Organized Crime

October 7, 2022 | Author: Anonymous | Category: N/A
Share Embed Donate


Short Description

Download Organized Crime...

Description

 

 JOHNNY REY DA DAGASUHAN GASUHAN CAILING CAILING

 

WHAT IS ORGANIZED CRIME? 



 Or Organ ganize ized d crime crime   or or crim imin inaal orga gan niz izat atio ions ns is a transnational   gr grouping of highly centralized

entg en ter erp ris ises run nlegbay  y   foorst thceompm fo uropnolsye forf  eng agpin ing gesinru il ill l   criminals activity,  m  profit. monetary  profit.  Defi fin ne also is any crime committed by a person occupying, an commission established division labor, a position designed forinthe of crimes providing that such division of labor includes at least one position for a cor orru rupt pter er,, on onee po posi siti tion on fo forr a corru orrupt ptee ee,, and and one one position for an enfor enforcer cer..

 

WHA WHAT T IS WHITE COLLAR CRIME? CRIME? 

 Whi White te-c -col ollar lar cri crime me   ha has been defi fin ned by  y    Edwin Sutherland   as "a crime committed by a person of  respectability and high social status in the course of  his occupation" occupation" (1939).

 

Forms of White Collar Crimes 





 Corporate crimes   - the violation of a criminal statute either by a corporate entity or by its executives, employees or agents, acting on behalf of and for the benefit of the corpor co rporation ation,, partnershi partnership p or other business business ent entity ity..  Environmental crimes  - violation of criminal law which, although typically committed by businesses or by business offi of ficcials ials,, may also also be commit mmittted by othe otherr pers perso ons or

organizational entities, and which damage some protected or otherwise otherwise significant significant aspect of the the natural natural envir environme onment. nt.   Occupational Occupational crimes - any any act punishable punishab le by law, law, which is committed through opportunity created in the course of an occupation occupatio n that is legal.

 

Forms of White Collar Crimes  Organizational Occupational Crime - crimes committed for the 

benefit of the entire organization in such instances only the organization or the employ employer er,, not individual employees. employees.







  th State Authority Author Crime crimes by. officials through the e ex exer erccise iseityofOccupational thei theirr stat atee-ba bassed - au auth tho ori rity ty. Suc Such cthrou ri rim me gh is occupation specific, and can only be committed by person in publicc office publi office or b byy working working fo forr such persons persons..  Professional Occupational Crime - crimes by professionals in thei th eirr capa capaci city ty as prof profes essi sion onal alss. Th Thee crim crimes es of phys physic icia ians ns,, attorneys, attorney s, psychologists, psychologists, and the like are included here.   Indi Indivi vidu dual al Occu Occupa pati tion onal al Crim Crimee - cr crim imes es by indi indivi vidu dual alss as individuals which include income tax evasion, theft of goods and services by employees, the filing of false expense report, and the like.

 

CRIMES OCCUPATIONAL   Whit White-c e-colla ollarr crim crime e (Sutherland) 











 Avocational crime - committed by one who does not think for himself  as criminal and whose major source of income is something other than   crime. Cor Corpor porat ate e cri crime me   - com ommi mittted by corp rpor oraate of offi fici ciaals for the heiir corporations and the offenses of the corporation and the offenses of the corporation itself.   Economic Economic crim crime e   - ill illeg egal al act activ ivity ity that that pri princi ncipa pally lly in invvolve olvess dec deceit eit,, misrepr misr epresen esentati tation, on, co conce ncealmen alment, t, mani manipula pulation tion,, bre breach ach of trus trustt and circumvention.   illegal Organizational Organiza tional crime   - ille illega gall ac acti tion onss ta tak ken in ac acco corrda danc ncee wi with th operative organizational goals that seriously harm employees or the general public.  Upper-world crime crime - law-breaking acts, committed by those who, due to their positions in the structure, have obtained specialized kinds of  occup oc cupat ation ional al slo slots ts ess essen entia tiall for the co commi mmissi ssion on of these off offen enses ses..

 

Types and Schemes of White Collar Crimes 





 Bank Fraud: To engage in an act or pattern of activity   where the purpose is to defraud a b bank ank of funds.  Blackmail: A demand for money or other consideration under threat to do bodily harm, to injure injure prop pr oper erty ty,, to ac accu cuse se of a cr crim ime, e, o orr tto o ex expo pose se se secr cret ets. s.  Bribery : When When money money,, goods, ser services, vices, informati information on or anything else of value is offered with intent to influence the actions, opinions, or decisions of the taker. You may be charged with bribery whether you offer off er the bri bribe be or ac acccept it.

 

Types and Schemes of White Collar Crimes 





 Cellular Phone Fraud: The unauthorized use, tampering, or mani ma nipu pullatio ation n of a cell ellular lar phon phonee or se serv rvic ice. e. This his can can be accomplished by either use of a stolen phone, or where an actor signs upa for service underserial false identification clones valid electronic number (ESN)orbywhere usingthe anactor ESN reader and reprograms another cellular phone with a valid ESN number.   Computer fraud: Where computer hackers steal information sourc sou rces es cont ontain ained ed on comp omput uters ers such such as: bank bank inform informati ation, on, credit cards, cards, and proprietary information.   Counterfeiting: Occurs when someone copies or imitates an item without having been authorized to do so and passes the copy off for the genuine or original item. Counterfeiting is most often associated with money however can also be associated with designer clothing, handbags and watches watches..

 

Types and Schemes of White Collar Crimes 











 Credit Card Fraud: The unauthorized use of a credit card to obtain goods goo ds of valu value. e. (RA 84 8484) 84)  Currency Schemes: Schemes: The practice of speculatin speculating g on the future valu valuee of  currencies.   Embezz1ement: Embezz1ement : When a person who has been entrusted with money  or pr prop opert ertyy ap appr propr opriat iates es it for his or her her ow own n us usee an and d bene benefit. fit.  Environmental Schemes: The over billing and fraudulent practices exerc ex ercised ised by corp corpora oration tionss whi which ch purp purport ort to clean up the en enviro vironme nment. nt.   Extortion: Extortion: Occurs when one person illegally obtains property from another actual or threatened force, fear, or violence, or under cover of officialbyright.

  Forgery : When a person passes a false or worthless instrument such as a check or counterfeit security with the intent to defraud or injure the recipient.

 

Types and Schemes of White Collar Crimes   Health Care Fraud 



: Where an unlicensed health care provider provides services under the guise of being lic licensed ensed and obtains obtains mon monetary etary benefit fo forr the serv service. ice.

  Insider Trading: Trading: When a person uses inside, confidential, or advance information to trade in shares of publicly held corporations corporations..









  Insurance Fraud Fraud:: To To engage in an act or pattern of activity wherein one obtains proc proceeds eeds from an insurance company through deception.   Investment Schemes: Schemes: Where an unsuspecting victim is contacted by the actor who promises to provide a large return on a small investment.   Kickback Kickback:: Occurs when a person who sells an item pays back a portion of the purchase price to the t he buyer.   Larceny/Theft Larceny/Theft:: When a person wrongfully takes another person's money or property   with the intent intent to appropriate, con convert vert or steal it.

 

Types and Schemes of White Collar Crimes 









 Money Laundering: The investme investment nt or transfer of money from racketeering rack eteering,, drug transactions or other embezzlement schemes so that it appears that its original sourc sourcee either cannot be trac traced ed or is legitimate.: The operation of an illegal business for personal  Racketeering profit.  Securities Fraud: The act of artificially inflating the price of  stocks by brokers brokers so that buy buyers ers can purchas purchasee a stock on the rise.

 Tax taxes.Evasion: When a person commits fraud in filing or paying  Telemarketing Fraud: Actors operate out of boiler rooms and place telephone calls to residences and corporations where the actor requests a donation to an alleged charitable organization or  where the actor actor rrequests equests mo money ney up ffront ront or a credit card number number up front, front, and do does es not us usee the donation donation for the state stated d purpo purpose. se.

 

Types and Schemes of White Collar Crimes 







 Welfare Fraud: To engage in an act or acts where the purpose is to obta obtain in bene benefit fitss (i (i.e .e.. Pu Publ blic ic As Assi sist stan ancce, Food ood Stam Stamps ps,, or Medicaid) from the State or Federal Government.  Weights Measures : The act of at placing an item fororsale at one price and yet charges a higher price the time of sale short  weighing an item when the the label reflects ref lects a higher higher weight.  Advanced Fee Schemes: Actor induces victim to give him some type of advanced fee in return for a future benefit. The future benefit never occurs and victim never receives the advanced fee back.  Airpor  Airp ortt Scam Scam: Actor approaches approaches victim in an airport stating that the newspaper stand cannot change his one hundred dollar bill and asks the victim for change. Victim provides actor with the change, actor returns to the store to get the one hundred dollar bill back, however however,, never never returns to victim.

 

Types and Schemes of White Collar Crimes 





 Auto Repair: Actor hangs out around an auto repair shop and approaches victims who leave after getting estimates.  Actor claims to do work work off duty at a very low cost. Once actor inferior work is completed cannothas getthe thecar, return of the car until the very and highvictim bill is paid.  Check Kiting: A bank account is opened with good funds and a rapport is developed with the bank. Actor then deposits a series of bad checks but prior to their discovery discovery,,  withdraws  withdra ws funds funds from from the bank. bank.

  Coup Coupon on Rede Redemp mpti tion on: Grocery stores amass large amounts of coupons and redeem them to manufacturers  when in fact merchandise merchandise was never never sold.

 

Types and Schemes of White Collar Crimes 



 Directory Advertising: Actor either impersonates sales person from a directory company like the yellow pages or fraudulently  sells advertis advertising ing which which the the victim victim never never rec receiv eives. es.   Actor Fortune Fortune Telling : Actor victim thatbevictim is cursed. advises victim thatadvises the curse must remo removed. ved. Actor advises that she must meditate to the spirits and will require paym pa ymen ent. t. Ov Over er a pe peri riod od of time time,, vict victim im pays pays fortu ortune ne telle ellerr thousands of dollars to remove remove curse.



 victims’   remove Gypsiesthe : Actor states is cursed. to curse, thethat money must money be placed into a In bagorder or box that the actor provides. provides. The bag or box is switched. Actor advises  victim to perform certain rituals ov over er the money and the curse  will be remo removed. ved. The The bag or box cannot be be opened opened for a period period of  time when it is open opened, ed, the money is g gone. one.

 

Types and Schemes of White Collar Crimes 





  Home Impr Improv oveme ement nt: Actor approaches a home h ome owner with a very low estimate for a repair or improvement. Inferior or incomplete work is perfo pe rforme rmed. d. On Once ce the re repai pairs rs ar aree co compl mplet eted ed,, ac acto torr in intim timid idat ates es th thee  victim to pay a price much great greater er than the original estimate estimate..   Inferior Equipment: Equipment: Actors travel around selling inferior equipment such as tools at hig high h pric prices. es.  Jamaican Switch: Actor #1 approaches a victim looking for the address of a prostitute. Actor #1 shows a large sum of money to the victim.  Actor #2 #2 arrives and tells Acto Actorr #1 where he can find the prostitute but cautions onvictim takingto allhold th thee money as the might rob him. Actor #1 asks the the money forprostitute him. Actor #1 puts his money  into a handkerchief with the victim’s money. Actor #1 shows the victim how to hide the money under his arm, inside his shirt while switching handkerchiefs handk erchiefs.. Victim takes the handkerchie handkerchieff and the parties split up,  victim’ss mo however howev er,, Actor #1 leaves with victim’  money ney..

 

Types and Schemes of White Collar Crimes 





 Land Fraud: Actor induces victim to purchase tracks of  land in some type of retirement development which does not exist.   Odom Odomet eter er Fraud raud: Unscrupulo lou us used car salesm esman purchased used cars and turns back the odometers. The used use d car is is sold sold at a higher higher price price due to its its lo low w mileag mileage. e.   Pigeon Pigeon Drop Drop: Act Actor #1 befr befrie iend ndss the the vict victim im.. Act ctor or #2 shows both Actor #1 and victim a "found" package containing a large amount of cash. Actor #1 insists that the found money be divided equally but only after each person puts up his own money to demonstrate good faith. All the money is put in one package and the package is later switched.

 

Types and Schemes of White Collar Crimes 



 Police Impersonation: Actor tells victim that his bank is being operated by fraudulent bank officers. Actor instructs victim to take money out of bank and place it into a good bank. After the money is withdrawn, actor The allegedly the money to the police station for safe the keeping. victimtakes never sees the money  again.  Ponzi: An investment scheme where the actor solicits investors in a business venture, promising extremely high financial returns or dividends in a very short period of time. The actor never invests the money, however, does pay dividends. The dividends consist of the newest investors funds. The first investors, pleased to receive dividends, encourage new investors to invest. This scheme falls apart when the actor no longer has sufficient new investors to distribute dividends to the old investors or the actor simplyy takes simpl takes all the funds funds and leaves leaves the the ar area. ea.

 

Types and Schemes of White Collar Crimes 



  Pyramid: An investment fraud in which an individual is offered a distributorship or franchise to market a particular product. The promoter of the pyramid represents that although marketing of  the product will result in profits, larger profits will be earned by  the sale of franchises. For example, if a franchise price is P10, 000.00, the seller receives P3, 500.00 for every franchise sold. Each Ea ch ne new w fran franch chis isee pu purrchas chaser er is pres presen entted with with th thee sa same me prop pr opos osal al so that that ea each ch franc franchi hise se owne wnerr is att attem empt ptin ing g to sell sell franchises. Once the supply of potential investors is exhausted, thee py th pyrramid amid col olla laps pses es.. Many any time timess, ther theree ar aree no pr prod oduc ucts ts involv inv olved ed in the fr franchise, anchise, simpl simplyy just the exchang exchangee of money. money.   actor’s  speedy series of   Quick Change: Victim is confused by  actor’s money mon ey excha exchang nges es and in the the en end, d, is short short chang changed. ed.

 

Types and Schemes of White Collar Crimes 



 Shell Game: Actor #1 manipulates a pea beneath three  walnut shells or bottle caps. Actor #1 moves moves the caps around and shows victim the cap with the pea under it.  With the encourag encouragement ement of another player player,, also Actor Actor #2,  victim places larger larger and larger larger bets as to to which cap contains contains the pea. The game is ended by Actor #1 when the take is large enough.   Utilitie Utilitiess Impersonat Impersonators ors: Actor ctor impe impers rson onat ates es util utilit itie iess employees by wearing jumpsuits with name tags. Actor approaches victim with story about a gas leak or electrical surge to gain entry to the home. Valuables are taken by  actor.

 

Types and Schemes of White Collar Crimes 



 VCR Scam Scam: Actor purports to sell new VCR's or televisions at an extremely low cost due to his connection connec tions. s. Victim pays pays for the V VCR CR or televisio television n onl only  y  to disc discov over er that the bo boxx has been filled w with ith rrocks ocks..  West est Af Afri rica can n In Inv ves estm tmen entt Sc Scam amss: Actors target businesses and obtain business' bank account informat info rmation ion fr from om wh which ich all funds are lat later er with withdr draw awn. n.

 

THE CONVENTIONAL CRIMES 

 Conv onven enti tio ona nall crim crimes es ar aree th tho ose tr trad adit itio iona nal, l, ille illega gall behaviors that most people think of as crime. Most crime is conventional crime. Non-conventional crime may be organized crime, white-collar crime, political crime, etc. Conventional crimes are groups of crimes catteg ca egor oriz ized ed as vi vio olen entt cr crim imes es (i (in nde dexx cri rim mes) es) an and d property crimes. It has been argued that cyber crime is  just a con convent ventional ional crime com committ mitted ed with high-t high-tech ech devices.

 

THE CONVENTIONAL CRIMES 

 Violent Crimes -  Violent crimes are criminal acts, which in the threat of or actual physical harm by an offender to a victim. It presents not only index offenses that every one recognizes as  violent (murder (murder, , trape, other acts inv involving force forcmonl e and intim int imida idati tion on but bu al also sorobbery)   “viole “violent ntor crimes cri mes” ”   that tha t olving are are commo om nly  y  categorized categ orized as “social problem”  such as domestic violence, child abuse,, elder abuse elder abuse abuse,, etc. etc.





 

  Viol Violen entt ac acts ts ar aree in the the fo form rmss of:   Interpersonal Violence - Forcible Forcible Rape. Murder Murder,, Serious Assault, Family amily Viole Violenc nce, e, Robbery  Robbery    Political Violence - Terrorism Terrorism   Collective Violence - Riots, Mobs, Crowds, Urban Violence

 

THE CONVENTIONAL CRIMES 

 Property Crimes - are crimes of economic interest. It includes those crimes that would most commonly be ca cat teg egor oriz ized ed s thef he ft in to oroffenses din inaary la lang ngua uag ge.unlawful It also lso includes but anot limited such as entry ent ry to commi ommitt thef theft, t, shop shopli lift ftin ing g, va vand ndal alism ism,, an and d arson. ars on. Prop Propert ertyy crime crimess aare re als also o in the fo forms rms of:





 Occasional Property Crimes - Shoplifting, Vandalism, Motor Mot or vehicle theft, Check Fo Forg rgery  ery   Co Con nvent entio ional nal Prope Property rty Crimes Crimes - Burgl Burglary ary/un /unla lawf wful ul entry to com commit mit theft, Fenc Fence, e, Larceny/Theft Larceny/Theft

 

THE CONVENTIONAL CRIMES   Vi Viol olen entt Cr Crim imes es (Ind (Index ex Crim Crimes es)) 





  Murder – is the unlawful killing of human being with malice and with  violence”   Serial Serial Mur urder  der    – – an act the “act of  killing of severa several  victims in violence” three or .more separ separate ate inciden incidents ts involving ov over er a we week, ek, a month orl  year..  Mass Murder   –  it is the killing of four or more victims at one  year  –  the killing of in two or more location with one event.  Spree Murder  – locations with almost n no o time break between between murders murders..  Homicide and Assault - Homicide -  Homicide is also unlawful killing with out the qualifying qualif ying circumstance circumstancess of murder murder.. It is generall generallyy regarded as the most commonly committed of all the index crimes (based on the UCR  offenses). Assault is called   “unlawful “unlawful attac attack” k”   to another person purposely to harm or inflict physical injuries. It is a crime that involves offering to to give bodily harm to a pe person rson or placing the person in fear fear..

 

THE CONVENTIONAL CRIMES 

  

 



 Robbery - INTERPOL defined robbery as “violent theft”. It is the taking of property belonging to another with intent to gain by means of force upon things, violence of  intimidati intim idation on against against the person. person. It could could be in the form of:

  Robbery of person – “hold up cases”   Robbery in open place following sudden attack   – “snatching  Robbery in cases” private premises – “forcible “forcible entry”   Robbe Robbery ry after after preli prelimin minary ary associ associati ation on of short short durati duration on between betw een victims victims and offender offender   Robbery in case of previous association between between victim and offender.

 

Types of Robbers 









  The The Pr Prof ofes essi sion onal al Rob obbe berr   –   ro robber who has long-term commi ommitm tmen entt to th thee cr crim imee of robbe obbery ry as a ma majo jorr sour sourcce of  livelihood.  –  the commonly known as  “bandits”,  one who  The Opportunist has little commitment to or specialization in robbery and one  who is all purpose purpose property offender. offender.   The Addict Robber – one who committed the crime of robbery to support suppo rt the drug habit. (Unplanne (Unplanned) d)

 The Alcoholic Robber  like tto the addict robber engages robbery rob bery occasio occasionall nallyy in  –order o support supp ort his habit.who (Unplanned (Unp lanned))to  The Muggers – they are the most feared robbers. They are semiprofessional robbers who are sometimes called  “strong   armed robb ro bber ers” s” –   the st strree eett rob obbe bers rs wh who o commi ommitt every everyth thin ing g fr from om snatching snat ching to the brutal brutalizatio ization n of the victim. victim.

 

How the Organized Crime Group Works? 

  For the orga organiz nizatio ation n to wo work rk ther theree must be:



 An Enforcer   –  one who make arrangements for killing and injuring (phys (ph ysica ically lly,, ec econ onomi omical cally ly,, psy psycho cholog logic icall ally) y) the mem member berss or non non-members.





  A Co Corr rrup uptter   –   one one who br brib ibes es,, bu buyys, in inti timi mida dattes, es, th thrrea eatten enss, negotiates, and “sweet talks” into a relationship with the police, public officials or any else who mig might ht help the members secu security rity and main maintain tain immunity immun ity from arre arrest, st, prose prosecuti cution on and puni punishmen shment. t.

  A Co Corr rrupt uptee ee   –   a publ bliic of offi fici ciaal, usu sual allly no nott a me memb mbeer of the orga or gani niza zati tion on fa fami mily ly,, who ca can n wiel wield d in influe fluenc ncee on be beha half lf of th thee organization’s interest.

 

Characteristics of Organized Crimes 

  





  It is a conspiracy activity involving coordination of  members.  Ec Econo onomic mic gai gain n is the the p prim rimary ary goa oal. l.  Ec Econom onomic ic gain is achie achieve ved d thr throug ough h ill illegal egal m means eans..  Em Empl plo oys predat edato ory ta taccti ticcs su such ch as inti intim mida idati tio on,  violence and corr corruption. uption.  Ef Efffec ecttive contr trol ol over mem embe berrs, ass sso ociat iates es,, and  victims.  Organized crimes does not include terrorist dedicated to poli politica ticall cchang hange. e.

 

Generic Types of Organized Crimes 

 Pol olit itic ical al Gr Graf aftt   –   man manned by political criminals (Political Graft), who use of force and violence of a means toaims obtor ainambitions. profi fitt orAn gaexample in, and of orthis achisievote ving political buyi bu ying ng,, an and d th thee em empl plo oym ymen entt of pri privat vate armi armies es to control contr ol a certain political area.



 The Mercenary/Predatory Organized Crime   –  crimes committed by groups for direct personal profit but prey upon unwilling victims. Example: extortionist/racketeer

 

Generic Types of Organized Crimes 



  In – Group Oriented Organized Crime – groups manned by  sem se mi orga organ nized ized indi ndivid vidual ual whose ose major ajor goals oals are are for psychological psych ological gratification such as adolescent gangs. Example: Motorcycle Gangs  Syndicated Crime   –  the organization that participates in illi illici citt acti activi vity ty in soci societ etyy by the the use use of for force, thr threat, eat, or   –  whose intimidation. group with a formalwhich structure purpose is to The provide elicit services, are in strong public demand through the use of secrecy on the part of  the associates. There is assurance of protection necessary  for its operations through political corruption or avoidance

of prosecution p rosecution..

 

EXPLAINING ORGANIZED CRIME THROUGH THEORIES 



  Stra Strain in theory -Dur -Durkh khei eim' m'ss theo theory ry of anom anomie ie is th thee basi basiss for for strain theory, at least in so far as "anomie" is translated as "dere "de regul gulati ation. on."" It shoul should d be noted noted that that cont ontro roll theori theorist stss also also trac tr acee thei theirr insp inspir iraati tion on to Durkhei kheim m, and and have tran transl slat ated ed "ano "a nomi mie" e" as "nor "norml mles essn snes esss." Du Durk rkhe heim im's 's in inff luenc luencee has has been been extre ext remel melyy broa broad d in crimino criminolo logy gy and soci sociolo ology gy.. His view view that social forces forces caused crime was extremely extremely rradical adical at the time.   Stra Strain in (st (stru ructu ctura rall strain strain)) refer referss genera enerall llyy to the pr proc ocess esses es by   which inadequate in adequate regulation at the societal level filters down to how the individual perceives his or her needs. Strain (individual strrai st ain) n) refer eferss to th thee fr fric icti tion onss and and pain painss expe experi rien encced by the the indi in divvidu idual as they they look look for ways to mee eett thei theirr need needss (the (the motivational mechanism that causes crime).

 

STRAIN THEORY 

 

 

 

  The theory assumes fairly uniform economic succ success ess aspirations across social class and the theory attempts to explain why crime is concentrated among the lower classes that havee the least legitim hav legitimate ate opportunitie opportunitiess for achiev achievemen ement. t.   Conformity   Merton rrecognized ecognized as theby most most of the fivemeans modes. During this mode, people strive conformity to obtain success the common most puretype conv conventional entional available.   Innovation   Du Duri ring ng inno innova vatio tion, n, Mer erto ton n iden identif tified ied a mi mini niscu scule le,, bu butt su subs bsta tant ntial ial ch chan ang ge in the perspective of the people whose mode is still in conformity and that of whom has shifted to innovation. The people continue to seek success; however however by innovation they strive to obtain the success by taking advantage of illegal goals available to them in place of less

conventional means in order to attain succ success. ess.   promising Rebellion conventional   Merton suggested that by the time people reach the mode of rebellion, they have completely rejected the story that everybody in society can achieve success and have loomed into a rebellious state. They neither trust the valued cultural ends nor the legitimate societal means used to reach success. Instead, these people replace such ideas  with irrational objectives to include the violent overthr overthrow ow of the syste system m altog altogether ether..

 

THEORY STRAIN   Retreatism  

 

  Identified by Merton as the escapist response of the five modes, retreatism occurs when people become practically dropouts of society. They give up all goals and efforts to achieve success because they view it as an impractical, impossible, almost imaginary, and irrational possibility. Merton attributes this mode as the one to which drug addicts, alcoholics, vagrants, and the severely  mental ill function because their reactions to not being able to obtain success by legitimate means represses them from society. society.   Ritualism   Durin During g ri ritu tual alis ism, m, the the final final mode mode,, peop people le re real aliz izee that that they they hav have no real real opportunity to advance in society and accept little relevance that they have. It is in this mode that people concentrate concentrat e on the retaining what little they possibly  gained or still have in place of concentrating on a higher yield of success. They  return to adhering to conventional norms in hopes of maintaining the few possessions or possible gains that they have have attained. For many members of the urban lower socioeconomic socioeconomic populous and disadvantaged minorities this period per iod of short-lived and slightly increased gains takes nearly a lifetime to obtain and to recognize its worth in a modern industrial society.

 

EXPLAINING ORGANIZED CRIME THROUGH THEORIES 



 Sutherlands   Diffe Different rential ial Association Association   Theory suggests that people commit crime by learning in a social context through their interactions with others and communication with them. He be beli liev eved edand crim crimin inal al be beha havi viou ourr is the lear learne ned d by int intof er erac acti tion on with with others, this includes learning techniques committing thee cri th crime, and and th thee moti tivves, es, dr driives es,, ratio ationa nallizat izatio ions ns,, and and attitudes atti tudes for commit committing ting it.   SO SOCI CIAL AL DISO DISOR RGANI GANIZA ZATI TION ON THE THEOR ORIE IES S OF CRIM CRIME E- It basi ba sica call llyy re refe fers rs to th thee fa fail ilur uree of soci social al insti institu tuti tion onss or soci social al organizations (e.g., (e.g., schools, business, policing, real estate, group netw ne twor orki king) ng) in cer erta tain in commu ommuni niti ties es and/ and/or or nei neigh ghbo borh rhoo oods ds (although nothing prohibits such theories from being couched at the "macro" "macro" lev level el to talk talk about all of society). It has its origins in the study of ecology, which is the examination of relations between betw een an organism organism and its enviro environment. nment.

 

EXPLAINING ORGANIZED CRIME THROUGH THEORIES 

 Cultu ulturral de devi vian ancce th theo eory  ry : The major tenet of  cult cu ltur ural al de devi vian ancce theo theory ry is that that con onfformit rmityy to the the prevailing cultural oftur lower class society crim cr ime. e. Lo Low w er cl clas asssnorms su subc bcul ultu re ha has s a un uniq ique ue causes se sett of   values and beliefs, beliefs, which are inva invariably riably in cconf onflict lict with conventional social norms. Criminality is an expr ex press ession ion of conf confor ormit mityy to low lower cla class ss subcu subcult ltur ural al  values.. Members of the working  values working class commit commit crimes as they respond to the cultural norms of their own class in an effort to deal with problems of social   – middlee clas middl classs- adjustment adjustment..

 

EXPLAINING ORGANIZED CRIME THROUGH THEORIES 

 Albert Cohen (1918) - He advocated the Sub-Culture Theory of Delinquency . Cohen claims that the lower class cannot socialize effectively as the middle class in.  what is co considered nsidered appro appropriate priate middle class behavior beha vior. Thus, the lower class gathered together share their common problems, forming a subculture that rejects mi mid ddl dlee clformation. ass valu luees.  Much Cohenof cthis alled lledbehavior thi hiss prcomes oc oceess to as reaction be called delinquent behavior; the subculture is called a gang and the kids are called delinquents. He put emphasis on the explanation of prevalence, origins, proc pr ocess ess and pur purpo poses ses as fac facto tors rs to cr crime ime..

 

EXPLAINING ORGANIZED CRIME THROUGH THEORIES 

 La Lab bel elin ing g th the eor ory: y:   people people bec become ome cri crimin minal alss wh when en significant members of society label them as such and they accept those labels as a personal identity. Throughout their lives people are given a variety of  symbolic labels in their interactions with others. These labels imply a variety of behaviors and attitudes; labels thus help define not just one trait but the whole person. If a devalued status is conferred by a signifi ficcant other, the negative label may cause permanent harm h arm to the targ target. et.) -

 

EXPLAINING ORGANIZED CRIME THROUGH THEORIES 

  Frank Tennenba ennenbaum, um, Edwin Lemert, Lem ert, Howard Becker (1822 – 1982)



 Being home,perceived at woras k, a social at scdeviant hool amay nd affect in ththeir e otreatment ther sociat al situ si tuat atio ions ns.. Label Labeled ed pers person onss ma mayy find find them themse sellves tu turn rnin ing g to others similarly stigmatized for support and companionship. Law is differentially applied, benefiting those  who hold economic and social power power and penalizing the powerless. Labeling theory is not concerned with why people originally engage in act that result in their being labeled. Its conce co ncern rn is with criminal criminal car career eer formation formation and not the origin origin of  criminal acts. acts. A person is deviant primaril primarilyy because of the social distance between the labeler and the labeled.  The theory that expl ex plai ains ns ab abou outt soci social al react eactio ion n to beha behavi vior or

 

EXPLAINING ORGANIZED CRIME THROUGH THEORIES 



  Social Social Contr Control ol Theory  Theory   as repr epresen esentted in the the work ork of  Travis HirschiHirschi- It proposes that exploiting the process of  socialization   and   social learning   builds self-control and reduces the inclination to indulge in behavior recognized as antisocial. Refers also as to those processes processes by which the community influences its members toward conformance  with established norm of behavior. behavior.   Differ Different ential ial-op -oppor portun tunity ity theory  theory - observa rvations that legit leg itim imat atee oppo opport rtun unit itie iess to purs pursue ue cult cultur ural ally ly appr approved goals are socially structured and unevenly distributed— especially by  class.  class. Differential-opportunity Differential-opportunity theory extends this notio tion of sociall llyy structured unequal access to delinquency delinque ncy and criminality crimin ality.. Llo  Lloyd yd Ohlin (1928) (1928)

 

TYPES OF MAFIA  



 What is a MAFIA?  Mafia is a term used to describe a number of   criminal organizations around the world. The first organization to bear the label was the Sicilian the  Sicilian Mafia based Mafia based in Italy  in Italy , known to its members as Cosa as Cosa Nostra  In the  United States, States, "the Mafia" generally refers to the  American Mafia Mafia.. Other powerful organizations described Chinese   Triads, Triads , the   Albanian  Russian Mafia Mafia, Mafia,,,  Bosnian the  Irishmafia, the Irish mafia Mob Mob,, the as mafias include the the Russian Mafia  Japanese Yakuza  Japanese  Yakuza,, the Neapolitan Camorra Neapolitan  Camorra,, the Calabrian 'Ndrangheta angheta,, the Indian the  Indian Mafia, Mafia, the Unione the  Unione Corse Corse,,  Serbian Mafia,, and the Bulgarian Mafia the Bulgarian mafia. mafia. There are also a number of  localized mafia organizations around the world bearing no link to any specific racial racial background. background.

 

TYPES OF MAFIA 



  Sicilian Mafia (based in Sicily) The Sicilian Mafia formed in the mid-1800s to unify the Sicilian peasants against their enemies. In Sicily, the word Mafia tends to mean  “manly .”  The Sicilian Mafia changed from a group of honorable Sicilian men to an organized criminal group in the 1920s.   Camorra or Neapolitan Mafi fia a (based in Naples) Thee word Th ord   “Camorra”   mean meanss ga gan ng. The Cam Camorra rra fi firrst appeared appea red in the mid-1800s mid-1 800s in Naples, Naple s, Italy Italy,, as a prison gang. Once released, members formed clans in the cities and continued to grow in power. The Camorra has more than 100 clans and approximately 7,000 members, making it the largest larg est of the Italian Italian or organized ganized crime groups. groups.

 

TYPES OF MAFIA 



Ndrang ngh heta eta or Calab labrian Mafi fia a (based in Calab labria) The word “’Ndrangheta” comes from the Greek meaning courage or loyalty. loyalty. The ’Ndranghet Ndranghetaa formed in the 1860s when a group of  Sicilians was banished from the island by the Italian government. They settled in Calabria and formed small criminal groups.  Sacra Corona Unita or United Sacred Crown (based in the  ’

Puglenforcement ia rein giothe n) Law became aware of the Sacra Corona Unita late 1980s. Like other groups, it started as a prison gang. As its members were were released, they settled in the Puglia region in Italy  Italy  and continued to grow and form links with other Mafia groups. The Sacra Corona Unita is headquartered in Brindisi, located in the southeas southeastern tern region region of Pugl Puglia. ia.

 

MAFIA 







 Organized crime groups, whether traditional mob families or street gangs, gang s, h hav avee a n numbe umberr of ccommon ommon char charact acterist eristics: ics:   Organized crime thrives on supplying illegal goods and services for  which a larg largee fifteen number of people are w willing illing pay pay.. For example example, , in 1999 an estimated million Americans usedtoillegal drugs, 75 percent of   whom used mariju marijuana. ana.  The goal of organized crime groups is to make money; members also gain a se sense nse of pride, po power wer,, and prote protection. ction. pyramid pow power er   structure like legal   Groups have what is called a   pyramid boss  called the chief  businesses. In legitimate businesses, there is  a boss called execu ex ecuti tive ve offic officer er (CE (CEO) O),, under the CEO are   vice vice pr presi esident dentss, treasurers, advisors, accountants, lawyers, lawyers,  technical staff , and so on. Organized crime has a boss, advisors who work closely with the boss and assign tasks to different crews, captains who run the different crews, soldiers who carry out the physi physical cal wor work k and act out tasks from collecting money to killing people, and men with special skills.

 

MAFIA 





  

  Membe embers rs are are extr extrem emel elyy loy loyal and and commi ommittted; ted; they they go through initiation rituals, take oaths, and swear to sec secrecy recy..  Punishment for members who stray might be demotion to a lower lower rank or, or, depending on their offense, death.  Omerta   is the code of the OC which have two major principle the following are;   Follow ollow your superior superior   Keep silent   Any Any violati violation on of the code, ode, death death is is the the conseq onsequen uencce

 

Asian Criminal Ent Enterprises erprises 



 Asian criminal enterprises have been operating in the U.S. since the early 1900s. The first of these groups evolved from Chin Ch ines esee tong tongss—so soccial ial organi anizati zatio ons form ormed by ear early  Chinese-American immigrants. immigrants.   Ther There e are are two two cat categori egories es of Asi Asian an cr crim imin inal al en entterpr erpris ises es. Trad radition itional al criminal criminal   enter enterpr pris ises es incl includ udee the the Chin Chines esee triads (or underground societies) based in Hong Kong, Taiw aiwan, an, and and Macau acau as well ell as the the Japan apanes esee Yakuz akuzaa or Boryokudan.   NonNon-tr trad adit itio iona nall crimi crimina nall   enterprises incl in clud udee grou groups ps such such as Chin Chines esee crim crimin inal ally ly inf inf luen luencced tongs, triad affiliates, and other ethnic Asian street gangs found in several countries with sizeable Asian communities.

 

Asian Criminal Ent Enterprises erprises  





  Transnational ransnational crime refers to crime crime that  that takes place across national borders national borders   The word "transnational" "transnational"   describes crimes that are not only international (that is, crimes that cross borders between countries), but crimes that by their nature involve border crossings as an essential part of the criminal activity. Transnational crimes also include crimes that take place in one country, but thei th eirr conse onsequ quen encces si sign gnifi ifica cant ntlly af affe fect ct anot anothe herr cou ount ntry ry.. Ex Exam ampl ples es of  traffic affickin king g,   people   smuggling, tr tran ansn snat atio iona nall crim crimes es incl includ udee the the   human human tr smuggling, smuggling/trafficking smuggling /trafficking of   goods (such goods (such as arms as arms trafficking ng and  and drug  drug trafficking), sex slavery , pedophilia  pedophilia and  and (non-domestic) terrorism (non-domestic) terrorism..   The crimeand of unlawfully carrying carr ying awa away y awill person fintent orce or Fraud orto  Fraud, or seizing detaining aseizing personand against his or her with by an force carry , that person away away at a later later time.   The Philippine jurisprudence jurisprudence defines kidnapping for rans ransom om as “the unlawful taking and carrying away of a person by force or fraud or against his will, or in any manner depriving him of his liberty for the purpose of extorting ransom as payment paym ent for his/her release. release.”

 

TEN THREATS BY HIGH LEVEL THREAT PANEL OF THE U.N. 

      



 

ten thr threat eatss   iden   The   ten identi tifie fied d by th thee   High High Le Levvel Th Thre reat at Pan anel el   of  the United the  United Nations are these:   Poverty    Infectio Infectious us dise disease ase   Environmental degradation   Inter-state war Inter-state war  Civil war   Genocide   Other Atrocities Other Atrocities (  (e.g., trade in women and children for sexual for sexual slavery , or kidnapping or  kidnapping for bod y parts parts))  Weapon of mass destruction  destruction   (nuclear proliferation,  proliferation,  chemical weapon proliferation,, biological weapon proliferation) proliferation proliferation)   Terrorism   Transnational organized crime

 

How We We Combat Asian Criminal Enterprises? (FBI) 





  The The FBI FBI part partic iciipa pattes in diff differ eren entt worki orking ng grou groups ps and and initiatives to combat Asian organized crime on an

  international The The FBI/ FBI/N Natio atlevel: iona nall Polic olice e Agen Agency cy of Japan apan Worki orking ng Group   meets annually to discuss ongoing investigations and policy policy matte matters rs for for sharin sharing g intell intellig igenc ence, e, inter interag agenc ency  y  investigativ inv estigativee support, and FBI extraterritorial extraterritorial operations in  Japan.  Project Bridge  is a working group under Interpol to help member countries coordinate investigations and info in form rmat atio ion n shar sharin ing g be betw twee een n poli policce agen agenci cies es to fight fight  Asian-alien smuggling syndicat syndicates. es.

 

How We We Combat Asian Criminal Enterprises? (FBI) 







 The Interagency Working Group on Alien Smuggling  coordinates policy discussions and examines investigative issues relating to alien smuggling and the trafficking of women and children. It is sponsored by the Na Natio tiona nal l Sec Securi urity  ty   Council’s   Special Special Coo Coordi rdinat nation ion Gr Group oup on International Crime.   The The In Inttern ernat atio ional nal As Asia ian n Orga Organi nize zed d Crim Crime e Conf Confer erenc ence e   meets annually, bringing together law enforcement agencies from around the  world  wor ld to discuss new trend trendss and exch exchange ange ideas on combat combating ing Asian organized crime.   cross-border The Canadian/Unit Canadian/United ed Stat States eseffective Cr Cross-Border oss-Border Crime F orum orum addresses  addresses crime issues and coordination between the U.S. and Canadian Canadian la law w enforc enforcement. ement.   Th The e In Intter erna nati tion onal al La Law w En Enfo forrceme ement Acade cadem my    in Ba Bang ngk kok ok,, Thailand, is run with assistance from the FBI and Australi Australian an federal law enffor en orcceme men nt agenci cies es.. The ac acad adeemy provid idees tr traain inin ing g to la law w enforc enfo rcemen ementt ag agent entss from sev severa erall South Southeast east Asian ccount ountries ries..

 

CRIMES COMMITTED BY THE ORGANIZED CRIMINALS 





 Kidnapping- However, most cases of kidnapping particularly  those tho se under undertak taken en by cri crimin minal al gr grou oups ps,, reve reveale aled d the fo follo llowin wing g stages:  Spotting . The first f irst step in planning a kidnapping operatio operation n is to come up with a shopping list of three to four possible targets that are capable of paying a huge amount of ransom. Targets are usually usual ly businessmen businessmen of Chines Chinesee descent. descent.   surveillance Surveillanceand   . investigation. Targets are tThe hen investigation subjected to a thoon routhe gh focused financia finan ciall ca capab pabili ility ty,, hom homee add addre ress ss and plac placee of work work,, phone phone numbers, complete description of the vehicle being used, travel routes, identities of household helpers, drivers and employees, and personal security of potential targets. targets.

 

STAGES IN KIDNAPPING 



 Risk analysis and target selection  . After a thorough investigation, the group selects one of the targets, which present a lower risk and difficulty in ransom negotiation. In some cases, the group selects the one whom the group had gathered the informatio tion fir first. In order to enhance precision in their operation, some group send out members of the the syn syndicat icatee to appl applyy as dri drivers ers, empl emplo oyees ees, and and household hous ehold helps helps to gain further further acces accesss on the targ target. et.   Seizin Seizing g of vict victim im . The time allotted for forcibly taking the  victim is usually two to three hours. The victim is usually  forcibly taken on his/her way to place of work or while going home after work. Most of the victims are successfully  intercepted while crossing road intersections or traveling along highly traveled streets.

 

STAGES IN KIDNAPPING 



  Negotiation . Ransom demand may range from PhP1 million to PhP100 million, depending on the paying capacity of the victim and an d th thee oper eraati tio onal nal capabi pabili litty of the grou group p. The wea eak kes estt member of the victim's family is usually selected by the syndicate to act as negotiator, warning the latter not to report the incident to the co conc ncerned erned polic policee authoritie authorities. s.  Collection of Ransom.  After the ransom has been negotiated, theough group a pay-off procedure. Thepayransom usually  br brou ghtt towill a design pr pred edes esig igna nate ted d site siproc te.. edure. In some some pa y-of offf situ siistuat atio ions ns however how ever,, the ransom courier is usually instructed to bring along a cellular phone for ease of communication during the actual pay-off. There were instances where couriers were given a roundthe-bush before before reaching the final pay-off venue. venue.

 

CRIMES COMMITTED BY THE ORGANIZED CRIMINALS 



 Terrorism   in the Philippines are are conflic flicts based on political issues conducted by rebel organizations against the Philip Philippin pinee govern overnmen ment, t, its citiz citizens ens and suppor supporte ters rs.. Most terrorism in the country are conducted by  Islamic   Islamic terrorist  groups. The most active  active   terrorist  groups in the Philippines Philippines are  are the Moro the  Moro Islamic Liberation Front Front,,  Moro Natio Na tional nal Lib Liber erati ation on Fr Fron ontt,   A Ab bu Sa yaf ,   Raj Rajah ah Sul Sulaim aiman an Movement  and Jemaah Movement and Jemaah Islami yah  yah..   Computer crime refers to any crime that involves a computer and a network, where the computers may or may  not have have played an instrumental part in the commission commission of  the crime (Moore 2000). Netcrime refers, more precisely prec isely,, to criminal exploitation of the Internet.

 

Law in the Philippines is R.A 9372  









 

  REPUBLIC ACT NO. NO. 9372   AN ACT TO SECURE THE TH E STATE STATE AND PROTECT PROTECT OUR PEOPLE FROM TERRORISM  Be it enacted by the Senate and House of Representative of the Philippines in Congres Congresss Assembled:  Section 1. Short Title. - This Act shall henceforth be known as the "Human Security Act of of 2007.”  Sec. 3. Terrorism. - Any person who commits an act punishable under any of the follow following ing provisio provisions ns of the Revised Revised Penal C Code: ode:  a. Article 122, (Piracy in General and Mutiny in the High Seas or in the Philippine Waters);  b. Article 134, (Rebellion or Insurrection);  c. Article 134-a, (Coup d' Etat), including acts committed by  privatee persons; privat

 

Law in the Philippines is R.A 9372     



 

 d. Article 248, (Murder);   e. Article 267, (Kidnapping and Serious Illegal Detention);  f. Article 324, (Crimes Involving Destruction), or under:   1. Presidential President ial Decree No. 1613, (The Law on Arson);   2. Republic Act No. 6969, (Toxic Substances and Hazardous and Nuclear Waste Control Control Act of 1990);  3. Republic Act No. 5207, (Atomic Energy Regulatory and Liability Liabi lity Act of 1968); 1968);   4. Republic Act No. No. 6235, 6235, (Anti-Hijacking (Anti-Hija cking Law);   5. Pres Presid iden enti tial al Decr Decree ee No. 532, 532, (Ant (Antii-Pi Pirracy acy and and Anti Anti-Highway Robber Robberyy Law of 1974); 1974); and

 

Law in the Philippines is R.A 9372 



  6. Pres Presid iden enti tial al Decr Decree ee No. 1866 1866,, as amen amende ded d (Dec (Decrree Codifying the Laws on Illegal and Unlawful Possession, Manu Ma nufa fact ctur e,munitions Deal Dealin ing g in in, Acqu Acquis isiti ition on or Disp Dispos osit itio ion n of  Firearms Firearms, , ure, Ammunitions Am or, Explosives) Explosiv es)  Thereby sowing and creating a condition of widespread and extraordinary fear and panic among the populace, in order to coerce the government to give in to an unlawful demand shall be guilty of the crime of terrorism and shall suff su ffer er the the penal penalty ty of fort fortyy (40) (40) years ears of impr impris ison onme ment nt,,  without the benefit benefit of parole as provided provided for under under Act N No o. 4103, otherwise known as the Indeterminate Sentence Law, as amended.

 

Law in the Philippines is R.A 9372 



 Sec. 7. Surveillance of Suspects and Interception and Recording of  Communications. -The provisions of Republic Act No. 4200, (Anti Wire Tapping Law) to the contr contrary ary notwithstandin notwithstanding, g, a police or law enforcement officialofand the members his team and may,record, upon awith written order of the Court Appeals, listen to,ofintercept the use of any mode, form, kind or type of electronic or other surveillance equipment or intercepting and tracking devices, or with the use of any  other suitable ways and means for that purpose, any communication, message, conv conversation, ersation, discussion, or spoken or written words words between members of a judicially declared and outlawed terrorist organization, association, or group of persons or of any person charged with or suspe sus pect cted ed of the cri crime me of te terr rrori orism sm or consp conspir iracy acy to co commi mmitt tterr errori orism. sm.   Provided, That surv rveeillance, interception and recording of  communications between lawyers and clients, doctors and patients,  journalistss and their sources  journalist sources and confiden confidential tial business correspondenc correspondencee shall not be be authoriz authorized. ed.

 

Law in the Philippines is R.A 9372 

  Sec. 8. Formal Application for Judicial Authorization. Authorization. - The  written order of the authorizing division division of the Court of   Appeals to track down, tap, listen to, intercept, intercept, and record record communications, messages, conversations, discussions, or spoken or written words of any person suspected of the crime of terrorism or the crime of conspiracy to commit terrorism shall only be granted by the authorizing division of the Court of Appeals upon an ex-parte written application of a police or of a law enforcement enforcement official who has been duly authorized in writing by the Anti-Terrorism Council created in Section 53 of this Act to file such ex parte application, and upon examination under oath or affi af firm rmat atio ion n of the the appl applic ican antt and and the the witn witnes esse sess he may  may  produc prod ucee to establish: establish:

 

Law in the Philippines is R.A 9372 

  Sec. 8. Formal Application for Judicial Judicial Authorization   (a) that there is probable cause to believe based on



personal knowledgeorofconspiracy facts or circumstances that the said crime of terrorism to commit terrorism has been committed, or is being committed, or is about to be committed;   (b) that there is probable cause to belie lieve based on



periden pe rsenc oncae, l kwnhoich whledisgeess f tial faalctsto othe r e cicrocn uvic mcstio taonncesof tany  hat ev evid ic eso senti en th vi ti an y  char ch arg ged or susp suspec ectted pers person on for for, or to the the solu soluti tion on or prevention of, any such crimes, will be obtained; and  (c) that there is no other effective means readily available



for acquiri acquiring ng such evidence. evidence.

 

Law in the Philippines is R.A 9372 

 Sec. 9. Classification and Contents of the Order of the Court. The written order granted by the authorizing division of the Court of Appeals as well as its order, if any, to extend or renew the applsame, icationthetooriginal extendapplication or renew newof, the if applicant, any, and including the writthis en authorizations of the Anti-Terrorism Council shall be deemed and are hereby declared as classified information: Provided, That the person being surveilled or whose communications, letters, papers, messages, conversations, discussions, spoken or written  words  wor ds and effects have have been monitored, monitored, listened to, to, bugged or recorded by law enforcement authorities has the right to be informed of the acts done by the law enforcement authorities in the premises or to challenge, if he or she intends to do so, the legality of the interference before the Court of Appeals which issued written The written orderthe of following: the authorizing divisionthe of the Courtorder. of Appeals shall specify

 

Law in the Philippines is R.A 9372 

 (a) the identity, such as name and address, if known, of the char ch arg ged or susp suspec ectted pers person on whose hose commu ommuni nica cati tion onss, messages, conversations, discussions, or spoken or written  words  wor ds are to be tracked tracked down, tapped, listened to, to, intterc in ercept epted, ed, and and reco ecorded and and, in the the case ase of radio adio,, electronic, or telephonic (whether wireless or otherwise) communications, messages, conversations, discussions, or spok sp oken en or writ writtten words ords,, the the elec electr tron onic ic tran transm smis issi sion on systems or the telephone numbers to be tracked down, tapped, listened to, intercepted, and recorded and their loccations or if the person suspected of the lo the crime of  terrorism or conspiracy to commit terrorism is not fully  known, such pers erson shall be subject to continuous surveillance sur veillance provided there is a reasonable ground to do so;

 

Law in the Philippines is R.A 9372 





  (b) the identity (name, address, and the police or law enfo en forrcemen ementt orga organi niza zati tion on)) of the the poli policce or of the the law law enfo en forrces, emen em entdres t esse offic ofses, ficia l,and incl includ udin g licthe th indivi vidu dual iden idemen enti tity  ty  (n (nam ames , addr ad s,ial, and the th e ing poli po cee orindi law law enfo enalforc rcem ent t orga or gan nizat izatiion) of the the mem members ers of his team eam, jud judicial ciallly  authorized to track down, tap, listen to, intercept, and reccord re ord the the commu ommuni nica cati tion ons, s, mess messag ages es,, conv onversa ersati tion ons, s, discussio disc ussions, ns, or spoken spoken or written written words; ords;  (c) the offense or offenses committed, or being committed, or sought sought to be prev prevent ented; ed; and   (d) the length of time within which which the authorization authorization shall be used used or or carried carried out. out.

 

Law in the Philippines is R.A 9372 

  Sec. 11. Custody Custody of Intercept Intercepted ed and Recorded Recorded Communications Communications..  All tapes, discs, and rec recordings ordings made pursuant to the autthori au horiza zati tio on of the auth tho ori rizi zing ng div divisio ision n of the Cour ourt of   Appeals, including all excerpts excerpts and summaries thereof as well as all written notes or memoranda made in connection therewith, shall, within forty-eight (48) hours after the expiration of the period fixed in the written order of the authorizing division of  the Court of Appeals or within forty-eight (48) hours after the expiration of any extension or renewal granted by the authorizing division of the Court of Appeals, be deposited with the authorizing Division of the Court of Appeals in a sealed envelope or sealed package, as the case may be, and shall be accompanied by a joint affidavit of the applicant police or law enforce enfor cement ment official official and the the me members mbers of his team. team.

 

Law in the Philippines is R.A 9372 

  In case of death of the applicant or in case he iiss physica physically lly disabled to execute the required affidavit, the one next in rank to the applicant among the members of the team named in the written order of the authorizing division of the Court of Appeals members of the team that requir required ed affida affidavit. vit. shall execute with the





  It shall be unl unlaw awful ful for any pers person, on, polic policee office officerr or an anyy cust custodia odian no off the tapes, discs and recording, and their excerpts and summaries, written notes or memoranda to copy in whatever form, to remove, delete, expu ex pung nge, e,ted in inci cine ner rat ate, e, sh shrredoror de dest roy inany anpret y ma mann er th thee er. it item enumerated enumera abo above ve iin n whole in pa part rtstrunder pretext extnner whatsoev whatsoever .emss   Any person who removes, deletes, expunges, incinerates, shreds or destroys the items enumerated above shall suffer a penalty of not less than six years and one day tto o tw twelve elve (12) yyears ears of imprisonment.

 

Law in the Philippines is R.A 9372 

 Sec. 17. Prescription of Terrorist Organizations, Association, or Group of Persons. - Any organization, association, or group of  persons organized for the purpose of engaging in terrorism, or  which, although although not not o organized rganized ffor or that purpose, ac actually tually uses the acts to terrorize mentioned in this Act or to sow and create a condition of widespread and extraordinary extraordinary fear and panic am among ong the populace in order to coerce the government to give in to an unlawful demand shall, upon application of the Department of   Justicee before a compet  Justic competent ent Regional T Trial rial Court, with due notice and opportunity to be heard given to the organiza ization, association, or group of persons concerned, be declared as a terr te rrori orist st and outla outlawe wed d organi organizat zation ion,, associ associati ation, on, or grou group p of  persons by the said Regional Trial Court.

 

MONEY LAUNDERING  

 Nature  The term "money laundering" does not derive, as is often said, from Al from  Al Capone Capone having  having used laundromats used  laundromats to hide ill-gotten gains. It is more likely to mean that dirty money is made clean. At some point in the pr proc oces esss ily ther there e art must us a sthat wit wiattcswit h be bet een een en. the tw two o; necessar nec essarily tthe he ist to tobek keep eep th switch chtwhidden. hidd

 

LAW ON R.A. 9194 





 AN ACT AMENDING REPUBLIC ACT NO NO.. 9160, 9160, OTHERWISE OTHER WISE KN KNOWN OWN AS THE ""ANTI-MONEY ANTI-MONEY LAUNDERING ACT OF 2001"  Sec Sectio tion n 1. Sec Sec.. 3, par paragr agrap aph h ((b), b), of R Repu epubli blicc Act Act No. No. 9160 is hereby hereby amen amended ded as ffollo ollows: ws:  ot "(b "(b) ) 'C 'Co o v er ered ed tra t ransa nsact ction ion' ' is a trans tr ansac actio tion n i in n c cash ash or othe herr eq equi uiva vale lent nt mo mone neta tary ry in inst stru rume ment nt in invvol olvi ving ng a total amount in excess of Five hundred thousand thousand pesos (P500,000.00) (P500, 000.00) wit within hin one (1) banking ba nking day day." ."

 

LAW ON R.A. 9194 







 Sec. 2. 2. Sec. Sec. 3 o off the sam samee Act Act is furthe furtherr amended amended by insert inserting ing between paragraphs (b) and (c) a new paragraph designated as (b-1) to read as follows:   "(b-1) "(b-1) 'Su 'Suspi spicio cious us tr trans ansact action ion'' are are tr trans ansact action ionss with with cover overed ed institutions, regardless of the amounts involved, where any of  the following circumstances exist:  "1. there there is no underlying underlying lega legall or or trade trade obligatio obligation, n, purpos purposee or economic justification;  "2. the cli client ent is not pr prope operl rlyy ide identi ntified; fied;



  or "3. financial the amount capacity involv involved of ed theisclient; not com commensurat mensuratee with the busines businesss

 

LAW ON R.A. 9194 









  Sec. Sec. 2. Sec. Sec. 3 of the sam samee Act Act is fur furth ther er ame amend nded ed by ins inser erti ting ng b bet etw ween een paragraphs (b) and (c) a new paragraph designated as (b-1) to read as follows:   "4. taking into account accou all known knured own circumstanc may perceiv perceived that clie cl ient nt's 's tr tran ansa sact ctio ion n isntst stru ruct ctur ed circumstances, in orde orderr toes,avoi avitoid d bein bebe ing g the the ed subj subjec ectt the of  reporting requirements under the Act;   "5. any circumst circumstance ance relating relating to to the the transa transaction ction which which is observed observed to deviate deviate from the profile of the client and/or the client's past transactions with the covered institution;   "6. the the trans transact action ion is is in any any way way rela relate ted d to an an unla unlawfu wfull activit activityy or offens offensee under this Act that is about to be, is being or has been committed; or   "7. any any tr trans ansact action ion that that is simila similarr or analog analogous ous to any any of the the for foreg egoin oing g."

 

LAW ON R.A. 9194 







  "SEC. 4. Mo Money ney Laund Launderin ering g Offe Offense. nse. —  Money laundering laundering is a crime  whereby  where by the proce proceeds eds of an unlaw unlawful ful activi activity ty as herein defined are tran transac sacte ted, d, the there reby by mak makin ing g the them m ap appe pear ar to ha have ve ori origin ginat ated ed from from legitimate sources. Itnowin iswing committe committed by the following   "(a) Anysources pers person on. k kno g tha thatt d an any y mone monetary tary inst instrume rument nt or pro proper perty  ty  represents, involves, or relates to, the proceeds of any unlawful activity activity,, tran transac sacts ts or atte attempt mptss to tran transac sactt sai said d mon moneta etary ry inst instrum rument ent or pr prop opert ertyy.   "(b) An Anyy p perso erson nk kno nowin wing g th that at any any m mone onetary tary ins instrum trument ent or pro proper perty  ty  involves the proceeds of any unlawful activity, performs or fails to perform any act as a result of which he facilitat facilitates es the offense of money  laundering referred refer red to in paragr paragraph aph (a) above.   "(c) Any person know knowing ing that any monetary instrume instrument nt or prope property rty is required under this toC), be fail disclosed and Launderin Laund ering g Coun Council cil Act (AML (AMLC), fails s to do so so." ." filed with the Anti-Money 

 

LAW ON R.A. 9194 



 Sec Sec.. 55.. Se Sec. c. 7 o off th thee same same Ac Actt is her hereb ebyy am amen ende ded d aass follows:  "SEC  "S EC.. 7. Cr Creatio eation n of Anti-Mo Anti-Money ney Launder Laundering ing Co Council uncil (AMLC).   —  The Anti-Money Laundering Council is hereby created and shall be composed of the Governor of the Bangko of Sentral ng Pilipinas as chairman, Commissioner the Insurance Commission and the the Chairman of the Securities and Exc Exchang hangee Commission as members. The AMLC shall act unanimously in the

discha dis charg rgee of its functi functions ons as defin defined ed he here reund under: er:  

LAW ON R.A. 9194 







  "(1) to req requir uiree aand nd rrec eceiv eivee cov covere ered d or suspi suspiciou ciouss tr trans ansacti action on rrepo eports rts from covered institutions;   "(2) "(2) to is issu suee or ord ders aad ddress sseed to th thee ap app prop opri riat atee Su Sup perv rviisi sin ng  Authority  Authorit y or the monetary cover covered ed institu institution tion toor determ determine ine subject the trueofidenti identity ty of  the owner of any instrument property a covered transaction or suspicious transaction report or request for assistance fr from om a fo fore reig ign n St Stat ate, e, or be beli liev eved ed by th thee Co Coun unci cil, l, on th thee ba basi siss of  substantial evidence, to be, in whole or in part, wherever located, represe rep resenti nting ng,, in invol volvin ving, g, or rela related ted to to,, dire directl ctlyy or ind indire irectl ctlyy, in an any  y  manner or by any means means,, the procee proceeds ds of an unlawful unlawful activity activity..   "(3) to ins insti titu tute te ci civil vil forf forfeit eitur uree proc procee eedin dings gs aand nd al alll oth other er re remed medial ial proceedings proce edings thr through ough the Office of the Solicitor General; General;   "(4) to caus causee the filing of comp complain laints ts wit with h tthe he Dep Departme artment nt of Justic Justicee or the O Ombud mbudsman sman fo forr the pros prosecut ecution ion of money lau launder ndering ing o offen ffenses; ses;

 

LAW ON R.A. 9194 









  "(5) to in inve vestig stigate ate susp suspicio icious us tra transac nsaction tionss and and ccov over ered ed tr trans ansacti actions ons deemed suspicious after an inv investigati estigation on by AMLC, money laundering activiti acti vities, es, an and d other viola violation tionss of this A Act; ct;   "(6) to apply before the Court of Appea Appeals, ls, ex parte, for the freezin freezing g of  any monetary instrument or property alleged to be the proceeds of any  unlawfull activ unlawfu activity ity as de defined fined in Sec. 3(i) here hereof; of;   "(7) to impl implemen ementt such meas measure uress as may be nec necessa essary ry and just justified ified under this Act Act to count counteract eract mone moneyy laundering;   "(8) to rece receive ive and take action in respect of, aany ny request from forei foreign gn states for assistance in their own anti-money laundering operations provided in this Act;   "(9) "(9) to de devvelo elop p educ educati ation onal al p pro rogr gram amss on th thee pern pernici icious ous eff effect ectss o of  f  mone mo neyy la laun unde deri rin ng, th thee me meth thod odss and and techn echniq ique uess us used ed in mo mone ney  y  laundering, the viable means of preventing money laundering and the effectivee wa effectiv ways ys of prosecuting and punishin punishing g offenders;

 

LAW ON R.A. 9194 

 "(10) to enlist  "(10) enlist the assista assistanc ncee of any any branc branch, h, dep depart artmen ment, t, bureau, office, agency or instrumentality of the government, including government-owned and -controlled corpo orporratio ations ns,, in unde undert rtak akin ing g any any and and all all anti anti-m -mon oney  ey  laundering operations, which may include the use of its personnel, facilities and resources for the more resolute



prevention, detection and investigation of money  laundering offenses and prosecution of offenders; and  "(11)  "( 11) to impose impose administr administrativ ativee sanctions sanctions for the violation violation of laws laws,, rule rules, s, regul egulat atio ions ns and and orde orders rs and and resol esolut utio ions ns

issued pursuant thereto.  

LAW ON R.A. 9194 

 SEC. 10.   Fre reezi ezing ng of M Mone onetary tary Ins Instru trume ment nt or Property .   —  The Court of Appeals, upon application ex parte by the AMLC and after determination that probable cause exists that any monetary instrument or property is in any way related related to an unlawful activity a ctivity as defined in Sec. 3(i) hereof, may issue a freeze order  which shall be effectiv effectivee immediat immediately ely.. The freeze order twenty ty (20) (20) days days   unless shall be for a period of   twen extended ext ended by the court." court."

 

Human Trafficking in person 

  refer eferss to the the recru ecruit itme ment nt,, tran transp spor orta tati tion on,, tran transf sfer er or harboring,, or receipt of arsons with or without the victim's harboring consent knowledge, oror across by  means oforthreat or use within of forc force, e, othernational forms ofborders coercion, coercion, abduction, fraud, deception, abuse of power power or of position, taking advantage of the vulnerability of the persons, or, the giving or receiving of payments or benefits to achieve the consent of a person having control over another person for the purpose of exploitation which includes at a minimum, the exploitation or the prostitution of others or other forms of sexual sexual exploi exploitat tatio ion, n, forc forced ed labor labor or servic services, sla slave very ry,,

servitudee or the remov servitud removal al or sale of organs organs..  

REPUBLIC ACT NO. 9208 

 AN ACT TO INSTITUTE P POLICIES OLICIES TO ELIMINATE TRAFFICKING TRAFFICK ING IN PERSONS E ESPECIALL SPECIALLY Y WOMEN WOMEN  AND CHILDREN, CHILDREN, EST ESTABLISHING ABLISHING THE NEC NECESSAR ESSARY Y INSTITUTIONAL MECHANISMS FOR THE PROTECTION PRO TECTION AND SUPPORT OF TRAFFICKED TRAFFIC KED PERSONS, PR PROVIDING OVIDING PENAL PENALTIES TIES FOR ITS  VIOLATIONS,  VIOLA TIONS, AND F FOR OR O OTHER THER PURPO PURPOSES. SES.

 

REPUBLIC ACT NO. 9208 







  Sec. Sec. 4. Acts Acts of Traffick rafficking ing in Perso Persons ns.. —  It shall be unlawful for any person, natural or judicial, judicial, to commit any of the following following acts.   (a) To recruit, transport, transfer transfer,, harbor, harbor, provide, provide, or receive receive a person by by any  me mean ans, s, incl includ udin g thos thosee or done done unde underr the the pr pret etex ext t of dome domest stic or over overse seas as employment oring training apprenticeship, for the purpose oficprostitution, pornography, sexual exploitation, forced labor, slavery, involuntary servitude or debt bondage;   (b) To introdu introduce ce or match match for money, money, profit, profit, or material, material, econ economic omic or other consideration, any person or, as provided for under Republic Act No. 6955, any  Filipino women to a foreign national, for marriage mar riage for the purpose of acquiring, acquiring, buyi bu ying ng,, offe offeri ring ng,, sell seexploitation, llin ing g or tr trad adin ing g him/ hi m/he her r to enga en gag ge in pr pros osti titu tutio tion, n, pornography, sexual forced labor, slavery, involuntary servitude or debt bondage;   (c) To offe offerr or con contr tract act marr marriag iage, e, real real or sim simul ulat ated ed,, for the the pur purpo pose se of  of  acquiring, buying, offering, selling, or trading them to engage in prostitution, pornography, sexual exploitation, forced labor or slavery, involuntary servitude or debt bondage bondage;;

 

REPUBLIC ACT NO. 9208 









 (d) To undertak undertakee or or organiz organizee tours tours and tr trav avel el pl plans ans consist consisting ing of tourism packages or activities for the purpose of utilizing and offferi of ring ng pers person onss for pr pro ost stit itu ution, ion, por porno nogr grap aph hy or sexu sexual al exploitation;  (e) To main maintai tain n or hir hiree a per person son to engag engagee in prost prostitu itutio tion n or pornography;   (f) To ad ado opt or or ffac acil ilit itat atee th thee adop adopttio ion n of pers perso ons fo for the the purpose of prostitution, pornography, sexual exploitation, forced labor,, slavery labor slavery,, involuntary involuntary servitude or debt bondag bondage; e;   (g) To rrec ecru ruit it,, hire, hire, ado adopt pt,, tran transp spor ortt or or abd abduc uctt a p per erso son, n, by  by  means of threat or use of force, fraud deceit, violence, coercion, or intimidation for the purpose of removal or sale of organs of  said person; and

 (h) Tos in recr recruit uit,Philippines , tr trans anspor port or or abro aadop dopt t a child child to to eenga ngage ge in arme armed d activitie acti vities the Philipp inest or abroad. ad.  

Illegal Accessed of Devices   

 Repu Republic blic Act No No.. 8484   Februa February ry 11, 11998 998  AN ACT REGULATING THE ISSUANCE AND USE OF  ACCESS  AC CESS DEVIC DEVICES, ES, PR PROHIBITING OHIBITING FRAUDULENT FRAUDULENT  ACTS  ACT S COMMITTED RELAT RELATIVE IVE THERETO THERETO,, PROVIDING PURPOSES

PENALTIES

AND

FOR

OTHER 

 

Republic Act No. 8484 







 Section 3.   Definition of terms.   –  For purposes of this Act, the terms:   (a) (a) Ac Accces esss De Devi vicce   –   mean meanss an anyy car card, plat plate, e, code, ode, acc accou ount nt numb nu mber er,, el elec ectr tron onic ic seri serial al numb number er,, pers person onal al iden identi tific ficat atio ion n numbe num berr, or other other te telec lecom ommu munic nicati ations ons servic service, e, equ equipm ipment ent,, or instrumental identifier, or other means of account access that can be used to obtain money, good, services, or any other thing of value or to initiate a transfer of funds (other than a transfer originated solelyAccess by paper instrument);  –  means any access device that is  (b) Counterfeit Device count ounter erfe feit it,, fic ficti titi tiou ous, s, alt altered, ered, or for forged, or an iden identi tifia fiabl blee compone co mponent nt of an access access device device or or count counterfei erfeitt acce access ss device; device;  (c) Unauthorized Access Device  –  means any access device that

is stol stolen en,,with lost lost, , ex expi red, ed , raud; ev evok oked ed,, canc cancel elle led, d, susp suspen ende ded, d, or obtai obtained ned intent inte ntpir to defraud; defr  

Republic Act No. 8484 



 



 Section 3.   Definition of terms.   –  For purposes of this Act, the terms:  (d) Access Device Fraudulently Applied for  –  means any access device that was applied for or issued on account of the use of  falsified document, false information, fictitious identities and address addr esses es,, or any any form of fal false se pret pretenc encee or misre misrepr prese esenta ntatio tion; n;  (e) Consumer – means a natura naturall person; person;  (f) Credit Card   –  means any card, plate, coupon book, or other credit device existing for the purpose of obtaining money, goods, prope pr operty rty,, lab labor or or serv servic ices es or an anyy tthing hing of valu valuee on credi credit; t;   (g) (g) Devic evicee Makin aking g or Al Altter erin ing g Equ Equip ipm men entt   –   mea means an any  y  equipm equ ipment ent,, mechan mechanism ism or impr impression ession design designed ed or primar primaril ily  y  used for making or altering or reencoding an access device or a

counterfeit count erfeit access access device;  

Republic Act No. 8484 





 

 (h) Finance Charges   –  represent the amount to be paid by the debtor incident to the extension of credit such as interest or discounts, collection fees, credit investigation fees, and other service charges;   (i) Open-end-credit Open-end-credit pla plan n – means a consumer credit extended on an acco account unt pu pursua rsuant nt to a plan under under whic which: h:   1) the creditor may permit the person to make purchase or obtain loans, from time to time, directly from the creditor or indirectly  by use of credit credit card, card, or or other other servic service; e;   2) the person person has the privileg privilegee of paying the balanc balance; e; or  3) a finance charge may be computed by the creditor from time to time on an unpaid balance.(j) Penalty Charges –  means such amount, in addition to interest, imposed on the credit card

ho hold lder er fo forr nonnon-pa paym ymen entt of an acc accou ount nt with within in a pres prescr crib ibed ed period;  

Republic Act No. 8484 



 (k) Prod Produc ucee   –   include includess design design,, al alte terr, aut authen hentic ticat ate, e, dupl du plic icat atee or asse assemb mble; le; and  (l) Tra raffic ffickin king g   –   means means tr tran ansf sfer erri ring ng,, or ot othe herw rwis isee disposing of, to another, or obtaining control of, with inte in tent nt tto o tran transf sfer er or di disp spos osee of. of.

 

Section 9. Prohibited Acts. – The following acts shall constitute access device fraud and are hereby declared to be unlawful:





  



  (a) (a) pr prod oduc ucing ing,, us usin ing, g, traf traffic ficki king ng in one one or mor more count ounter erfe feit it access devices;  (b) trafficking one or more unauthorized access devices or access acc ess dev devices ices fraudulently frin audulently applied for;   (c) using, with intent intent tto o defraud, an unauthorized access access devic device; e;   (d) using an acc access ess device fraudulently fraudulently applied for;  (e) possessing one or more counterfeit access devices or access devices fraudulently fraudulently applied for;   (f) producing, trafficking in, having control or custody of, or possessing device-making or altering equipment without being in the business or employment, which lawfully deals with the

manufacture, issuance, or distribution of such equipment; equipment;  

Section 9. Prohibited Acts. – The following acts shall constitute access device fraud and are hereby declared to be unlawful: 



  (g) inducing, enticing, permitting or in any manner allowing another, for consideration or otherwise to produce, use, traffic in counterfeit access devices, access devices or access devices fraudulently fraudulentl y appliedunauthorized for;  (h) multiple imprinting on more than one transaction record, sales slip or similar document, thereby making it appear that the device holder has entered into a transaction other than those  which said without device holder lawfully lawfulmerchant, ly contracted contracted for for,, to or submitting, being anhad affiliated an order collect from the issuer of the access device, such extra sales slip throug thr ough h an affiliat affiliated ed mercha merchant nt wh who o conniv onnives es the there rewit with, h, or or,, under false pretenses pretenses of being an affiliated merchant, present for

collec co llection tion such such sales sales slips slips,, and similar similar docu documents ments;;  

Section 9. Prohibited Acts. – The following acts shall constitute access device fraud and are hereby declared to be unlawful: 







  (i) disclosing any information imprinted imprinted on the access device, such as, but not limited to, the account number or name or address of the device devi ce holde holderr, w witho ithout ut the lat latter ter's 's auth authority ority or perm permissio ission; n;  (j) obtaining money or anything of value through the use of an access devi de vice ce,, wi with th in inte tent nt to de defr frau aud d or wi with th int intent ent to ga gain in an and d f le leei eing ng thereafter;   (k) having in one's possess possession, ion, without authority fr from om the o owner wner of the access device or the access device company, an access device, or any  material, such as slips, carbon paper, or any other medium, on which the acc access ess devic devicee is writ written, ten, prin printed, ted, embossed embossed,, or otherwise iindicate ndicated; d;  (l) writing or causing to be written on sales slips, approval numbers from the issuer of the access device of the fact of approval, where in fact no such approval was given, or where, if given, what is written is delibera delib eratel telyy diffe differen rentt from the app approv roval al actuall actuallyy giv given; en;

 

Section 9. Prohibited Acts. – The following acts shall constitute access device fraud and are hereby declared to be unlawful: 





 



  (m) (m) ma mak kin ing g an anyy al altter erat atiion on,, wi with thou outt th thee ac accces esss de devi vicce ho hold lder er's 's author aut hority ity,, of an anyy amo amoun untt or other other in infor format mation ion wri writt tten en on the sal sales es sli slip; p;  (n) effecting transaction, with one or more access devices issued to another person or persons, to receive payment or any other thing of   value;   (o) (o) wi with thou outt th thee au auth thor oriz izat atio ion n of the the issu issuer er of th thee ac accces esss de devi vicce, solicit soli citin ing g a pe perso rson n fo forr the pu purpo rpose se of:   1) offering an access device; or  2) selling device; or information regarding or an application to obtain an access  (p) without the authorization of the credit card system member or its agen ag ent, t, ca caus usin ing g or ar arra rang ngin ing g fo forr an anot othe herr pe pers rson on to pr pres esen entt to th thee member or its agent, for payment, one or more evidence or records of  transac tra nsaction tionss mad madee by cred credit it car card. d.

 

Smuggling 



  is the clandestine transportation of goods or persons persons past a point where prohibited, such as out of a building, into a prison, , or  laws or across international border, in violation of  prison  or an othe other r regul egulat atio ions ns. . border, applicable laws applicable  There are various motivations to smuggle. These include thee part th partic icip ipat atio ion n in il ille lega gall trad trade, e, such such as   drugs, drugs,   illegal immigration   or   emigration, emigration,   ta tax evasion, providing the  theft of  of the items contraband  to a prison inmate, or the theft being bei ng smugg smuggled led.. Examp Examples les of non-fi non-finan nanci cial al motiv motivati ations ons include bringing banned items past a security checkpoint (suc (s uch h as   air airlin linee sec securi uritt y ) or the removal of  f    classified

documents from documents  from a gove governme rnment nt or corpor corporate ate office office..  

Drug Tra raffick fficking ing 

 The illegal drug trade is a global black global  black market market in  in the cult cu ltiiva vati tion on,, ma manu nufa fact ctur ure, e, di dist stri ribu buti tion on and and sa sale le of  those substances which are subject to drug to drug prohibition laws.

 

REPUBLIC ACT NO. 9165 

 June 7, 2002



 A ACRTOU IN ITUGS UTSINA GCTTHOF E C O0M EH ENLING SING VE DN ANGE ANGER OUS S ST DR DRUG 20 200 2,PR RE REP PEA EALI REPUBLIC ACT NO. 6425, OTHERWISE KNOWN AS THE DANGEROUS DRUGS ACT OF 1972, AS  AMENDED  AMENDED, , PR PRO OVIDING FUNDS THEREFOR, THEREFOR, AND FOR OTHER PURPOSES

 

REPUBLIC ACT NO. 9165  

  





 

 Illegal acts   Sect Sectio ion n 4.   Imp Impor orttat atio ion n of Da Dang nger erou ouss Dr Drug ugss an and/ d/or or Con ontr trol olle led  d  Precursorss and Essential Chemicals. Precursor  Section 6. Maintenance of a Den, Dive or Resort. –  Section 7. Employees and Visitors of a Den, Dive or Resort   Sect Sectio ion n 8.   Man Manuf ufac actu ture re of Da Dang nger erou ouss Dr Drug ugss an and/ d/or or Con ontr trol olle led  d  Precursorss and Essential Chemicals Precursor   Section 9.   Ille Illegal gal Che Chemic mical al Di Dive versio rsion n of Co Contr ntroll olled ed Pr Precu ecurso rsors rs an and  d  Essential Chemicals.   Sect Sectio ion n 10 10..   Manu Manuffac actu turre or De Deli livver eryy of Eq Equi uipm pmen ent, t, Ins nstr trum umen ent, t,  Apparatus,, and Other Par  Apparatus Paraphernalia aphernalia for Dangerous Drugs and/or  Controlled Control led Precursors and Essential Chemicals.  Section 11. Possession of Dangerous Drugs.

Drugs or16. are  Cultivation Sources Thereof Thereof. or Culture . of Plants Classified as Dangerous   Section

 

Gambling 

 Title Six of the RPC



 CRIMES AGAINST PUBLIC MORALS



 Gambling is the wag ering of  of money  money or or something of the wagering material value material  value (referred  (referred to as "th "thee stakes") on an event  with an uncertain outcome outcome with the primary intent of  winning additional additional money money and/or material goo goods. ds. Typically, the outcome of the wager is evident within a

short period.  

Gambling   





  Chapter One   GAMBLING AND BETTING BETTING  Presidential Decree No. 449 Cockfighting Law of 1974. This law took effect on May 9, 1974. It governs the establishment, operations, maintenance and ownership of  cockpits.  Presidential Decree No. 483 Penalizes betting, game-fixing or point shaving and machinations in sports contests. It took effect on June 13,1974. 13,1974.   Pres Presid iden enti tial al Dec Decree No. 519 519 Outl Outlaaws pinb pinbal alll and and slot slot machines mach ines and and other other similar similar devices devices and nullifies all all existing existing permits and/or licenses to operate the same. It took effect

on July 23, 1974.  

PROSTITUTION Prostitution is the act or practice of providing sexual services with another person in return for payment. Persons whProstitution o execute issuone ch ofacthe tivibranches ty are cof althe led prostitutes. sex x in indu dust stry  ry . Esti Estima mattes plac lace the the annua nual revenu enue se generated from the global prostitution industry to be over ov er $100 billion. billion.     

 TYPES OF PROSTITUTES  CALL GIRL  HUSTLER   DOOR KNOCKER 

 FACTORY GIRL  

Art. 202. Vagrants and prostitutes;  penalty   









  — The following following are vagran vagrants: ts:   1. Any person person havin having g no appar apparent ent means of subsi subsiste stenc nce, e, who has the physical ability to work and who neglects to apply himself or herself to some lawful calling;   2. Any person found loitering loitering about public or semi-public buildings buildings or places or trampling or wandering about the country or the streets  without visible means of support;   3. Any idle idle or dissolut dissolutee person who ledges in houses of ill fame; ruffians

or pimp pimps s and those who habituall ually y assoc associat iateeinwit with hp prost rostitut itutes; es; of other   4. Any person who, nothabit being included the provisions arti ar ticl cles es of th this is Code Code,, shal shalll be fo foun und d lo loit iter erin ing g in an anyy in inha habi bite ted d or unin un inha habi bitted pl plac acee be belo long ngin ing g to an anot othe herr wi with thou outt an anyy la lawf wful ul or  justifiable purpose;

 

Art. 202. Vagrants and prostitutes;  penalty   



 5. Prostitutes.  For the purposes of this article, women who, for money or profit, habitually indulge indulge in sexual intercourse intercourse or lascivious conduct, cond uct, are deemed to be pr prostitutes. ostitutes.  Any person found guilty of any of the offenses covered by  this articles shall be punished by arresto menor or a fine not exceeding 200 pesos, and in case of recidivism, by  arresto mayor in its medium period to prision correctional in its minimum period or a fine ranging from 200 to 2,000 pesos,, or both, pesos both, in the discret discretion ion of the court. court.

 

Computer crime, or cybercrime 

 refers to any crime that involves a   computer   and a network network,, where the computers may or may not have played an instrumental part in the commission of a crime crime..[1] Netcrime  refers, more precisely, to criminal exploitation of the Internet the  Internet..[2] Issues surrounding this type crime have  hacking become, high-profile, particularly  gement hacking,   copyright infrin gement,, thoseofsurrounding child pornography , and child and child grooming. grooming. There are also problems of  privacy    privacy  when confidential   when  confidential information  information is

lostt or in los inte terc rcept epted, ed, la lawfu wfull llyy or oth otherw erwise. ise.  

REPUBLIC ACT NO. 8792  

  June June 14, 14, 2000 2000   AN ACT PROVIDING AND USE OF ELECTRONIC COMNSACTI MECTIONS RCIONS, AL , PENAL ANLD NOUNLA N-CLAWFU OWFUL MMELRCUSE IAE L TRA TRANSA ENA TIES TIES FOR UN US THEREOF, AND OTHER PURPOSES

 

 Section 4.   Sphere of Application- This Act shall apply to any kind of electronic document used in the context of  comme ommerc rcia iall and and nonnon-ccomme ommerrcial cial acti activi viti ties es to in incl clud udee domestic and inte nternational dealings, transactions, arrang arr angeme ements nts,, agreem agreement entss contra ontracts cts and excha exchang nges es and storag stor agee of informati information. on.



 

Carnapping 

 Most of the vehicles were carnapped in parking lots, residential areas and middle class subdivisions. Car theft usually occurred between 2 o'clock and 4 o'clock in the morning due to following reasons: inadequate police poli ce visib visibility ility,, street street par parking king opp opport ortunity unity,, natu natura rall advantage advan tage during nighttime for criminal elements elements,, and lack security inr residential area ar eass.of Tappropriate he hese se veh ehic iclles were ere measures later ei eitthe her sold sold after acquiring falsified documents or dismantled and sold as used parts. Some stolen vehicl vehicles es were for forcibly cibly taken,

usually by OCGs whocrim would after aft er comple completing ting one criminal inaleventually oper operatio ation. n.abandon them  

REPUBLIC ACT No. 6539 



  AN ACT PREVENTING CARNAPPING

AND

PENALIZING



 Section 1. This Act shall be known and may be cited as the "Anti-Carnapping Act of 1972."   Section 2.   Definit Definitio ion n of terms erms..   The terms "carnapping", "motor vehicle", vehicle", "defacing or tampering with", "repainting", "repainting", "body-building", "remodeling", "dismantli tling", and



"overhauling", as used in this Act, shall be understood, respectively,, to mean respectively mea n   "Carnapping "Carnapping"" is the taking, taking, with intent intent to gain, of a motor  vehicle belonging to another without the latter's consent, or by means of violenc violencee against or intimidation of persons,

or by using force upon things.  

Philippine Center for Transnationa ransnationall Crime Crime 

 In res esp ponse to or orga gan niz ized ed cri rimi mina nall acti tivi viti ties es,, the Philippine government has instituted programs and proj pr ojec ectts to add ddrres esss th thes esee threa hreats ts to nati natio ona nall an and d international interest and security. It has created the Phil Ph ilip ippi pine ne Cent enter on Transn ansnat atio iona nall Cr Crim imee (P (PCT CTC) C) (E..O. No.among (E 62 s199 999) 9) to estaagencies blish a for sha shainformation red central database concerned on criminals, methodologies, arrests, and convictions on transnational crime in all its forms. Apart from this,

the Center is mandated to discharge discharge the following: following:  

Philippine Center for Transnationa ransnationall Crime Crime 



  Supervise and control conduct of anti-transnational crim cr imee op oper erat atio ions ns of al alll governm ernmen entt ag agen enci cies es an and d instrumentalities:   Establish a central database on national as well as intternational legislations and ju in jurrisprudence on trecommending ransnational cmeasures rime, wito th strengthen the end responses in view and of  prov pr ovide ide im immed mediat iatee int interv ervent ention ion fo forr the pr prev event ention ion,, detection and apprehension of criminals operating in

thee cou th ount ntry; ry;  

Philippine Center for Transnationa ransnationall Crime Crime 





 Establish a center for strategic research on the structure and dynamics of transnational crime, predict trends and analyze relationships of given given factors for the formulation of  strate str ategie giess to combat ombat the same; same;   Design programs programs and projects aimed at enhancing national capaci cap acityty-bu build ilding ing in combat ombating ing trans transnat nation ional al cri crime, me, as  well supporting the related centers; programs progr ams otheras ASEAN and international cent ers; andand projects of    Expl Explo ore and and coordinat inatee inf inform ormatio ation n exc exchang anges and and training with other government agencies, foreign countries and international organizations involved in containing and

eliminating transnational crime.  

Ex Executive ecutive Order No. 100 s1999 

 To further strengthen the operational, administrative and information support system of the PCTC, E.O. No. 100 s1999 empowered the Center to ex exer ercis cisee ge gener neral al superv supervisi ision on an and d co cont ntrol rol ov over er the fol follo lowi wing: ng:

 

  Loop Center of the National National Action Committ Committee ee on Anti-Hijacking and Terrorism (NACAHT) whose primary mission is to assist and support the NACAHT in integrating and orchestrating the efforts of all law enforcement enforc ement agen agencies cies aga against inst int internation ernational al and dome domestic stic terrorism terrorism;;



 

  Manila Internatio Interna tional nal Criminal Crimi nal reconstituted Polic olicee Org Organiz anizati ation on ICP ICPO-IN TERPOL OLliaison NCBwhich has been to serve as O-INTERP the national office and main coordinating body for international police cooperation against transnational crime;   Police Police Att Attachés achés of the Philippine N National ational P Police olice (P (PNP); NP); and   Political Political Attachés/ Counselors for Security Mat Matters ters of the Department

of the Interio Interiorr and Local Go Gove vernme rnment nt (DIL (DILG) G)

 

“OR “ORGANIZED GANIZED CRIME IN I N THE

PHILIPPINES" 

 Francisc  Fra ncisco o Group Group  which is formerly the  Dragon or the Kuratong Baleleng Group, now led by  Manuel   Manuel Francisco, wi witth 66 memb ember erss armed med wit with ass sso orted type of high powered firearms and operates in the cities of Cagayan De Oro, Pagadian and Dipolog, and othe ot herr ne neig ighb hbor orin ing g ci citi ties es and and mu muni nici cipa pali liti ties es in th thee

Mindanao southern Philippines), Cebu ininVisayas (in Central(in Philippines), and Metro Manila Luzon (in northern Philippines). The group is engaged in robbery/hold-up, carnapping, illegal drugs trafficking,

and smuggling smuggling of rice rice and sugar sugar..  

“OR “ORGANIZED GANIZED CRIME IN I N THE

PHILIPPINES" 

  IT HAD   been been the the mili milita tary ry that that crea creatted the the Kur urat ato ong Baleleng in 1986. The military wanted a vigilante organization that would counter the growing influence of  communist guerillas in the provinces of Misamis Occidental, Occiden tal, Zamboanga del Norte and Zamboanga del Sur, Sur, thee first th first guer gueril illa la fron frontt of the the Comm ommunis unistt Party arty of the the Philippines in Mindanao. Kuratong is actually a traditional bamboo instrument used to call villagers for a meeting or to alert them of the approach of enemies; baleleng means  young  youn g lady, lady, although it is also used as a term of  endearment. The Kuratong Baleleng, or the "darling bell,"

became presence of rebels.a group that would inform soldiers of the presence  

“OR “ORGANIZED GANIZED CRIME IN I N THE

PHILIPPINES" 

  Army Maj. Franco Calanog, who formally organized the Kuratong Bale alelen leng, put the the organizatio tion under the supervision of the Philippine Army's 101st Battalion based in Misamis Occidenta ental. l. Calanog appointed Ongkoy  Parojinog as the "chairman" of the organization. Its first members were militiamen from three urban poor barangays known collectively as Lawis or "sulod  (inside)"  (inside)" in Ozamiz City. But they were said to have done double duty  as Kuratong and as protector of Ongkoy's illegal activities,  which reportedly reportedly included robberies in the provinces provinces of  Siquijor and Misamis Occidental. Ongkoy, however, was

also for his generosity and was dubbed the "Robin Hoodknown of Lawis."  

“OR “ORGANIZED GANIZED CRIME IN I N THE

PHILIPPINES" 

 Pentagon Group hea  headed ded by T Tahir ahir Alonto with around 168 armed members, engaged primarily in KFR and operates in Mindanao. This group is a creation of the Moro Islamic Liberation Front (MILF). It was organized not only to generate funds for the latter through illegal means but also insulate the MILF from

accusations that its members are involved in purely  criminal acts. Its leader, Tahir Alonto is the former planning and operations office of the BIAF and the nephew of MILF's Chairman Al Haj Murad. Relatedly,

there are aree listed as members membe rsother of themembers MILF MILF.. of the group who ar  

“OR “ORGANIZED GANIZED CRIME IN I N THE

PHILIPPINES" 

 PENTAGON GR  PENTAGON GROUPOUP- Kurato Tapuyak alias “Anton” no. 2 in the group.

 

“OR “ORGANIZED GANIZED CRIME IN I N THE

PHILIPPINES" 



  Lex Lexus us Gr Group oup   , a carnapping group with around 37 members operating in NCR, and Regions 3 and 4, all in Luzon.

with 30 members   Rex   “Wacky”    Sa Salud Group   wi operating in Cebu, engaged in illegal gambling and the  Vicviv Yu Group   wit with h 16 membe emberrs oper operaati ting ng in Centr Cen tral al Visayas Visayas and al also so engaged engaged in illegal gam gambling bling..

 

Robbery/hold-up 

 As of October 2003, there are 45 bank robbery  incidents recorded nationwide, or one (1) incident per  week, with the perpetrators perpetrators carting a tota totall loot of  around PhP44.8 million. Compared to similar period in 2002, bank robbery inciden entts increased by 13 percent. Metro Manila or NCR registered the highest  with 20 rec recorded orded incidents. Opera Operations tions con conducted ducted against these groups resulted in the arrest of 18 persons, to include 12 members of the Kuratong Baleleng Group who were responsible in the series of 

bank robberies in Metro Manila.  

Robbery/hold-up 

 Bank robbery groups are considered as the most organized among the crime groups. They are usually composed of hardened criminals and/or personalities of tested daring capabilities. Members are trained to follow and executed min minute ute details of a w well-plan ell-planned ned operation. Usually Usually, , all m members embers are heavily armed and ready to forcibly douse any opposition.

 

Robbery/hold-up 

 The robbery group initially places the target bank under a thorough casing and surveillance, week or even months in advance. The peak and leanexpected hours in resistance; the bank; the time of  relief of security personnel; individual characteristic, traits and weaknesses of every personnel; estimated cash in teller's booth and inside the safe; and detailed sketch of the whole bank premises are observed



observ and observes studied. es the time In case and of route rouarmored te of mo move vements vans, ments the of group the vehicle vehicle. closely  .  Usually, the bank robbers stage the heist wearing bonnets and an d usua usuall llyy util utiliz izee Asia Asian n util utilit ityy vehic ehicle less duri during ng thei theirr operation. The group in most cases uses two sets of 

 vehicles  vehicles, one on their way wa tocle. the anothe ano therr,will wil l bebeing used as aused s the their ir get-awa et-a way y vyehicle ehi . bank while  

Interpol Role is OC 

 Interpol acts as a central repository for professional and te techn chnica icall exper expertise tise on tr trans ansnat nation ional al organ organiz ized ed crime and as a clea earringhouse for the collec ecttion, collation, analysis and dissemination of information relating to organized crime and criminal organizations. monitors situation on Ita also glob al basistheanorganized d co-ordicrime nates international investigations.

 

Interpol 



   

 INTERPOL currently has projects targeting org or gan aniz ized ed/s /sp pec eciial aliz ized ed cr crim imee in fi fivve area eass of high igh activity:  Pr Proje oject ct Mil Millen lenniu nium m   –   targ target etin ing g Eu Eurras asia ian n cr crim imin inal al organizations  Project A AOC OC – targeting Asian criminal organizations  Project Scream – tar  targeting geting serial murd murders ers and rapists rapists  Project Bada – targeting maritime piracy    Project Pink Panthers - Armed Jewellery Robberies

commit co mmitted ted by na nation tionals als of former former Yug ugosla oslavia via  

ASEAN Plan Of Action To Combat Transnationa ransnationall Crime Crime 

  The general objective objective of the Action Plan is to encou encourag ragee ASEAN Mem emb ber Count ntri ries es to expa expand nd their heir eff ffo orts in comba mbati ting ng transnational atpou the to reg egio iona nall level evel..crime As espo es used senational d in th theeand ASEA ASbilateral EAN N Decl eclevels lar arat atio ion n the on Transnational Crime, the overall focus of ASEAN collaboration  will be to strengthen regional commitment commitment and capacity to comba ombatt tran transn snat atio iona nall cr crim imes es wh whic ich h in incl clud udee terr terror oris ism, m, drug drug trafficking, money laundering, in persons and arms piracy.smuggling, This is in recognition of the facttrafficking that tackling transnational crime requires a concerted regional effort in view of it itss glob global al dime dimens nsio ion n an and d pe perv rvas asiv ivee na natu ture re.. Besi Beside des, s, such such efforts will assist in complementing and contributing to the

national and bilateral efforts undertaken by Member Countries in combating such crime.

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF