@@@Organized Crime Investigation@@@

September 7, 2017 | Author: Dane Pauline Adora | Category: Prostitution, Money Laundering, Organized Crime, Crimes, Crime & Justice
Share Embed Donate


Short Description

Download @@@Organized Crime Investigation@@@...

Description

Organized Crime Investigation

Organized crime  are transnational, national, or

local groupings of highly centralized enterprises run by criminals for the purpose of engaging in illegal activity, most commonly for monetary profit. ERIC SAWATI CATTE

2

Organized Crime (OC) Distinguished from Terrorism OC is a non ideological enterprise which would differentiate it from terrorist groups, such as those religiously, politically, and some socially motivated violent crimes embraced in the technical definition of terrorism ERIC SAWATI CATTE

3

Organized Crime Group (OCG) is a structured group of three or

more persons existing for a period of time and acting in concert with the aim of committing one or more serious crimes in order to obtain directly or indirectly a financial or other material benefit. OC is organized in a hierarchical manner which makes it “organized” ERIC SAWATI CATTE

4

An Enforcer • one who make

ERIC SAWATI CATTE

arrangement for killing and injuring (physically, economically and psychologically) the member or

5

A Corrupter •

one who bribes, buys, intimidates, threatens, negotiates and “sweet talk” into a relationship with the police, public officials or anyone else who might help the member security and maintain immunity from arrest,

ERIC SAWATI CATTE

6

A Corruptee

a public

official, usually not a member of the organization family, who can influence on behalf of the organization ERIC SAWATI CATTE

7

Attributes of Organized Crime (OC)

ERIC SAWATI CATTE

8

Non-ideological No political goal They just want to gain

money, material or fame/honor

ERIC SAWATI CATTE

9

Hierarchical Authority is

defined B There is chain of o command ss Underbos There is s delegation of Captains authority Tasks are provided Soldiers ERIC SAWATI CATTE

10

Limited or exclusive membership The members of the

organization are their family members, close friends or associates.

ERIC SAWATI CATTE

11

Self perpetuating The OCG continues overtime

ERIC SAWATI CATTE

12

Use bribery and illegal violence

ERIC SAWATI CATTE

13

Demonstrate a specific division of labor

In order to maintain chain of custody

so that if there are irregularities, they may trace who do it and punish him. PURPOSE? 1. Punishment 2. Security 3. Specialty ERIC SAWATI CATTE

14

Monopolistic They monopolized the business so

that all the gains will be owned by them. They have the control to the business where they can increase and decrease the price

ERIC SAWATI CATTE

15

Governed by explicit rules and regulation

“Code of Omerta” “Be true inside but not on

the outside”

ERIC SAWATI CATTE

16

What is the punishment for the violation of this law? Death

ERIC SAWATI CATTE

17

Models of Organized Crime

Bureaucratic or Corporate Model

ADVISER A retired member/ former boss of the OCG ERIC SAWATI CATTE

19

Presidential Commission on Organized Crime Model Boss, Underboss, Consigliere Lawyers, Corrupt Politician Accountant, Chemist Pushers and users Community of illegal products support and services ERIC SAWATI CATTE

20

Comparative Perspective in Organized Crime

MAFIA

The word MAFIA is an acronym……. Morta Alla Francia, Italia Anela

Italian for death to France ERIC SAWATI CATTE

this is Italy’s cry 22

What is the original name of Mafia? La Cosa Nostra Our Thing ERIC SAWATI CATTE

23

At one point in their history, what do they called their group? “The Honored Society”

ERIC SAWATI CATTE

24

What about their members? Mafiosi “Men of Honor” ” Made Men”

ERIC SAWATI CATTE

25

What is known as the most powerful and most active Italian organized crime group in the US?

It is also considered the

second largest organization in Italy. ERIC SAWATI CATTE

26

ERIC SAWATI CATTE

27

It is used to describe the assassination of prominent government officials. “Excellent Cadaver”

ERIC SAWATI CATTE

28

Yakuza or Gokudo

(Violence

groups)

Aka “good for nothing” The Yakuza or boryokudan, is

the most influential organized crime group in Japan.

ERIC SAWATI CATTE

29

Ya-Ku-Sa its name was originated from

the Japanese card game Oicho Kabu, a card game that represents the numbers eight, nine and three – the total is 20, a useless number that means also a bad fortune for the player. ERIC SAWATI CATTE

30

ERIC SAWATI CATTE

31

The ff are some characteristics of the yakuza: manner 1. MembersThe usually wear sunglasses ofsuits walking and colorful so that their profession could be immediately recognized by civilians 2. Members walk arrogantly with wide gaits 3. Members dress conservatively and flash their tattoos only when ERIC SAWATI CATTE

32

Yakuza Rituals

Yubitsume for the first offense, the

transgressor must cut off the tip of his left little finger and hand the severed portion to the boss as a form of penance or apology. Sometimes, the Underboss may do this himself to spare a member of his gang ERIC SAWATI CATTE

34

Irezumi hand-poked full-body

tattoos for the members through hand-made and hand-held tools with needles of sharpened bamboo or steel

ERIC SAWATI CATTE

35

Pearlings one pearl is inserted into

the skin of the penis of the member for every year in prison

ERIC SAWATI CATTE

36

Oicho-Kabu the members, whenever they

play this card game, are given the chance to display their tattoos to the other members as they normally keep them concealed with long-sleeved and high-necked shirts ERIC SAWATI CATTE

37

Sake-sharing ceremony is used to seal bonds of

brotherhood between individual yakuza members or groups

ERIC SAWATI CATTE

38

societies common mystical symbol; an equilateral triangle representing Chinese basic concept of Heaven, Earth and Man.

Chinese Triad ERIC SAWATI CATTE

39

These OC are highly skilled in Martial Arts, therefore police officers special unit created in combating OC, must be more than physically fit.

ERIC SAWATI CATTE

40

Tongs originated among early-

marginalized Chinatown communities to protect themselves from the natives, but because it had no political motives, they soon found themselves involved in criminal activities like extortion, gambling, human trafficking, murder and ERIC SAWATI CATTE

41

1.Columbian Medellin Cartel Founded during the 1980’s by Colombian

drug lords in the name of Pablo Escobar Gaviria and drug bosses Jose Gonzalo Rodriguez Gacha and the top aid cocaine barons Juan David and the Ochoa Brothers. The Medellin Cartel is reputedly responsible for organizing world’s drug trafficking network. Eric S. Catte

42

Pablo Escobar Gaviria

2. The Cali Cartel The downfall of the Medellin Cartel is the rise of

the Cali Cartel- the newly emerged cocaine monopoly. The cartel produces over 90% of cocaine in the world. Due to this, it was called the best and the brightest of the modern underworld. “they are professionals of the highest order, intelligent, efficient, imaginative, and nearly impenetrable”- US- Drug Enforcement Agency. Eric S. Catte

44

Boss

ERIC SAWATI CATTE

45

Gilberto Orajuela

Gilberto Rodriguez Orajuela- better known as Don Chepe- “the chess player” heads the syndicated organization. Under him, the Cali Cartel was considered the most powerful criminal organization in the world.

Extradition Treaty Columbian government

allowed the extradition of the Columbian members of the Cartel to US and to be tried in US courts.

ERIC SAWATI CATTE

47

When they are just starting their illegal activity, what drugs are they trafficking? Marijuana

ERIC SAWATI CATTE

48

OCGs in the Philippines

Francisco Group formerly called the Dragon or

Kuratong Baleleng Group led by Manuel Francisco

ERIC SAWATI CATTE

50

Pentagon Group It is headed by Tahir Alonto it is a creation of the Moro

Islamic Liberation Front (MILF) Most of the members are also listed as members of the MILF.

ERIC SAWATI CATTE

51

What is the main purpose of the creation of pentagon group? To generate funds for the MILF and insulate MILF members from criminal accusations.

ERIC SAWATI CATTE

52

Lost Command KFR Group is mainly composed of ex-soldiers

and ex-policemen who were rendered jobless after the 1986 EDSA Revolution. Most of its members are seasoned combatants and have good background in intelligence works. ERIC SAWATI CATTE

53

Waray-Abuyog Group is composed of hardened

criminals from Samar and Leyte.

ERIC SAWATI CATTE

54

Akyat Bahay Gang is known as a violent home

invasion-oriented gang which also has a history with drug dealing.

ERIC SAWATI CATTE

55

Bahala Na Gang("Come What May") A tattoo of a Question Mark (?) is their identity as members of the gang located in any of the parts of their body.

ERIC SAWATI CATTE

56

Sigue Sigue Comando Gang is one of the largest Gangs

in the Philippines. It has thousands of members all over the Philippines.

ERIC SAWATI CATTE

57

The Organized Crime Situation in the Philippines

Drugs Trafficking What is the

most abuse drugs in the Philippines? Shabu in the Philippines mainly comes from the Southern provinces of China – Guandong and Shabu Fujian. ERIC SAWATI CATTE

59

What is the most active and indispensable ingredient of shabu? Ephedra or ephedrine It is processed in China and smuggled into the Philippines as Shabu. ERIC SAWATI CATTE

60

DID YOU KNOW? A person can die the first time they take METH, while others can survive for years on the drug.

Eric S. Catte

61

EFFECTS OF SHABU

Crank Bugs

Eric S. Catte

62

EFFECTS OF DRUGS ON THE FETUS

Kidnapping • A person is guilty of kidnapping if

he unlawfully removes another from his place of residence or business or a substantial distance from the vicinity where he find or if he unlawfully confines another for a substantial period in a place of isolation. ERIC SAWATI CATTE

64

Kidnapping VS. Hostage Taking Kidnapping

Hostage Taking MEANS OF Online/ Face to face COMMUNICA Electronic communicatio TION Communicatio n n (CP/Telephone / Radio) LOCATION Unknown Known ERIC SAWATI CATTE

65

Modus Operandi of KFR Groups 1.Spotting – this is the stage of

identifying probable victims. 2.Surveillance – it is conducted to obtain data to ensure success of the Kidnapping. 3.Risk Analysis and Target Selection – Surveillance report is Profit/ Risk then analyzed and victim is selected as a result of the data. ERIC SAWATI CATTE

66

4. Abduction of Victim – the act of

abducting implemented as agreed or planned. 5. Ransom for Demand – amount of money is then relayed to the party of the victim and negotiation by the police may happen during this stage unless earlier or later detected. 6. Collection of Ransom – money is then collected and life here is in danger if agreement was never meet. ERIC SAWATI CATTE

67

It is considered as the most organized among the crime groups. Bank robbery groups

ERIC SAWATI CATTE

68

What is RA 6539 ? Anti-Carnapping Act of 1972

ERIC SAWATI CATTE

69

Elements of Carnapping That the offender must have taken a

motor vehicle belonging to another; Any the vehicle propelled means other That taking is with by intent to gain; than muscular power using the public and highways, but excepting road roller, That the motor vehicle was taken trolley car, street sweeper, without the owner’s consent sprinkle, or by lawnmower, bulldozer, grader, forklift, means of violence against or amphibian trucks and crane, tractor, intimidation of persons, or by using trailer andthings. all kinds used exclusively force upon for agricultural purposes. ERIC SAWATI CATTE

70

Businesses of Organized Crime

Corruption

Graft

• acting on

• refers to opportunities, exploitation of created by virtue of one’s authority, one’s role by for personal gain accepting at the expense of bribes or the public as one protection is authorized to money. serve. ERIC SAWATI CATTE

72

What is the anti-graft and corrupt practices act? RA 3019

ERIC SAWATI CATTE

73

REPUBLIC ACT No. 10589 AN ACT DECLARING DECEMBER

OF EVERY YEAR AS "ANTICORRUPTION MONTH" IN THE ENTIRE COUNTRY Approved: MAY 27 2013

ERIC SAWATI CATTE

74

What is the lead agency that was designated under RA 10589 for coordination purposes on the said program? Office of the Ombudsman

ERIC SAWATI CATTE

75

What is the anti- plunder law? RA 7080

ERIC SAWATI CATTE

76

Patronage- favoring

supporters during the previous election Nepotism- favoring relatives Cronyism - favoring personal friends ERIC SAWATI CATTE

77

Embezzlement

Kickback it is the official’s theft or share of misappropriat misappropriated ion of funds from his office made entrusted possible by resources corrupt bidders ERIC SAWATI CATTE

78

3. Gambling it is the wagering of money

or something of material value with the intent to win more but the outcome is uncertain. Game of chance or luck ERIC SAWATI CATTE

79

What is the law simplifying and providing stiffer penalties for violations of Philippine gambling laws? PRESIDENTIAL DECREE NO. 1602

ERIC SAWATI CATTE

80

What is the term called for gambling that is permitted by law? GAMING

ERIC SAWATI CATTE

81

4. Loan sharking is the lending of money to

another wherein the percentage of the principal is too high (usurious interest) for the lender to pay his debt and the collection is done by force or intimidation. ERIC SAWATI CATTE

82

What is the other term for loansharking? Shylocking

ERIC SAWATI CATTE

83

5. Pornography is the

depiction of explicit sexual subject matter for sexually exciting the viewer. ERIC SAWATI CATTE

84

Sub Genres of Pornography Softcore

Hardcore

refers to

pornography pornography that does not that depicts depict penetration penetration explicitly ERIC SAWATI CATTE

85

It is an act defining the crime of Child Pornography, prescribing Penalties therefore and for other purposes.

RA 9775

ERIC SAWATI CATTE

86

6. Prostitution is the act or practice of engaging

in sex acts for hire. It is considered as a victimless crime.

ERIC SAWATI CATTE

87

Terms used in Prostitution:

Whore

Hooker or street walker

The usual

term for a commercial sex worker or One who sex trade solicits worker customers in

public places ERIC SAWATI CATTE

89

Call girl

Kerb crawlers Men who drive

Makes

appointments by phone ERIC SAWATI CATTE

along red-light districts to solicit prostitutes (costumer).

90

Gigolo Male

prostitute who offers services to female customers ERIC SAWATI CATTE

Hustlers or Male Rentboys prostitute offering services to male customers

91

Pimps (male) and Madams (female)

organizers of prostitution or

procurers for customers

ERIC SAWATI CATTE

92

Johns or Tricks

Punters

the

customers of prostitutes in North America ERIC SAWATI CATTE

the British

customers of prostitutes 93

Types of Prostitution

Escort prostitution Out Call the act takes

place at the customer’s residence or at his or her hotel room ERIC SAWATI CATTE

In Call at the escort’s

residence or in the hotel room rented for the occasion by the escort 95

Lot lizard

Serves the

trucking industry ERIC SAWATI CATTE

Street prostitution

Solicits

customers in street corners or walking the streets. 96

Skeezers

Sex tourism

The

Trade sex for

illegal drugs ERIC SAWATI CATTE

commercial sexual relation by the tourist with residents at the destination 97

Philippines • Where is

considered as the haven for sex industry?

ERIC SAWATI CATTE

98

Thailand • It is considered as

the most notorious in the world in terms of sex industry, importing at least one (1) million women from China, Laos and Vietnam. ERIC SAWATI CATTE

99

REPUBLIC ACT NO. 10158 THE ACT DECRIMINALIZING

VAGRANCY • Any person having no apparent means of  Approved on March 27, 2012

subsistence, who has the physical ability to work and who neglects to apply himself or herself to some lawful calling; • Any person found loitering about public or semi-public buildings or places or trampling or wandering about the country or the streets without visible means of 100 support; ERIC SAWATI CATTE

Trafficking in Persons Recruitment, transportation,

harboring, or receipt of people for the purpose of slavery, prostitution, forced labor and servitude. It includes the act of removal or sale of organ. ERIC SAWATI CATTE

101

What is the Anti Trafficking in persons act of 2003? RA 9208

ERIC SAWATI CATTE

102

REPUBLIC ACT No. 10364 "Expanded Anti-Trafficking

in Persons Act of 2012″ Approved: FEB 06 2013

ERIC SAWATI CATTE

103

Slavery Slave • the submission to a dominating influence or the a person held state of a in servitude as person who is the chattel of chattel of another. another. ERIC SAWATI CATTE

104

White slavery engagement in the

business for profit, or enlistment of services of any other person for the purpose of prostitution. ERIC SAWATI CATTE

105

Money Laundering It is the practice of

disguising illegally obtained funds so that they may seem legal. Converting illegal money to a legal one. ERIC SAWATI CATTE

106

What is the anti- money laundering act of 2001? REPUBLIC ACT 9160

as amended by RA 9194 ERIC SAWATI CATTE

107

REPUBLIC ACT NO. 10167 AN ACT TO FURTHER

STRENGTHEN THE ANTIMONEY LAUNDERING LAW.

Approved: June 06, 2012

ERIC SAWATI CATTE

108

Freezing of Monetary Instrument or Property Upon verified petition by the AMLC and after determination that probable cause exists that any monetary instrument or property is in any way related to an unlawful activity, will be issued a freeze order, which shall be effective immediately. ERIC SAWATI CATTE

109

Who is the authorized agency to issue a freeze order in accordance with RA 10167? Court of Appeals

ERIC SAWATI CATTE

110

No court shall issue a temporary restraining order or a writ of injunction against any freeze order. Who is only authorized by law to issue TRO as an exemption? Supreme Court

ERIC SAWATI CATTE

111

REPUBLIC ACT NO. 10365 AN ACT FURTHER STRENGTHENING

THE ANTI-MONEY LAUNDERING LAW. Approved: FEB 15 2013

ERIC SAWATI CATTE

112

"Money laundering is also

committed by any covered person who, knowing that a covered or suspicious Banks, non-banks, quasitransaction is required banks, trust entities, foreign under this Act to be exchange dealers, pawnshops, reported to theremittance Anti-Money money changers, Laundering Council (AMLC), and transfer companies fails to do so." ERIC SAWATI CATTE

113

Steps of Money Laundering

Mixing of illicit 1. Placement

money with licit is the physical disposal of the one.

money by putting them into the financial system, usually through Smurfing and Immersion.

Moving small amounts at times to avoid suspicion ERIC SAWATI CATTE

115

2. Layering also called heavy soaping conversion of cash into

monetary instruments and the conversion of tangible assets obtained by means of cash purchases. ERIC SAWATI CATTE

116

3. Integration also called spin dry the money is again available

to the criminal with its occupational and geographical origin hidden.

ERIC SAWATI CATTE

117

Where is the best institution for you to put your money that comes from illegal means in order to avoid detection and prosecution? ERIC SAWATI CATTE

118

Ponzi/Pyramid Schemes Pyramid schemes focus on the

exchange of money and recruitment. At the heart of each pyramid scheme there is typically a representation that new participants can recoup their original investments by inducing two or more prospects to make ERIC SAWATI CATTE

119

ERIC SAWATI CATTE

120

Cyber Crime

Cyber Crime Any offense that is

committed by a computer, computer system or computer network

ERIC SAWATI CATTE

122

What is the anti cyber crime law of 2012? RA 10175

ERIC SAWATI CATTE

123

Reasons of the Vulnerability of Computers 1.Capacity to store data in a

relatively small space 2.Easy to access 3.Loss of evidence ERIC SAWATI CATTE

124

Onel De Guzman Had made the “I LOVE YOU

VIRUS” It originates in the country May 4, 2000 and spread itself around the world in one day from Hongkong to Europe to United States. Like other corporations, the Pentagon, CIA and British ERIC SAWATI CATTE

125

Manners of Committing Cyber Crimes

Hacking Unauthorized access into

or interference in a computer system in order to corrupt, alter, steal, or destroy using a computer or other similar information and communication devices. ERIC SAWATI CATTE

127

WHAT IS THE OTHER TERM FOR HACKING? CRACKING

ERIC SAWATI CATTE

128

Kinds of Hacking

ERIC SAWATI CATTE

129

Denial of Service Attack The bandwidth of the

victim’s network is flooded or his e-mail box is filled with spam mail depriving him of the services he is entitled to access or provide. ERIC SAWATI CATTE

130

Virus Dissemination This is usually done by

means of a malicious code or software.

ERIC SAWATI CATTE

131

Web Defacement This is the act of the intruder

into a server and changing without permission all the aspect of a website which the public can see

ERIC SAWATI CATTE

132

Salami Attack Logic bombs are introduced

into the bank’s system that result to the deduction of an insignificant amount from every account and transferred into a single account ERIC SAWATI CATTE

133

Virus or worm attack Viruses are programs that

attach themselves to a computer or a file and then circulate to other files or to the other computers on a network. ERIC SAWATI CATTE

134

What is the kind of virus that eats up the available space on a computer’s memory?

Worms

ERIC SAWATI CATTE

135

Logic Bombs Viruses that lie dormant and only become active at particular dates

ERIC SAWATI CATTE

136

Internet Time Theft the internet surfing hours

of the victim are used up by another person without his consent

ERIC SAWATI CATTE

137

Web Jacking the hacker gains access

and control over the web site of another.

ERIC SAWATI CATTE

138

Software Piracy software are stolen

through the illegal copying of genuine programs and the products distributed to the customers ERIC SAWATI CATTE

139

Phishing a form of identity theft in which

scammers send mass emails posing as banks, credit card companies, popular commercial web sites, asking the recipients to confirm or update financial information in a hyperlink in order to appear like it came from the original website ERIC SAWATI CATTE

140

Cyber Stalking the criminal follows the

victim by sending emails, and frequently entering the chat rooms that causes an intentional, substantial and unreasonable intrusion into the private life of the person. ERIC SAWATI CATTE

141

What will be the result of cyber stalking to the victim?

mental distress

ERIC SAWATI CATTE

142

Cyber Defamation/ Libel The use of the computer

system to make false statements against a person thereby injuring his reputation ERIC SAWATI CATTE

143

Computer vandalism Any physical harm done

to the computer set

ERIC SAWATI CATTE

144

Cyber Terrorism It is the premeditated use of

disruptive activities, or the threat thereof, in cyber space, with the intention to further social, ideological, religious, political or similar objectives, or to intimidate any person in furtherance of ERIC SAWATI CATTE

145

Republic Act No. 8792 or

the E-commerce Law was signed into law which punishes certain crimes such as computer hacking and intrusion of viruses and worms to computer networks. ERIC SAWATI CATTE

146

R.A. 8484 Access Device Regulation

Act of 1998.

ERIC SAWATI CATTE

147

Access Device Is any card, plate, code,

account number, electronic serial number, personal identification number or other means of account access that can be used to obtain money, goods, services. It includes Credit Cards. ERIC SAWATI CATTE

148

Access Device Punishable Acts

ERIC SAWATI CATTE

149

CYBER SEX Is a sexual activity of arousal

through communication using the computer. Cybersex-for-pay employs the Internet and utilizes computer cameras and microphones that allows client to see and talk to girls doing the role play for them ERIC SAWATI CATTE

150

According to CIDG, where are the cybersex “hot spots” here in the Philippines (2014)? Angeles Pampanga San Fernando Pampanga Las Pinas Davao ERIC SAWATI CATTE

151

R.A. 8293 the Intellectual Property

Code of the Philippines that tries to protect patents, industrial design, trademarks and copyright ERIC SAWATI CATTE

152

Patent is the statutory grant, by

government, which confers to an INVENTOR to exclude others from making, using, selling or importing the invention within the territory of the country that granted the patent. ERIC SAWATI CATTE

153

How many years will be the patent of an invention will be protected?

17 years ERIC SAWATI CATTE

154

Copyright is the system of legal protection

an author enjoys in the form of EXPRESSION OF IDEAS. The holder of the copyright enjoys the right to reproduce, distribute, display, perform, and to prepare derivative works based on the copyrighted work ERIC SAWATI CATTE

155

REPUBLIC ACT NO. 10372 AN ACT AMENDING CERTAIN

PROVISIONS OF REPUBLIC ACT NO. 8293, Approved: FEB 28 2013

ERIC SAWATI CATTE

156

TERRORISM

What is the main purpose of terrorism? “To inflict Massive Fear”

ERIC SAWATI CATTE

158

Terrorism It is a threat or actual use of

force or violence for political or other purpose, to foster fear, insecurity, distrust and unrest among the people ERIC SAWATI CATTE

159

The commission of crimes

(rebellion, murder, kidnapping, hijacking etc.) that sow or create a condition of widespread and extraordinary fear and panic among the populace in order to coerce the government to give in to an unlawful demand. (R.A.

ERIC SAWATI CATTE

160

9/11 Bombing

ERIC SAWATI CATTE

161

REPUBLIC ACT NO. 10168  "The Terrorism Financing,

Prevention and Suppression Act of 2012” June 20, 2012 The State shall reinforce its fight against terrorism by criminalizing the financing of terrorism. ERIC SAWATI CATTE

162

DOMESTIC TERRORISM

Involves persons

or groups committing a terrorist act/s in their own country. ERIC SAWATI CATTE

163

INTERNATIONAL TERRORISM Involves

citizens or the territory of more than one country. ERIC SAWATI CATTE

164

Religious Terrorism Terror in the

Mind of God”. Terrorizing for religious purpose.

ERIC SAWATI CATTE

165

In the Philippines, where is considered as the ‘terrorist safe haven’? Southern

Philippines

ERIC SAWATI CATTE

166

Moro National Liberation Front (MNLF)

The Moro National

Liberation Front's primary goal was the creation of an Nur Misuari autonomous Muslim state in the southern Philippines. Who is the founder and leader? ERIC SAWATI CATTE

167

Moro Islamic Liberation Front (MILF) The Moro Islamic Liberation Front (MILF) is a splinter of the Moro National Liberation Front (MNLF). Following a failed 1977 accord between MNLF and the Philippine government, MNLF's second-incommand broke away from the group. Hashim Salamat then created the Moro Islamic Liberation ERIC SAWATI CATTE

168

Publicly, the Moro Islamic Liberation

Front demanded a fully independent Muslim state in the southern Philippines. However by the late 1990s, the MILF had begun negotiations for simply an autonomous Muslim region. By 1997, MILF had begun negotiations with the Philippine government. The Moro Islamic Liberation Front and the Philippine president Gloria Arroyo signed a peace agreement in ERIC SAWATI CATTE

169

Abu Sayyaf Group (ASG) The ASG was founded in 1991 by

radical Moro National Liberation Front (MNLF) members who objected to the MNLF's negotiations with the Philippine government. Abu Sayyaf, which literally means “bearer of the sword" in Arabic. ERIC SAWATI CATTE

170

The group's first major attack came

in 1991, when an Abu Sayyaf grenade killed two American evangelists. Its first leader was Abdurajak Janjalani From 1998 the group was led by Khadaffy Janjalani ERIC SAWATI CATTE

171

Abu Sayyaf Victims

ERIC SAWATI CATTE

Talipao Massacre in Sulu

172

New People's Army (NPA) The New People's Army (NPA) was created

as the armed wing of the outlawed political organization, the Communist Party of the Philippines, Marxist-Leninist (CPP-ML). Overthrow the Filipino From 1969 to 1976, the People's Republic government and replace of China provided material support it to the a communist/socialist Newwith People's Army. Following the cessation of China's support, the NPA went through a state. five-year period of weakness. ERIC SAWATI CATTE

173

Who is known as the founder of NPA? Jose Maria Sison (1969)

ERIC SAWATI CATTE

174

Bangsamoro Islamic Freedom Fighters (BIFF) Ameril Umbra It is a groupUstadz of radical armed Muslims espousing Kato independence in the Southern Philippines. Who is the leader? Where is there operation?

Central Mindanao ERIC SAWATI CATTE

175

Jemaah Islamiyah which is based in

Indonesia and has operated in the Philippines, has had particularly strong ties to al-Qaeda. ERIC SAWATI CATTE

176

Al-Qaeda "the base" in Arabic—is the

network of extremists organized by Osama bin Laden. More than a month after bin Laden's death al-Qaeda named Dr. Ayman al-Zawahiri, al-Qaeda's theological leader, as its leader.

ERIC SAWATI CATTE

177

Genocide

Massacre

• It is the

intentional destruction of The mass a national ethnic, racial, killing of people or religious without group of selection people. ERIC SAWATI CATTE

178

The Government’s Threetiered Defense System

Three-tiered Defense System

A. TARGET HARDENING B. INTELLIGENCE C.INCIDENT MANAGEMENT

ERIC SAWATI CATTE

180

Target Hardening this is envisioned through

education, information dissemination and in-depth study of the criminals’ modus operandi through data gathering. ERIC SAWATI CATTE

181

Intelligence involves the gathering, processing and use of intelligence information.

ERIC SAWATI CATTE

182

Incident Management crimes, especially those that

affect national security, are effectively managed in order to lessen their effects to the community and see to it that as much as possible, they will not happen again. ERIC SAWATI CATTE

183

Philippine Drug Enforcement Agency (PDEA)

it is patterned after the

USDEA and is the lead agency in the implementation of RA 9165

ERIC SAWATI CATTE

184

Anti-Illegal Drug Special Operations Task Force (AIDSOTF)

it supports the PDEA in

its campaign against illegal drugs.

ERIC SAWATI CATTE

185

National Anti-Kidnapping Task Force (NAKTF)

is tasked to lead a

national, integrated, comprehensive and synchronized effort to reduce, if not eliminate kidnapping in the country. ERIC SAWATI CATTE

186

Philippine Center On Transnational Crime (PCTC)

it was created by EO 62 and

is mandated to formulate and integrate a concerted program of action of all law enforcement, intelligence and other agencies for the prevention and control of transnational crime.

187

Thank You for listening!!!

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF