@@@Organized Crime Investigation@@@
Short Description
Download @@@Organized Crime Investigation@@@...
Description
Organized Crime Investigation
Organized crime are transnational, national, or
local groupings of highly centralized enterprises run by criminals for the purpose of engaging in illegal activity, most commonly for monetary profit. ERIC SAWATI CATTE
2
Organized Crime (OC) Distinguished from Terrorism OC is a non ideological enterprise which would differentiate it from terrorist groups, such as those religiously, politically, and some socially motivated violent crimes embraced in the technical definition of terrorism ERIC SAWATI CATTE
3
Organized Crime Group (OCG) is a structured group of three or
more persons existing for a period of time and acting in concert with the aim of committing one or more serious crimes in order to obtain directly or indirectly a financial or other material benefit. OC is organized in a hierarchical manner which makes it “organized” ERIC SAWATI CATTE
4
An Enforcer • one who make
ERIC SAWATI CATTE
arrangement for killing and injuring (physically, economically and psychologically) the member or
5
A Corrupter •
one who bribes, buys, intimidates, threatens, negotiates and “sweet talk” into a relationship with the police, public officials or anyone else who might help the member security and maintain immunity from arrest,
ERIC SAWATI CATTE
6
A Corruptee
a public
official, usually not a member of the organization family, who can influence on behalf of the organization ERIC SAWATI CATTE
7
Attributes of Organized Crime (OC)
ERIC SAWATI CATTE
8
Non-ideological No political goal They just want to gain
money, material or fame/honor
ERIC SAWATI CATTE
9
Hierarchical Authority is
defined B There is chain of o command ss Underbos There is s delegation of Captains authority Tasks are provided Soldiers ERIC SAWATI CATTE
10
Limited or exclusive membership The members of the
organization are their family members, close friends or associates.
ERIC SAWATI CATTE
11
Self perpetuating The OCG continues overtime
ERIC SAWATI CATTE
12
Use bribery and illegal violence
ERIC SAWATI CATTE
13
Demonstrate a specific division of labor
In order to maintain chain of custody
so that if there are irregularities, they may trace who do it and punish him. PURPOSE? 1. Punishment 2. Security 3. Specialty ERIC SAWATI CATTE
14
Monopolistic They monopolized the business so
that all the gains will be owned by them. They have the control to the business where they can increase and decrease the price
ERIC SAWATI CATTE
15
Governed by explicit rules and regulation
“Code of Omerta” “Be true inside but not on
the outside”
ERIC SAWATI CATTE
16
What is the punishment for the violation of this law? Death
ERIC SAWATI CATTE
17
Models of Organized Crime
Bureaucratic or Corporate Model
ADVISER A retired member/ former boss of the OCG ERIC SAWATI CATTE
19
Presidential Commission on Organized Crime Model Boss, Underboss, Consigliere Lawyers, Corrupt Politician Accountant, Chemist Pushers and users Community of illegal products support and services ERIC SAWATI CATTE
20
Comparative Perspective in Organized Crime
MAFIA
The word MAFIA is an acronym……. Morta Alla Francia, Italia Anela
Italian for death to France ERIC SAWATI CATTE
this is Italy’s cry 22
What is the original name of Mafia? La Cosa Nostra Our Thing ERIC SAWATI CATTE
23
At one point in their history, what do they called their group? “The Honored Society”
ERIC SAWATI CATTE
24
What about their members? Mafiosi “Men of Honor” ” Made Men”
ERIC SAWATI CATTE
25
What is known as the most powerful and most active Italian organized crime group in the US?
It is also considered the
second largest organization in Italy. ERIC SAWATI CATTE
26
ERIC SAWATI CATTE
27
It is used to describe the assassination of prominent government officials. “Excellent Cadaver”
ERIC SAWATI CATTE
28
Yakuza or Gokudo
(Violence
groups)
Aka “good for nothing” The Yakuza or boryokudan, is
the most influential organized crime group in Japan.
ERIC SAWATI CATTE
29
Ya-Ku-Sa its name was originated from
the Japanese card game Oicho Kabu, a card game that represents the numbers eight, nine and three – the total is 20, a useless number that means also a bad fortune for the player. ERIC SAWATI CATTE
30
ERIC SAWATI CATTE
31
The ff are some characteristics of the yakuza: manner 1. MembersThe usually wear sunglasses ofsuits walking and colorful so that their profession could be immediately recognized by civilians 2. Members walk arrogantly with wide gaits 3. Members dress conservatively and flash their tattoos only when ERIC SAWATI CATTE
32
Yakuza Rituals
Yubitsume for the first offense, the
transgressor must cut off the tip of his left little finger and hand the severed portion to the boss as a form of penance or apology. Sometimes, the Underboss may do this himself to spare a member of his gang ERIC SAWATI CATTE
34
Irezumi hand-poked full-body
tattoos for the members through hand-made and hand-held tools with needles of sharpened bamboo or steel
ERIC SAWATI CATTE
35
Pearlings one pearl is inserted into
the skin of the penis of the member for every year in prison
ERIC SAWATI CATTE
36
Oicho-Kabu the members, whenever they
play this card game, are given the chance to display their tattoos to the other members as they normally keep them concealed with long-sleeved and high-necked shirts ERIC SAWATI CATTE
37
Sake-sharing ceremony is used to seal bonds of
brotherhood between individual yakuza members or groups
ERIC SAWATI CATTE
38
societies common mystical symbol; an equilateral triangle representing Chinese basic concept of Heaven, Earth and Man.
Chinese Triad ERIC SAWATI CATTE
39
These OC are highly skilled in Martial Arts, therefore police officers special unit created in combating OC, must be more than physically fit.
ERIC SAWATI CATTE
40
Tongs originated among early-
marginalized Chinatown communities to protect themselves from the natives, but because it had no political motives, they soon found themselves involved in criminal activities like extortion, gambling, human trafficking, murder and ERIC SAWATI CATTE
41
1.Columbian Medellin Cartel Founded during the 1980’s by Colombian
drug lords in the name of Pablo Escobar Gaviria and drug bosses Jose Gonzalo Rodriguez Gacha and the top aid cocaine barons Juan David and the Ochoa Brothers. The Medellin Cartel is reputedly responsible for organizing world’s drug trafficking network. Eric S. Catte
42
Pablo Escobar Gaviria
2. The Cali Cartel The downfall of the Medellin Cartel is the rise of
the Cali Cartel- the newly emerged cocaine monopoly. The cartel produces over 90% of cocaine in the world. Due to this, it was called the best and the brightest of the modern underworld. “they are professionals of the highest order, intelligent, efficient, imaginative, and nearly impenetrable”- US- Drug Enforcement Agency. Eric S. Catte
44
Boss
ERIC SAWATI CATTE
45
Gilberto Orajuela
Gilberto Rodriguez Orajuela- better known as Don Chepe- “the chess player” heads the syndicated organization. Under him, the Cali Cartel was considered the most powerful criminal organization in the world.
Extradition Treaty Columbian government
allowed the extradition of the Columbian members of the Cartel to US and to be tried in US courts.
ERIC SAWATI CATTE
47
When they are just starting their illegal activity, what drugs are they trafficking? Marijuana
ERIC SAWATI CATTE
48
OCGs in the Philippines
Francisco Group formerly called the Dragon or
Kuratong Baleleng Group led by Manuel Francisco
ERIC SAWATI CATTE
50
Pentagon Group It is headed by Tahir Alonto it is a creation of the Moro
Islamic Liberation Front (MILF) Most of the members are also listed as members of the MILF.
ERIC SAWATI CATTE
51
What is the main purpose of the creation of pentagon group? To generate funds for the MILF and insulate MILF members from criminal accusations.
ERIC SAWATI CATTE
52
Lost Command KFR Group is mainly composed of ex-soldiers
and ex-policemen who were rendered jobless after the 1986 EDSA Revolution. Most of its members are seasoned combatants and have good background in intelligence works. ERIC SAWATI CATTE
53
Waray-Abuyog Group is composed of hardened
criminals from Samar and Leyte.
ERIC SAWATI CATTE
54
Akyat Bahay Gang is known as a violent home
invasion-oriented gang which also has a history with drug dealing.
ERIC SAWATI CATTE
55
Bahala Na Gang("Come What May") A tattoo of a Question Mark (?) is their identity as members of the gang located in any of the parts of their body.
ERIC SAWATI CATTE
56
Sigue Sigue Comando Gang is one of the largest Gangs
in the Philippines. It has thousands of members all over the Philippines.
ERIC SAWATI CATTE
57
The Organized Crime Situation in the Philippines
Drugs Trafficking What is the
most abuse drugs in the Philippines? Shabu in the Philippines mainly comes from the Southern provinces of China – Guandong and Shabu Fujian. ERIC SAWATI CATTE
59
What is the most active and indispensable ingredient of shabu? Ephedra or ephedrine It is processed in China and smuggled into the Philippines as Shabu. ERIC SAWATI CATTE
60
DID YOU KNOW? A person can die the first time they take METH, while others can survive for years on the drug.
Eric S. Catte
61
EFFECTS OF SHABU
Crank Bugs
Eric S. Catte
62
EFFECTS OF DRUGS ON THE FETUS
Kidnapping • A person is guilty of kidnapping if
he unlawfully removes another from his place of residence or business or a substantial distance from the vicinity where he find or if he unlawfully confines another for a substantial period in a place of isolation. ERIC SAWATI CATTE
64
Kidnapping VS. Hostage Taking Kidnapping
Hostage Taking MEANS OF Online/ Face to face COMMUNICA Electronic communicatio TION Communicatio n n (CP/Telephone / Radio) LOCATION Unknown Known ERIC SAWATI CATTE
65
Modus Operandi of KFR Groups 1.Spotting – this is the stage of
identifying probable victims. 2.Surveillance – it is conducted to obtain data to ensure success of the Kidnapping. 3.Risk Analysis and Target Selection – Surveillance report is Profit/ Risk then analyzed and victim is selected as a result of the data. ERIC SAWATI CATTE
66
4. Abduction of Victim – the act of
abducting implemented as agreed or planned. 5. Ransom for Demand – amount of money is then relayed to the party of the victim and negotiation by the police may happen during this stage unless earlier or later detected. 6. Collection of Ransom – money is then collected and life here is in danger if agreement was never meet. ERIC SAWATI CATTE
67
It is considered as the most organized among the crime groups. Bank robbery groups
ERIC SAWATI CATTE
68
What is RA 6539 ? Anti-Carnapping Act of 1972
ERIC SAWATI CATTE
69
Elements of Carnapping That the offender must have taken a
motor vehicle belonging to another; Any the vehicle propelled means other That taking is with by intent to gain; than muscular power using the public and highways, but excepting road roller, That the motor vehicle was taken trolley car, street sweeper, without the owner’s consent sprinkle, or by lawnmower, bulldozer, grader, forklift, means of violence against or amphibian trucks and crane, tractor, intimidation of persons, or by using trailer andthings. all kinds used exclusively force upon for agricultural purposes. ERIC SAWATI CATTE
70
Businesses of Organized Crime
Corruption
Graft
• acting on
• refers to opportunities, exploitation of created by virtue of one’s authority, one’s role by for personal gain accepting at the expense of bribes or the public as one protection is authorized to money. serve. ERIC SAWATI CATTE
72
What is the anti-graft and corrupt practices act? RA 3019
ERIC SAWATI CATTE
73
REPUBLIC ACT No. 10589 AN ACT DECLARING DECEMBER
OF EVERY YEAR AS "ANTICORRUPTION MONTH" IN THE ENTIRE COUNTRY Approved: MAY 27 2013
ERIC SAWATI CATTE
74
What is the lead agency that was designated under RA 10589 for coordination purposes on the said program? Office of the Ombudsman
ERIC SAWATI CATTE
75
What is the anti- plunder law? RA 7080
ERIC SAWATI CATTE
76
Patronage- favoring
supporters during the previous election Nepotism- favoring relatives Cronyism - favoring personal friends ERIC SAWATI CATTE
77
Embezzlement
Kickback it is the official’s theft or share of misappropriat misappropriated ion of funds from his office made entrusted possible by resources corrupt bidders ERIC SAWATI CATTE
78
3. Gambling it is the wagering of money
or something of material value with the intent to win more but the outcome is uncertain. Game of chance or luck ERIC SAWATI CATTE
79
What is the law simplifying and providing stiffer penalties for violations of Philippine gambling laws? PRESIDENTIAL DECREE NO. 1602
ERIC SAWATI CATTE
80
What is the term called for gambling that is permitted by law? GAMING
ERIC SAWATI CATTE
81
4. Loan sharking is the lending of money to
another wherein the percentage of the principal is too high (usurious interest) for the lender to pay his debt and the collection is done by force or intimidation. ERIC SAWATI CATTE
82
What is the other term for loansharking? Shylocking
ERIC SAWATI CATTE
83
5. Pornography is the
depiction of explicit sexual subject matter for sexually exciting the viewer. ERIC SAWATI CATTE
84
Sub Genres of Pornography Softcore
Hardcore
refers to
pornography pornography that does not that depicts depict penetration penetration explicitly ERIC SAWATI CATTE
85
It is an act defining the crime of Child Pornography, prescribing Penalties therefore and for other purposes.
RA 9775
ERIC SAWATI CATTE
86
6. Prostitution is the act or practice of engaging
in sex acts for hire. It is considered as a victimless crime.
ERIC SAWATI CATTE
87
Terms used in Prostitution:
Whore
Hooker or street walker
The usual
term for a commercial sex worker or One who sex trade solicits worker customers in
public places ERIC SAWATI CATTE
89
Call girl
Kerb crawlers Men who drive
Makes
appointments by phone ERIC SAWATI CATTE
along red-light districts to solicit prostitutes (costumer).
90
Gigolo Male
prostitute who offers services to female customers ERIC SAWATI CATTE
Hustlers or Male Rentboys prostitute offering services to male customers
91
Pimps (male) and Madams (female)
organizers of prostitution or
procurers for customers
ERIC SAWATI CATTE
92
Johns or Tricks
Punters
the
customers of prostitutes in North America ERIC SAWATI CATTE
the British
customers of prostitutes 93
Types of Prostitution
Escort prostitution Out Call the act takes
place at the customer’s residence or at his or her hotel room ERIC SAWATI CATTE
In Call at the escort’s
residence or in the hotel room rented for the occasion by the escort 95
Lot lizard
Serves the
trucking industry ERIC SAWATI CATTE
Street prostitution
Solicits
customers in street corners or walking the streets. 96
Skeezers
Sex tourism
The
Trade sex for
illegal drugs ERIC SAWATI CATTE
commercial sexual relation by the tourist with residents at the destination 97
Philippines • Where is
considered as the haven for sex industry?
ERIC SAWATI CATTE
98
Thailand • It is considered as
the most notorious in the world in terms of sex industry, importing at least one (1) million women from China, Laos and Vietnam. ERIC SAWATI CATTE
99
REPUBLIC ACT NO. 10158 THE ACT DECRIMINALIZING
VAGRANCY • Any person having no apparent means of Approved on March 27, 2012
subsistence, who has the physical ability to work and who neglects to apply himself or herself to some lawful calling; • Any person found loitering about public or semi-public buildings or places or trampling or wandering about the country or the streets without visible means of 100 support; ERIC SAWATI CATTE
Trafficking in Persons Recruitment, transportation,
harboring, or receipt of people for the purpose of slavery, prostitution, forced labor and servitude. It includes the act of removal or sale of organ. ERIC SAWATI CATTE
101
What is the Anti Trafficking in persons act of 2003? RA 9208
ERIC SAWATI CATTE
102
REPUBLIC ACT No. 10364 "Expanded Anti-Trafficking
in Persons Act of 2012″ Approved: FEB 06 2013
ERIC SAWATI CATTE
103
Slavery Slave • the submission to a dominating influence or the a person held state of a in servitude as person who is the chattel of chattel of another. another. ERIC SAWATI CATTE
104
White slavery engagement in the
business for profit, or enlistment of services of any other person for the purpose of prostitution. ERIC SAWATI CATTE
105
Money Laundering It is the practice of
disguising illegally obtained funds so that they may seem legal. Converting illegal money to a legal one. ERIC SAWATI CATTE
106
What is the anti- money laundering act of 2001? REPUBLIC ACT 9160
as amended by RA 9194 ERIC SAWATI CATTE
107
REPUBLIC ACT NO. 10167 AN ACT TO FURTHER
STRENGTHEN THE ANTIMONEY LAUNDERING LAW.
Approved: June 06, 2012
ERIC SAWATI CATTE
108
Freezing of Monetary Instrument or Property Upon verified petition by the AMLC and after determination that probable cause exists that any monetary instrument or property is in any way related to an unlawful activity, will be issued a freeze order, which shall be effective immediately. ERIC SAWATI CATTE
109
Who is the authorized agency to issue a freeze order in accordance with RA 10167? Court of Appeals
ERIC SAWATI CATTE
110
No court shall issue a temporary restraining order or a writ of injunction against any freeze order. Who is only authorized by law to issue TRO as an exemption? Supreme Court
ERIC SAWATI CATTE
111
REPUBLIC ACT NO. 10365 AN ACT FURTHER STRENGTHENING
THE ANTI-MONEY LAUNDERING LAW. Approved: FEB 15 2013
ERIC SAWATI CATTE
112
"Money laundering is also
committed by any covered person who, knowing that a covered or suspicious Banks, non-banks, quasitransaction is required banks, trust entities, foreign under this Act to be exchange dealers, pawnshops, reported to theremittance Anti-Money money changers, Laundering Council (AMLC), and transfer companies fails to do so." ERIC SAWATI CATTE
113
Steps of Money Laundering
Mixing of illicit 1. Placement
money with licit is the physical disposal of the one.
money by putting them into the financial system, usually through Smurfing and Immersion.
Moving small amounts at times to avoid suspicion ERIC SAWATI CATTE
115
2. Layering also called heavy soaping conversion of cash into
monetary instruments and the conversion of tangible assets obtained by means of cash purchases. ERIC SAWATI CATTE
116
3. Integration also called spin dry the money is again available
to the criminal with its occupational and geographical origin hidden.
ERIC SAWATI CATTE
117
Where is the best institution for you to put your money that comes from illegal means in order to avoid detection and prosecution? ERIC SAWATI CATTE
118
Ponzi/Pyramid Schemes Pyramid schemes focus on the
exchange of money and recruitment. At the heart of each pyramid scheme there is typically a representation that new participants can recoup their original investments by inducing two or more prospects to make ERIC SAWATI CATTE
119
ERIC SAWATI CATTE
120
Cyber Crime
Cyber Crime Any offense that is
committed by a computer, computer system or computer network
ERIC SAWATI CATTE
122
What is the anti cyber crime law of 2012? RA 10175
ERIC SAWATI CATTE
123
Reasons of the Vulnerability of Computers 1.Capacity to store data in a
relatively small space 2.Easy to access 3.Loss of evidence ERIC SAWATI CATTE
124
Onel De Guzman Had made the “I LOVE YOU
VIRUS” It originates in the country May 4, 2000 and spread itself around the world in one day from Hongkong to Europe to United States. Like other corporations, the Pentagon, CIA and British ERIC SAWATI CATTE
125
Manners of Committing Cyber Crimes
Hacking Unauthorized access into
or interference in a computer system in order to corrupt, alter, steal, or destroy using a computer or other similar information and communication devices. ERIC SAWATI CATTE
127
WHAT IS THE OTHER TERM FOR HACKING? CRACKING
ERIC SAWATI CATTE
128
Kinds of Hacking
ERIC SAWATI CATTE
129
Denial of Service Attack The bandwidth of the
victim’s network is flooded or his e-mail box is filled with spam mail depriving him of the services he is entitled to access or provide. ERIC SAWATI CATTE
130
Virus Dissemination This is usually done by
means of a malicious code or software.
ERIC SAWATI CATTE
131
Web Defacement This is the act of the intruder
into a server and changing without permission all the aspect of a website which the public can see
ERIC SAWATI CATTE
132
Salami Attack Logic bombs are introduced
into the bank’s system that result to the deduction of an insignificant amount from every account and transferred into a single account ERIC SAWATI CATTE
133
Virus or worm attack Viruses are programs that
attach themselves to a computer or a file and then circulate to other files or to the other computers on a network. ERIC SAWATI CATTE
134
What is the kind of virus that eats up the available space on a computer’s memory?
Worms
ERIC SAWATI CATTE
135
Logic Bombs Viruses that lie dormant and only become active at particular dates
ERIC SAWATI CATTE
136
Internet Time Theft the internet surfing hours
of the victim are used up by another person without his consent
ERIC SAWATI CATTE
137
Web Jacking the hacker gains access
and control over the web site of another.
ERIC SAWATI CATTE
138
Software Piracy software are stolen
through the illegal copying of genuine programs and the products distributed to the customers ERIC SAWATI CATTE
139
Phishing a form of identity theft in which
scammers send mass emails posing as banks, credit card companies, popular commercial web sites, asking the recipients to confirm or update financial information in a hyperlink in order to appear like it came from the original website ERIC SAWATI CATTE
140
Cyber Stalking the criminal follows the
victim by sending emails, and frequently entering the chat rooms that causes an intentional, substantial and unreasonable intrusion into the private life of the person. ERIC SAWATI CATTE
141
What will be the result of cyber stalking to the victim?
mental distress
ERIC SAWATI CATTE
142
Cyber Defamation/ Libel The use of the computer
system to make false statements against a person thereby injuring his reputation ERIC SAWATI CATTE
143
Computer vandalism Any physical harm done
to the computer set
ERIC SAWATI CATTE
144
Cyber Terrorism It is the premeditated use of
disruptive activities, or the threat thereof, in cyber space, with the intention to further social, ideological, religious, political or similar objectives, or to intimidate any person in furtherance of ERIC SAWATI CATTE
145
Republic Act No. 8792 or
the E-commerce Law was signed into law which punishes certain crimes such as computer hacking and intrusion of viruses and worms to computer networks. ERIC SAWATI CATTE
146
R.A. 8484 Access Device Regulation
Act of 1998.
ERIC SAWATI CATTE
147
Access Device Is any card, plate, code,
account number, electronic serial number, personal identification number or other means of account access that can be used to obtain money, goods, services. It includes Credit Cards. ERIC SAWATI CATTE
148
Access Device Punishable Acts
ERIC SAWATI CATTE
149
CYBER SEX Is a sexual activity of arousal
through communication using the computer. Cybersex-for-pay employs the Internet and utilizes computer cameras and microphones that allows client to see and talk to girls doing the role play for them ERIC SAWATI CATTE
150
According to CIDG, where are the cybersex “hot spots” here in the Philippines (2014)? Angeles Pampanga San Fernando Pampanga Las Pinas Davao ERIC SAWATI CATTE
151
R.A. 8293 the Intellectual Property
Code of the Philippines that tries to protect patents, industrial design, trademarks and copyright ERIC SAWATI CATTE
152
Patent is the statutory grant, by
government, which confers to an INVENTOR to exclude others from making, using, selling or importing the invention within the territory of the country that granted the patent. ERIC SAWATI CATTE
153
How many years will be the patent of an invention will be protected?
17 years ERIC SAWATI CATTE
154
Copyright is the system of legal protection
an author enjoys in the form of EXPRESSION OF IDEAS. The holder of the copyright enjoys the right to reproduce, distribute, display, perform, and to prepare derivative works based on the copyrighted work ERIC SAWATI CATTE
155
REPUBLIC ACT NO. 10372 AN ACT AMENDING CERTAIN
PROVISIONS OF REPUBLIC ACT NO. 8293, Approved: FEB 28 2013
ERIC SAWATI CATTE
156
TERRORISM
What is the main purpose of terrorism? “To inflict Massive Fear”
ERIC SAWATI CATTE
158
Terrorism It is a threat or actual use of
force or violence for political or other purpose, to foster fear, insecurity, distrust and unrest among the people ERIC SAWATI CATTE
159
The commission of crimes
(rebellion, murder, kidnapping, hijacking etc.) that sow or create a condition of widespread and extraordinary fear and panic among the populace in order to coerce the government to give in to an unlawful demand. (R.A.
ERIC SAWATI CATTE
160
9/11 Bombing
ERIC SAWATI CATTE
161
REPUBLIC ACT NO. 10168 "The Terrorism Financing,
Prevention and Suppression Act of 2012” June 20, 2012 The State shall reinforce its fight against terrorism by criminalizing the financing of terrorism. ERIC SAWATI CATTE
162
DOMESTIC TERRORISM
Involves persons
or groups committing a terrorist act/s in their own country. ERIC SAWATI CATTE
163
INTERNATIONAL TERRORISM Involves
citizens or the territory of more than one country. ERIC SAWATI CATTE
164
Religious Terrorism Terror in the
Mind of God”. Terrorizing for religious purpose.
ERIC SAWATI CATTE
165
In the Philippines, where is considered as the ‘terrorist safe haven’? Southern
Philippines
ERIC SAWATI CATTE
166
Moro National Liberation Front (MNLF)
The Moro National
Liberation Front's primary goal was the creation of an Nur Misuari autonomous Muslim state in the southern Philippines. Who is the founder and leader? ERIC SAWATI CATTE
167
Moro Islamic Liberation Front (MILF) The Moro Islamic Liberation Front (MILF) is a splinter of the Moro National Liberation Front (MNLF). Following a failed 1977 accord between MNLF and the Philippine government, MNLF's second-incommand broke away from the group. Hashim Salamat then created the Moro Islamic Liberation ERIC SAWATI CATTE
168
Publicly, the Moro Islamic Liberation
Front demanded a fully independent Muslim state in the southern Philippines. However by the late 1990s, the MILF had begun negotiations for simply an autonomous Muslim region. By 1997, MILF had begun negotiations with the Philippine government. The Moro Islamic Liberation Front and the Philippine president Gloria Arroyo signed a peace agreement in ERIC SAWATI CATTE
169
Abu Sayyaf Group (ASG) The ASG was founded in 1991 by
radical Moro National Liberation Front (MNLF) members who objected to the MNLF's negotiations with the Philippine government. Abu Sayyaf, which literally means “bearer of the sword" in Arabic. ERIC SAWATI CATTE
170
The group's first major attack came
in 1991, when an Abu Sayyaf grenade killed two American evangelists. Its first leader was Abdurajak Janjalani From 1998 the group was led by Khadaffy Janjalani ERIC SAWATI CATTE
171
Abu Sayyaf Victims
ERIC SAWATI CATTE
Talipao Massacre in Sulu
172
New People's Army (NPA) The New People's Army (NPA) was created
as the armed wing of the outlawed political organization, the Communist Party of the Philippines, Marxist-Leninist (CPP-ML). Overthrow the Filipino From 1969 to 1976, the People's Republic government and replace of China provided material support it to the a communist/socialist Newwith People's Army. Following the cessation of China's support, the NPA went through a state. five-year period of weakness. ERIC SAWATI CATTE
173
Who is known as the founder of NPA? Jose Maria Sison (1969)
ERIC SAWATI CATTE
174
Bangsamoro Islamic Freedom Fighters (BIFF) Ameril Umbra It is a groupUstadz of radical armed Muslims espousing Kato independence in the Southern Philippines. Who is the leader? Where is there operation?
Central Mindanao ERIC SAWATI CATTE
175
Jemaah Islamiyah which is based in
Indonesia and has operated in the Philippines, has had particularly strong ties to al-Qaeda. ERIC SAWATI CATTE
176
Al-Qaeda "the base" in Arabic—is the
network of extremists organized by Osama bin Laden. More than a month after bin Laden's death al-Qaeda named Dr. Ayman al-Zawahiri, al-Qaeda's theological leader, as its leader.
ERIC SAWATI CATTE
177
Genocide
Massacre
• It is the
intentional destruction of The mass a national ethnic, racial, killing of people or religious without group of selection people. ERIC SAWATI CATTE
178
The Government’s Threetiered Defense System
Three-tiered Defense System
A. TARGET HARDENING B. INTELLIGENCE C.INCIDENT MANAGEMENT
ERIC SAWATI CATTE
180
Target Hardening this is envisioned through
education, information dissemination and in-depth study of the criminals’ modus operandi through data gathering. ERIC SAWATI CATTE
181
Intelligence involves the gathering, processing and use of intelligence information.
ERIC SAWATI CATTE
182
Incident Management crimes, especially those that
affect national security, are effectively managed in order to lessen their effects to the community and see to it that as much as possible, they will not happen again. ERIC SAWATI CATTE
183
Philippine Drug Enforcement Agency (PDEA)
it is patterned after the
USDEA and is the lead agency in the implementation of RA 9165
ERIC SAWATI CATTE
184
Anti-Illegal Drug Special Operations Task Force (AIDSOTF)
it supports the PDEA in
its campaign against illegal drugs.
ERIC SAWATI CATTE
185
National Anti-Kidnapping Task Force (NAKTF)
is tasked to lead a
national, integrated, comprehensive and synchronized effort to reduce, if not eliminate kidnapping in the country. ERIC SAWATI CATTE
186
Philippine Center On Transnational Crime (PCTC)
it was created by EO 62 and
is mandated to formulate and integrate a concerted program of action of all law enforcement, intelligence and other agencies for the prevention and control of transnational crime.
187
Thank You for listening!!!
View more...
Comments