judicial Authority Within
Three (3) Days
The penalty of ten (10) years and one day to twelve (12) years of
imprisonment shall be imposed upon any police or law enforcement personnel
who has apprehended or arrested, detained and taken custody of a person
charged with or suspected of the crime of terrorism or conspiracy to commit
terrorism and fails to deliver such charged or suspected person to the proper
judicial authority within the period of three (3) days.
L. TheAnti-Terrorism Council
The Council shall implement this Act and assume the responsibility for
the proper and effective implementation of the anti-terrorism policy of the
country. The Council shall keep records of its proceedings and decisions. All
records of the Council shall be subject to such security classifications as the
Council may, in its judgment and discretion, decide to adopt to safeguard the
safety of the people, the security of the Republic, and the welfare of the nation.
The National Intelligence Coordinating Agency shall be the Secretariat of
the Council. The Council shall define the powers, duties, and functions of the
National Intelligence Coordinating Agency as Secretariat of the Council. The
National Bureau of Investigation, the Bureau of Immigration, the Office of Civil
Defense, the Intelligence Service of the Armed Forces of the Philippines, the
Anti-Money Laundering Council, the Philippine Center on Transnational Crime,
and the Philippine National Police intelligence and investigative elements shall
serve as support agencies for the Council.
In pursuit of its mandate in the previous Section, the Council shall have
the following functions with due regard for the rights of the people as mandated
by the Constitution and pertinent laws:
The Commission on Human Rights shall give the highest priority to the
investigation and prosecution of violations of civil and political rights of persons
in relation to the implementation of this Act; and for this purpose, the
Commission shall have the concurrent jurisdiction to prosecute public officials,
law enforcers, and other persons who may have violated the civil and political
rights of persons suspected of, accused of, or detained for the crime of terrorism
or conspiracy to commit terrorism.
Chapter 5
CYBERCRIMES
A. Introduction
3. Identity Theft which occurs when a person uses the Internet to steal
someone’s identity and/or impersonate them to open a new credit card
account or conduct some other financial transactions.
1. Theft of Services such as the theft of processing time and services not
entitled to an employee
5. Making the computer itself the subject of crime such as placing virus in it
to destroy data.
1. The motivation behind cyberterrorism maybe the same with any other
terrorism;
4. The cost of such an act is minimal, and the tools and information are
ubiquitous on existing everywhere.
6. The prevention of attacks requires more coordination than almost any form of
terrorism.
Examples:
2. Attacking air traffic control systems which may cause collision between two
large aircraft, or cracking aircrafts- in cockpit sensors or rail lines.
C. Definition of Terms
(a) Where the law requires a document to be in writing, that requirement is met
by an electronic document if the said electronic document maintains its integrity
and reliability and can be authenticated so as to be usable for subsequent
reference, in that–
ii. The electronic document is reliable in the light of the purpose for which
it was generated and in the light of all relevant circumstances.
(b) Paragraph (a) applies whether the requirement therein is in the form of an
obligation or whether the law simply provides consequences for the document
not being presented or retained in its original form.
(c) Where the law requires that a document be presented or retained in its
original form, that requirement is met by an electronic document if-
(a) A method is used to identify the party sought to be bound and to indicate
said party's access to the electronic document necessary for his consent or
approval through the electronic signature;
(b) Said method is reliable and appropriate for the purpose for which the
electronic document was generated or communicated, in the light of all
circumstances, including any relevant agreement;
(c) It is necessary for the party sought to be bound, in or order to proceed further
with the transaction to have executed or provided the electronic signature; and
(d) The other party is authorized and enables to verify the electronic signature
and to make the decision to proceed with the transaction authenticated by the
same.
(b) On the ground that it is not in the standard written form, and the
electronic data message or electronic document meeting, and complying
with the requirements under Sections 6 or7 hereof shall be the best
evidence of the agreement and transaction contained therein.
F. Lawful Access
Except for the purposes authorized under the law(RA 8792), any person
who obtained access to any electronic key, electronic data message or electronic
document, book, register, correspondence, information, or other material
pursuant to any powers conferred, shall not convey to or share the same with
any other person.
Chapter 6
HUMAN TRAFFICKING
Note:
Scope of Trafficking
It is very difficult to assess the real size of human trafficking because the
crime took place underground, and is often not identified. However, a
conservative estimate of the crime puts the number of victims at any one time at
2.5 million. It affects every region of the world and generates tens of billions of
dollars in profits for criminals each year.
1) Sexual exploitation
2) Forced labor
B. Modalities of Trafficking
While trafficking patterns may differ from country to country and region
to region, a number of common features can be identified.
At present, for organized criminal groups the risk is low and profits are
high in trafficking in human beings.
Low Risks
High Profits
1) When consumers are willing to buy goods and services from the
trafficking industry, they create a profit incentive for labor traffickers;
5.Facilitate, assist or help in the exit and entry of persons from/to the country
at international and local airports, territorial boundaries and seaports who are in
possession of unissued, tampered or fraudulent travel documents for the purpose of
promoting trafficking in persons;
7. Knowingly benefit from, financial or otherwise, or make use of, the labor or
services of a person held to a condition of involuntary servitude, forced labor, or
slavery.
The prescriptive period commences to run from the day on which the
trafficked person is delivered or released from the conditions of bondage and
interrupted by the filing of the complaint or information and commence to run
again when such proceedings terminate without the accused being convicted or
acquitted or are unjustifiably stopped for any reason not imputable to the
accused.
Chapter 7
MONEY LAUNDERING
A. Definitions
1. Double invoicing
2. Direct cash deposit
3. Back-to-back loans
4. Fake properties transactions
5. Underworld illicit banking systems
6. Advocate trial fees
7. Smurfing
8. Fake gambling earnings
PLACEMENT
COLLECTION OF
Dirty Money
BANK LAYERING
Dirty money integrates
Into the financial system
Loan to Company
“Y”
BANK
Purchase of luxury assets, Offshore bank
Financial investments, commercial/
Industrial investments
INTEGRATION
D. The Anti-Money Laundering Act of 2001
E. Definitions
(1) banks, non-banks, quasi-banks, trust entities, and all other institutions
and their subsidiaries and affiliates supervised or regulated by the
BangkoSentralngPilipinas (BSP);
Note:
(d) Offender- refers to any person who commits a money laundering offense.
(e) Person- refers to any natural or juridical person.
(h) Transaction- refers to any act establishing any right or obligation or giving
rise to any contractual or legal relationship between the parties thereto. It also
includes any movement of funds by any means with a covered institution.
(1) Kidnapping for ransom under Article 267 of Act No. 3815, otherwise
known as the Revised Penal Code, as amended;
(5) Robbery and extortion under Articles 294, 295, 296, 299, 300, 301 and
302 of the Revised Penal Code, as amended;
(7) Piracy on the high seas under the Revised Penal Code, as amended and
Presidential Decree No. 532;
(8) Qualified theft under Article 310 of the Revised Penal Code, as
amended;
(9) Swindling under Article 315 of the Revised Penal Code, as amended;
(11) Violations under Republic Act No. 8792, otherwise known as the
Electronic Commerce Act of 2000;
(12) Hijacking and other violations under Republic Act No. 6235;
destructive arson and murder, as defined under the Revised Penal Code,
as amended, including those perpetrated by terrorists against non-
combatant persons and similar targets;
(13) Fraudulent practices and other violations under Republic Act No.
8799, otherwise known as theSecurities Regulation Code of 2000;
(14) Felonies or offenses of a similar nature that are punishable under the
penal laws of other countries.
(a) Any person knowing that any monetary instrument or property represents,
involves, or relates to, the proceeds of any unlawful activity, transacts or
attempts to transact said monetary instrument or property.
(b) Any person knowing that any monetary instrument or property involves the
proceeds of any unlawful activity, performs or fails to perform any act as a result
of which he facilitates the offense of money laundering referred to in paragraph
(a) above.
(c) Any person knowing that any monetary instrument or property is required
under this Act to be disclosed and filed with the Anti-Money Laundering
Council (AMLC), fails to do so.
(1) to require and receive covered transaction reports from covered institutions;
(3) to institute civil forfeiture proceedings and all other remedial proceedings
through the Office of the Solicitor General;
(4) to cause the filing of complaints with the Department of Justice or the
Ombudsman for the prosecution of money laundering offenses;
(7) to implement such measures as may be necessary and justified under this Act
to counteract money laundering;
(8) to receive and take action in respect of, any request from foreign states for
assistance in their own anti-money laundering operations provided in this Act;
(10) to enlist the assistance of any branch, department, bureau, office, agency or
instrumentality of the government, including government-owned and -
controlled corporations, in undertaking any and all anti-money laundering
operations, which may include the use of its personnel, facilities and resources
for the more resolute prevention, detection and investigation of money
laundering offenses and prosecution of offenders.
Chapter 8
1. Capability:
a) Organizational Structure
(1) Composition- highly structured and complex
(2) Disposition- members have infiltrated a vast variety of legitimate
businesses that circumvent government controls.
b) Resources
(1) High profile strength
(2) Highly sophisticated logistical support
(3) Highly specialized training and indoctrination
c) Networking/Connections
(1) Well-entrenched and fluid network
(2) Tight operating linkages and influenced with law enforcement and
other government agencies
(3) Initiated and maintained through bribery and corruption on public
officials
d) Modus Operandi
(1) High profile
(2) Difficult to counter
(3) Violence and intimidation
2. Motive:
a) Non-ideological/Non Sectarian
b) Organizational Profit and Advantage
Note:
The absence of the attending requirements in the definition of the OSCG will fall
on the concept of ordinary Criminal Gangs.
C. Criminal Gangs
1. Capability:
2. Resources:
3. Networking/Connections:
4. Modus Operandi:
a) Less corporate-focus attention on making money from specific criminal
activity
b) Territorial-possession of “turf”
c) Scavenger-motivated by the need to belong to a group
5. Personalities:
6. Motive:
a) Profit and personal advantage
2) Criminal Activity
a) Primary . Refers to the main or principal crime specialty, for
which group was originally established
4) Name of Members
7) Current Activities
9) Connections
14) Priority
Covered by COPLAN to neutralize said OCG/CG
20) Attachments
(1) Name/Alias- state the name and aliases used by the person.
(2) Last Known Address- indicate the recent known whereabouts of
the person
(3) Group Affiliation- if applicable, state the name of the group
wherein the person is a member or affiliated with.
(4) Area of Operation/Main Base- state the areas where the person is
conducting operations/harboring
(5) Position- if the person is a member of the group, indicate the
person’s position in the group
(6) Nature of Offense- state the criminal offense the person is charged
with
(7) Criminal Case Number- indicate the criminal case number
(8) Issuing Court- state the court which issued the warrant of arrest
(9) Remarks- state any other relevant information not mentioned
above such as whether there is a reward for the arrest of the person,
etc.
(10) Photograph- include the person’s photograph, if available
(1) Name/Alias- state the name and alias used by the person
(2) Last Known Address- indicate the recent known whereabouts of
the person
(3) Group Affiliation- if applicable, state the name of the group
wherein the person is a member or affiliated with
(4) Area of Operation/Main Base- state the area where the person is
conducting operations/harboring
(5) Position- if the person is a member of a group, indicate the person’s
position in the group
(6) Crime Committed/Involvement- state the crime where the person
is suspected to be involve and the person’s nature of involvement
(7) References- cite particular reference which are basis for the person’s
inclusion in the watch list such as information reports, police
investigation reports, etc.
(8) Photograph- include the person’s photograph, if available
4. Mechanics for Removal and Downgrading of Entries From Wanted List to
Watch List
(1) Escaped while in detention pending the resolution of the court case
(2) Jumped bail
(3) Escape while serving sentence
In cases where a person has been arrested and is out on bail but is
monitored to be involved in crimes defined in the criteria for the
priority/wanted list, same person’s name shall be removed from the
priority list on the watch list.
6. Drawing of Top Twenty Most Wanted Persons From the Wanted List
From among the entries in the priority list, “Top Twenty Most Wanted
Persons” shall be drawn. The parameters which serve as the bases for the
inclusion are as follows:
a) Number of warrant of arrests
b) Gravity of offenses
c) Notoriety and extent of atrocious activities of the person; and
d) Recidivism
Chapter 9
Pursuant to Executive Order No. 62, the Philippine Center for Transnational
Crime is created under the Office of the President to formulate and implement a
concerted program of action of all law enforcement, intelligence and other
government agencies for the prevention and control of transnational crime.
C. Organizational Structure
Presently, the PCTC have two (2) Executive Offices and four (4) Directorates,
namely:
Functions:
Functions
Functions
Functions
Functions
Functions
D. Coordinative Mechanism
b) Pursuant to E.O 829 NALECC was created to serve as the venue for the
coordination of all law enforcement activities of various government
law enforcement agencies to ensure unified direction and integration
of effort throughout the country in the suppression of criminal
activities on a day-to-day basis, particularly at the operating levels.
E. Other Functions
1. Designs programs and projects to enhance capacity building in
combating Transnational Crime
Organizational Structure
2. If such acts are carried out, to ensure that the perpetrators are brought
to justicewhich could be achieved by exchanging information's with
its member countries through its source messaging system and by
arranging meetings of expert to address the subject.
Fugitive Investigation
1. Red Notice - based on national arrest warrants, are used to seek the
arrest and extradition of suspects.
References
Corpus, Victor N. Silent War. VNC Enterprises. Quezon City, Philippines. 1989
Maas, Peter. Killer Spy. Warmer Books, Inc. New Yerk. 1995