Professional Documents
Culture Documents
Comparative Finals
Comparative Finals
COOPERATION
ADDRESSING
TRANSNATIONAL
CRIME
1
TRANSNATIONAL
CRIME
2
VIDEO CLIP
3
TRANSNATIONAL
CRIME
- a continuing illegal activity of group of
person which is primarily concerned with the
generation of profits, irrespective of national
boundaries as a result of globalization.
- crimes have actual or potential effect across
national borders which are intra-state
- activity that is considered a criminal offense
by at least two countries.
4
5
TRANSNATIONAL
ORGANIZED CRIME
- is a crime perpetuated by
organized criminal group
which the aim of committing
one or more serious crimes
or offenses in order to obtain
directly or indirectly, a financial
or other material benefits
committed through crossing of
borders or jurisdictions
6
7
8
SERIOUS CRIME
- The United Nations Convention against
Transnational Organized Crime defines “serious
crime” as an offense that is transnational in
nature and involves an organized criminal
group.
- Shall mean conduct constituting an offense
punishable by maximum deprivation of liberty
of at least four years or a more serious
penalty.
9
An offense is transnational in nature if:
It is committed in more than one State;
It is committed in one State but substantial
part of its preparation, planning,
direction or control takes place in
another State;
It is committed in one State but involves an
organized criminal group engages in
criminal activities in more than one
State; or
It is committed in one State but has
substantial effects in another State.
10
TYPES OF
TRANSNATIONAL
CRIME
11
TYPES OF
TRANSNATIONAL
CRIMES
- Drug Trafficking - Economic crime
- Trafficking in Persons - Intellectual Property Theft
- Money Laundering - Piracy and Armed Robbery
- Cybercrime Against Ships
- Terrorism - Illicit Trade (smuggling) of
Small Arms and Light
- Environmental Crime Weapons
12
DRUG TRAFFICKING
• Is another term for drug trade.
• Refers to the illegal process through which
narcotics and other illegal drugs are
produced, transported and sold.
• Generally refers to the sale and distribution
of illegal drugs.
13
VIDEO CLIP
14
CLASSIFICATION OF DANGEROUS
DRUGS ACCORDING TO EFFECTS
1. Depressants
2. Stimulants
3. Hallucinogens
15
DEPRESSANTS
• Is another term for Downers.
• These are drugs which suppress vital body
functions especially those of the brain or
central nervous system with the resulting
impairment of judgment, hearing, speech
and muscular coordination.
• Generally decrease both the mental and
physical activities of the bodies.
16
STIMULANTS
• Is another term for Uppers.
• These are drugs produce increased mental
alertness, wakefulness, reduce hunger, and
provide a feeling of well being.
• Ex: Cocaine, Amphetamines and Caffeine.
17
HALLUCINOGENS
• Is another term for Psychedelic.
• The group of drugs that consists of a variety
of mind-altering drugs which distort reality,
thinking and perceptions of time, sound,
space and sensation.
• Ex: Marijuana
18
REPUBLIC ACT
9165
The Comprehensive Dangerous
Drugs Act of 2002
19
20
TRAFFICKING OF
A PERSON
• It refers to the recruitment transportation
harboring or receipt of people for the
purpose if slavery prostitution forced labor,
and servitude
• It is a form of “MODERN DAY SLAVERY”
• Also known as human trafficking
21
22
REPUBLIC ACT
9208
the Anti Trafficking in Persons Act of 2003
23
REPUBLIC ACT
No. 10364
"Expanded Anti-Trafficking in
Persons Act of 2012″
Approved: FEB 06 2013
24
SLAVERY SLAVE
25
WHITE SLAVERY
• engagement in the
business for profit,
or enlistment of
services of any
other person for
the purpose of
prostitution.
26
PURPOSE OF
TRAFFICKING PERSON
Slavery Involuntary servitude
Debt bondage Exploitation
Prostitution White slavery
Pornography Sale of organs
28
CAUSES OF HUMAN
TRAFFCKING
• POVERTY
• UNEVEN ECONOMIC DEVELOPMENT
• FAMILY ORIENTATION AND VALUES
• WEAK ENFORCEMENT OF LAW
• CORRUPTION
• IMMEDIATE BENEFITS IF WORKING
ABROAD
29
TERMS
USED IN
PROSTITUTION:
30
HOOKER /
WHORE STREET
WALKER
The usual
term for a One who solicits
commercial customers in
sex worker or public places
sex trade
worker
31
CALL GIRL KERB
CRAWLERS
32
GIGOLO HUSTLERS /
RENTBOYS
33
PIMPS (MALE)
AND
MADAMS (FEMALE)
organizers of prostitution or
procurers for customers
34
JOHNS OR
TRICKS
PUNTERS
35
TYPES OF
PROSTITUTION
36
ESCORT
PROSTITUTION
Out Call In Call
• at the escort’s
• the act takes place residence or in
at the customer’s the hotel room
residence or at his rented for the
or her hotel room occasion by the
escort
37
LOT STREET
LIZARD PROSTITUTION
• Solicits customers
• Serves the in street corners
trucking industry or walking the
streets.
38
SEX
SKEEZERS
TOURISM
Trade sex for • The commercial
sexual relation by
illegal drugs the tourist with
residents at the
destination
39
PHILIPPINES
Where is
considered as
the haven for
sex industry?
40
THAILAND
• It is considered as
the most notorious
in the world in terms
of sex industry,
importing at least
one (1) million
women from China,
Laos and Vietnam.
41
CONSIDERED
AS
QUALIFIED
TRAFFICKING
42
• (a) When the trafficked person is a child;
• (b) When the adoption is effected through Republic
Act No. 8043, otherwise known as the "Inter-
Country Adoption Act of 1995" and said adoption is
for the purpose of prostitution, pornography, sexual
exploitation, forced labor, slavery, involuntary
servitude or debt bondage;
• (c) When the crime is committed by a syndicate, or
in large scale.
• (d) When the offender is a SPOUSE, ascendant,
parent, sibling, guardian or a person who exercises
authority over the trafficked person or when the
offense is committed by a public officer or
employee; 43
• E. When the trafficked person is recruited to engage
in prostitution with any member of the military or
law enforcement agencies;
44
PHILIPPINE
GOVERNMENT EFFORTS
TO ADDRESS THE
PROBLEM
45
Philippine Govt Manifested its commitments against TIP
through the creation/ amendments of other legislative
acts such as:
- Mail-Order Bride (RA 6955)
- Anti-Rape law of 1997 (RA 8353)
- Rape Victim Assistance and Protection Act of 1998 (RA
8505)
- Special Protection of Children Against Abuse, Exploitation
and Discrimination Act (RA 7610)
- An Act Prohibiting the Employment of Children Below 15
Years of Age in Public and Private Undertakings (RA 7658)
- Migrant Workers and Overseas Filipinos Act of 1995 (RA
8042)
- Philippine Passport Act of 1996 (RA 8239)
- Inter-Country Adoption Law (RA 8043)
46
MONEY
LAUNDERING
• It is the practice of
disguising illegally
obtained funds so
that they may seem
legal.
• Converting illegal
money to a legal
one.
47
VIDEO CLIP
48
STEPS OF
MONEY
LAUNDERING
49
1. PLACEMENT
• is the physical disposal of the
money by putting them into the
financial system, usually through
Smurfing and Immersion.
Mixing of illicit
Moving small money with
amounts at times to licit one.
avoid suspicion
50
2. LAYERING
• also called heavy soaping
• conversion of cash into
monetary instruments and the
conversion of tangible assets
obtained by means of cash
purchases.
51
3. INTEGRATION
• also called spin dry
• the money is again available to the
criminal with its occupational and
geographical origin hidden.
52
53
WHAT IS THE
ANTI- MONEY LAUNDERING
ACT OF 2001?
as amended by RA 9194
54
REPUBLIC ACT NO.
10167
AN ACT TO FURTHER
STRENGTHEN THE ANTI-MONEY
LAUNDERING LAW.
Approved: June 06, 2012
55
THE ANTI-MONEY
LAUNDERING
COUNCIL (AMLC)
56
The Anti-Money
Laundering Council
(AMLC)
is the financial intelligence unit
of the Philippines and is
composed of the following
officials:
57
The Anti-Money
Laundering Council
(AMLC)
1. The Governor of the Bangko Sentral ng
Pilipinas.
2. The Chairperson of the Securities and
Exchange Commission.
3. The Commissioner of the Insurance
Commission.
58
59
CYBER CRIME
All crimes performed or
resorted to by abuse of
electronic media with the
purpose of influencing the
functioning of computer
or computer system.
It includes traditional
crimes in which computers
or networks are used to
commit a crime.
Also known as computer
crime.
60
Cyber Crime
Any offense that is
committed by a computer,
computer system or computer
network
61
SCOPE APPLICATION
1. Computer or network can be a tool of
crime. ( use to commit the crime)
2. Computer or network can be a target of
the crime. ( the victim )
3. Computer or network can be used for
incidental purposes related to the crime
62
What is the anti cyber crime
law of 2012?
RA 10175
63
REASONS OF THE
VULNERABILITY OF
COMPUTERS
64
ONEL DE GUZMAN
• Had made the “I LOVE YOU
VIRUS”
• It originates in the country
May 4, 2000 and spread itself
around the world in one day
from Hongkong to Europe to
United States.
• Like other corporations, the
Pentagon, CIA and British
Parliament had to shut down
their mail systems.
65
66
The LOVE BUG
By far the most popular incidence of cyber
crime in the Philippines is the “ILOVEYOU
Virus” or the LOVE BUG. The suspect in the
case, a 23-year old student from a popular
computer university in the Philippines
drafted the virus with the vision of creating a
program that is capable of stealing passwords
in computers, ultimately to have free access to
the internet.
68
JJ MARIA GINER
• first person convicted in
violation of RA 8792
• he actually commits DDoSA
for causing denial of access
of the government portal
“gov.ph”
• in Sept. 2005 he was
convicted for hacking due to
pleading guilty lesser
offense.
• Giner imprison of 1-2 years
but was released on
probation.
69
REPUBLIC ACT NO. 10175
CYBERCRIME PREVENTION
ACT OF 2012
• AN ACT DEFINING CYBERCRIME,
PROVIDING FOR THE PREVENTION,
INVESTIGATION, SUPPRESSION AND THE
IMPOSITION OF PENALTIES THEREFOR AND
FOR OTHER PURPOSES
• Approved: SEP 12 2012
70
Manners of Committing Cyber Crimes:
HACKING
- unauthorized access into or interference in a computer
system in order to corrupt, alter, steal, or destroy using a
computer or other similar information and communication
devices.
CRACKING
-is a higher form of hacking in which the unauthorized
access culminates with the process of defeating the security
system for the purpose of acquiring money or information
and/or availing of free services.
71
MALICIOUS SENDING OF E-MAILS
- the sending of malicious
and defamatory electronic
mails for the purpose of
extorting money, or
threatening prospective
victims.
72
73
74
75
DISTRIBUTED DENIAL OF SERVICE ATTACKS
- DDOS attacks can be
committed by employing
multiple computers
controlled by a single
master computer server to
target a particular server by
bombarding it with
thousands of packets of
data in an attempt to
overwhelm the server and
cause it to crash.
76
77
78
Manners of Committing Cyber Crimes:
CYBER STALKING
- the criminal follows the victim by sending emails, and
frequently entering the chat rooms that causes an
intentional, substantial and unreasonable intrusion into
the private life of the person.
MENTAL DISTRESS
- the result of cyber stalking to the victim.
CYBER DEFAMATION
- the use of the computer system to make false statements
against a person thereby injuring his reputation.
COMPUTER VANDALISM
- any physical harm done to the computer set. (hardware)
79
Cybersex - is a sexual activity of arousal through
communication using the computer.
- Cybersex-for-pay employs the Internet and utilizes
computer cameras and microphones that allows client
to see and talk to girls doing the role play for them.
81
ACCESS DEVICE
• Is any card, plate, code,
account number, electronic
serial number, personal
identification number or
other means of account
access that can be used to
obtain money, goods,
services.
• It includes Credit Cards.
82
CYBER SEX
• Is a sexual activity
of arousal through
communication
using the
computer.
83
• Cybersex- for-pay employs the Internet and utilizes
computer cameras and microphones that allows client to
see and talk to girls doing the role play for them
84
According to CIDG, where are
the cybersex “hot spots” here in
the Philippines (2014)?
• Angeles, Pampanga
• San Fernando, Pampanga
• Las Piῆas
• Davao
85
INTERNET
PORNOGRAPHY
- The trafficking, distribution, posting,
and dissemination of obscene
material including children’s nude
pictures, indecent exposure, and
child sex slavery posted into the
internet, live streaming videos aired
through the internet
86
REPUBLIC ACT NO. 9995
ANTI-PHOTO AND VIDEO
VOYEURISM ACT OF 2009".
• Approved: FEB 15, 2010
• "Photo or video voyeurism" means the act of
taking photo or video coverage of a person or group
of persons performing sexual act or any similar
activity or of capturing an image of the private area
of a person or persons without the latter's consent.
87
INTELLECTUAL
PROPERTY THEFT
• Used interchangeably with intellectual property
piracy.
• is unauthorized copying of good, or works without
the authority of the owner, facilitation of the
production, distribution, importation and retailing.
• counterfeiting or pirating of good facilitated by the
internet or satellite technologies.
88
R.A. 8293
the Intellectual
Property Code of the
Philippines that tries to
protect patents,
industrial design,
trademarks and
copyright.
89
REPUBLIC ACT
NO. 8293
AN ACT PRESCRIBING THE INTELLECTUAL
PROPERTY CODE AND ESTABLISHING THE
INTELLECTUAL PROPERTY OFFICE,
PROVIDING FOR ITS POWERS AND
FUNCTIONS, AND FOR OTHER PURPOSES
• PATENTS
• TRADEMARKS
• TRADE SECRET
• COPYRIGHT
92
PATENT
• is the statutory grant, by
government, which
confers to an INVENTOR
to exclude others from
making, using, selling
or importing the
invention within the
territory of the country
that granted the patent.
93
How many years will be
the patent of an invention
will be protected?
17 years
94
TRADE MARKS
refers to symbol
word, or words
legally registered
by use as
representing a
company or
product
95
TRADE SECRET
A secret device
or technique
used by a
company or
product.
96
COPYRIGHT
• is the system of legal
protection an author
enjoys in the form of
EXPRESSION OF IDEAS.
• The holder of the
copyright enjoys the right
to reproduce, distribute,
display, perform, and to
prepare derivative works
based on the copyrighted
work.
97
REPUBLIC ACT 10088
"Anti-Camcording Act of 2010".
104
105
INTERNATIONAL
TERRORISM
• it is a form of
terrorism in
which the scope
of operations
involves citizens
of the territory of
more than one
country.
106
107
108
AL QAEDA
• in Arabic this means “The Base”, “the
Foundation”, “the Fundament”
• founded by Osama Bin Laden on about 1980’s.
• “The recruited and trained with the help of the
“Americans (CIA) and Arabs”– Robin Cook
(CLE0414)
• - Origins are traceable to the Arab volunteers
who fought against the Soviets Invasion of
Afghanistan in the 1980’s.
109
Osama Bin Laden
• Organized Al Qaeda, the Emir
of Al Qaeda
• Was Born in March 10, 1957
in the city of Riyadh
• responsible for heinous
terrorist, incidents including
the 2001 destruction of world
trade center
• He was killed in ABBOTTABAD
COMPOUND in Pakistan on
May 2, 2011 by Operations
Neptune Spear an Operation
launched by the US against
him.
110
111
112
113
9/11 ATTACK
114
115
FOUR AIRLINES UTILIZED
DURING 9/11 ATTACK
116
117
118
119
120
121
122
123
124
125
126
END
127