Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 127

INTERNATIONAL

COOPERATION
ADDRESSING
TRANSNATIONAL
CRIME
1
TRANSNATIONAL
CRIME

2
VIDEO CLIP

3
TRANSNATIONAL
CRIME
- a continuing illegal activity of group of
person which is primarily concerned with the
generation of profits, irrespective of national
boundaries as a result of globalization.
- crimes have actual or potential effect across
national borders which are intra-state
- activity that is considered a criminal offense
by at least two countries.

4
5
TRANSNATIONAL
ORGANIZED CRIME

- is a crime perpetuated by
organized criminal group
which the aim of committing
one or more serious crimes
or offenses in order to obtain
directly or indirectly, a financial
or other material benefits
committed through crossing of
borders or jurisdictions

6
7
8
SERIOUS CRIME
- The United Nations Convention against
Transnational Organized Crime defines “serious
crime” as an offense that is transnational in
nature and involves an organized criminal
group.
- Shall mean conduct constituting an offense
punishable by maximum deprivation of liberty
of at least four years or a more serious
penalty.

9
An offense is transnational in nature if:
 It is committed in more than one State;
 It is committed in one State but substantial
part of its preparation, planning,
direction or control takes place in
another State;
 It is committed in one State but involves an
organized criminal group engages in
criminal activities in more than one
State; or
It is committed in one State but has
substantial effects in another State.
10
TYPES OF
TRANSNATIONAL
CRIME

11
TYPES OF
TRANSNATIONAL
CRIMES
- Drug Trafficking - Economic crime
- Trafficking in Persons - Intellectual Property Theft
- Money Laundering - Piracy and Armed Robbery
- Cybercrime Against Ships
- Terrorism - Illicit Trade (smuggling) of
Small Arms and Light
- Environmental Crime Weapons

12
DRUG TRAFFICKING
• Is another term for drug trade.
• Refers to the illegal process through which
narcotics and other illegal drugs are
produced, transported and sold.
• Generally refers to the sale and distribution
of illegal drugs.

13
VIDEO CLIP

14
CLASSIFICATION OF DANGEROUS
DRUGS ACCORDING TO EFFECTS
1. Depressants
2. Stimulants
3. Hallucinogens

15
DEPRESSANTS
• Is another term for Downers.
• These are drugs which suppress vital body
functions especially those of the brain or
central nervous system with the resulting
impairment of judgment, hearing, speech
and muscular coordination.
• Generally decrease both the mental and
physical activities of the bodies.

16
STIMULANTS
• Is another term for Uppers.
• These are drugs produce increased mental
alertness, wakefulness, reduce hunger, and
provide a feeling of well being.
• Ex: Cocaine, Amphetamines and Caffeine.

17
HALLUCINOGENS
• Is another term for Psychedelic.
• The group of drugs that consists of a variety
of mind-altering drugs which distort reality,
thinking and perceptions of time, sound,
space and sensation.
• Ex: Marijuana

18
REPUBLIC ACT
9165
The Comprehensive Dangerous
Drugs Act of 2002

Signed June 7, 2002


Published June 19, 2002
Took Effect July 4, 2002

19
20
TRAFFICKING OF
A PERSON
• It refers to the recruitment transportation
harboring or receipt of people for the
purpose if slavery prostitution forced labor,
and servitude
• It is a form of “MODERN DAY SLAVERY”
• Also known as human trafficking

21
22
REPUBLIC ACT
9208
the Anti Trafficking in Persons Act of 2003

Approved May 26, 2003

A Consolidated Bill of Senate Bill No. 2444


and House Bill No. 4432.

23
REPUBLIC ACT
No. 10364

"Expanded Anti-Trafficking in
Persons Act of 2012″
Approved: FEB 06 2013

24
SLAVERY SLAVE

the submission a person held in


to a dominating servitude as the
influence or the chattel of
state of a person another.
who is chattel of
another.

25
WHITE SLAVERY
• engagement in the
business for profit,
or enlistment of
services of any
other person for
the purpose of
prostitution.

26
PURPOSE OF
TRAFFICKING PERSON
 Slavery  Involuntary servitude
 Debt bondage  Exploitation
 Prostitution  White slavery
 Pornography  Sale of organs

28
CAUSES OF HUMAN
TRAFFCKING
• POVERTY
• UNEVEN ECONOMIC DEVELOPMENT
• FAMILY ORIENTATION AND VALUES
• WEAK ENFORCEMENT OF LAW
• CORRUPTION
• IMMEDIATE BENEFITS IF WORKING
ABROAD

29
TERMS
USED IN
PROSTITUTION:

30
HOOKER /
WHORE STREET
WALKER
The usual
term for a One who solicits
commercial customers in
sex worker or public places
sex trade
worker
31
CALL GIRL KERB
CRAWLERS

Makes Men who drive along


appointments red-light districts to
by phone solicit prostitutes
(costumer).

32
GIGOLO HUSTLERS /
RENTBOYS

Male prostitute Male prostitute


who offers offering services
services to
female to male
customers customers

33
PIMPS (MALE)
AND
MADAMS (FEMALE)

organizers of prostitution or
procurers for customers

34
JOHNS OR
TRICKS
PUNTERS

• the customers • the British


of prostitutes in customers of
North America prostitutes

35
TYPES OF
PROSTITUTION

36
ESCORT
PROSTITUTION
Out Call In Call
• at the escort’s
• the act takes place residence or in
at the customer’s the hotel room
residence or at his rented for the
or her hotel room occasion by the
escort
37
LOT STREET
LIZARD PROSTITUTION
• Solicits customers
• Serves the in street corners
trucking industry or walking the
streets.

38
SEX
SKEEZERS
TOURISM
Trade sex for • The commercial
sexual relation by
illegal drugs the tourist with
residents at the
destination

39
PHILIPPINES

Where is
considered as
the haven for
sex industry?

40
THAILAND
• It is considered as
the most notorious
in the world in terms
of sex industry,
importing at least
one (1) million
women from China,
Laos and Vietnam.

41
CONSIDERED
AS
QUALIFIED
TRAFFICKING
42
• (a) When the trafficked person is a child;
• (b) When the adoption is effected through Republic
Act No. 8043, otherwise known as the "Inter-
Country Adoption Act of 1995" and said adoption is
for the purpose of prostitution, pornography, sexual
exploitation, forced labor, slavery, involuntary
servitude or debt bondage;
• (c) When the crime is committed by a syndicate, or
in large scale.
• (d) When the offender is a SPOUSE, ascendant,
parent, sibling, guardian or a person who exercises
authority over the trafficked person or when the
offense is committed by a public officer or
employee; 43
• E. When the trafficked person is recruited to engage
in prostitution with any member of the military or
law enforcement agencies;

• F. When the offender is a member of the military or


law enforcement agencies; and

• G. When by reason of or on occasion of the act of


TIP, the victim dies, becomes insane, suffers
mutilation or is afflicted with Human
Immunodeficiency Virus (HIV) or the Acquired
Immune Deficiency Syndrome (AIDS).

44
PHILIPPINE
GOVERNMENT EFFORTS
TO ADDRESS THE
PROBLEM

45
Philippine Govt Manifested its commitments against TIP
through the creation/ amendments of other legislative
acts such as:
- Mail-Order Bride (RA 6955)
- Anti-Rape law of 1997 (RA 8353)
- Rape Victim Assistance and Protection Act of 1998 (RA
8505)
- Special Protection of Children Against Abuse, Exploitation
and Discrimination Act (RA 7610)
- An Act Prohibiting the Employment of Children Below 15
Years of Age in Public and Private Undertakings (RA 7658)
- Migrant Workers and Overseas Filipinos Act of 1995 (RA
8042)
- Philippine Passport Act of 1996 (RA 8239)
- Inter-Country Adoption Law (RA 8043)
46
MONEY
LAUNDERING

• It is the practice of
disguising illegally
obtained funds so
that they may seem
legal.
• Converting illegal
money to a legal
one.
47
VIDEO CLIP

48
STEPS OF
MONEY
LAUNDERING

49
1. PLACEMENT
• is the physical disposal of the
money by putting them into the
financial system, usually through
Smurfing and Immersion.
Mixing of illicit
Moving small money with
amounts at times to licit one.
avoid suspicion
50
2. LAYERING
• also called heavy soaping
• conversion of cash into
monetary instruments and the
conversion of tangible assets
obtained by means of cash
purchases.
51
3. INTEGRATION
• also called spin dry
• the money is again available to the
criminal with its occupational and
geographical origin hidden.

52
53
WHAT IS THE
ANTI- MONEY LAUNDERING
ACT OF 2001?

REPUBLIC ACT 9160

as amended by RA 9194

54
REPUBLIC ACT NO.
10167
AN ACT TO FURTHER
STRENGTHEN THE ANTI-MONEY
LAUNDERING LAW.
Approved: June 06, 2012

55
THE ANTI-MONEY
LAUNDERING
COUNCIL (AMLC)

56
The Anti-Money
Laundering Council
(AMLC)
is the financial intelligence unit
of the Philippines and is
composed of the following
officials:
57
The Anti-Money
Laundering Council
(AMLC)
1. The Governor of the Bangko Sentral ng
Pilipinas.
2. The Chairperson of the Securities and
Exchange Commission.
3. The Commissioner of the Insurance
Commission.
58
59
CYBER CRIME
 All crimes performed or
resorted to by abuse of
electronic media with the
purpose of influencing the
functioning of computer
or computer system.
 It includes traditional
crimes in which computers
or networks are used to
commit a crime.
 Also known as computer
crime.

60
Cyber Crime
Any offense that is
committed by a computer,
computer system or computer
network
61
SCOPE APPLICATION
1. Computer or network can be a tool of
crime. ( use to commit the crime)
2. Computer or network can be a target of
the crime. ( the victim )
3. Computer or network can be used for
incidental purposes related to the crime

62
What is the anti cyber crime
law of 2012?

RA 10175
63
REASONS OF THE
VULNERABILITY OF
COMPUTERS

1. Capacity to store data in a relatively


small space
2. Easy to access
3. Loss of evidence

64
ONEL DE GUZMAN
• Had made the “I LOVE YOU
VIRUS”
• It originates in the country
May 4, 2000 and spread itself
around the world in one day
from Hongkong to Europe to
United States.
• Like other corporations, the
Pentagon, CIA and British
Parliament had to shut down
their mail systems.
65
66
The LOVE BUG
By far the most popular incidence of cyber
crime in the Philippines is the “ILOVEYOU
Virus” or the LOVE BUG. The suspect in the
case, a 23-year old student from a popular
computer university in the Philippines
drafted the virus with the vision of creating a
program that is capable of stealing passwords
in computers, ultimately to have free access to
the internet.

RA 8792 - legislated because of I love you virus


67
Republic Act No. 8792
or the E-commerce Law
was signed into law which punishes certain
crimes such as computer hacking and
intrusion of viruses and worms to computer
networks.

APPROVED JUNE 14, 2000

68
JJ MARIA GINER
• first person convicted in
violation of RA 8792
• he actually commits DDoSA
for causing denial of access
of the government portal
“gov.ph”
• in Sept. 2005 he was
convicted for hacking due to
pleading guilty lesser
offense.
• Giner imprison of 1-2 years
but was released on
probation.
69
REPUBLIC ACT NO. 10175
CYBERCRIME PREVENTION
ACT OF 2012
• AN ACT DEFINING CYBERCRIME,
PROVIDING FOR THE PREVENTION,
INVESTIGATION, SUPPRESSION AND THE
IMPOSITION OF PENALTIES THEREFOR AND
FOR OTHER PURPOSES
• Approved: SEP 12 2012

70
Manners of Committing Cyber Crimes:
HACKING
- unauthorized access into or interference in a computer
system in order to corrupt, alter, steal, or destroy using a
computer or other similar information and communication
devices.
CRACKING
-is a higher form of hacking in which the unauthorized
access culminates with the process of defeating the security
system for the purpose of acquiring money or information
and/or availing of free services.

71
MALICIOUS SENDING OF E-MAILS
- the sending of malicious
and defamatory electronic
mails for the purpose of
extorting money, or
threatening prospective
victims.

72
73
74
75
DISTRIBUTED DENIAL OF SERVICE ATTACKS
- DDOS attacks can be
committed by employing
multiple computers
controlled by a single
master computer server to
target a particular server by
bombarding it with
thousands of packets of
data in an attempt to
overwhelm the server and
cause it to crash.

76
77
78
Manners of Committing Cyber Crimes:
CYBER STALKING
- the criminal follows the victim by sending emails, and
frequently entering the chat rooms that causes an
intentional, substantial and unreasonable intrusion into
the private life of the person.
MENTAL DISTRESS
- the result of cyber stalking to the victim.
CYBER DEFAMATION
- the use of the computer system to make false statements
against a person thereby injuring his reputation.
COMPUTER VANDALISM
- any physical harm done to the computer set. (hardware)

79
Cybersex - is a sexual activity of arousal through
communication using the computer.
- Cybersex-for-pay employs the Internet and utilizes
computer cameras and microphones that allows client
to see and talk to girls doing the role play for them.

Child Pornography. — The unlawful or prohibited acts


defined and punishable by

Republic Act No. 9775 or the Anti-Child


Pornography Act of 2009, committed through a
computer system Provided, That the penalty to be
imposed shall be (1) one degree higher than that
provided for in Republic Act No. 9775.
80
R.A. 8484
• Access Device
Regulation
Act of 1998.

81
ACCESS DEVICE
• Is any card, plate, code,
account number, electronic
serial number, personal
identification number or
other means of account
access that can be used to
obtain money, goods,
services.
• It includes Credit Cards.

82
CYBER SEX

• Is a sexual activity
of arousal through
communication
using the
computer.

83
• Cybersex- for-pay employs the Internet and utilizes
computer cameras and microphones that allows client to
see and talk to girls doing the role play for them
84
According to CIDG, where are
the cybersex “hot spots” here in
the Philippines (2014)?

• Angeles, Pampanga
• San Fernando, Pampanga
• Las Piῆas
• Davao
85
INTERNET
PORNOGRAPHY
- The trafficking, distribution, posting,
and dissemination of obscene
material including children’s nude
pictures, indecent exposure, and
child sex slavery posted into the
internet, live streaming videos aired
through the internet
86
REPUBLIC ACT NO. 9995
ANTI-PHOTO AND VIDEO
VOYEURISM ACT OF 2009".
• Approved: FEB 15, 2010
• "Photo or video voyeurism" means the act of
taking photo or video coverage of a person or group
of persons performing sexual act or any similar
activity or of capturing an image of the private area
of a person or persons without the latter's consent.

87
INTELLECTUAL
PROPERTY THEFT
• Used interchangeably with intellectual property
piracy.
• is unauthorized copying of good, or works without
the authority of the owner, facilitation of the
production, distribution, importation and retailing.
• counterfeiting or pirating of good facilitated by the
internet or satellite technologies.

88
R.A. 8293

the Intellectual
Property Code of the
Philippines that tries to
protect patents,
industrial design,
trademarks and
copyright.

89
REPUBLIC ACT
NO. 8293
AN ACT PRESCRIBING THE INTELLECTUAL
PROPERTY CODE AND ESTABLISHING THE
INTELLECTUAL PROPERTY OFFICE,
PROVIDING FOR ITS POWERS AND
FUNCTIONS, AND FOR OTHER PURPOSES

Approved: June 6, 1997


90
REPUBLIC ACT
NO. 10372
An Act Amending Certain Provisions
of Republic Act No. 8293, Otherwise Known
as the “Intellectual Property Code of the
Philippines” and for Other Purposes.
• Approved: FEB 28 2013
91
FOUR CATEGORIES OF
INTELLECTUAL
PROPERTIES

• PATENTS
• TRADEMARKS
• TRADE SECRET
• COPYRIGHT
92
PATENT
• is the statutory grant, by
government, which
confers to an INVENTOR
to exclude others from
making, using, selling
or importing the
invention within the
territory of the country
that granted the patent.

93
How many years will be
the patent of an invention
will be protected?

17 years

94
TRADE MARKS

refers to symbol
word, or words
legally registered
by use as
representing a
company or
product

95
TRADE SECRET
A secret device
or technique
used by a
company or
product.

96
COPYRIGHT
• is the system of legal
protection an author
enjoys in the form of
EXPRESSION OF IDEAS.
• The holder of the
copyright enjoys the right
to reproduce, distribute,
display, perform, and to
prepare derivative works
based on the copyrighted
work.
97
REPUBLIC ACT 10088
"Anti-Camcording Act of 2010".

AN ACT TO PROHIBIT AND PENALIZE THE


UNAUTHORIZED USE, POSSESSION AND/OR
CONTROL OF AUDIOVISUAL RECORDING DEVICES
FOR THE UNAUTHORIZED RECORDING OF
CINEMATOGRAPHIC FILMS AND OTHER
AUDIOVISUAL WORKS AND/OR THEIR
SOUNDTRACKS IN AN EXHIBITION FACILITY,
PROVIDING PENALTIES THEREFOR AND FOR OTHER
PURPOSES

Approved: MAY 13 2010


98
CYBER TERRORISM
• It is the premeditated
use of disruptive
activities, or the threat
thereof, in cyber space,
with the intention to
further social,
ideological, religious,
political or similar
objectives, or to
intimidate any person
in furtherance of such
objectives.
99
100
101
 Use of intentionally
indiscriminate violence as a
means to create terror among
masses of people; or fear to
achieve a financial, political,
religious or ideological aim

 use of violence (or the threat of violence) against civilians in order


to attain goals that are political or religious or ideological in nature; this
is done through intimidation or coercion or instilling fear 102
 The word terror derives from the Latin word terrere,
T meaning “to frighten”.
 It is a threat or actual use of force or violence for
E political or other purpose, to foster fear, insecurity,
R distrust and unrest among the people.
 The unlawful use of force or violence against
R persons or property to intimidate or coerce a
O government, the civilian population, or any segment
thereof, in furtherance of political or social
R objectives. (FBI)
 The commission of crimes (rebellion, murder,
I kidnapping, hijacking etc.) that sow or create a
S condition of widespread and extraordinary fear and
panic among the populace in order to coerce the
M government to give in to an unlawful demand. (R.A.
9372 or the H.S.A.) 103
PURPOSE
OF TERRORISM
1. To inflict Massive fear ( main )
2. To bring about political change ( ultimate )

104
105
INTERNATIONAL
TERRORISM
• it is a form of
terrorism in
which the scope
of operations
involves citizens
of the territory of
more than one
country.

106
107
108
AL QAEDA
• in Arabic this means “The Base”, “the
Foundation”, “the Fundament”
• founded by Osama Bin Laden on about 1980’s.
• “The recruited and trained with the help of the
“Americans (CIA) and Arabs”– Robin Cook
(CLE0414)
• - Origins are traceable to the Arab volunteers
who fought against the Soviets Invasion of
Afghanistan in the 1980’s.
109
Osama Bin Laden
• Organized Al Qaeda, the Emir
of Al Qaeda
• Was Born in March 10, 1957
in the city of Riyadh
• responsible for heinous
terrorist, incidents including
the 2001 destruction of world
trade center
• He was killed in ABBOTTABAD
COMPOUND in Pakistan on
May 2, 2011 by Operations
Neptune Spear an Operation
launched by the US against
him.
110
111
112
113
9/11 ATTACK

114
115
FOUR AIRLINES UTILIZED
DURING 9/11 ATTACK

1. America Airlines 11- North Tower


2. United Airlines 175- South Tower
3. American- Airlines 77- Pentagon
4. United Airlines 93- crashed in Shanks Ville,
Pennsylvania, but the original target is the white
house

116
117
118
119
120
121
122
123
124
125
126
END

127

You might also like