Drime Detection and Investigation (15%)
Drime Detection and Investigation (15%)
MODULE 4:
DRIME DETECTION AND INVESTIGATION (15%)
ORGANIZED CRIME INVESTIGATION
7. The Illegal Drug business – this is one major 1. Money laundering proper
source of funds for organized crime groups 2. Facilitation
8. Labor Racketeering – it is the use of union power 3. Failure to report
for personal profit and its heart relies on fear 4. Failure to keep records
9. Business Racketeering - `is the act of operating an 5. Malicious reporting
illegal business or scheme in order to make profit by 6. Breach of confidentiality
a structured group
10. Money Laundering – is the practice of disguising Freezing of Monetary Instrument or Property
illegally obtained funds so that they may seem legal Upon verified petition by the AMLC and after
determination that probable cause exists that any
Steps of Money Laundering monetary instrument or property is in any way related to
an unlawful activity, will be issued a freeze order to be
1. Placement – (also called immersion )is the physical issued by Court of Appeals, which shall be effective
disposal of the money by moving funds from direct immediately.
association with crime and putting them into the "Money laundering is also committed by any covered
financial system, usually through person who, knowing that a covered or suspicious
transaction is required under this Act to be reported to the
Smurfing (moving small amounts at times to Anti-Money Laundering Council (AMLC), fails to do so."
avoid suspicion). It involves bank complicity, the (RA 10365)
mixing of licit with illicit funds, cash purchases and ANTI MONEY LAUNDERING COUNCIL
the smuggling of currency to safe havens. 1. The GOVERNOR of the BSP (Bangko Sentral ng
Pilipinas)
2. Layering – is (also called heavy soaping) the 2. The CHAIRPERSON of the SEC (Security and
process of disguising the trail to foil pursuit. It involves Exchange Commission)
the creation of false paper trail, conversion of cash into 3. The COMMISSIONER of the Insurance
monetary instruments and the conversion of tangible Commission
assets obtained by means of cash purchases. 11. Cyber Crime - Any offense that is committed by a
Electronic processes is the most cost-effective computer, computer system or computer network.
layering method. They offer the criminal speed,
distance, minimal audit trail and virtual anonymity amid RA 10175 - Anti Cyber Crime Law of 2012
the enormous daily volume of electronic transfer, all at ✓ Republic Act No. 8792 or the E-commerce Law
minimal cost. was signed into law which punishes certain crimes
3. Integration – (also called spin dry) the money is such as computer hacking and intrusion of viruses
again available to the criminal with its occupational and worms to computer networks.
and geographical origin hidden. Because the money is ✓ R.A. 8484 - Access Device Regulation Act of 1998.
often repatriated in the form of clean, often taxable o Access Device - Is any card, plate, code,
income. It is achieved by means of real estate account number, electronic serial number,
transactions, front companies and sham loans, foreign personal identification number or other
means of account access that can be used 6. Cyber Stalking - the criminal follows the victim by
to obtain money, goods, services. sending emails, and frequently entering the chat
✓ CYBER SEX - Is a sexual activity of arousal rooms that causes an intentional, substantial and
through communication using the computer. unreasonable intrusion into the private life of the
Cybersex-for-pay employs the Internet and utilizes person.
computer cameras and microphones that allows 7. Cyber Defamation/ Libel - The use of the computer
client to see and talk to girls doing the role play for system to make false statements against a person
them thereby injuring his reputation
o According to CIDG, the cybersex “hot spots” 8. Cyber Terrorism - It is the premeditated use of
here in the Philippines (2014) are the disruptive activities, or the threat thereof, in cyber
following? space, with the intention to further social, ideological,
1. Angeles Pampanga religious, political or similar objectives, or to intimidate
2. San Fernando Pampanga any person in furtherance of such objectives.
3. Las Pinas
4. Davao Terrorism
R.A. 8293 - the Intellectual Property Code of the It is a threat or actual use of force or violence for
Philippines that tries to protect patents, industrial design, political or other purpose, to foster fear, insecurity, distrust
trademarks and copyright and unrest among the people
The commission of crimes (rebellion, murder,
Patent - is the statutory grant, by government, which kidnapping, hijacking etc.) that sow or create a condition of
confers to an INVENTOR to exclude others from making, widespread and extraordinary fear and panic among
using, selling or importing the invention within the territory the populace in order to coerce the government to give
of the country that granted the patent for 17 years. in to an unlawful demand. (R.A. 9372 or the H.S.A.)
✓ To inflict MASSIVE FEAR is the main purpose of
Reasons of the Vulnerability of Computers terrorism
1. Capacity to store data in a relatively small space RA 10168 - The Terrorism Financing, Prevention and
2. Easy to access Suppression Act of 2012
3. Loss of evidence GENERIC TYPES OF TERRORISM
1. DOMESTIC TERRORISM - Involves persons or
Onel De Guzman groups committing a terrorist act/s in their own country.
✓ Had made the “I LOVE YOU VIRUS” 2. INTERNATIONAL TERRORISM - Involves citizens or
✓ It originates in the country May 4, 2000 and the territory of more than one country.
spread itself around the world in one day from 3. RELIGIOUS TERRORISM - Terror in the Mind of
Hongkong to Europe to United States. Like other God”. Terrorizing for religious purpose
corporations, the Pentagon, CIA and British 4. SEPARATIST - Separation from existing entities
Parliament had to shut down their mail systems 5. ETHNOCENTRIC - Seeing their race as the defining
characteristic of society
Manners of Committing Cyber Crimes 6. NATIONALISTIC - Creation of a nation or splitting
away from existing state
1. Hacking - Unauthorized access into or interference in 7. REVOLUTIONARY - Overthrow an established order
a computer system in order to corrupt, alter, steal, or replacing it with new structure
destroy using a computer or other similar information 8. POLITICAL - Opposing the existing political structure
and communication devices. 9. SOCIAL - Aka SINGLE ISSUE/ SPECIAL INTEREST
2. Denial of Service Attack - The bandwidth of the Terrorism
victim’s network is flooded or his e-mail box is filled
with spam mail depriving him of the services he is KNOWN TERRORIST GROUPS
entitled to access or provide
3. Virus Dissemination - This is usually done by means 1. AL-QAEDA
of a malicious code or software. – Founded in 1988 by OSAMA BIN LADEN
4. Web Defacement - This is the act of the intruder into – Ideology: JIHADISM
a server and changing without permission all the – Home base: No home base
aspect of a website which the public can see
5. Phishing - a form of identity theft in which scammers NOTABLE ATTACKS
send mass emails posing as banks, credit card – August 1988, Attack on US Embassies in
companies, popular commercial web sites, asking the Nairobi, Kenya, Dar es Salaam, Tanzania
recipients to confirm or update financial information in – October 2000, Bombing of USS Cole, at Coast
a hyperlink in order to appear like it came from the of Yemen
original website
– 9/11 SUICIDE ATTACK on the World Trade – Led by: AMERIL UMBRA KATO
Center and Pentagon – Rejected the Framework Agreement on
Bangsamoro, goal is Bangsamoro Independence
OSAMA BIN LADEN
– Killed on May 2, 2011 4. ASG (Abu Sayyaf Group)
– OPERATION NEPTUNE SPEAR – Also known as al-Harakat al-Islamiyya
– In English “Bearer of the Sword”
AYMAN MOHAMMED RABIE al-ZAWAHIRI – Founder: Abdurajik Abubakar Janjalani
– An Egyptian physician and theologian – Current Leader: Khadaffy Janjalani
– Current Leader of Al Qaeda
5. Fake MNLF aka 15EC
2. Jemaah Islamiya – 3rd Separatist of MNLF, 2001
– Founded: 1933 – Call themselves as MNLF Central Committee/
– Aliases: “Islamic Congregation”, “Islamic MNLF Executive Council
Community”, or “Islamic Group”
– Base: Indonesia, Malaysia, Philippines, Singapore 6. CPP-NPA-NDF (New People’s Army)
– Ideology: Create an Islamic State across – Combat arm of CPP that was formed on March 29,
Southeast Asia 1969 by JOSE MARIA SISON
– Aim: Overthrowing Philippine Government
NOTABLE ATTACKS through guerilla warfare
– October 2002: triple bombing in Bali – Opposes to US Military Forces in the Philippines
– August 2003: J.W. Marriott Hotel, Jakarta
Indonesia SEPARATIST GROUPS OF NPA
– September 2004: Australia Embassy bombing in
Jakarta 1. Alex Boncayao Brigade (ABB)
2. Cordillera People’s Liberation Army (CPLA)
3. Hezbollah 3. Rebolusyonaryong Hukbong Bayan (MLPP-RHB)
– The Party of God
– A Shi’a Islamic Militant Group 7. RSM (RAJAH SOLAIMAN MOVEMENT)
– Base: Lebanon – Founded by: AHMED SANTOS (aka HILARION
– Ideology: Shi’a Radicalism DEL ROSARIO) in Jan 2002
– Its membership consists of Filipino Christians who
4. HAMAS have converted to Islam and it is now one of the
– Means Enthusiasm major conflicts in the Philippines.
– Acronym for: Ḥarakat al-Muqāwamah al- – “Balik Islam Movement”
ʾIslāmiyyah
– A Palestinian Sunni Islamic or Islamist Political GOVERNMENT’S RESPONSE TO TRANSNATIONAL
Party that governs Gaza Strip CRIME
– According to George W. Bush: “Hamas is an 1. The Philippine Center for Transnational Crime -
extremist group… it is one of the deadliest terrorist The PCTC was established under EO 62 on January
organizations in the world today.” 15, 1999 and was supplemented by EO 100 in May,
1999. Generally, the PCTC was created to address the
TERRORIST GROUPS IN THE PHILIPPINES global threat to national and international security; and
1. MNLF (Moro National Liberation Front) specifically to strengthen the operational,
– Founded by: Nur Misuari administrative and information support system
– Ideology: Egalitarianism, Independence of especially for law enforcement agencies in combating
Bangsamoro Land transnational crime.
-End-