Vision:: PLT COLLEGE, INC 2018-2019

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 54

PLT COLLEGE, INC.

Bayombong, Nueva Vizcaya


Tel. Nos. (078) 805-3682
Website: www.pltcollege.edu.ph
E-mail Address: [email protected]

COLLEGE OF CRIMINAL JUSTICE EDUCATION

VISION:
PLT College, Inc.: An Icon in Humane Education.

MISSION:
We dedicate ourselves to develop humane individuals who are professionally
competent, socially responsible, and God-centered.

GENERAL OBJECTIVES:
We strive to:
1. Lead and develop humane individuals and communities;
2. Initiate innovations and technological advancement;
3. Pursue academic excellence and global standardization;
4. Strengthen instruction, research, extension, and production; and
5. Work continuously on quality education and community service.

WHAT IS ORGANIZED CRIME?

PLT COLLEGE, INC 2018-2019


Page 1
 A non-ideological enterprise involving a number of persons in close social
interaction, organized on a hierarchical basis, with at least three levels/ranks, for
the purpose of securing profit and power by engaging in illegal and legal activities.
(Abadinsky, 1990: 6)

 Are American inventions that have been superimposed on a heterogeneous


European crime landscape. It becomes a criminal activity by an enduring structure
or organization developed and devoted primarily to the pursuit of profits through
illegal means. It sometimes referred to as MOB, MAFIA, “syndicate” or the COSA
NOSTRA, and others from different parts of the world which are known as the
enemy within, the 2nd government, the 5th state or the crime confederation.
(Garcia, 2009)

 The term Cosa Nostra (literally means one thing) or mafia is used to signify
organized crimes and one of the varieties, names for either mob or syndicate. A
strict code of conduct governs their behavior called the Omerta, which is the
mafia’s code of secrecy, and informal, unwritten code of organized crime, which
demand silence and loyalty, among other thing, of family members (Abandinsky
(1991) as cited by Manwong).

 Refers to those self-perpetuating, structured and disciplined associations of


individuals or groups, combined together for the purpose of obtaining monetary
or commercial gains or profits, wholly or in part by illegal means, while protecting
their activities through a pattern of graft and corruption. (U.S. Comptroller
General, 1981: 10)

 Widespread criminal activities, such as prostitution, interstate theft, or illegal


gambling, that occur within centrally controlled formal structure.
 The people and the groups involved in such criminal activities. (The American
Heritage Dictionary of the English Language, Third Edition, Boston/New
York/London 1992).

 Organized crime as any group having some manner of a formalized structure


and whose primary objective is to obtain money through illegal activities. Such
groups maintain their position through the use of actual or threatened violence,
corrupt public officials, graft, or extortion, and generally have a significant impact
on the people in their locales, region, or the country as a whole. (FBI website -
last viewed 20100202)

Definitions of organized crime by international agencies and institutions

Council of Europe

 The illegal activities carried out by structured groups of three or more persons
existing for a prolonged period of time and having the aim of committing serious
crimes through concerted action by using intimidation, violence, corruption or other
PLT COLLEGE, INC 2018-2019
Page 2
means in order to obtain, directly or indirectly, a financial or other material benefit.
(Council of Europe, 2002, 6)

Interpol

 Any group having a corporate structure whose primary objective is to obtain


money through illegal activities, often surviving on fear and corruption. (Paul
Nesbitt, Head of Organized Crime Group, cit. in Bresler 1993, 319)

United Nations

 "Organized crime" is understood to be the large-scale and complex criminal


activity carried on by groups of persons, however loosely or tightly organized, for
the enrichment of those participating and at the expense of the community and its
members. It is frequently accomplished through ruthless disregard of any law,
including offences against the person, and frequently in connection with political
corruption. (United Nations 1975, 8)

Encyclopaedia Britannica

 Complex of highly centralized enterprises set up for the purpose of engaging in


illegal activities. (The New Encyclopaedia Britannica 1986, Vol. 8, 994)

Encyclopedia of Crime and Punishment

 Organized Crime can be broadly defined as two or more persons conspiring


together on a continuous and secretive basis, with the aim of committing one or
more serious crimes to obtain, directly or indirectly, a financial or other material
benefit. (Schneider, 2002: 1112)

Whatever be the name, the organization is known to be formal, with


division of labor, with coordination of activities through rules and codes and with allocation
of task in order to achieve legitimate goals. The organization seeks profit from crimes and
try to prevent itself from threats, prosecution, and even punishment from legal authorities.
The organized Crime group may be characterized as persons of decent character, with
formal education, having its own social classes from gangsterism to racketeering.

Characteristics of Organized Crime group

1. It is a conspiracy activity involving the coordination of members.


2. Economic gain is the primary goal
3. Economic goal is achieved through illegal means.
4. Employs predatory tactics such as intimidation, violence and corruption
5. Effective control over members, associates, and victims
6. Organized crime does not include terrorist dedicated to political change.

PLT COLLEGE, INC 2018-2019


Page 3
The attributes of Organized Crime are:
1. It is hierarchical
2. It is monopolistic
3. It perpetuates itself
4. It has no political goal
5.It constitutes a unique culture
6. It has limited and exclusive membership
7. It is governed by explicit rules and regulations.
8.It demonstrates specialization/ division of labor.
9. It exhibits a willingness to use illegal violence and bribery

How the Organized Crime Group Works:

1. An Enforcer – one who make arrangements for killing and injuring (physically,
economically. Psychologically) the members or non-members.

2. A corrupter – One who bribes, buys, intimidates, threatens, negotiates, and “sweet
talks” into a relationship with the police, public officials or anybody else who
can help the members security and maintain immunity from arrest,
prosecution and punishment.

3. A corruptee – a public official, usually not a member of the organization family, who
can wield influence on behalf of the organization’s interest.

Generic Types of Organized Crime

1. Political Graft
 Manned by political criminals who used forced or violence of means to obtain
profit or gain.
2. Mercenary/Predatory Organized Crime
 Committed by groups for direct personal profit but prey upon unwilling
victims.
3. In-Group Oriented Organized Crime
 Group manned by semi-organized individual whose major goals are for
psychological gratification such as adolescent gangs.
4. Syndicated Crimes
 The organization that participates in illicit activity in society by the use of
force, threat or intimidation.
 The group with a formal structure, whose purpose is to provide illicit services,
which are in strong public demands through the use of secrecy on the parts
of the associates.
 There is assurance of protection necessary for its operations through political
corruption or avoidance of prosecution.

Note: Essential components of organized crime are professional criminals to


successfully operate in the organization.

Criminological Types of Organized Crimes

PLT COLLEGE, INC 2018-2019


Page 4
1. Traditional crime syndicates
2. Non-traditional crime syndicates
3. Semi-organized crimes
4. Local police controlled organized crime

PROBLEMS CAUSED BY ORGANIZED CRIME

1. Uncollected Revenues
2. Citizens are victims
3. Increased cost of law enforcement
4. Threat to legitimate business

The Organized Crime Activities:


1. Alcohol and tobacco smuggling
2. Arms trafficking
3. Corruption (bribery)
4. Counterfeiting
5. Drug trafficking
6. Extortion
7. Fraud
8. Gambling
9. Labor racketeering
10. Loan sharking
11. Theft, robbery, hi-jacking, and home invasion
12. Sex slave and children for sex
13. Smuggling of human and human parts
14. Violence (assassination, “hits”, dirty deeds

PLT COLLEGE, INC 2018-2019


Page 5
SPECIALTIES OF ORGANIZED CRIME

1. Provider of illicit services


2. Provider of illicit goods
3. Conspiracy
4. Penetration of legitimate business
5. Extortion
6. Corruption

Rationale why Organize Crime aligned with legitimate business

1. Collaborative business investment


2. Concealment opportunities for illicit activities
3. Sources of reportable legitimate income
4. Provider of money laundering resources
5. Gives the appearance of legitimacy

Benefits of Legitimate business from organized crime


1. The OC’s ability to harass business competitors
2. Extra income for joint income ventures
3. Opportunities for collaborating with management to control labor
unions

Types of Connection between Organized Crime and Illegal business

1. Parasitic

OC members will extort money from entrepreneurs through threat or


violence.

2. Reciprocal

OC extorts money but provides services.

3. Entrepreneurship

OC provides illegal goods and services.

THEORIES OF ORGANIZED CRIME

1. Deterrence Theory
a. General deterrence theory
Crimes can be thwarted by the threat of punishment, like capital
punishment.
b. Specific deterrence theory
The penalty should be sufficiently severe to discourage second time
offenders knowing that the gain is not worth the punishment.
PLT COLLEGE, INC 2018-2019
Page 6
2. Cultural Deviance Theory
Slum dwellers violate the law because they belong to a unique
subculture in conflict with the upper class values and norms in
which criminal law is based. Social status and wealth is attained
through some people through some attractive alternatives.
3. Alien Conspiracy Theory
Seeks to blame outsiders and outside influence for the prevalence
of organized crime.
4. Rationale Choice Theory
This is the pain and pleasure principle; a certain person weighs the
benefits and consequences of his actions so if the pain of
punishment outweighs the expected pleasure or reward, then he
will not commit the crime because the risk is not worth the benefits.
5. Differential Association Theory
 Advocated by Edwin Sutherland.
Theorized that criminal behavior is learned though social
interactions.
 It is a process theory because it detailed the experiences of a person
must go through in order to become a delinquent.
6. The Anti-social Personality Theory
 Criminals have no feeling of guilt and shame after the commission of the
crime.
7. Enterprise Theory
 The OCG (Organized Crime group) provides the needs of some people as
these goods and services are not available or cannot found in market.
8. Anomie Theory
 Advocated by Emil Durkheim
 He believed that crime is normal and functional
a. Crime is Normal
 Crime is nothing more than a consequence of the creation and
application of norms. It is because some behavior is wrong that
other behavior is right. That is the reason why crime is said to
be normal.
b. Crime is Functional
 Because it is the basis for social change. Crime often points out
to the social group, those elements, processes, or arrangements
that may need to be changed.

MODELS OF ORGANIZED CRIME


1. Bureaucratic or Corporate Model
a. A complicated hierarchy
b. There is extensive division of labor
c. Position and recruitment is based on skill
d. Responsibilities are carried out impersonally
e. Extensive rules and regulations

PLT COLLEGE, INC 2018-2019


Page 7
f. Written communications down the hierarchy

2. Presidential Commission on Organized Crime Model


a. Continuity
b. Structure
c. Membership
d. Criminality
e. Violence
f. Power
g. Profit

3. Albini’s Patron-Client Model


a. A close network is hard for the police to penetrate
b. Opportunities for criminal activities are initiated by low-ranked members.
c. Service and protection
d. May hire the expertise of some criminals
e. Immediately adjust if a leader is incapable

4. Chambliss Organized Crime Network Model


a. OC cannot operate without the direct complicity and connivance of
political machinery.
b. OC is an important source of political corruption
c. OC provides illegal goods and services to the public.

5. Smith’s Enterprise Model


 The law of supply and demand.

6. Ianni’s Enterprise Model


 Kinship or social network

7. Nontraditional Organized Crime


a. Vertical integration
b. Alternative sources of supply
c. Exploitation of social and political conditions
d. Insulation of leaders in the distribution of network

HISTORICAL TYPES OF TRANSNATIONAL CRIMES

1. Slavery
 The submission to a dominating influence or the state of person who is a
chattel of another.
 Related terms & topics:
Slave

PLT COLLEGE, INC 2018-2019


Page 8
 Refers to a person who is a chattel of another.
White slavery
 Engagement in the business for profit, or enlistment of services
of any other person for the purpose of prostitution.
Spain
 The first European power to give permission to transfer slaves
under King Ferdinand.
President Thomas Jefferson
 Signed a law for prohibition of importation of slaves in March
1807 and went enforced in 1808.

2. Piracy
Refers to robbery in the high seas and or the unauthorized use of
another’s production, invention or conception especially in infringement
of a copy right.

3. Smuggling of opium and other drugs


Related term:
Smuggling
 The act of conveying or introducing surreptitiously or to import
or export secretly contrary to law and especially without paying
duties imposed by law.

MODERN TYPES OF TRANSNATIONAL CRIMES

1. Terrorism
2. Illicit Trafficking
3. Computer crimes
4. Trans-chemical Environmental crimes
5. Drug Trafficking

SOME ASIAN AND ORGANIZED CRIME GROUPS (Garcia, 2009)

1. 2 forms of Organized Crime Group in China

PLT COLLEGE, INC 2018-2019


Page 9
A. Gangs (Triads) – work in cooperative ventures involving black market
activities, large burglaries, thefts, and highjackings. Other activities
include extortion of small business.
B. Criminal Syndicates – commonly involved in more sophisticated crimes
such as prostitution, illegal immigration, slavery and other organized
forms of vices.
2. Hongkong
A. Wo Sing Wo
 The triad with longest tradition in Hong Kong.
B. 14 K gang
 It is the second largest Triad group in the world with around 20,000
members split into thirty subgroups.
 Formed by Kuomintang Lieutenant-General Kot Siu-wong in
Guangzhou
C. Sun Yee On, or New Righteousness and Peace Commercial and Industrial
Guild,
One of the leading triads in Hong Kong and mainland China, with
the most members – more than 55,000 – worldwide.
Founded by Heung Chin, originally from Chiu Chow, in 1919
D. Shui Fong
Also known as the Wo on Lok, is one of the main Triad groups in
Southern China, operating especially in Hong Kong and Macau.

3. Japan
A. Gokudō /Boryokudan/ Ya –ku-za- 893 means useless or no points
-Most influential organized crime group in Japan.
-The Japanese police, and media by request of the police, call them
bōryokudan or "violence group"), while the yakuza call
themselves "ninkyō dantai" or "chivalrous organizations").
-Some of its activity are; exploitation of women, prostitution (Supply
comes most from the Philippines, Thailand and Taiwan) who are
imported as entertainers.

RITUALS:
a. Yubitsume
 The cutting of one's finger is a form of penance or
apology. Upon a first offense, the transgressor must cut
off the tip of his left little finger and give the severed
portion to his boss.
b. Irezumi
 Full-body tattoos of yakuza member including their
genitalia.

THREE PRINCIPAL FAMILIES:


 Yamaguchi-gumi
 The biggest yakuza family, accounting for 50% of all yakuza in
Japan, with more than 55,000 members divided into 850 clans.
 Based: Hyogo
 Sumiyoshi-rengo/Sumiyoshi-kai
PLT COLLEGE, INC 2018-2019
Page 10
 The second largest yakuza family, with 20,000 members divided
into 277 clans.
 It is sometimes called, is a confederation of smaller yakuza groups.
 Based: Tokyo
 Inagawa-kaï
 The third largest yakuza family in Japan, with roughly 15,000
members divided into 313 clans.
 Based: Tokyo.

4. Cambodia
 Chinese and Myanmorese is the major controller of organized
transnational activities.
5. Republic of Korea
 Kendal Emening Scarups
 Although not considered as criminal groups, they also engage in
criminal activities and intervene in violence, in some way to help
the weak and the poor.
6. Myanmar
 A country led by a military Junta, which exploits its citizen to force
labor.
 A country which produce and supply at least 68% of illicit drugs
around the globe.
 These activities are controlled by armies, now considered as the
largest organized crime groups in the world.
United Wa State Army
 Under the command of Wei-Hsueh-Kong
Konkang Chinese
 Protects cultivation and refining of drugs.
Myanmar National democratic Alliance Army
 Control the plantations and refine of opium into Heroin and also
produce methamphetamine.
7. Vietnam
 Rank as top 26 drug producing and trafficking countries in the
world.
 Nam Cam Gang
 Involves in corruption of public officials and the police.
8. Taiwan
 Have direct connections with Bamboo Union Gangs.
 It has a relationship with the triad groups in China and
Hong Kong with primary crime activities into drug
trafficking, prostitution, child and woman smuggling.

9. Philippines
 Considered the “heaven for sex industry” organized criminal
groups virtually control every aspect of the commerce in women
and child trafficking.
 Thousands of women are sent to Japan, Thailand and other
countries as entertainers and most end up as prostitutes.

PLT COLLEGE, INC 2018-2019


Page 11
 Also major provider of for young children to pedophiles on the so-
called sex tours.
 Kuratong Baleleng
 An organized crime syndicate in the Philippines that once was an
anti-communist vigilante group.
 11 members of Kuratong Baleleng were killed by the Presidential
Anti-Crime Commission, led by Panfilo Lacson.
 Akyat Bahay Gang
 The Akyat Bahay Gang is known as a violent home invasion-
oriented gang which also has a history with drug dealing.
 Bahala Na Gang
 The Bahala Na Gang ("Come What May") is one of the most
notorious of Filipino Gangs; they were established among inmates
in the notorious jails of the Philippines in the early 1940s and
eventually spread its operations throughout the globe. The gang is
known to have chapters in North and Latin America as well as
Europe alongside their Philippine presence.
 A tattoo of a Question Mark (?) located on any part of the body is a
mark of the infamous Filipino gang. The Bahala Gang, despite
rumours that the gang is "dying" out, mainly due to the majority of
its leaders being in jail, still has a presence in the Philippines and
primarily in the United States.
 Sigue Sigue Comando Gang
 One of the largest Gangs in the Philippines. The Gang has
thousands of members spread around the Philippine Islands, the
gang is involved with home invasion, kidnapping and torture,
extortion, arson, auto theft, robberies, sales of illegal narcotics,
battery assault, shootings and numerous known & unknown
homicides

 Bacolod Underground Crips


 A type of gang that has been known for its number of vandals in
the city of Bacolod, Negros Occidental. The gang is involved with
shootings and mostly vandalism. The gang is widely spread in the
city of Bacolod and is not involved with other gang wars except
their own.
 The gang is said to have connected with True Brown Style 13 and
other Crip gangs in Bacolod City
10. Thailand
 Considered the most notorious in the world in terms of industry,
importing at least 1 million women from China, Laos and Vietnam.
 Chao pho or jao poh
 Literally means “godfather.” Chao pho are mostly of Han ethnicity
based in the provinces that have business interests in both
legitimate and criminal activities.
 Red Wa
 Local organized crime in Thailand is largely controlled by people of
Han Chinese ethnicity.
 The most powerful organized crime gang in Thailand

PLT COLLEGE, INC 2018-2019


Page 12
ORGANIZED CRIME IN EUROPE

 Sicilian Mafia
 Regarded as the archetype of organized c rime and has been
subject of controversy.
 Based in Sicily Italy.
 Ndrangheta
 A criminal organization in Italy centered in Calabria.
 The most-powerful crime syndicate of Italy in the late 1990s and
early 2000s.
 Camorra
 A Mafia-type of criminal organization, or secret society, that
originated in the region of Campania and its capital Naples in Italy.
It is one of the oldest and largest criminal organizations in Italy,
dating back to the 18th century.
 Sacra Corona Unita (SCU) or United Sacred Crown
 A Mafia-like criminal organization from Apulia (in Italian Puglia)
region in Southern Italy, and is especially active in the areas of
Brindisi, Lecce and Taranto
 The Russian Mafia and the Vory V. Zakone (thieves in law)
 Counterpart of Sicilian Mafia, it is linked to a territoriality based
provision of protection services and to alliance between upper-
world and under world in Russia.
 Corrupt government officials
 Shady business tycoons, so called Oligarch, and
 Members of criminal gangs headed by so called
authorities and loosely tied to each other through a
criminal fraternity known as “Thieves in Law”
 Pink Panthers
 The name given by Interpol to an international jewel thief network,
named after The Pink Panther series of crime comedy films, which
is responsible for some of the most audacious thefts in criminal
history.
 They are responsible for what have been termed some of the most
glamorous heists ever, and one criminologist even described their
crimes as "artistry".

ORGANIZED CRIME IN NORTH AMERICA

1. La Cosa Nostra
Known as the MAFIA, the MOB, and collection of Italian American
Organized Crime “families”.

FIVE prominent LCN families


 Bananno
 First Boss: Joseph "Joe Banannas" Bonanno
 Primary Activities: Involved in narcotics trafficking, home
video pornography, loan sharking, gambling, phony
telemarketing schemes, pizza parlors and espresso cafes.
 Colombo

PLT COLLEGE, INC 2018-2019


Page 13
First Boss: Joseph Profaci “the snake”
Primary Activities: Narcotics, gambling, loan sharking,
cigarette smuggling, pornography, counterfeiting,
hijacking, fraud, stock fraud.
 Genovese
 First Boss: Charles "Lucky" Luciano
 Primary Activities: The most powerful and wealthy crime
Family in the New York area, and perhaps the entire
country. The Genovese Family maintains major muscle in
narcotics, loan-sharking, and extortion rackets,
pornography, labor union racketeering, waste hauling
industry, restaurants, seafood distribution and vending
machines. They are the most secretive, and well led, LCN
Family in the New York region.
 Gambino
 First Boss: Vincent Mangano,
 Great boss of LCN: Carlo Gambino
 Primary Activities: Narcotics trafficking, loan sharking,
gambling, extortion, car theft, union corruption,
construction, internet fraud, waste hauling industry.
 Lucchese
 First Boss: Tom Gagliano, followed by Gaetano "Tommy
Brown" Lucchese
 Primary Activities: Narcotics, gambling, loan sharking,
waste management, construction and extortion.
2. Five Points Gang
 A 19th-century and early 20th-century criminal organization, primarily
of Italian-American origins, based in the Sixth Ward (The Five Points) of
Manhattan, New York City. Since the early 19th century, the area was
first known for gangs of Irish immigrants.

First boss: Paul Kelly, born as Paolo Antonio Vaccarelli

An Italian American who founded the Five Points Gang, one of


the dominant street gangs in the first two decades of the twentieth
century. Over the years, Kelly recruited youths who later became
prominent criminals, such as Johnny Torrio, Al Capone and Lucky
Luciano.

CANADIAN ORGANIZED CRIME

1. Asian Groups
2. East European Groups
3. Italian Groups
4. Outlaw Motorcycle Gangs
 Hells Angels Motorcycle Club (HAMC)
 In the United States and Canada, the Hells Angels are
incorporated as the Hells Angels Motorcycle Corporation.
Common nicknames for the club are the "H.A.", "Red & White",

PLT COLLEGE, INC 2018-2019


Page 14
and "81" (H and A being the eighth and first letters of the
alphabet

STRUCTURES OF ORGANIZED CRIME GROUP

STRUCTURE: 1. YAKUZA/GOKUDO/BORYUKUDAN

STRUCTURE: 2. CHINESE TRIAD

489

438- 438-Deputy 438 –


Vanguard Mountain Incense
master Master

415- White 426 - 432 – Straw


paper fan Enforcer sandal

49 – 49ers Blue
lanterns
 Triads use numeric codes to distinguish between ranks and positions
within the gang; the numbers are inspired by Chinese numerology
based on the I Ching.
 "489" refers to the "Mountain" or "Dragon" Master (or 'Dragon Head'),
PLT COLLEGE, INC 2018-2019
Page 15
 438 is used for the "Deputy Mountain Master",
 "432" indicate "Grass Slipper" rank and the Mountain Master's proxy,
"Incense Master", who oversees inductions into the Triad, and
"Vanguard", who assists the Incense Master.
 "426" refers to a "military commander", also known as a "Red Pole",
overseeing defensive and offensive operations,
 "49" denotes the position of "soldier" or rank-and-file member.
 415 "White Paper Fan" provides financial and business advice,
 (432) "Straw Sandal" functions as a liaison between different units.
 "25" refers to an undercover law enforcement agent or spy from
another triad, and has become popularly used in Hong Kong as slang
for "informant".
 "Blue Lanterns" are uninitiated members, equivalent to Mafia
associates and, as such, do not have a number designation.

STRUCTURE: 3. MAFIA

BOSS

CONSIGLIERE

UNDERBOSS

CAPOREGIME CAPOREGIME CAPOREGIME

SOLDIERS SOLDIERS
SOLDIERS

ASSOCIATES

SOME IMPORTANT PERSONALITIES IN THE STUDY OF OCG

1. Joseph Valachi
 The American mafioso who testified before the Permanent
Subcommittee on Investigations of the U.S. Senate Committee on
Government Operations in 1963 (known as the Valachi hearings),
 He revealed that American mafiosi referred to their organization by the
term cosa nostra ("our thing" or "this thing of ours")
2. Alphonse Gabriel "Al" Capone
 America's best known gangster and the single greatest symbol of the
collapse of law and order in the United States during the 1920s
Prohibition era.
PLT COLLEGE, INC 2018-2019
Page 16
3. Charles "Lucky" Luciano born as Salvatore Lucania
 An Italian-born, naturalized American mobster.
 Considered the father of modern organized crime in the United States
for splitting New York City into five different Mafia crime families and the
establishment of the first Commission.
4. John "Papa Johnny" Torrio, born Giovanni Torrio
 Also known as "The Fox" and as "The Immune", was an Italian-American
mobster who helped build the criminal empire known as the Chicago
Outfit in the 1920s that was later inherited by his protégé, Al Capon.

5. Emilio Changco
 A pirate gang leader based out of Manila Bay in the Philippines. He was
responsible for many of the ships that went missing in the area. He
specialized in piracy-for-order, where a client would choose a ship and
the Changco Gang would seize it, transfer the cargo, and then sell the
ship. He was captured and imprisoned by Philippine authorities. In 1992
he was killed under suspicious circumstances. Philippine government
officials claim that he was shot while trying to escape from the New
Bilibid Prison
6. Nicasio "Asiong" Salonga (Birth name Nicasio Salonga)
 Nicknamed "Robin Hood of Tondo", or the "Hitler" or "Hito" of Tondo.
 An infamous Manila gangster whose notorious life had been portrayed in
several movie versions since 1961.

TYPICAL ORGANIZED CRIME ACTIVITIES

1. Theft and Fraud


 Victimizing business
 Hijacking of cargo tracks
 Robbery
 Bankruptcy fraud also known as “bust-out”
 Insurance fraud
 Stock fraud (inside trading)
 Victimizing individual persons:
 Carnapping “chop chop for export”.
 Burglary
 Credit card fraud
 Stock fraud (Pump and dump scam)
 Victimizing State:
 Bid-rigging public projects
 Money counterfeiting
 Smuggling, manufacturing illegally (counterfeiting) or trading in
untaxed alcohol (bootlegging) or cigarettes (butt legging).
2. Providing illegal services and goods
a. Loan sharking
 Lending of money to another wherein the percentage of the
principal is to exorbitant for the lender to pay his debt and the
collection is done by force or intimidation.
b. Bookmaking

PLT COLLEGE, INC 2018-2019


Page 17
 Gambling practice of determining odds and receiving and paying
off bets on the outcome of sporting events (particularly horse
racing), political contests, and other competitions.
c. Gambling
It is the wagering of money or something of material value with the
intent to win more.
Gaming – Gambling permitted by law.
d. Prostitution
The act or practice of engaging in sex acts for hire.
Related topics and Terms:
Whore
The usual term for commercial sex worker or sex trade
worker.
Hooker or street walker
One who solicit customers in public places
Call Girl
Makes appointment by phone
Gigolo
One who offers services to female customers
Hustlers or rent boys
Those offering services to male customers
Pimps (Males) and Madams(Females)
Organizers of prostitution or procurers for customers
John or Tricks
The customers of prostitutes in north America
Punters
British customers of prostitutes
Kerb Crawlers
Men who drive along a red-light districts to solicit prostitutes.

Types of Prostitutions
 Escort prostitution – one-call and in-call
 Lot lizard – serves the trucking industry
 Street Prostitution – solicit customers in street corners
 Skeezers – trade sex for illegal drugs
 Sex tourism – the commercial sexual relation by the tourist
with resident at the destination
e. Pornography
 The depiction of explicit sexual subject matter for sexually
titillating the viewer.
f. Drug trafficking
 The illegal sale, production, transport, movement, and distribution
of illegal drugs and controlled-substances attained through
unlawful means.
g. Arms smuggling (Arms trafficking)
 Also known as gunrunning.
 The illegal trafficking or smuggling of contraband weapons or
ammunition. What constitutes legal trade in firearms varies
widely, depending on local and national laws.

PLT COLLEGE, INC 2018-2019


Page 18
h. Murder for hire (contract killing)
 A form of murder, in which one party hires another party to kill a
target individual or group of people. It involves an illegal
agreement between two or more parties in which one party
agrees to kill the target in exchange for currency, monetary, or
otherwise. Either party may be a person, group, or an
organization.
i. Toxic waste dumping
 Dumping of hazardous waste in town dumps to avoid paying the
fees charged by waste transporters and waste facilities.
j. People smuggling
 People smuggling (also called human smuggling) is defined as
"the facilitation, transportation, attempted transportation or illegal
entry of a person or persons across an international border, in
violation of one or more countries laws, either clandestinely or
through deception, such as the use of fraudulent documents".
k. Trafficking in human beings
 It is the recruitment, transportation, transfer, harboring, or receipt
of persons by means of; threat or use of force or other forms of
coercion, abduction, fraud, deception, abuse of power, a position
of vulnerability, the giving or receiving of payments or benefits to
achieve the consent of the person having control over another
person, for the purpose of exploitation.

Causes of human Trafficking


 Lack of employment opportunities
 Organized crime
 Regional imbalances
 Economic disparities
 Social discrimination
 Corruption in government
 Political instability
 Armed conflicts
 Mass resettlement without proper resettlement package
 Profitability
 Insufficient penalties against traffickers
 Minimal law enforcement on global sex tourism industry
 Legal process that prosecute victims instead of traffickers
 Poor international border defense

Child laundering
 The illegal acquisition of children through monetary
transactions, deceit, and/or force. Child laundering rings
are often expansive with multiple hierarchies of people
whose primary motivations are large profits from the
black markets of overseas adoption. With Westerners
willing to spend thousands of dollars to adopt one child,
enough monetary incentives are created to extend the
laundering ring from the middle classes to societies' more
affluent groups. These "baby broker" families
PLT COLLEGE, INC 2018-2019
Page 19
subsequently forge a new identity for the laundered child,
"validating" the child's legal status as an orphan and
ensuring the scheme will not be uncovered.
Child harvesting
 the active drafting of parents and children for the
adoption market and is particularly associated with and
prevalent in some international adoption countries and
markets
Baby factory or baby farm
 A location where girls are deliberately encouraged or
forced to become pregnant and give up their newborns
for sale
Child-selling
 The practice of selling children, usually by parents, close
persons, or subsequent masters or custodians.

Child labor
 Refers to the employment of children in any work that
deprives children of their childhood, interferes with their
ability to attend regular school, and that is mentally,
physically, socially or morally dangerous and harmful.
Commercial sexual exploitation of children (CSEC)
 Constitutes a form of coercion and violence against
children and amounts to forced labour and a
contemporary form of slavery.
 CSEC includes the prostitution of children, child
pornography,[2] child sex tourism and other forms of
transactional sex where a child engages in sexual
activities to have key needs fulfilled, such as food, shelter
or access to education.
Europol Distinctions of Types of Victims
 Exploited Victims
 Those who have worked in sex industry in their own
country and are recruited for similar work in the
destination country.
 Deceived Victims
 Consist of woman recruited to work in the service or
entertainment industry of the destination country.
 Kidnapped Victims
 Woman who have been kidnapped and are therefore
unwillingly from the outset.

3. Business and labor Racketeering


 Act of operating illegal business or scheme in order to make profit
by a structured group.
 Casino skimming
 The illegal siphoning-off of gambling profits by Las Vegas casinos
to avoid taxes.
 Setting up monopolies in rigid low-tech industries (like garbage
collecting and cement pouring)
PLT COLLEGE, INC 2018-2019
Page 20
4. Miscellaneous activities

A. Money laundering
Practice of disguising illegally obtained funds so that they may seem
legal.
(Related Topic: R.A. 9160 as amended R.A. 9194)

 Steps in Money Laundering


a. Placement
 It is also called as immersion.
 The physical disposal of money by moving funds from
direct association with the crime and putting them into
the financial system, usually through Smurfing
(moving small amounts at times to avoid suspicion).
 It involves bank complicity, the mixing of illicit with
illicit funds, cash purchases and the smuggling of
currency to safe havens.
b. Layering
 It is also called as heavy soaping.
 The process of disguising the trail to foil pursuit. In
involves the creation of false paper trail, conversion of
cash into monetary instruments and the conversion of
tangible assets obtained by means of cash purchases.
 Electronic process is the most cost-effective layering
method. They offer the criminal speed, distance,
minimal audit trail and virtual anonymity amid the
enormous daily volume of electronic transfer, all at
minimal cost.

c. Integration
 Also called as spin dry.
 The money is again available to the criminal with its
occupational and geographical origin is hidden.
Because the money is often repatriated in the form of
clean, often taxable income. It is achieved by means of
real estate transactions, front companies and sham
loans, foreign bank complicity and false import and
export transactions.
B.Bullying
 Bullying is the use of force or coercion to abuse or intimidate
others. The behavior can be habitual and involve an imbalance of
social or physical power. It can include verbal harassment or
threat, physical assault or coercion and may be directed
repeatedly towards particular victims, perhaps on grounds of race,
religion, gender, sexuality, or ability.
 If bullying is done by a group, it is called mobbing.
 The victim of bullying has been referred to as a "target"

C. Kleptocracy
PLT COLLEGE, INC 2018-2019
Page 21
 Alternatively cleptocracy or kleptarchy, (from Greek: kleptēs,
means "thief" and - kratos, means "power, rule", hence "rule by
thieves")
 A form of political and government corruption where the
government exists to increase the personal wealth and political
power of its officials and the ruling class at the expense of the
wider population, often without pretense of honest service. This
type of government corruption is often achieved by the
embezzlement of state funds.
D. Piracy
E. Political Corruption
The used of legislated powers by government officials for illegitimate
private gain.

a. Bribery
 Requires one to give and another to receive. It is demanded
for an official to do something wherein he is already paid to
do. The intent is influence.
b. Graft
 It only requires that an official has gained something of
value, not part of his official pay when doing his work.
c. Patronage
 Favoring supporters during the previous election.
d. Nepotism
 Favoring relatives.
e. Cronyism
 Favoring personal friends
f. Embezzlement
 Theft or misappropriation of entrusted funds.
g. Kickback
 Official’s share for misappropriated funds.

Conditions Favorable to Corruption


a. Information deficit
b. Luck of control by the Government
c. Opportunities and incentives
d. Social Conditions
e.

ACTIONS TAKEN BY INTERNATIONAL AND NATIONAL LEVEL TO LEVERAGE


ORGANIZED CRIME PROBLEMS

1. Repression
 The Palermo protocol calls for every nation to enact laws to criminalize
trafficking of person, specially women and children and to ensure that
the person attempting to commit, participating in its commission or
organizing and directing other persons in order to commit it are
punished.
 The Palermo convention also envisages the eliminations of safe havens
for migrant’s smugglers and to fast track prosecution of offenders.

PLT COLLEGE, INC 2018-2019


Page 22
2. Prevention
 Information campaigns should be drafted and implemented and should
be focused on informing potential victims.

3. Protection and Assistance,


 Trafficking and smuggling Protocols mandated countries to:
a. Protect the basic rights of migrants against violence.
b. Assist migrants endangered by the smuggling process with special
attention to woman and children.
c. Allow trafficked victims to remain on their territory temporarily or
permanently.
d. Provide for the physical, psychological and social recovery of the
victim.

POLITICAL CRIME
-A serious violation of law that threatens the security or existence of the
government, such as Treason or Sedition
(http://legaldictionary.thefreedictionary.com/Political+Crime)
-Any crime directly against the government. It includes any violent
disturbance without reference to specific crime. In modern times, it also
includes public officer’s offense towards the public that may ripen into
betrayal of the public trust. (Organized Crime Investigation, Garcia M.A.
2009)

POLITICS

The science of government, the art or practice of administering public affairs.


POLYOPSONY
Condition of a market characterized by fewness of buyers. The fewness has
an effect on the price of the materials or products.
POLYPOLY
A market condition characterized by the fewness of sellers and this has a
direct effect on prices.
PROSCRIPTION
 A mechanism by which a country can outlaw organizations deemed a threat
to its national security, generally making it an offense to belong to, to train
with, and recruit for, fund, or otherwise support a banned organization or
individual.
EFFECTS OF PROSCRIPTION
 Deters donations or contributions to proscribed organizations
 Heightens public awareness and knowledge of terrorist
organizations
 Alerts concerned government agencies on the activities of
proscribed organizations
 Stigmatizes and isolates proscribed organization
 Deny entry of aliens connected with proscribed organization

TERRORISM
PLT COLLEGE, INC 2018-2019
Page 23
Comes from the French word terrorisme, and originally referred specifically to state
terrorism as practiced by the French government during the Reign of terror.
The French word terrorisme turn derives from the Latin verb terreō meaning
“I frighten”.

Definition of Terrorism under United Nations


 Terrorism as any act "intended to cause death or serious bodily harm to
civilians or non-combatants with the purpose of intimidating a population or
compelling a government or an international organization to do or abstain
from doing any act".
 The systematic use of terror as means of coercion.
National Terrorist
 Sued to define almost all illegal acts of violence committed for political
purpose by clandestine groups.
Transnational Terrorist
 Terrorists who operates across national borders, whose actions and political
aspirations may affects individual of more than one nationality
International Terrorist
 Terrorist who are controlled by and whose actions represent the national
interest of a sovereign state.
Political Ideology
 Body of ideas reflecting the social needs and aspirations of an individual, or
group, a class or a culture.
 A set of doctrines or beliefs that form a basis of political, economic or other
system.
 A certain ethical set of ideals, principles, doctrines, myths, or symbols of a
social movement, institution, class, or large group that explains how society
should work, and offers some political and cultural blueprint for a certain
social order. A political ideology largely concerns itself with how to allocate
power and to what ends it should be used.

Political ideologies have two dimensions:

1. Goals: how society should work


2. Methods: the most appropriate ways to achieve the ideal arrangement.
(http://en.wikipedia.org/wiki/Ideology#Political_ideologies)

SOME CRIMES DUE TO POLITICAL IDEOLOGY

a. Tiananmen massacre
 Occurred in China on June 4 1989
 Many youth protesters were killed by the Peoples liberation Army
under the orders of Deng Xiaoping.

b. East Timor Invasion

PLT COLLEGE, INC 2018-2019


Page 24
 President Suharto of Indonesia ordered military occupation of East Timor
which caused to deaths of hundreds of People.
c. Tibet Occupation by China
 A peaceful country under Buddhist religion until it was invaded by China
which imposed communist rule and resulted to deaths many of those who
opposed it.
d. Tahrir square massacre
 Occurred at Tahrir square in Egypt on November 2011.
 A terrible massacre done to the innocent youth of Egypt by the ruling
military council after the revolution where the police used illegal chemical
weapons to totally eliminate the innocent revolutionaries who demanded
their rights and the end of the military rule in Egypt in November 2011
e. Vietnam War
 A country once separated by two ideologies
a. Communist – north
b. Democratic south
 It was the war wherein the United States lost an active ally of South
Vietnam.
f. Political conquer of Africa
 Haile Sellasie – A self-proclaimed king in 1928 ruled and terrorized his in a
barbaric manner without qualms and remorse. He murdered his most
trusted officer to get the officer’s young wife as his mistress. Happened in
Ethiopia is a sun soaked in eastern Africa.

THREE FORMS OF TERRORISM

1. Criminal
 Terrorist who simply engage in all types of crime since they recognize no
law.
2. Political
 As a state repression, ideological revolutionary activities or Nationalistic
Revolutions.
a. State Repression
 Refers to government using terrorism to keep citizens in line.

b. Ideological Revolutionary Terrorism


 Focuses on violence to change a political system.
c. Nationalistic Terrorism
 Emphasize the ethnic structure of the government over its
ideological underpinnings.

3. State Sponsored
 Both nationalistic and revolutionary terrorism can be sponsored by the
State, as its aims in a surreptitious manner or a statute to promote its
personal ends.

 RELATED TERMS:
 Neo-Colonialism

PLT COLLEGE, INC 2018-2019


Page 25
The great power indirectly maintains or extends its influence over
other areas or over other people.
 Anti-Colonialism
 Body of action by local settlers on the control of other foreign
nations intruding in their independence.

DESTINCTION BETWEEN ORGANIZED CRIME AND TERRORISM

ORGANIZED CRIME TERRORISM


1.not motivated by ideology 1.motivated by ideology
2.Seeks to form a parallel government 2. Seeks to overthrow the existing
while coexisting with the existing govt. government.
3. Prefers to carry out their activities in 3. Carries their activities openly by
covert manner. seeking maximize media coverage and
to promote their message and publicize
their goals.

OTHER FORMS OF TERRORISM

1. Genocide

 Derived from Greek word “geno” means race or tribe and Latin Term
“cide” means killing.
 Nationalism is a product of nation sate-policy; it is predicated on the need
to achieve homogeneity. When confronted with social, religious and
cultural diversity, the nation-state sought to achieve uniformity by
extermination. In the end the result is the same but not everyone could
call it as genocide.
 Its causes are some politico-socio-economic calamity sparks off the
genocidal fire in a volatile population “primed for ignition”. The priming is
achieved by a prolonged propaganda period of state sponsored racist
propaganda against the victim group.
 It is generally recognized as a form of “jus cogens” in other words it forms
part of customary international law binding on all states.
 It is relatively an open crime; the motives are open and also the carrying
out of the crime itself. The reason for killings based on racial, religious, or
ethnic grounds is clearly articulated.
 Example: (Serbian government against Chechens)

Cultural genocide
 Consist of destroying specific characteristics of the group such group such as
language, literature, religion and art.
What makes Genocide as a Crime?
 It operates to exclude many victims of mass killings and would freeze the
crime as an event history.
 Premised on the fact that elements of genocide can be identified in all
instances of life including urban violence.

PLT COLLEGE, INC 2018-2019


Page 26
2. Religious Fanaticism
Exploitation of religious fanatics

FANATICS
 Those marks by excessive enthusiasm and often intense uncritical devotion.
(E.g. the call by Al-Qaeda for Jihad or holy war between Muslims and non-
Muslims.)

SOME GLOBAL TERRORISM DUE TO RELIGION

1. Pontius Pilate of Rome


 During his reign, citizens were bludgeoned to death, burned at the
stake or thrown into the lion’s den if they vehemently refuse to accept
the cross.
2. Stalin of Russia
 Thousand of skeletal remains were recovered in Russia and its satellite
states, a grim reminder that anyone against his personality cult is
doomed to death.
3. Moa’s Red Army of China
 During its great purge, anything that looks churchy were destroyed
and vanished to extinction.
4. Adolf Hitler of Germany
 Subjugated and exterminated more than six million Jews into Gas
chambers.

SOME TYPES OF TERRORIST ACTIVITIES

 Hijacking
 Aircraft hijacking
 Carjacking
 Maritime Hijacking
 Truck Hijacking
 Kidnapping
 Murder
 Drug trafficking
 Human Smuggling and Human Trafficking
 Money Laundering
 Immigration Crimes
 Includes but not limited to violation of citizen law of a country.
 R.A. 9225 – an act making Filipino Citizens who acquired foreign
citizenship permanent, amending of Commonwealth Act. No. 63.

SOME WORST TERRORIST ATTACKS IN THE WORLD

1. Sept. 11, 2001

PLT COLLEGE, INC 2018-2019


Page 27
 Crashing of hijacked planes into World Trade Center, New York City,
New York, Pentagon in Alexandria, Virginia, and site in Pennsylvania -
2,993 dead 8,900 injured Credited to Osama Bin Ladin. (Update:
Osama Bin Ladin was announced dead on May 1st 2011, from a
gunshot wound to the head during an attack on his compound in
Pakistan.)

2. April 19, 1995

 Truck bombing of federal building, Oklahoma City, Oklahoma - 169


dead 675 injured Credited to Timothy McVeigh; he was executed on
July 11, 2001 for his actions.

3. Sep. 16, 1920

 Bombing near bank in New York City, New York - 38 dead 300 injured,
Many have been accused, including Russia, American communist
party, and Italian terrorists, but this bombing is still unsolved.

4. Feb. 26, 1993

 Truck bombing of World Trade Center, New York City, New York - 6
dead 1,040 injured, the attack was planned by a group of conspirators
including Ramzi Yousef, Mahmud Abouhalima, Mohammad Salameh,
Nidal A. Ayyad, Abdul Rahman Yasin and Ahmad Ajaj. They received
financing from Khaled Shaikh Mohammed

PHILIPPINE LAW TO LEVERAGE TERRORISM

REPUBLIC ACT # 9372

 This Act shall henceforth be known as the “Human Security Act of 2007.”

Terrorism:

 Any person who commits an act punishable under any of the following
provisions of the Revised Penal Code:

1. Article 122 (Piracy in General and Mutiny in the High Seas or in the
Philippine Waters);
2. Article 134 (Rebellion or Insurrection);
3. Article 134-a (Coup de’ Etat), including acts committed by private
persons;
4. Article 248 (Murder);
5. Article 267 (Kidnapping and Serious Illegal Detention);
6. Article 324 (Crimes Involving Destruction,

PLT COLLEGE, INC 2018-2019


Page 28
OR UNDER

1. Presidential Decree No. 1613 (The Law on Arson);


2. Republic Act No. 6969 (Toxic Substances and Hazardous and
Nuclear Waste Control Act of 1990);
3. Republic Act No. 5207, (Atomic Energy Regulatory and Liability Act
of 1968);
4. Republic Act No. 6235 (Anti-Hijacking Law);
5. Presidential Decree No. 532 (Anti-piracy and Anti-highway Robbery
Law of 1974); and,
6. Presidential Decree No. 1866, as amended (Decree Codifying the
Laws on Illegal and Unlawful Possession, Manufacture, Dealing in,
Acquisition or Disposition of Firearms, Ammunitions or Explosives)

 thereby sowing and creating a condition of widespread and extraordinary


fear and panic among the populace, in order to coerce the government to
give in to an unlawful demand shall be guilty of the crime of terrorism and
shall suffer the penalty of forty (40) years of imprisonment, without the
benefit of parole as provided for under Act No. 4103, otherwise known as
the Indeterminate Sentence Law, as amended.

Cultism and Sectarianism

Cult
 An organization brazed with spiritual or ethical belief. (Rizalista)
Sect
 Groups which believe on unorthodox rituals crafted from established religious
ideology.

CRIMES COMMITTED BY GOVERNMENT

1. Crimes Committed by Secret Police


 They are units of the internal security police of the state, with mandate
to suppress all serious, threatening political opposition to the
government in power. Often involved in extraordinary means of
surveillance, searches, detention, and assassination of political figures,
torture of political prisoners, intimidation, threat, harassment and
arrest.
 Other tactics of government to Suppress Social Movements.
 Litigation of the leader of the movement
 Administrative harassment
 Disinformation campaign
 Wiretapping and other electronic surveillance method
 The use of informants
 Bad jacketing or snitch jacketing
 Use of force by Police
2. Human Rights Violations

PLT COLLEGE, INC 2018-2019


Page 29
Committed for ideological reasons by government and their agents,
motivated by not self-interest but by a dedication a particular belief
system, a conviction that they are defending the status quo or
preserving the existing system. These violations include but not limited
to, Torture, murder, executions, etc…

CRIMES AGAINST THE GOVERNMENT

1. Protest and Dissent


Social movements that seek change are viewed as threatening or
subversives to the existing society. These acts vary from illegal
protest, demonstrations, strikes, treason, sabotage, assassination and
other acts of terrorism.
2. Political Whistleblowers
Information is usually classified to protect the national security or also
to misinform or divert the public to cover-up questionable activities.
Agents or officers entrusted with this information, when disgruntled
come out to the public and expose what they know to the detriment of
the government.
3. Social movements
They are relatively organized groups that contain a distinctive ideology
and advocate social change. Most groups used non-institutionalized
and sometimes societal disapproved means in obtaining their
objective. Many social movements are fragile and depend on
charismatic leadership.
Charisma – personal magic of leadership or influence, the ability to
inspire.

Assassination
The murder of a prominent person or political figure by a surprise attack,
usually for payment or political reasons.
Assassin
A person who commits assassination.
Contract killing
A form of murder, in which one party hires another party to kill a target
individual or group of people. It involves an illegal agreement between
two or more parties in which one party agrees to kill the target in
exchange for currency, monetary, or otherwise. Either party may be a
person, group, or an organization.

TYPES OF ASSASINS
1. Political assassins – commit their acts for political reasons.
2. Egocentric assassins – commit their acts to seek attention.
3. Psychopathic assassins – emotional crippled who direct their perverse rage at
popular political figures.
4. Insane assassins – assassins suffering from mental illness.
5. Typical assassins – those who defy classification.

PLT COLLEGE, INC 2018-2019


Page 30
CYBER CRIME AND WHITE COLLAR CRIMES

I.CYBER CRIME

1. Any offense that is committed by a computer, computer system, or computer


network.
2. Any offense in which the computer, computer system or computer network is
the target.
3. Any offense in which the computer, computer system or computer network is
used to hide or store possible evidence.

Elements of Cyber crimes

1. The computer is the target


2. The computer is the tool of the crime
3. The computer is incidental to the crime

Reasons and vulnerability of Computers

1. Capacity to store data in a relatively small space


2. Easy to access
3. Complex
4. Negligence
5. Loss evidence

CATEGORIES OF CYBER CRIMINALS

1. Children and adooplescents from 6-18 years old


Due to their inquisitiveness to explore things
2. Organized hackers
The reasons are usually political
3. Professional hackers
They are motivated by remuneration
4. Discontented employees
Employees who are sacked or dissatisfied.

R.A. 8792 - an act providing and use of electronic commercial and non-
commercial transactions, penalties for unlawful use thereof, and other
purposes

PLT COLLEGE, INC 2018-2019


Page 31
MANNERS OF COMMITTING CYBER CRIMES
1. Hacking or crackling

Refers to unauthorized access into or interference in a computer


system/server or information and communication system; or any access
in order to corrupt, alter, steal, or destroy using a computer or other
similar information and communication devices, without the knowledge
and consent of the owner of the computer or information and
communications system, including the introduction of computer viruses
and the like, resulting in the corruption, destruction, alteration, theft or
loss of electronic data messages or electronic documents.

a. Denial of Service Attack – the bandwidth of the victim’s network is


flooded or his e-mail box is filled with spam mail depriving him of
the services he is entitled to access or provide.
b. Virus dissemination – it is usually done by means of malicious code
or software that modifies or destroys data, steals data or allows
unauthorized access, or exploits or damages a system in a manner
not intended by the user.
c. Web Defacement – the act of the intruder into a server and
changing without permission, all the aspect of websites which the
public can see.

2. Theft of information contained in electronic Form


Information stored in the computer hard disk, removable storage media,
etc,, are stolen.
3. E-mail Bombing
Large numbers of e-mails are sent to the victim that results to cracking
4. Data Diddling
Raw data are altered just before the computer processing them and
changing it back after the processing is completed.
5. Salami Attack
Logic bombs are introduced into the bank’s system that result to the
deduction of an insignificant amount from every account and transferred
into single account.
6. Denial of Service Attack
The bandwidth of the victim’s network is flooded or his e-mail box is
filled with spam mail depriving him of the services he is entitled to
access or provide.
7. Virus or Worm Attack
Viruses are attaching themselves to a computer or file and then circulate
to other files or to other computers on a network. These usually alter or
delete data. Worms eat up the available space on the computer
memory.
8. Logic Bombs

PLT COLLEGE, INC 2018-2019


Page 32
Are-event dependent programs created to do something only when a
certain event occurs e.g. Viruses that lie dormant and only become
active at a particular date.
9. Trojan Attacks
Are unauthorized programs which passively gain control over another
system by representing itself as an authorized program.
10.Internet Time Theft
The internet time of the victim is used by another person without his
consent.
11.Web Jacking
The hacker gains access and control over the website of another.
12.Software Piracy
Software are stolen through the illegal copying of genuine programs and
products distributed to the customers.
13.Online Gambling
Betting in the hope of winning money through the internet.
14.Cyber pornography
Computers are used in the production, distribution, encryption and
storage of digital images usually of children who are usually the victims
of pedophiles.
15.Internet relay chat
Hackers and even other criminals use chat rooms for discussing their
exploits and share techniques in committing criminal acts.
16.E-mail threat and extortion
A criminal send threatening e-mails or threatens the victim via the chat
rooms. It could also be done by copying the company’s confidential data
or trade secrets in order to extort huge amount of money from the
company.
17.Phishing
A form of identity theft in which scammers send mass e-mails posing as
banks, credit card companies, popular commercial websites, asking the
recipients’ to confirm or update financial information in a hyperlink in
order to appear like it came from the original website.
18.Cyber stalking
The criminals follows the victim by s ending e-mails, and frequently
entering the chat rooms that causes an intentional, substantial and
unreasonable intrusion into the private life of the person causing him
mental distress.
19.Cyber defamation
The use of computer system to make false statements against a person
thereby injuring hi/her reputation.
20.E-mail spoofing
The e-mails are misrepresented and usually contain viruses.

PLT COLLEGE, INC 2018-2019


Page 33
21.Computer vandalism
Any physical harm done to a computer set.
22.Cyber terrorism
It is the premeditated used of disruptive activities, or threat thereof, in
cyber space, with the intention to further social, ideological, religious,
political or similar objectives, or to intimidate other person in
furtherance of such objectives.
23.Cyber Fraud and cheating
It is the most lucrative business nowadays that consist of credit card
crimes, contractual crimes, offering jobs, etc..
24.Harassment via E-mail
The person threatens or blackmails the victim by sending him e-mails.
25.Computer sabotage
The input, alteration, erasure or suppression of computer or
communication data, programs, systems or networks. It also includes
computer fraud and forgery.

Prevention of Cyber Crimes


1. To prevent cyber stalking, avoid disclosing any information pertaining to
oneself on the cyber space, especially to strangers.
2. Avoid sending any photograph online particularly to strangers and chat
friends as the photographs maybe misused.
3. Always use latest and up-to-date antivirus software to guard against virus
attacks.
4. Always keep back-up volumes in order to avoid data loss in case of virus
contamination.
5. Never send your credit card number to any unsecured site, to guard against
fraud.
6. Always keep watch on the sites your children has access to prevent any kind
of harassment or deprivation of children
7. Use security programs
8. Website owners should watch traffic and check any irregularity on the site.
9. Use firewall
10.Web servers running public sites must physically separated from internal
corporate network.

THE FIVE MANTRA OF ONLINE SECURITY


1. Precaution
2. Prevention
3. Protection
4. Preservation
5. Perseverance

Credit Card Fraud


PLT COLLEGE, INC 2018-2019
Page 34
The copying and cloning of cards, ATM fraud, internet credit card fraud
and the PIN number stealing, etc.

R.A. 8484
It is the access Device Regulation Act of 1998 that tries to regulate the
issuance and use of access devices and prohibiting related fraudulent
acts.

Access Device
Any card, plate, code, account number, electronic serial number, Personal
identification number, or other telecommunication service, equipment, or
instrumental identifier, or other means of account access that can be used to obtain
money, goods, services or any other thing of value or to initiate the transfer of
funds. It includes credit cards.

WHITE COLLAR CRIMES

White-collar crime

Was coined by the criminologist Edwin Sutherland who was convinced of a


connection between social class and crime.
White Collar Crime he defined a white-collar crime as "a crime committed
by a person of respectability and high social status in the course of his
occupation “and one who traditionally wears a suit and white (collared)
shirt to work.
The Federal Bureau of Investigation narrowly defines white-collar crime as
crimes—usually involving deceit, concealment, or violation of trust—which
are not dependent on the application or threat of physical force.
Alternatively is the popular definition in which white-collar crime is that
which is performed by members of the upper class. Most crime labeled
white-collar is done so because of the socioeconomic status of the
perpetrator, depending on their profession or academic qualification.
Most, if not all white-collar offenders are distinguished by lives of privilege

Corporate crime

White-collar crime is normally a crime against a corporation or


organization. This is distinguished from corporate crime, which is
crime committed 'by' a corporation or organization. The distinction
blurs when the given crime promotes the interest of the corporation
and its senior employees as a business entity can only act through
the agency of the people whom it employs.

PLT COLLEGE, INC 2018-2019


Page 35
State crime

In terms of social class and status, those employed by the state,


whether directly or indirectly, are more likely to be white-collar and
so more state crime will be committed through the agency of white-
collar employees.

Forms of White Collar Crimes:

1. Corporate Crimes – the violation of a criminal statute either by a corporate entity


or by its executives, employees or agents, acting on behalf of and for
the benefit of the corporation, partnership or other business entity.

2. Environmental Crimes – violation of criminal laws which, although typically


committed by businesses or by business officials, may also be
committed by any persons or organizational entities and which
damage some protected or otherwise significant aspect of the natural
environment.

3. Occupational Crimes – any act punishable by law, which is committed through


opportunity created in the course of an occupation that is legal.
Occupational Crimes are categorized as:

1. Organizational Occupational crime – committed for the benefit of the entire


organization in such instances only the organization or the employer,
not individual employees.

2. State Authority Occupational crimes – committed by officials through the exercise


of their government-based authorities. Such crime is occupation
specific and can only be committed by person in public office or by
working for such persons.

3. Professional Occupational Crimes – committed by professional in their capacity as


professionals. The crimes of physicians, attorneys, psychologists and
the like are included here.

4. Individual Occupational crimes – committed by individuals which include income


tax evasion, theft of goods and services by employees, the filling of
false expense report and the like.

Occupational Crimes also refers to:

1. White Collar Crime (Sutherland)

2. Avocational Crime – committed by one who does not link for himself as criminal
and whose major source of income is something other than crime.

PLT COLLEGE, INC 2018-2019


Page 36
3. Corporate crime – committed by corporate officials for their corporations and the
offenses of the corporation itself.

4. Economic Crime – illegal activity which principally involves deceit,


misrepresentation, concealment, manipulation, breach of trust and
illegal circumvention.

5. Organizational Crime – illegal actions taken in accordance with operative


organizational goals that seriously harm employees or the general
public.

6. Upper-world crime – refers to law-breaking acts committed by those who, due to


their positions in the structure, have obtained specialized kinds of
occupational slots essential for the commission of these offenses.

Dealing with White-Collar Crimes

Gary Green pointed out that professional criminals would probably continue
to enjoy immunity from prosecution. Hence, they are unlikely to be deterred by
sanction or threat and are unlikely to be formally disqualified by their professional
organizations. They will therefore feel free and be free to continue or begin their
activities (Schmallenger, 1999).

James W. Coleman suggested four areas of reform, which white-collar crime


might be effectively addressed:

1. Ethical Reforms - Reforms include such things as working to establish stronger


and more persuasive codes of business ethics. Courses in ethical
businesses might be offered in universities, and cooperation could
school their employees in right livelihood.

2. Enforcement Reforms - Reforms center on the belief that white-collar criminals


must be severely published, but also include such things as better
funding for enforcement agencies dealing with white-collar crime, and
insulation of enforcement personnel from undue political violations.

3. Structural Reforms - Involve basic changes in corporate structure to make white-


collar crime more difficult to commit such as selective nationalization
of firms that have long records of criminal violation.

4. Political Reforms - Focus on eliminating campaign contributions from corporations


and businesses, but also include the level of fairness in the
determining government grants and contracts, the government must
serve as a police itself. This includes the enforcement of laws and the
regulation of the activities of elected officials and administrative
personnel.

PLT COLLEGE, INC 2018-2019


Page 37
TYPES OF WHITE COLLAR CRIME

1. Bank Fraud:
 To engage in an act or pattern of activity where the purpose is to
defraud a bank of funds.
2. Blackmail:
 A demand for money or other consideration under threat to do bodily
harm, to injure property, to accuse of a crime, or to expose secrets.
3. Bribery:
 When money, goods, services, information or anything else of value is
offered with intent to influence the actions, opinions, or decisions of
the taker. You may be charged with bribery whether you offer the bribe
or accept it.
4. Cellular Phone Fraud:
 The unauthorized use, tampering, or manipulation of a cellular phone
or service. This can be accomplished by either use of a stolen phone or
where an actor signs up for service under false identification or where
the actor clones a valid electronic serial number (ESN) by using an ESN
reader and reprograms another cellular phone with a valid ESN
number.
5. Computer fraud:
 Where computer hackers steal information sources contained on
computers such as: bank information, credit cards, and proprietary
information.

6. Counterfeiting:
 Occurs when someone copies or imitates an item without having been
authorized to do so and passes the copy off for the genuine or original
item. Counterfeiting is most often associated with money however can
also be associated with designer clothing, handbags and watches.
7. Credit Card Fraud:
 The unauthorized use of a credit card to obtain goods of value.
8. Currency Schemes:
 The practice of speculating on the future value of currencies.
9. Embezzlement:
 When a person who has been entrusted with money or property
appropriates it for his or her own use and benefit.

10. Environmental scheme:


 The overbilling and fraudulent practices exercised by corporations
which purport to clean up the environment.
11. Extortion:
 Occurs when one person illegally obtains property from another by
actual or threatened force, fear, or violence, or under cover of official
right.
12. Forgery:
 When a person passes a false or worthless instrument such as a check
or counterfeit security with the intent to defraud or injure the recipient.

PLT COLLEGE, INC 2018-2019


Page 38
13. Health Care Fraud:
 Where an unlicensed health care provider provides services under the
guise of being licensed and obtains monetary benefit for the service.
14. Insider Trading:
 When a person uses inside, confidential, or advance information to
trade in shares of publicly held corporations.
15. Insurance Fraud:
 To engage in an act or pattern of activity wherein one obtains
proceeds from an insurance company through deception.
16. Investment Schemes:
 Where an unsuspecting victim is contacted by the actor who promises
to provide a large return on a small investment.
17. Kickback:
 Occurs when a person who sells an item pays back a portion of the
purchase price to the buyer.
18. Larceny/Theft:
 When a person wrongfully takes another person's money or property
with the intent to appropriate, convert or steal it.
19. Money Laundering:
 The investment or transfer of money from racketeering, drug
transactions or other embezzlement schemes so that it appears that its
original source either cannot be traced or is legitimate.
20. Racketeering:
 The operation of an illegal business for personal profit.
21. Securities Fraud:
 The act of artificially inflating the price of stocks by brokers so that
buyers can purchase a stock on the rise.
22. Tax Evasion:
 When a person commits fraud in filing or paying taxes.
23. Telemarketing Fraud:
 Actors operate out of boiler rooms and place telephone calls to
residences and corporations where the actor requests a donation to an
alleged charitable organization or where the actor requests money up
front or a credit card number up front, and does not use the donation
for the stated purpose.

24. Welfare Fraud:


 To engage in an act or acts where the purpose is to obtain benefits (i.e.
Public Assistance, Food Stamps, or Medicaid) from the State or Federal
Government.
25. Weights and Measures:
 The act of placing an item for sale at one price yet charging a higher
price at the time of sale or short weighing an item when the label
reflects a higher weigh

TYPES OF WHITE COLLAR SCHEMES

PLT COLLEGE, INC 2018-2019


Page 39
1. Advanced Fee Schemes:
 Actor induces victim to give him some type of advanced fee in return
for a future benefit. The future benefit never occurs and victim never
receives the advanced fee back.
2. Airport Scam:
 Actor approaches victim in an airport stating that the newspaper stand
cannot change his one hundred dollar bill and asks the victim for
change. Victim provides actor with the change, actor returns to the
store to get the one hundred dollar bill back, however, never returns to
victim.
3. Auto Repair:
 Actor hangs out around an auto repair shop and approaches victims
who leave after getting estimates. Actor claims to do work off duty at a
very low cost. Once actor has the car, inferior work is completed and
victim cannot get the return of the car until the very high bill is paid.

4. Check Kiting:
 A bank account is opened with good funds and a rapport is developed
with the bank. Actor then deposits a series of bad checks but prior to
their discovery, withdraws funds from the bank.
5. Coupon Redemption:
 Grocery stores amass large amounts of coupons and redeem them to
manufacturers when in fact merchandise was never sold.
6. Directory Advertising:
 Actor either impersonates sales person from a directory company like
the yellow pages or fraudulently sells advertising which the victim
never receives.
7. Fortune Telling:
 Actor advises victim that victim is cursed. Actor advises victim that the
curse must be removed. Actor advises that she must meditate to the
spirits and will require payment. Over a period of time, victim pays
fortune teller thousands of dollars to remove curse.
8. Gypsies:
 Actor states that victims money is cursed. In order to remove the
curse, the money must be placed into a bag or box that the actor
provides. The bag or box is switched. Actor advises victim to perform
certain rituals over the money and the curse will be removed. The bag
or box cannot be opened for a period of time when it is opened, the
money is gone.
9. Home Improvement:
 Actor approaches a home owner with a very low estimate for a repair
or improvement. Inferior or incomplete work is performed. Once the
repairs are completed, actor intimidates the victim to pay a price much
greater than the original estimate.
10.Inferior Equipment:
 Actors travel around selling inferior equipment such as tools at high
prices.
11.Jamaican Switch:
 Actor #1 approaches a victim looking for the address of a prostitute.
Actor #1 shows a large sum of money to the victim. Actor #2 arrives
PLT COLLEGE, INC 2018-2019
Page 40
and tells Actor #1 where he can find the prostitute but cautions on
taking all the money as the prostitute might rob him. Actor #1 asks the
victim to hold the money for him. Actor #1 puts his money into a
handkerchief with the victim’s money. Actor #1 shows the victim how
to hide the money under his arm, inside his shirt while switching
handkerchiefs. Victim takes the handkerchief and the parties split up,
however, Actor #1 leaves with victim’s money.
12.Land Fraud:
 Actor induces victim to purchase tracks of land in some type of
retirement development which does not exist.
13.Odometer Fraud:
 Unscrupulous used car salesman purchased used cars and turns back
the odometers. The used car is sold at a higher price due to its low
mileage.
14.Pigeon Drop:
 Actor #1 befriends the victim. Actor #2 shows both Actor #1 and
victim a "found" package containing a large amount of cash. Actor #1
insists that the found money be divided equally but only after each
person puts up his own money to demonstrate good faith. All the
money is put in one package and the package is later switched.
15.Police Impersonation:
 Actor tells victim that his bank is being operated by fraudulent bank
officers. Actor instructs victim to take money out of bank and place it
into a good bank. After the money is withdrawn, the actor allegedly
takes the money to the police station for safe keeping. The victim
never sees the money again.
16.Ponzi:
 An investment scheme where the actor solicits investors in a business
venture, promising extremely high financial returns or dividends in a
very short period of time. The actor never invests the money, however,
does pay dividends. The dividends consist of the newest investors
funds. The first investors, pleased to receive dividends, encourage new
investors to invest. This scheme falls apart when the actor no longer
has sufficient new investors to distribute dividends to the old investors
or the actor simply takes all the funds and leaves the area.
17.Pyramid:
 An investment fraud in which an individual is offered a distributorship
or franchise to market a particular product. The promoter of the
pyramid represents that although marketing of the product will result
in profits, larger profits will be earned by the sale of franchises. For
example, if a franchise price is P10,000.00, the seller receives
P3,500.00 for every franchise sold. Each new franchise purchaser is
presented with the same proposal so that each franchise owner is
attempting to sell franchises. Once the supply of potential investors is
exhausted, the pyramid collapses. Many times, there are no products
involved in the franchise, simply just the exchange of money.
18.Quick Change:
 Victim is confused by actor’s speedy series of money exchanges and in
the end, is short changed.
19.Shell Game:
PLT COLLEGE, INC 2018-2019
Page 41
 Actor #1 manipulates a pea beneath three walnut shells or bottle caps.
Actor #1 moves the caps around and shows victim the cap with the
pea under it. With the encouragement of another player, also Actor #2,
victim places larger and larger bets as to which cap contains the pea.
The game is ended by Actor #1 when the take is large enough.

20.Utilities Impersonators:
 Actor impersonates utilities employees by wearing jumpsuits with
name tags. Actor approaches victim with story about a gas leak or
electrical surge to gain entry to the home. Valuables are taken by
actor.
21.VCR Scam:
 Actor purports to sell new VCR's or televisions at an extremely low cost
due to his connections. Victim pays for the VCR or television only to
discover that the box has been filled with rocks.
22.West African Investment Scams:
 Actors target businesses and obtain business' bank account
information from which all funds are later withdrawn.

COMBATTING TRANSNATIONAL CRIME

Transnational Policing
Pertains to all forms of policing that transgress national borders.
International Policing
Indicate those types of policing that are formally directed by institutions
usually responsible for international affairs.
Global Policing
Indicate those forms of policing that are fully global in scope.
Globalization
A process of interaction and integration among the people, companies,
and governments of different nations, a process driven by international
trade and investment and aided by information technology. The process
has effects on the environment, on culture, on political systems, on
economic development and prosperity, and on human physical well-
being in societies around the world.
The process of international integration arising from the interchange of
world views, products, ideas, and other aspects of culture. Put in simple
terms, globalization refers to processes that promote world-wide
exchanges of national and cultural resources. Advances in
transportation and telecommunications infrastructure, including the rise
of the Internet, are major factors in globalization, generating further
interdependence of economic and cultural activities.
(http://en.wikipedia.org/wiki/Globalization)

BILATERAL COOPERATION AGAINST TRANSNATIONAL CRIME


Convention against Transnational Organized Crime
A United Nations-sponsored multilateral treaty against transnational
organized crime, adopted in 2000. By April 2013, the Convention had

PLT COLLEGE, INC 2018-2019


Page 42
been ratified by 175 states. It is also called the Palermo Convention, and
its three protocols (the Palermo Protocols) are:

a. Protocol to Prevent, Suppress and Punish Trafficking in Persons,


especially Women and Children; and

The Trafficking Protocol was adopted by the United Nations in


Palermo in 2000 and entered into force on 25 December 2003. As
of March 2013 it has been ratified by 154 states.
The United Nations Office on Drugs and Crime (UNODC) is
responsible for implementing the Protocol. It offers practical help to
states with drafting laws, creating comprehensive national anti-
trafficking strategies, and assisting with resources to implement
them. In March 2009, UNODC launched the Blue Heart Campaign to
fight human trafficking, to raise awareness, and to encourage
involvement and inspire action.
The Protocol commits of ratifying states to prevent and combat
trafficking in persons, protecting and assisting victims of trafficking
and promoting cooperation among states in order to meet those
objectives.
The Protocol covers the following:

 defining the crime of trafficking in human beings; essentially,


trafficking is the transport of persons, by means of coercion,
deception, or consent for the purpose of exploitation such as
forced or consensual labor or prostitution:
o "Trafficking in persons" shall mean the recruitment,
transportation, transfer, harbouring or receipt of persons,
by means of the threat or use of force or other forms of
coercion, of abduction, of fraud, of deception, of the
abuse of power or of a position of vulnerability or of the
giving or receiving of payments or benefits to achieve the
consent of a person having control over another person,
for the purpose of exploitation. Exploitation shall include,
at a minimum, the exploitation of the prostitution of
others or other forms of sexual exploitation, forced labour
or services, slavery or practices similar to slavery,
servitude or the removal of organs... The consent of a
victim of trafficking in persons to the intended
exploitation set forth [above] shall be irrelevant where
any of the means set forth [above] have been used.
b. Protocol against the Smuggling of Migrants by Land, Sea and Air.

Supplementing the Convention against Transnational Organised


Crime, was adopted by the United Nations in Palermo, Italy in 2000.
It is also referred to as the Smuggling Protocol. It is one of the three
Palermo protocols, the others being the Protocol to Prevent,

PLT COLLEGE, INC 2018-2019


Page 43
Suppress and Punish Trafficking in Persons, especially Women and
Children and the Protocol against the Illicit Manufacturing and
Trafficking in Firearms.
The Smuggling Protocol entered into force on 28 January 2004. By
May 2013 the protocol had been signed by 112 states, and ratified
by 135.[1]
The Protocol is aimed at the protection of rights of migrants and the
reduction of the power and influence of organized criminal groups
that abuse migrants. It emphasizes the need to provide migrants
with humane treatment, and the need for comprehensive
international approaches to combating people smuggling, including
socio-economic measures that address the root causes of
migration.

c. Protocol against the Illicit Manufacturing and Trafficking in Firearms

RELATED PHILIPPINES LAWS IN THE STUDY OF TRANSNATIONAL


ORGANIZED CRIME

R.A. 10175 –“Cybercrime Prevention Act of 2012″


R.A. 9995"- “Anti-Photo and Video Voyeurism Act of 2009"
R.A. 9775 -"Anti-Child Pornography Act of 2009."
R.A. 9372 – “Human Security Act of 2007”
R.A. 9208 – Anti –Trafficking in Person’s Act of 2003
R.A. 9262 - "Anti-Violence against Women and Their Children Act of 2004".
R.A. 9194 –An act amending R.A. 9160
R.A. 9165 -"Comprehensive Dangerous Drugs Act of 2002"
R.A. 9160 - “Anti-Money Laundering Act of 2001"
R.A. 8042 - "Migrant Workers and Overseas Filipinos Act of 1995
R.A. 8293 - "Intellectual Property Code of the Philippines"
E.O. 62 - Creating the Philippine center on transnational crime to formulate and
implement a concerted program of action of all law enforcement, intelligence and
control of transnational crime.

ORGANIZATIONS CREATED TO COMBAT TRANSNATIONAL


CRIME

Executive Order No.100, dated 7 May 1999


-"Strengthening the Operational, Administrative and Information Support System
of the PCTC" - This Executive Order sought to strengthen the operational,
administrative and information support system and capacity of PCTC by placing the
following agencies/offices/instrumentalities of under the general supervision and
control of the Center:

a. Loop Center of the NACAHT; (national action committee on anti-hijacking and


anti terrorism)
b. INTERPOL NCB-Manila;
c. Police Attaches of the PNP; and

PLT COLLEGE, INC 2018-2019


Page 44
d. Political Attaches/Counselors for Security Matters of the DILG.

The Philippine Center on Transnational Crime (PCTC), which houses INTERPOL


Manila, is the national law enforcement agency which carries investigations
beyond the borders of the Philippines. Its priority crime areas include:

 Illicit trafficking of narcotic drugs and psychotropic substances;


 Money laundering;
 Terrorism;
 Arms smuggling;
 Trafficking in persons;
 Piracy;
 Any crime which impacts the stability and security of the Philippines.

The PCTC is assisted by the Philippine’s 22 national law enforcement agencies:

Philippine’s 22 national law enforcement agencies


 Philippine National Police;  Department of Tourism;
 National Bureau of Investigation;  Philippine Center on
 Department of Justice; Transnational Crime;
 Anti-Money Laundering Council;  Philippine Drug Enforcement
 Bangko Sentral ng Pilipinas Agency;
(Philippine Central Bank);  Optical Media Board;
 Bureau of Customs;  Philippine Coast Guard
 Bureau of Immigration;  Philippine Overseas Employment
 Bureau of Internal Revenue; Administration;
 Dangerous Drugs Board;  Philippine Ports Authority;
 Department of Finance;  Philippine Postal Corporation;
 Department of Foreign Affairs;  Presidential Anti-Organized Crime
Commission;
 Securities and Exchange
Commission;
 Office for Transportation Security.

INTERPOL Manila

 The National Central Bureau (NCB) for the Philippines is an inter-ministerial


entity which is not part of the Philippine National Police but instead is directly
attached to the Office of the President. As such it benefits from direct access
to the services of all law enforcement agencies in the Philippines.
 The NCB is referred to as “NALECC-SCILEC” (National Law Enforcement
Coordinating Committee - Sub Committee on International Law Enforcement
Cooperation).
 INTERPOL Manila is an integral part of the PCTC. Its mission is to serve as the
liaison office and main coordinating body for international police cooperation
on behalf of all law enforcement agencies in the Philippines. Its main duties
include:

PLT COLLEGE, INC 2018-2019


Page 45
 Monitoring and coordinating law enforcement activities relating to
transnational crimes affecting the Philippines;
 Operating and maintaining an operations centre to serve as the focal point
for international cooperation on transnational crime for all law enforcement
agencies in the Philippines;
 Acting as a NALECC Sub Committee in the monitoring of crime and activities
which threaten national security and the economy.
 INTERPOL Manila works around the clock and uses English as its main
working language.

INTERNATIONAL POLICE COOPERATIONS

UN POLICE Community

 The United Nations Police Division cooperates with many organizations to


strengthen its expertise and expand its effectiveness. With some of these
organizations, UN Police (UNPOL) has official agreements to strengthen
information sharing and lessons learned and to facilitate the implementation
of peacekeeping mandates. With others the links are informal, but add to the
work of the Division. This police community continues to grow, and this
growth will be reflected in these pages.

1. EUROPOL

 Short for European Police Office


 Headquarters is in Hague Netherlands.
 A European Union's criminal intelligence agency.
 It became fully operational on 1 July 1999.
 The establishment of Europol was agreed to in the 1992 Maastricht Treaty,
officially known as the Treaty on European Union (TEU) that came into effect
in November 1993.
 The agency started limited operations on 3 January 1994, as the Europol
Drugs Unit (EDU). In 1998 the Europol Convention was ratified by all the
member states and came into force in October. In order to fight international
organized crime effectively, Europol cooperates with a number of third
countries and organization.
 The Europol External Strategy defines the framework within which Europol is
to develop its activities with regard to third partners.
 Fully reformed on 1 January 2010. Europol increased powers to collect
criminal information and European Parliament more control over Europol
activities and budget.

2. ASEANAPOL

 Stands for Association of National Police Forces of the ASEAN Region


 Formed in 1980 to initiate regional police co-operation. Delegates meet
annually to discuss crime-related issues. A paper by the Assistant Director for
External Relations of the ASEAN Secretariat wrote in 1999 that:

PLT COLLEGE, INC 2018-2019


Page 46
 The ASEANAPOL deals with the preventive, enforcement and operational
aspects of cooperation against transnational crime.
 Has been actively involved in sharing of knowledge and expertise on policing,
enforcement, law, criminal justice, and transnational and international
crimes. It has established three ad-hoc commissions dealing with drug
trafficking, arms smuggling, counterfeiting, economic and financial crimes,
credit card fraud, extradition and arrangements for handing over of criminal
offenders and fugitives. It has also taken initiatives to combat new forms of
transnational crime, such as fraudulent travel documents, phantom ship
frauds, product counterfeiting and piracy.

3. International Association of Chiefs of Police (IACP)

 Was founded in Chicago in 1893 as the National Chiefs of Police Union.


 The primary goal of this organization was to apprehend and return criminals
who had fled the agency jurisdictions in which they were wanted. The
organization has expanded over the years with the goals of advancing the
science and art of police work, promoting improved practices throughout the
law enforcement community and foster cooperation and information
exchange among police administrators.
 The IACP is the world’s oldest and largest nonprofit membership organization
of police executives, with over 20,000 members in over 89 different
countries.
4. Automated Donor Assistance Mechanism (ADAM)
 An online coordination tool developed by UNODC within the framework of the
Paris Pact Initiative, a UNODC-led partnership of more than 50 countries and
international organizations, which aims to counter traffic in and consumption
of Afghan opiates.
5. CEPOL - the European Police College
 CEPOL brings together senior police officers across Europe with the aim to
encourage cross-border cooperation in the fight against crime and
maintenance of public security and law and order. Established as an agency
of the European Union (EU) in 2005 and the CEPOL Secretariat is based in the
United Kingdom.
6. United Nations Office on Drugs and Crime (UNODC)
 UNODC is mandated to assist Member States in their struggle against
illicit drugs, crime and terrorism.
7. THE INTERPOL
 Conceptualized in 1920’s.
 Formerly known as International Police Commission.
 In 1955, the number affiliated countries from 19 to 55.
 In 2004, the number of affiliated countries increased to 181.
 As of 2012, the number of affiliated countries is 190.
 Mission:
 “To be a whole world pre-eminent police organization in support
of all organizations, authorities and services whose mission is
preventing, detecting and suppressing crime”.
 Three core services:
a. A unique global police communication system.

PLT COLLEGE, INC 2018-2019


Page 47
b. A range of criminal data bases and analytical services.
c. Proactive support for police operations throughout the world.
 Major decisions on the policy, budget, working methods, finances and
programs of activities are made by General assembly which meets
annually.
 Each member country maintains NCB. (National Central Bureau).
 It is financed by annual contributions of each member country
calculated a sliding scale according to GNP.

The logo

The logo, in use since 1950, comprises the following elements:

 A representation of the globe, to indicate that INTERPOL's activities are


worldwide;
 Olive branches either side of the globe to symbolize peace;
 The name "INTERPOL" below the globe in the centre of the olive branches;
 A vertical sword behind the globe, symbolizing police action.
 The abbreviations "OIPC" and "ICPO" above the globe either side of the
sword;
 The scales below the olive branches symbolize justice.

The flag

The flag has been in use since 1950.

 It has a light-blue background;


 The logo is in the centre;
 The four lightning flashes arranged symmetrically around the emblem
symbolize telecommunications and speed in police action.

Types of Notice (Interpol)

Red Notice Yellow Notice


To seek the arrest or To help locate
provisional arrest of wanted missing persons,
persons with a view to often minors, or to
extradition. help identify persons
who are unable to
identify themselves.

PLT COLLEGE, INC 2018-2019


Page 48
Blue Notice Black Notice
To locate, identify or obtain To seek information
information on a person of on unidentified
interest in a criminal bodies.
investigation.

Green Notice Orange Notice


To warn about a person's To warn of an event,
criminal activities if that a person, an object
person is considered to be a or a process
possible threat to public representing an
safety. imminent threat and
danger to persons or
property.

INTERPOL–United Nations Purple Notice


Security Council Special Notice To provide
information on modi
Issued for individuals and operandi, objects,
entities that are subject to UN devices and
sanctions. concealment
methods used by
http://www.interpol.int/ criminals.
INTERPOL-expertise/Notices

BASIC TERMS AND PHRASES TO PONDER

Antiques
 Cultural assets of a certain country which portrays or symbolizes the tradition
of such country. These are invaluable treasures that cannot be transferred or
taken out from the owner country.

PLT COLLEGE, INC 2018-2019


Page 49
International Crime
 Crimes which affect the peace or safety of more than one state or which are
so reprehensible in nature as to justify the intervention of international
agencies in the investigation and prosecution thereof.
Transnational crime
 Refers to crime that takes place across national borders.
 These are crimes committed involving several states or countries, crimes
which exceeds borders.
Professional Crimes
 Refer to occupations or their incumbents, which posses various traits
including useful knowledge that requires lengthily training, service
orientation and code of ethics that permits occupations to attempt to obtain
anatomy and independence with high prestige and remuneration.
Syndicate
 A body of persons associated for some design and undertaking which is
usually a bold and difficult one.
Organized crime
 A non-ideological enterprise involving a number of persons in close social
interaction, organized on a hierarchical basis, with at least three levels/ranks,
for the purpose of securing profit and power by engaging in illegal and legal
activities. (Abadinsky, 1990: 6)
 A complex set of people and functions interrelated in hierarchical structure
specifically for the purpose of attaining set of goals.
 Are American inventions that have been superimposed on a heterogeneous
European crime landscape. It becomes a criminal activity by an enduring
structure or organization developed and devoted primarily to the pursuit of
profits through illegal means. It sometimes referred to as MOB, MAFIA,
“syndicate” or the COSA NOSTRA, and others from different parts of the world
which are known as the enemy within, the 2 nd government, the 5th state or
the crime confederation. (Garcia, 2009)
 Refers to those self-perpetuating, structured and disciplined associations of
individuals or groups, combined together for the purpose of obtaining
monetary or commercial gains or profits, wholly or in part by illegal means,
while protecting their activities through a pattern of graft and corruption.
(U.S. Comptroller General, 1981: 10)
 Widespread criminal activities, such as prostitution, interstate theft, or illegal
gambling, that occur within centrally controlled formal structure.
 The people and the groups involved in such criminal activities. (The American
Heritage Dictionary of the English Language, Third Edition, Boston/New
York/London 1992).
 Organized crime as any group having some manner of a formalized structure
and whose primary objective is to obtain money through illegal activities.
Such groups maintain their position through the use of actual or threatened
violence, corrupt public officials, graft, or extortion, and generally have a
significant impact on the people in their locales, region, or the country as a
whole. (FBI website - last viewed 20100202)

Amico Nostro
 English translation, Our Friend, Friend of Ours.
Associate

PLT COLLEGE, INC 2018-2019


Page 50
 One who earns money for the family in concert with other associates or made
members. Not all associates become made members.
Atlantic City Conference: of 1929
 Considered the earliest organized crime summit held in the United States and
held a major impact on the future direction of the underworld.
 It represented the first concrete move toward a "National Crime Syndicate."
Big Seven
 Also known as the Combine or Big Seven was a criminal organization headed
by many organized crime figures on the east coast during Prohibition serving
as the predecessor to the alleged National Crime Syndicate of the 1930s.
 The Seven Group was successful in establishing its authority and served as
the basis for the Atlantic City Conference in 1929.
Black Hand
 "A Manu Neura" in Sicilian, was a type of extortion racket. It was a method of
extortion, not a criminal organization as such, though gangsters of Camorra
and the Mafia practiced it. It came to be incorrectly known as a "Criminal
Organization" in and of itself.
 Typical Black Hand tactics involved sending a letter to a victim threatening
bodily harm, kidnapping, arson, or murder. The letter demanded a specified
amount of money to be delivered to a specific place. It was decorated with
threatening symbols like a smoking gun or hangman's noose and signed with
a hand imprinted in black ink; hence the Sicilian name 'A Manu Neura (The
Black Hand) which was readily adopted by the American press as "The Black
Hand Society".

Bust out
 A person is often referred to as a "bust out" when they have hit bottom, has
no resource or money and is unlikely to recover. As in "he's a bust out."
Capo
 A Captain in the family who directs soldiers under him. These are the
everyday "street earners."
Capo di tutti capi
 The boss of all bosses. Originally this referred to the boss of the national
family or the boss of the "whole thing." This "position" no longer exists thanks
to Luciano and Lansky who in the 1930's created the "commission." This
phrase will sometimes be used by regional family members when referring to
the family head.
Capo mandamento
 Within Cosa Nostra a mandamento is a district of generally three
geographically contiguous Mafia families in Sicily. A capo mandamento
representing the mandamento is usually entitled to be part of the provincial
Mafia Commission.
Clip
 To eliminate someone, also "whack","the big sleep","make disappear" etc.
Comare
 "Goumada", "goom" slang. Best girl, number one, a term for a woman that
may be dated outside of a marriage. A mistress.
Camorra
 The word is almost certainly a blend of "capo" (boss) and a Neapolitan street
game, the "morra". (In this game, two persons wave their hands
PLT COLLEGE, INC 2018-2019
Page 51
simultaneously, while a crowd of surrounding gamblers guess, in chorus, at
the total number of fingers exposed by the principal players.)
 Unlike the Mafia which has a distinct organizational structure the Camorra
was never a coherent whole, a centralized organization. Instead it has always
been a loose confederation of different, independent groups or families. Each
group was bound around kinship ties and controlled economic activities which
took place in its particular territory. Each family clan took care of its own
business, protected its territory, and sometimes tried to expand at another
group’s expense. Although not centralized, there was some minimal
coordination, to avoid mutual interference. The families competed to
maintain a system of checks and balances between equal powers. One of the
Camorra’s strategies to gain social prestige is political patronage, something
the Mafia as a group has practiced in this country since its beginning.
Ciaculli massacre
 On 30 June 1963 a car bomb that exploded in Ciaculli, an outlying suburb of
Palermo, killing seven police and military officers sent to defuse it after an
anonymous phone call was the cause of the so called Ciaculli massacre. The
bomb was intended for Salvatore "Ciaschiteddu" Greco, head of the Sicilian
Mafia Commission and the boss of the Ciaculli Mafia family. Mafia boss Pietro
Torretta was considered to be the man behind the bomb attack.
 The the culmination point of a bloody Mafia war between rival clans in
Palermo in the early 1960s – now known as the First Mafia War, a second
started in the early 1980s – for the control of the profitable opportunities
brought about by rapid urban growth and the illicit heroin trade to North
America. The struggle reaped 68 victims from 1961 to 1963.
Compare
 Best man, very close friend. Literally "Godfather" in Italian.

Consigliere
 The counsellor to the boss, usually an older family member who is respected
by family members.
Contract
 Murder assignment.

Corleonesi
 Is the name given to a faction within the Sicilian Mafia that dominated Cosa
Nostra in the 1980s and the 1990s. It was called the Corleonesi because it’s
most important leaders came from the town of Corleone, first Luciano Leggio
and later Totò Riina, Bernardo Provenzano and Leoluca Bagarella, Riina’s
brother-in-law.
Cosa Nostra
 Cosa means:”our” and Nostra means “thing”. Literally means “our thing” or
“this thing is ours”.
 The label La Costa Nostra was created by members of the FBI when the
existence of Italian Organized Crime could no longer be denied.
Designees
 Responsible for production, transportation, storage, and wholesale
distribution of drugs.

Earner
PLT COLLEGE, INC 2018-2019
Page 52
 A term that can be applied to a made member or associate. One who has the
ability to make large amounts of money on the street.
Enforcer
 A made member of the family who enforces rules, collects money etc. This is
done by intimidation, threats, violence and murder if necessary.
Fanook
 A derogatory term for homosexual.
Fazoo
 Italian slang translated as "bean" as "He has fazools in his head." Empty
headed, dumb. Also at one time used as "one hundred". "You owe me two
fazools." (You owe me two hundred dollars.)
Friend of mine
 Introduction of a third party to made members. The one making the
introduction is saying "he's not made but he is trustworthy."
Friend of ours
 Introduction of one made member to another.
Garduna
 Was a secret criminal society in Spain in the late middle Ages. It was
essentially a prison gang that grew into a more organized entity over time,
involved with robbery, kidnapping, arson, and murder-for-hire. One makes his
way to Naples and founds the Camorra. One makes his way to Calabria and
founds the 'Ndrangheta. The third makes his way to Sicily and founds the
Mafia. Additionally, the circumstances’ surrounding the original shipwreck
seem to suggest their main occupations as pirates, and alludes to a
connection with pirates throughout the Spanish Empire, including the
Americas.
Hit
 A contract to eliminate someone.
Intelligence analyst
 Analyzes information concerning organized crime.

Juice
 The excessive interest paid on money borrowed from a shylock or loan shark.
Large
 A grand, one thousand. "He owes me twenty large!" means $20,000.00.
Make your bones
 Perform a murder to further the families’ interest or the interest of the Don.
This is done to gain entrance to the family as a "made man."
Made man
 To be a member of the crime family. Entrance is gained by "making your
bones" and usually accomplished by performing a "hit" to further the
interests of the family.
The numbers
 This game dates back to 1530. Bettors attempt to pick three winning
numbers which over the course of history were drawn from different sources
at different times. The source was finally decided to be the mutual number
which was the last dollar digit of Win, Place and Show amounts bet on a
specific race at a specific race track. In the northeast it was called "Niggar
Pool" due to its enormous presence in poor African American communities. It
was also known as "Bolita" in Latin communities and was very popular in poor
PLT COLLEGE, INC 2018-2019
Page 53
Italian communities and generally known as "Policy." It drew much popularity
because for as much as one cent a bettor could win $5.00. The payout was
500 to 1 but the odds of winning were 1000:1. This game brought millions of
dollars into organized crime pockets.
Omertá
 The code of silence you must swear when you join a Family. The original code
dictated that a "Man" would through "vendetta" take care of any misdeed
done to him or his family. Reporting the misdeed to any governmental police
agency or official was strictly prohibited.
Past Posting
 Another racket where a bettor would know results before the person taking
the bet. Usually done by having a spotter in another state viewing the event
and immediately relaying the info to the bettor in an attempt to place a bet
before "Official" results are posted. This very old racket was attempted as
late as 2006.
Picciotto (plural picciotti)
 An Italian term used to refer to lower level mafioso soldiers. However,
picciotto usually indicates a younger, more inexperienced mafioso, one who
has not necessarily been made. Picciotti usually perform grittier tasks or
simple tasks such as beatings and robbery.
Pinch
 To be arrested or to "take a pinch" for another.
RP immigration gang
 Maybe the “Biggest Crime Syndicate in Asia” Cited in Philippine Star dated
November 2006 written by Delon Porcalla.
Race Wire Service
 Organized crime controlled much of the race wire service which reported
results on races around the country to local "offices" which would get the
information out to their bookies. The advantage to this was the race results
were obtained almost immediately and in a lot of cases the bookie would
know the race result before the bettors so he could accept or decline bets to
his advantage.
Shylock
 A person who lends money at a highly inflated rate of interest.
Skim
 Money taken 'off the top" before it's reported to the IRS.
Skipper
 A Captain or Capo.
Vendetta
 A series of retaliatory, vengeful or hostile acts or exchange of such acts
waged by a person or group for a perceived misdeed, slight or crime.
Vig
 Interest paid to a loan shark for a loan. Again the rate is usually due weekly
at a highly inflated rate.
Whack
 To murder someone.

PLT COLLEGE, INC 2018-2019


Page 54

You might also like