Вы находитесь на странице: 1из 193

ORGANIZED CRIME INVESTIGATION

GONZALES, RODNEY P.
R.CRIMINOLOGIST
“Organized Crime poses a direct threat to national and
international security and stability, and continues a
frontal attack on political and legislative authority.
Organized crimes disrupt and compromise social and
economic institutions, thus causing a loss of faith in
democratic process.”
Organized Crime

 Structured group of 3 or more persons.

 Acting in concert (Conspiracy)

 Commit one or more serious crimes or offenses in


order to obtain, direct or indirectly, a financial or
other material benefit.
Organized Crime

Group activities of three or more persons, with


hierarchical links or personal relationships, which
permits their leader to earn profits or control territories
or markets, internal or foreign, by means of violence,
intimidation or corruption, both in furtherance of
criminal activity and to infiltrate the legitimate economy.
Organized Crime

Any enterprise or group of persons engaged in a


continuing illegal activity which has as its primary
purpose the generation of profits and continuance of the
entreprise regardless of national borders
(INTERPOL, P.J. Ryan and G.E Rush)
Organized Crime

Any group having some manner of formalized structure


and whose primary objective is to obtain money through
illegal activities.
(FBI, H. Abbadinsky)
Organized Crime

Planned commission of criminal offenses, determined by


the pursuit of profit and power, involving more than two
persons over a prolonged or indefinite period of time,
using a commercial or business license scheme, violence
and/or intimidation.
(BKA Germany - Bundeskriminalamt)
Organized Crime

Any crime committed by a person occupying, in a


established division of labor, a position designed for the
commission of crimes providing that such division of
labor includes at least one position for corrupter, one
position for corruptee, and one position for an enforcer.
(FBI)
CORRUPTER

The one who corrupts or bribes, intimidate or threatens,


negotiate or “sweet talks” into a relationship with public
officials, law enforcement officer, or anyone who would
be of help in obtaining security and immunity from
possible arrest, prosecution and punishments.
CORRUPTEE

Public officials, Law enforcement officers or anybody


who not a member of the organization who can HELP the
organization.
ENFORCER

The one who makes for the killing arrangements for the
killing, injuring or carrying out the task physically,
economically or psychologically the members or non
members.
CHARACTERISTICS OF ORGANIZED CRIMES

1. It is CONSPIRACY activity involving coordination of


members.

2. ECONOMIC GAIN is the primary goal.

3. Economic goal is achieved through ILLEGAL MEANS.

4. Employs PREDATORY TACTICS such as intimidation,


violence and corruption.
5. EFFECTIVE CONTROL over members, associates
and victims.

6. Organized crimes DO NOT INCLUDE TERRORISTS


dedicated to political change.
ATTRIBUTES OF ORGANIZED CRIMES

1. NO POLITICAL GOALS.

OC is basically motivated by MONEY AND POWER.


Political involvement may be part of activities of
its purpose of gaining protection for its illegal activities.
2. HIERARCHICAL

An OC has a vertical power structure with at least


three (3) ranks.

The authority is inherent in the position and does


not depend on who happens to be occupying it at any
given time.
3. LIMITED OR EXCLUSIVE MEMBERSHIP

CRITERIA:
 Ethnic background, Race, Kinship;
 Criminal Record;
 Sponsorship by ranking members;
 Behavior Characteristics:

a. Willingness to commit criminal act; or


b. Follow rules and regulations and secrecy
in the organization.
4. CONSTITUTE A UNIQUE SUBCULTURE (GANG)

Members of the OC consider themselves DISTINCT


from the society,

They look at the society as “weak and stupid” and


treat them with derisions if not contempt, and therefore
not subject to its rules.

This is sometimes referred to as “THE UNDERWORLD”


Subcultural Theory
Chicago School (1920s)

“... deviant subcultural/gand participation is a


result of social and environmental problems rather than
individual personality traits/genetics such as poor
individual choices, moral failing, or psychological
disorders.”
Human Ecology Theory
Robert Park and Ernest Burgess (1922)

“... gangs and other delinquent groups arise due to the


social strain of having access to legitimate resources in
illegitimate ways.”
Strain Theory
Robert K. Merton (1930s)

“... pressure derived from social factors, such as lack of


income or lack of quality of education, drives individuals
to commit crimes.”
Social Disorganization Theory
Cliffor Shaw and Henry Mckay (1942)

“... deviance and social instability are first and foremost a


result of geographic location, as residential instability
tends to be highly concentrated in specific areas.”
Differential Association Theory
Edwin Sutherland and Donald Cressey (1934)

“...techniques and justification or rationalization for


criminal deviance are learned, specifically from intimate
friends and family members.”

“... deviant behavior are not determined at birth, but


develop over time as peer social groups shift from more
normative to more deviant friends.”
5. PERPETUATES ITSELF

An OC constitutes an ONGOING CRIMINAL


CONSPIRACY designed to persist through time.

In order to survive, it must have an


INSTITUTIONZED PROCESS for inducting new members
and inculcating them with the values and ways of
behaving of the social system.
6. WILLINGNESS TO USE ILLEGAL VIOLENCE AND
BRIBERY

Violence is readily available and acceptable in an


OC as a MEANS TO ACHIEVE ITS GOAL.

Bribery for PROTECTION and LESSER CHANCE


detection and suppression.
7. SPECIALIZATION AND DIVISION OF LABOR

There is a need for ESTABLISHED FUNCTIONAL


POSTION filled with qualified members.

EXAMPLES:
Enforcer
Corrupter
8. MONOPOLISTIC

An OCG ESCHEW (avoid) COMPETITION.

It strives for HEGEMONY (control/influence) over a


particular geographic area, a particular “industry”,
legitimate or illegitimate or combination of both.

Maintained by methods of VIOLENCE AND


CORRUPTION
9. GOVERNED BY EXPLICIT RULES AND REGULATIONS

In an OCG, a rule-violating member is NOT FIRED


but more likely, FIRED UPON.
STRUCTURE OF ORGANIZED CRIME GROUPS

1. THE BUREAUCRATIC OR CORPORATE MODEL

The corporation, the police, and the military are


examples of bureaucracies, that mode of organization
for efficiently carrying out large scale tasks.
Main Features:

a. Complicated heirarchy
b. An extensive division of labor
c. Position and recruitment is based on skill
d. Responsibilities are carried out impersonally
e. Extensive rules and regulations
f. Written communications down the heirarchy
2. PATRIMONIAL OR PATRON CLIENT

The patron/client system can be defined as a


mutual arrangement between a person that has
authority, social status, wealth, or some other personal
resource (patron) and another who benefits from their
support or influence (client).
Main Features:

a. Closed network (Hard for the police to penetrate)


b. Opportunities for criminal activities are initiated by
low ranked members.
c. Service and Protection
d. May hire the expertise of some criminals
e. Immediately adjust if a leader is incapable.
GENERIC TYPE OF ORGANIZED CRIMES

1. POLITICAL GRAFT

Committed by POLITICAL CRIMINALS for purposes


of gaining profit through violence or force such as use of
private armies, vote-buying or threatening voters.
2. IN-GROUP ORIENTED OC

Manned by semi-organized individual with the end


view of attaining psychological gratification such a
adolescent gangs.
3. MERCENARY OR PREDATORY OC

Perpertuates for the attainment of direct personal


gain but prey upon unwilling victims.

4. SYNDICATED CRIMES

Comes with a structured organization that


participates in illicit activity in society using force, or
intimidation.
SOURCES OF ILLEGAL PROFIT

It includes but not limited to most victimless crimes,


such as:

A. Illegal Drugs
B. Alcohol
C. Gambling
D. Pornography; and
E. Bank fraud, extortion, or racketeering
TYPICAL ORGANIZED CRIME ACTIVITIES

A. CORRUPTION

The use of legislated powers by government


officials for illegitimate private gain.
1. BRIBERY

Connotes the idea of a public officer utilizing the power,


influence or prestige of his office for the benefit of an
individual inexchange for a consideration.

a. Direct Bribery
b. Indirect Bribery
c. Qualified Bribery
a. DIRECT BRIBERY (ART. 210, RPC)

Three Ways of Commission:

1. Agreeing to perform an act constituting a


crime in connection with the performance of official
duties in consideration of any offer, promise, gift or
present

2. Accepting a gift in consideration of the


execution of an act which does not constitute a crime,
in connection with the performance of his official
capacity.
3. Refraining from doing something which is his
official duty to do, in consideration of a gift received or
promise.

b. INDIRECT BRIBERY (ART. 211, RPC)

1. Offender: Public Officer


2. He accepts gifts
3. The gifts are offered to him by reason of his
office
c. QUALIFIED BRIBERY ( ART. 211-A, RPC)

1. Offender is a public officer entrusted with law


enforcement.

2. He refrains from arresting or prosecuting an


offender who has committed a crime.

3. Offender has committed a crime punishable


by reclusion perpetua and/or death.

4. In consideration of any offer, promise, gift or


present.
*** If the public officer who asks or demands such gift
or present, shall suffer the penalty of DEATH.
2. GRAFT
It only requires that an official has gained
something of value, not part of his official pay, when doing
his work.

3. PATRONAGE
Favoring supporters during the previous election

4. NEPOTISM
Favoring relatives

5. CRONYISM
Favoring personal friends
6. EMBEZZLEMENT
Theft or misappropriation of entrusted resources
7. KICKBACK
It is the official’s share of misappropriated funds
from his office made possible by corrupt bidders
CONDITIONS FAVORABLE FOR CORRUPTION

1. Information deficit

2. Lack of control by the government

3. Opportunities and incentives

4. Social conditions
e.g. Illiteracy, Racial discrimination, Tribal
solidarity
B. GAMBLING

Is the wagering of money or something of material


value on an event with an uncertain outcome with the
primary intent of winning additional money and/or
material goods.
C. LOANSHARKING (USURY)

Refers to the lending money at an interest rate that


exceeds the allowable legal limit.

Refers to predatory lending practices by individuals


or organizations that charge high interest rates.
Types:
1. Payday Loan
2. Yamikinyu (Japan)
3. Ah Long (Malaysia and Singapore)
D. PORNOGRAPHY OR PORN AS AN ORGANIZED CRIME

Is the depiction of explicit sexual subject matter


for sexually exciting the viewer.

It refers to any representation, through publication,


exhibition, cinematography, indecent shows, information
technology, or by whatever means, of a person engage in
a real or simulated explicit sexual activities or any
representation of the sexual parts of the person for
primarily sexual purposes.
“Explicit Sexual Activities”
[ Section 3 (c), RA 9775 ]

Includes actual or simulated :


i. Sexual Intercourse or lascivious act...;
ii. Bestiality;
iii. Masturbation;
iv. Sadistic or Masochistic Abuse;
v. Lascivious Exhibitions; or
vi Use of any object or instrument for
lascivious acts.
Grooming

“... act of preparing a child or someone who


the offender believes to be a child for sexual activity or
relationship. It includes online enticement through any
other means.”
Luring

“.. act of communicating, by means of a


computer system, with a child or someone who the
offender believes to be a child for the purposes of
facilitating the commission of sexual activity or
production of any form of child pornography.”
Pandering

“... act of offering, advertising, promoting,


representing, or distributing through any means any
material or purported material that is intended to cause
another to believe that the material or purpoted
material contains any form of child pornography,
regardless of the actual content of the material or
purported material.”
E. PROSTITUTION

Is defined as the act or practice of engaging in


sexual acts for hire .

Venue:
Street, Brothel, Escort, Private, Window/Doorway,
Club, other all male venues, Door Knock or Hotel,
Transport.
Definition of Terms:

1. WHORE
The usual term for a commercial sex worker
or sex trade worker.

2. HOOKER/STREET WALKER
One who solicits customers in pulic places.

3. CALL GIRL
Makes appointments by phone.
4. GIGOLO
One who offers services to female customers.

5. HUSTLERS OR RENTBOYS
Those offering services to male customers

6. PIMPS (MALE) AND MADAMS ( FEMALE)


Organizers of prostitution or procurers for
customers.
7. JOHNS OR TRICKS
The customers of prostitutes in North America

8. PUNTERS
The British customers of prostitutes

9. KERB CRAWLERS
Men who drive along red-light districts to
solicit prostitutes.
TYPES OF PROSTITUTION

1. ESCORT PROSTITUTION
OUT-CALL AND IN-CALL.

2. LOT LIZARD
Serves those who are in the trucking industry.

3. STREET PROSTITUTION
Solicits customersin street corners or walking
the streets.
4. SKEEZERS
Trade sex for illegal drugs.

5. SEX TOURISM
The commercial sexual relation by the tourist
with residents at the destination.
F. TRAFFICKING IN PERSONS

HUMAN TRAFFICKING

The term mean the recruitment, transportation,


harboring, or receipt of people for the purposes of
slavery,
prostitution, forced labor (including bonded labor or debt
bondage), and servitude.
SOME CAUSES AND FACILITATORS OF TRAFFICKING IN
PERSONS

1. Organized crime
2. Economic disparities
3. Social discrimination
4. Political instability
5. Armed conflicts
6. Profitability
7. Insufficient penalties against traffickers
8. Minimal law enforcement on global sex tourism
industry
9. Legal processes that prosecute victims instead of
the traffickers
10. Poor international border defense
G. RACKETEERING
Often associated with organized crime, is the act of
offering of a dishonest service (a "racket") to solve a
problem that wouldn't otherwise exist without the
enterprise offering the service.

TYPES:
1. BUSINESS RACKETEERING
2. LABOR RACKETEERING
3. PROTECTION RACKETEERING
1. BUSINESS RACKETEERING

The act of operating an illegal business or scheme in


order to make a profit, perpetrated by a structured
group.

It is a broad category of criminal acts. It includes theft


and fraud against businesses or individuals
REASONS FOR BUSINESS RACKETEERING

1. Expand their illegitimate undertakings.


2. Legitimate business can conceal their illegitimate
activities.
3. Provides money-laundering opportunity.
4. It is an excellent source of legitimate and portable
income.
5. it will lessen competition
6. Integration of legitimate business into the
community.
2. LABOR RACKETEERING

Is the use of union power for personal profit and its


heart relies on fear.

Labor racketeering is the domination, manipulation, and


control of a labor movement in order to affect related
businesses and industries.

It can lead to the denial of workers’ rights and inflicts an


economic loss on the workers, business, industry,
insurer, or consumer.
3. PROTECTION RACKETEERING

Extortion scheme whereby a criminal group or individual


coerces a victim to pay money, supposedly for protection
services against violence or property damage.
H. MONEY LAUNDERING

Is the practice of disguising illegally obtained funds


so that they seem legal.

A crime whereby the proceeds of specified


unlawful activities are transacted, making them appear
to have originated from legitimate sources.

(Section 4, RA 9160, as amended)


STAGES OF MONEY LAUNDERING

1. PLACEMENT

‘IMMERSION’.

Criminal groups sometimes achieve this by


‘SMURFING’: moving small amounts at time to avoid
raising suspicion.
2. LAYERING

‘HEAVY SOAPING’.

It involves the creation of false paper trail,


conversion of cash into monetary instruments and the
conversion of tangible assets obtained by mean of cash
purchases.

The use of electronic methods to facilitate the


layering process is increasing.
3. INTEGRATION

SPIN DRY

Repatriating the money in the form of clean, often


taxable, income.
I. KIDNAP FOR RANSOM

MODUS OPERANDI
a. Spotting
b. Surveillance
c. Risk Analysis and Target Selection
d. Abduction of the Victim
e. Ransom Demand
f. Collection of Ransom
J. CARNAPPING
(RA 10883)

Carnapping is the taking, with intent to gain, of a motor


vehicle belonging to another without the latter’s
consent, or by means of violence against or intimidation
of persons, or by using force upon things.
EFFECT WHEN MOTOR VEHICLE IS USED IN A CRIME

Aggravating Circumstance, if the crime was committed as


a means thereof;
( Sec.20, Article 14 Aggravating Circumstances, RPC)
ACTS CONSIDERED CARNAPPING

A. When MV engine, engine block or chassis is not


registered with the LTO shall be considered as untaxed
importation or coming from an illegal source or
carnapped, and shall be confiscated in favor of the
government.

B. Defacing or tampering with serial numbers of MV


engines, engine blocks and chassis, perforce constitute
carnapping.
C. When MV is assembled and rebuilt or repaired by
replacement engines, engine blocks and chassis not
registered with LTO shall not be issued certificate of
registration and shall be considered as untaxed imported
vehicle or MV carnapped or proceeding from illegal
source.
CARNAPPER'S HAVEN

a. Public parking places


b. Eateries parking spaces
c. Valet parking arena
d. While parked along roadside
e. At pay parking zones
f. Open car garage
MODUS OPERANDI: WHILE PARKED

a. By the use of false key to open the door


b. By diamond cutter on glass window
c. By U-magnet to unlock door
d. By battery-operated penetrator to blast key hole
e. By outstripping rubber around glass windshield
f. By high tech method that can pry open even magic
keyhole.
g. Under guise of using tow truck
MODUS OPERANDI: WHILE ON THE ROADWAY

a. Taxicab is the easiest road prey.


b. Overtake and block target victim at gunpoint when
refuse to stop.
c. Board public utility vehicles and divest occupants.
d. Bump rear guard or side swipe MV to force driver to
stop and check.
e. By scissor-cut schemes to block mobility
f. Bodily shove driver while on stop at red traffic signal
ORGANIZED CRIME GROUPS
The Most Powerful Organized Crime Groups in the
World:

1. Solntsevskaya Bratva (Russian Mafia)

Revenue: $8.5 Billion

Source of profit :
Heroin trade that originates in
Afghanistan.
2. Yamaguchi Gumi (Yakuza-Japan)

Revenue: $6.6 Billion

Sources of profit:
Drugs,
Gambling Extortion
3. Camorra (Naples)

Revenue: $4.9 Billion

Sources of profit:
Sexual Exploitation
Firearms Trafficking
Drugs
Counterfeiting and Gambling
Usury and Extortion
4. 'Ndrangheta (Calabria Region, Italy)

Revenue: $4.5 Billion

Source of Profit:
Same illicit activities as Camorra
Cocaine deals in South America
5. Sinaloa Cartel (Mexico)

Revenue: $3 Billion

Source of Profit:
Illegal drugs (Middleman between South
American and unquenchable American
Market.
MAFIA (Cosa Nostra - “Our Thing”)

Sicilian criminal secret society which is believed to have


first developed in the mid-19th century in Sicily.

“Mafia” came from a Sicilian-Arabic slang expression


that means -

“Acting as a protector against arrogance of the


powerful .”
“Mafiusu/Mafiusi”

Aggressive boasting or bragging


Swagger/ Boldness/ Bravado

“Marfud”

Rejected
***In reference to a man, MAFIUSU in 19th century
Sicily was:
• Ambiguous,
• Signifying a bully,
• Arrogant

But also...

• Fearless, enterprising, and proud.


The Sicilians also have a law of silence, called OMERTA;

It forbids the common man, woman or child to


cooperate at all with the police or the government, upon
pain of death.
MAFIA (TERMINOLOGY)
Terms Meaning

Capofamiglia Don/ Boss

Consigliere Counsel/ Advisor/ Right-


hand man

Sotto Capo Underboss/ Secon-in-


command

Capodecina Captain/ Capo


Uomi D'onore Men of Honor

Capo di Tutti Capi Boss of All Bosses

Capo Crimine Crime Boss


Don (Head of the Crime
Family)

Capo Bastone Club Head


Underboss ( second-in-
command to the Capo
Crimine)
Consigliere Advisor

Caporegime Regime Head


Captain who commands a
“crew of around ten
Sgarriste or soldiers”

Sgarrista or Soldato Soldier


Foot Soldiers

Picciotto Little Man


Low Ranking member who
serves as an “enforcer”
Giovane D'onore Associate member

Usually someone not of


Italian Ancestry
DIVISIONS OF THE MAFIA
SICILIAN MAFIA
(Sicily)

The Sicilian Mafia formed in the mid-1800s to unify the


Sicilian peasants against their enemies.

In Sicily, the word Mafia tends to mean “manly.”

The Sicilian Mafia changed from a group of honorable


Sicilian men to an organized criminal group in the 1920s.
RITUALS

1. No one can present himself directly to another


of our friends (A third person must to do it)

3. Never look at the wives of friends

4. Never be seen with cops

5. Don’t go to pubs and clubs


6. Always being available for Cosa Nostra is a
duty – even your wife is about to give birth.

7. Appointments must absolutely be respected

8. Wives must be treated with respect

9. When asked for any information, the answer


must be the truth

10. Money cannot be appropriated if it belongs to


others or to othe families
11. People who cannot be part of Cosa Nostra:
anyone who has a close relative in the police,
anyone with a two-timing relative in the family,
anyone who behaves badly and doesn’t hold
to moral values
Camorra or Neapolitan Mafia

The word “Camorra” means GANG.

The Camorra first appeared in the mid-1800s in Naples,


Italy, as a prison gang.

Once released, members formed clans in the cities and


continued to grow in power.

The Camorra has more than 100 clans and approximately


7,000 members, making it the largest of the Italian
organized crime groups.
’Ndrangheta or Calabrian Mafia

Greek word : “COURAGE OR LOYALTY”

They formed in the 1860s when a group of Sicilians were


banished from the Italian government. They settled in
CALABRIA and formed small criminal groups.

There are about 160 'Ndrangheta cells with roughly


6,000 members.

Specialized in kidnapping and political corruption


Sacra Corona Unita or United Sacred Crown

It started as a prison gang.

As its members were release, they settled in the Puglia


region in Italy and continued to grow and form links with
other Mafia groups.

It is headquartered in Brindisi, located in the


southeastern region of Puglia.

Specialized in: Smuggling cigarettes, drugs, arms &


people
YAKUZA

The term came from a Japanese card game,


OICHO-KABU
(Played with HANAFUDA AND KABUFUDA CARDS).

The worst hand in the game is a set of


EIGHT, NINE, and THREE

In Japanese counting: YA (8) - KU (9) - SA (3)


“YAKUZA”
OYABUN
Family boss

SAIKO- KOMON WAKAGASHIRA SHATEIGASHIRA


Administration 1st lieutenant 2nd lieutenant

SHINGIIN KYODAI SHATEI


Law advisor Big brother Little brother

KAIKEI
accountant
YAKUZA

1. Members usually wear sunglasses and colorful suits


so that their profession could be immediately
recognized by civilians

2. Members walk arrogantly with wide gaits

3. Members dress conservatively and flash their


tattoos only when the need arises
4. Some sport insignia pins on their lapels

5. Majority of their income comes from protection


rackets in shopping, entertainment and red-
light districts within their territory due to the
reluctance of both the businesses and the
police.
6. The yakuza is regarded as a semi-legitimate
organization,

e.g. Just after the Kobe earthquake, the


Yamaguchi-gumi provided disaster relief services
in contrast to the much slower response by the
Japanese government.
RITUALS

1. IREZUMI

“BODY TATOOING”

...still often HAND-POKED, that is, the ink is


inserted beneath the skin using non-electrical, hand-
made and hand held tools with needle or sharpened
bamboo.

Expensive, painful and may take years to


complete.
2. PEARLINGS

“... a PEARL is inserted in their penis underneath


the skin for every year that they are in prison.”

3. SOKAIYA

This is a unique form of extortion wherein the


yakuza, in their protection racket, they harass the
stockholder’s meetings of large corporations instead of
harassing small businesses.
4. YUBITSUME
“FINGER-CUTTING”

A form of penance or apology.

First Offense
Cut off the tip of his LEFT LITTLE FINGER
and hand the severed portion to his boss.
5. SAKE-SHARING CEREMONY

Used to seal bonds of brotherhood between


individual YAKUZA members or between YAKUZA
GROUPS.
YAKUZA FAMILIES

1. YAMAGUCHI-GUMI (1915)

Biggest YAKUZA family.

HQ: Kobe

OYABUN: SHINOBU TSUKASA


( KENICHI SHINODA)
2. SUMIYOSHI-RENGO / SUMIYOSHI-KAI
Second Largest YAKUZA family.

OYABUN: SHIGEO NISHIGUCHI

3. INAGAWA-KAI
Third Largest YAKUZA family.
First YAKUZA to expand its operations outside of
Japan.

OYABUN: HIDEKI INAGAWA


4. TOUA YUAI JIGYO KUMIAI

Founded by Hisayuki Machii in 1948,

OYABUN: SATORU NOMURA


CHINESE TRIAD

Refers to society's common mystical symbol; and


equilateral triangle representing Chinese basic concept
of HEAVEN, EARTH AND MAN.

Triad's membership requires sponsorship from a high


ranking official of the society and many are involved in
martial arts.
TONGS

Originated among early-marginalized Chinatown


communities to protect themselves from the natives, but
because it had no political motives, they soon found
themselves in criminal activities like extortion, gambling,
human traffcking, murder and prostitution.
JAMAICAN POSSE

Is a loose coalition of gangs based in New York and


Toronto that is affiliated with the Jamaica Labour Party
and the People’s National Party. In UK where most of
them live in London, they are called Yardies.
RUSSIAN MAFIA

The Russian Mafia, Red Mob or Bratva; slang for


"brotherhood", which applies to all gangs, including
rivals) — often transliterated as Mafiya — are names
designating a diverse group of organized crime
syndicates originating in the former Soviet Union (Since
the 1991 fall of the USSR, these groups have amassed
considerable worldwide power and influence.
ORGANIZED CRIME GROUPS IN RUSSIA

1. Chechens – most notorious; Caucasus Mountain;


bank fraud and extortion

2. Dolgoprudny- protection rackets

3. Lyubertsy- nationalist party; beats up anyone who


is seen as a counterculture

4. Solntsevo- runs slot machines and taxi rings


5. Solntsevskaya Bratva
it is considered the most powerful OCG in the
world and the most dangerous operating in Moscow.

6. Dolgoprudnenskaya Bratva
a very influential OCG and considered the largest
OCG in Moscow.

7. Izmaylovskaya Bratva
it is the oldest of the Russian Mafia Groups that
utilized quasi-military ranks and strict internal discipline.
It was involved in murder for hire, extortion and
infiltration of legitimate businesses.
8. Obshina or Chechen Mafia
It was a formidable OCG and paramilitary group
that once formed the most dominant minority criminal
group in Russia. It is believed that it has ties with the
Chechen militant factions.

9. Solntsevo
A criminal group in Russia that runs slot machines
and taxi rings.
MEDELLIN CARTEL

An organized network of "Drug Suppliers and Smugglers"


originating in the city of Medellín, Colombia.

The Cartel operated in Colombia, Bolivia, Peru, Central


America, the United States, as well as Canada and even Europe
throughout the 1970s and 1980s.

It was founded and run by Pablo Escobar together with the


Ochoa Vázquez brothers Jorge Luis, Juan David and Fabio.

During the height of its operations, the Cartel brought in


more than $60 million per day.
CALI CARTEL

Cali Cartel was a drug cartel based in southern


Colombia around the city of Cali and the Valle del Cauca
Department.

The Cali Cartel was founded by the Rodríguez Orejuela


brothers, Gilberto and Miguel, as well as associate José
Santacruz Londoño.
ORGANIZED CRIME GROUPS IN THE PHILIPPINES
AND OTHER REBEL/ TERRORIST GROUPS
KURATONG BALELENG

If Colombia had Cali Cartel, the Philippines had the


Kuratong Baleleng Gang.

Head:
OCTAVIO “ONGKOY” PAROJINOG SR.
“Robin Hood of Lawis (Inside)”
The group was based in Ozamiz and also present
in different parts of Mindanao, Cebu City, Metro
Manila and nearby towns.

Rumors spread that the group is also using their


military-issued guns for illegal activities such as
kidnappings, robberies, extortion, drug trafficking,
and other crimes.
FRANCISO GROUP

An OCG in the Philippines that is formerly known as


DRAGON OR KURATONG BALELENG GROUP, now led by
MANUEL FRANCISCO.

Operates in the cities of Cagayan de Oro, Pagadian,


Dipolog and other neighboring cities and municiplaitie in
Mindanao.
AKYAT BAHAY GANG

Known as a violent home invasion-oriented gang which


also has a history with drug dealing.
BAHALA NA GANG

A KFR group that is known in English as “Come What


May.” It is one of the most notorious Filipino Gangs
created and fromed in notorious prisons in the early
1940's.

Tattoo of question mark (?) is their identity as members


of the gang located in any part of their body.
LOST COMMAND GROUP

A KFR group where the members were former policemen


and soldiers who were jobless after the 1986 EDSA
Revolution who are seasoned combatants and good in
intellignece.
PENTAGON GROUP

Headed by Tahir Alonto

Engaged primarily in KFR and operates in


Mindanao.

This group is a creation of the Moro Islamic


Liberation Front (MILF). It was organized not only to
generate funds for the latter through illegal means but
also insulate the MILF from accusations that its members
are involved in purely criminal acts.
LEXUS GROUP

A carnapping group with around 37 members operating


in NCR, and Regions 3 and 4, all in Luzon.
REX “WACKY” SALUD GROUP

Rex “Wacky” Salud Group with 30 members operating in


Cebu.

They are engaged in illegal gambling.


VICVIV YU GROUP

Operating in Central Visayas and also engaged in illegal


gambling.
ILONGGO KFR GROUP

It is composed of the remnant of the paramilitary force


KURATONG BALELENG.

Engaged in Extortion, Protection Racket, and Bank


Robbery in Misamis Occidental.
WARAY-ABUYOG GROUP

It is composed of hardened criminals from Samar and


Leyte.

It operates in Metro Manila and hibernates in the said


provinces after the successful execution of their heists.
TERRORISM (Latin: Terrere - to frighten)
(RA 9372)

“... sowing and creating a condition of widespread and


extraordinary fear and panic among the populace.”

“... in order to coerce the government to give in to an


unlawful demand.”
AL-QAEDA (“THE BASE”)

An international terrorist group established by


OSAMA BIN LADEN, in the late 1980s to bring together
Arabs who fought in Afghanistan against the Soviet
Invasion.

Goal: Establish as PAN-ISLAMIC CALIPHATE

Through : Overthrowing regimes it deems “non-


Islamic” and expelling Westerners & Non-Muslims from
Muslim Countries.
ABU SAYYAF GROUP (ASG)
“THE SWORD BEARER”

Founded by : Abdujarak Janjalani in 1989


It split from the MNLF.

Goal: To create a Muslim State of Mindanao and


Islamization of entire Philippines.

First Major Attack: Abu Sayyaf grenade killed two


Amercian Evangelists in 1991.
HAMAS

Its roots are in the Palestinian branch of the Muslim


Brotherhood. HAMAS's strength is concentrated in the
Gaza Strip and areas of the West Bank.

Goal: Establish an Islamic Palestinian State in place of


Israel and rejects all agreements made between
Palestine and Israel.

Leader: Ismail Haniyeh


HEZBOLLAH
“THE PARTY OF GOD”

A Lebanon-based Shia terrorist group.

Goal: During the Israeli invasion of Lebanon in 1982, a


group of Lebanese Shīʿite clerics formed Hezbollah with
the goal of driving Israel from Lebanon and establishing
an Islamic state there.

Leader: Hassan Nasrallah


JEMAAH ISLAMIYA

Indonesian-based clandestine terrorist network.

Goal: Establish an Islamic State encompassing


southern Thailand, Malaysia, Singapore, Indonesia,
Brunei, and the southern Philippines.

Trained in Afghanistan and the Philippines.

Leader: Abu Bakar Bashir


ISLAMIC STATE IN IRAQ AND SYRIA

Started as an Al Qaeda splinter group.

Goal: To create an Islamic State called a caliphate


across Iraq, Syria and beyond.

Leader: Abu Bakr al-Baghdadi


BANGSAMORO ISLAMIC FREEDOM FIGHTERS (BIFF)

It is a Muslim militant organization based in Central


Mindanao.

They broke away from the MILF in 2008.

Goal: Independence for the Bangsamoro area, and they


have declare that they will not settle for anything less.

Leader: Sheik Ismail Abubakar who replaced Ustadz


Umbra Kato.
MORO NATIONAL LIBERATION FRONT

“Jabidah Massacre” (Corregidor, March 18, 1968)

Nur Misuari, a UP Professor rose to become the leader


of the outraged group and founded the MNLF in 1969.

Goal: Creation on an autonomous Muslim State in


the Southern Philippines. ( 2 Islands of Mindanao and
Sulu Archipelago - 13 Provinces)
MORO ISLAMIC LIBERATION FRONT

It is a splinter group of the MNLF.

Hashim Salamat, led the break from the MNLF.

Goal: Liberate Mindanao and surrounding islands


from the government and forming them into an
independent Islamic State in the Southern Philippines.
RAJAH SOLAIMAN MOVEMENT

Founded by Ahmad Santos in 2001.

Members are Filipino Christians who have converted to


Islam.

Ahmad Santos, used the Fi Sabilillah Da'wah and Media


Foundation (FSDMFI) as a base for recruitment,
idoctrination, training, fundraising, logistical support and
other activities. (Balik-Islam Movement)
NEW PEOPLE'S ARMY

The Armed Wing of the Communist Party of the


Philippines.

It was founded in Central Luzon (Tarlac and Pampanga)


on March 29, 1969, with Bernabe Buscayno as the
founding commander-in-chief.

Leader: Jose Maria Sison


The NPA's aim is to overthrow the government through
protracted guerilla warfare.

Goal: Overthrow the Filipino Government and replace


it with a communist/socialist state.
ANTI-ORGANIZED CRIME EFFORTS
1. REPUBLIC ACT 9160
The Anti-Money Laundering Act of 2001

2. REPUBLIC ACT 9208


The Anti-Trafficking in Persons Act of 2003

3. REPUBLIC ACT 9775


The Anti-Child Pornography Act
4. REPUBLIC ACT 3019
The Anti-Graft and Corrupt Practices Act

5. REPUBLIC ACT 7080


The Anti-Plunder Law

6. REPUBLIC ACT 9372


The Human Security Act
7. OPLAN CLEANSWEEP
DRUG TRAFFICKING

8. OPLAN SALIKOP
CAMPAIGN AGAINST OCGs and CRIMINAL GROUPS.

9. OPLAN LIGTAS
CAMPAIGN AGAINST KFR

10. OPLAN SAGIP ANGEL


AGAINST CHILD ABUSE, MALTREATMENT AND
EXPLOITATION.
PRESIDENTIAL ANTI-ORGANIZED CRIME COMMISSION
&
PRESIDENTIAL ANTI-ORGANIZED CRIME TASK FORCE
(EO 22, S. 1998, sgd. JOSEPH ESTRADA)
POLICE ANTI-CRIME EMERGENCY REPONSE
(PACER)
This unit adopts cohesive military tactics to go after
kidnappers and drug dealers including their financial and
support network.

NATIONAL ANTI-KIDNAPPING TASK FORCE


(NAKTF)
Taksed lead a national, integrated, comprehensive and
synchronized effort to reduce, if not eliminate
kidnapping in the country.
PHILIPPINE CENTER ON TRANSNATIONAL CRIME
“... formulate and implement a concerted program of
action of all law enforcement, intelligence and other
government agencies for prevention and control of
transnational crime”

(EO 62, s.1999, sgd. JOSEPH ESTRADA)


LEGAL OBSTACLES: WHY LAW ENFORCEMENT IS PASSIVE

1. Right of the accused to counsel in all stages of the


investigation.

2. Right of the accused to remain silent during


interrogation.

3. Life is valuable than property doctrine: killing


carnappers, unless in complete self defense, is a
felonious act

4. Strong human rights advocates


5. No warrantless arrest, unless the crime is committed
in the presence of the arrestor.

6. Buyer’s in good faith alibi: police wanting legal savvy


will succumb to this argument although considered
the weakest market of defense.

7. Placing roadblocks or checkpoints: in the light of the


Supreme Court ruling, the operational efficacy against
ambulatory crime is affected.
CYBERCRIME
CYBERCRIME

1. Any offense that is committed by a computer,


computer system or computer network (TOOL)

2. Any offense in which the computer, computer system


or computer network is the target (SUBJECT)

3. Any offense in which the computer, computer system


or computer network is used to hide or store possible
evidence (INCIDENTAL TO THE CRIME)
RELATED LAWS:

1. RPC (BK.2) ART. 355-LIBEL


2. RA 4200 ANTI-WIRETAPPING LAW
3. RA 8484 ACCESS DEVICE REGULATION ACT (1998)
4. RA 8792 E-COMMERCE ACT OF 2000
5. RA 9208 ANTI-TRAFFICKING IN PERSONS (2003)
6. RA 9775 ANTI-CHILD PORNOGRAPHY (2009)
7. RA 9995 ANTI-PHOTO AND VOYEURISM (2009)
REASON FOR RA 10175

“I LOVE YOU VIRUS”


by ONEL de GUZMAN (2000)

He went unpunished because the Philippines had


no law covering the crime.
DEFINITION OF TERMS

1. Access
Refers to the instruction, communication with,
storing data in, retrieving data from, or otherwise
making use of any resources of a computer system or
communication network.
Acess Device
Means any card, plate, code, account number,
electronic serial number, personal identification number,
or other telecommunications service, equipment, or
instrumental identifier, or other means of account access
that can be used to obtain money, good, services, or
any other thing of value or to initiate a transfer of funds
(other than a transfer originated solely by paper
instrument);
Asymmetric or Public Cryptosystem
System capable of generating a secure key pair,
consisting of a private key for creating a digital signature
and a public key for verifying the digital signature.
2. Cyber
Refers to a computer or a computer network, the
electronic medium in which online communication takes
place.

3. Interception
Refers to listening to, recording, monitoring or
surveillance of the content of communications, including
procuring of the content of data, either directly, through
access and use of a computer system or indirectly, through
the use of electronic eavesdropping or tapping devices, at
the same time that the communication is occurring.
4. Computer-Related Forgery
The input, alteration, or deletion of any computer data
without the right resulting in inauthentic data with the
intent that it be considered or acted upon for legal
purposes as if it is were authentic, regardless whether
the data is directly readable and intelligible.

5. Computer-Related Fraud
The unauthoried input, alteration, or deletion of
computed data or progra or interference in the
functioning of a computer system, causing damage
thereby with fraudulent intent.
6. Computer-Related Identity Theft
The intentional acquisition, use, misuse, transfer,
possession, alteration, or deletion of identifying
information belonging to another, whether natural or
judicial without right.

7. Cyber Squatting
The acquisition of a domain name over the
internet in bad faith to profit, mislead, destroy
reputation, and deprive others from registering the
same.
8. Denial of Service Attack
The bandwidth of the victim’s network is flooded
or his e-mail box is filled with spam mail depriving him of
the services he is entitled to access or provide.

9. Virus Dissemination
This is usually done by means of a malicious code
or software that modifies or destroys data, steals data or
allows unauthorized access, or exploits or damages a
system in a manner not intended by the user.
10. Web Defacement
This is the act of the intruder into a server and
changing without permission all the aspect of a website
which the public can see.

11. Salami attacks (Salami Slicing)


A fraud activity in a bank where an employee steals a
small amount of funds from several accounts.

12. Viruses
Programs that attach themselves to a computer or a
file and then circulate themselves to other files and to
other computers on a network.
13. Logic bombs
Event dependent programs. This implies that these
programs are created to do something only when a certain
event.

14. Trojan attacks-


‘Trojan horse’

In software field this means an unauthorized


programme, which passively gains control over another’s
system by representing itself as an authorised programme
15. Internet time thefts
Normally in these kinds of thefts the Internet
surfing hours of the victim are used up by another
person.

16. Web jacking


This term is derived from the term hi jacking.
In these kinds of offences the hacker gains access
and control over the web site of another. He may even
mutilate or change the information on the site.
17. Phising
Is a new form of identity theft which occurs when
scammers send mass e – mail posing as banks,
credit card companies, or popular commercial web -
sites, asking recipients to confirm or update personal
and financial information in a hyperlink to a look
like coming from the original web site.
18. Cyber Stalking/Harassment
The Criminal follows the victim by sending emails,
entering the chat rooms frequently.

19. Cyber Defamation


The making of a false statement of fact that
injures someone’s reputation.

20. Software Piracy


Theft of software through the illegal copying of
genuine programs (counterfeiting) and distribution of
products intended to pass for the original
21. E-mail Spoofing
The emails are misrepresented and they usually contain
viruses

22. Computer vandalism


Any physical harm done to the computer set

23. Cyber Terrorism


It is the premeditated use of disruptive activities, or the
threat thereof, in cyber space, with the intention to further
social, ideological, religious, political or similar objectives,
or to intimidate any person in furtherance of such
objectives.
24. Cyber Fraud and Cheating
It is the most lucrative business nowadays that consist
of credit card crimes, contractual crimes, offering jobs, etc.

25. Harassment via emails


The person threatens or blackmails the victim by
sending him emails

26. Computer Sabotage


Is the input, alteration, erasure or suppression of
computer or communication data, programs, systems or
networks. It also includes computer fraud and forgery.
27. CREDIT CARD FRAUD
It is a wide-ranging term for theft and fraud
committed using credit cards or any similar payment
mechanisms as fraudulent source of funds in a
transaction.
The purpose it is either to obtain goods without
paying or to obtain unauthorized funds from an account.
The most common methods of fraud today include:
copying and cloning of cards, ATM fraud, Internet card
fraud, and PIN number stealing.
PREVENTION OF CYBER CRIMES

1. To prevent cyber stalking, avoid disclosing any information


pertaining to oneself in the cyber space, especially to strangers

2. Avoid sending any photograph online particularly to


strangers and chat friends as the photographs maybe misused

3. Always use latest and update antivirus software to guard


against virus attacks

4. Always keep back-up volumes in order to avoid data loss in


case of virus contamination
5. Never send your credit card number to any unsecured
site, to guard against fraud.

6. Always keep watch on the sites your children has access


to prevent any kind of harassment or depravation in children

7. Use security programs

8. Web site owners should watch traffic and check any


irregularity on the site

9. Use firewall
10. USE YOUR COMMON SENSE

Вам также может понравиться