Академический Документы
Профессиональный Документы
Культура Документы
GONZALES, RODNEY P.
R.CRIMINOLOGIST
“Organized Crime poses a direct threat to national and
international security and stability, and continues a
frontal attack on political and legislative authority.
Organized crimes disrupt and compromise social and
economic institutions, thus causing a loss of faith in
democratic process.”
Organized Crime
The one who makes for the killing arrangements for the
killing, injuring or carrying out the task physically,
economically or psychologically the members or non
members.
CHARACTERISTICS OF ORGANIZED CRIMES
1. NO POLITICAL GOALS.
CRITERIA:
Ethnic background, Race, Kinship;
Criminal Record;
Sponsorship by ranking members;
Behavior Characteristics:
EXAMPLES:
Enforcer
Corrupter
8. MONOPOLISTIC
a. Complicated heirarchy
b. An extensive division of labor
c. Position and recruitment is based on skill
d. Responsibilities are carried out impersonally
e. Extensive rules and regulations
f. Written communications down the heirarchy
2. PATRIMONIAL OR PATRON CLIENT
1. POLITICAL GRAFT
4. SYNDICATED CRIMES
A. Illegal Drugs
B. Alcohol
C. Gambling
D. Pornography; and
E. Bank fraud, extortion, or racketeering
TYPICAL ORGANIZED CRIME ACTIVITIES
A. CORRUPTION
a. Direct Bribery
b. Indirect Bribery
c. Qualified Bribery
a. DIRECT BRIBERY (ART. 210, RPC)
3. PATRONAGE
Favoring supporters during the previous election
4. NEPOTISM
Favoring relatives
5. CRONYISM
Favoring personal friends
6. EMBEZZLEMENT
Theft or misappropriation of entrusted resources
7. KICKBACK
It is the official’s share of misappropriated funds
from his office made possible by corrupt bidders
CONDITIONS FAVORABLE FOR CORRUPTION
1. Information deficit
4. Social conditions
e.g. Illiteracy, Racial discrimination, Tribal
solidarity
B. GAMBLING
Venue:
Street, Brothel, Escort, Private, Window/Doorway,
Club, other all male venues, Door Knock or Hotel,
Transport.
Definition of Terms:
1. WHORE
The usual term for a commercial sex worker
or sex trade worker.
2. HOOKER/STREET WALKER
One who solicits customers in pulic places.
3. CALL GIRL
Makes appointments by phone.
4. GIGOLO
One who offers services to female customers.
5. HUSTLERS OR RENTBOYS
Those offering services to male customers
8. PUNTERS
The British customers of prostitutes
9. KERB CRAWLERS
Men who drive along red-light districts to
solicit prostitutes.
TYPES OF PROSTITUTION
1. ESCORT PROSTITUTION
OUT-CALL AND IN-CALL.
2. LOT LIZARD
Serves those who are in the trucking industry.
3. STREET PROSTITUTION
Solicits customersin street corners or walking
the streets.
4. SKEEZERS
Trade sex for illegal drugs.
5. SEX TOURISM
The commercial sexual relation by the tourist
with residents at the destination.
F. TRAFFICKING IN PERSONS
HUMAN TRAFFICKING
1. Organized crime
2. Economic disparities
3. Social discrimination
4. Political instability
5. Armed conflicts
6. Profitability
7. Insufficient penalties against traffickers
8. Minimal law enforcement on global sex tourism
industry
9. Legal processes that prosecute victims instead of
the traffickers
10. Poor international border defense
G. RACKETEERING
Often associated with organized crime, is the act of
offering of a dishonest service (a "racket") to solve a
problem that wouldn't otherwise exist without the
enterprise offering the service.
TYPES:
1. BUSINESS RACKETEERING
2. LABOR RACKETEERING
3. PROTECTION RACKETEERING
1. BUSINESS RACKETEERING
1. PLACEMENT
‘IMMERSION’.
‘HEAVY SOAPING’.
SPIN DRY
MODUS OPERANDI
a. Spotting
b. Surveillance
c. Risk Analysis and Target Selection
d. Abduction of the Victim
e. Ransom Demand
f. Collection of Ransom
J. CARNAPPING
(RA 10883)
Source of profit :
Heroin trade that originates in
Afghanistan.
2. Yamaguchi Gumi (Yakuza-Japan)
Sources of profit:
Drugs,
Gambling Extortion
3. Camorra (Naples)
Sources of profit:
Sexual Exploitation
Firearms Trafficking
Drugs
Counterfeiting and Gambling
Usury and Extortion
4. 'Ndrangheta (Calabria Region, Italy)
Source of Profit:
Same illicit activities as Camorra
Cocaine deals in South America
5. Sinaloa Cartel (Mexico)
Revenue: $3 Billion
Source of Profit:
Illegal drugs (Middleman between South
American and unquenchable American
Market.
MAFIA (Cosa Nostra - “Our Thing”)
“Marfud”
Rejected
***In reference to a man, MAFIUSU in 19th century
Sicily was:
• Ambiguous,
• Signifying a bully,
• Arrogant
But also...
KAIKEI
accountant
YAKUZA
1. IREZUMI
“BODY TATOOING”
3. SOKAIYA
First Offense
Cut off the tip of his LEFT LITTLE FINGER
and hand the severed portion to his boss.
5. SAKE-SHARING CEREMONY
1. YAMAGUCHI-GUMI (1915)
HQ: Kobe
3. INAGAWA-KAI
Third Largest YAKUZA family.
First YAKUZA to expand its operations outside of
Japan.
6. Dolgoprudnenskaya Bratva
a very influential OCG and considered the largest
OCG in Moscow.
7. Izmaylovskaya Bratva
it is the oldest of the Russian Mafia Groups that
utilized quasi-military ranks and strict internal discipline.
It was involved in murder for hire, extortion and
infiltration of legitimate businesses.
8. Obshina or Chechen Mafia
It was a formidable OCG and paramilitary group
that once formed the most dominant minority criminal
group in Russia. It is believed that it has ties with the
Chechen militant factions.
9. Solntsevo
A criminal group in Russia that runs slot machines
and taxi rings.
MEDELLIN CARTEL
Head:
OCTAVIO “ONGKOY” PAROJINOG SR.
“Robin Hood of Lawis (Inside)”
The group was based in Ozamiz and also present
in different parts of Mindanao, Cebu City, Metro
Manila and nearby towns.
8. OPLAN SALIKOP
CAMPAIGN AGAINST OCGs and CRIMINAL GROUPS.
9. OPLAN LIGTAS
CAMPAIGN AGAINST KFR
1. Access
Refers to the instruction, communication with,
storing data in, retrieving data from, or otherwise
making use of any resources of a computer system or
communication network.
Acess Device
Means any card, plate, code, account number,
electronic serial number, personal identification number,
or other telecommunications service, equipment, or
instrumental identifier, or other means of account access
that can be used to obtain money, good, services, or
any other thing of value or to initiate a transfer of funds
(other than a transfer originated solely by paper
instrument);
Asymmetric or Public Cryptosystem
System capable of generating a secure key pair,
consisting of a private key for creating a digital signature
and a public key for verifying the digital signature.
2. Cyber
Refers to a computer or a computer network, the
electronic medium in which online communication takes
place.
3. Interception
Refers to listening to, recording, monitoring or
surveillance of the content of communications, including
procuring of the content of data, either directly, through
access and use of a computer system or indirectly, through
the use of electronic eavesdropping or tapping devices, at
the same time that the communication is occurring.
4. Computer-Related Forgery
The input, alteration, or deletion of any computer data
without the right resulting in inauthentic data with the
intent that it be considered or acted upon for legal
purposes as if it is were authentic, regardless whether
the data is directly readable and intelligible.
5. Computer-Related Fraud
The unauthoried input, alteration, or deletion of
computed data or progra or interference in the
functioning of a computer system, causing damage
thereby with fraudulent intent.
6. Computer-Related Identity Theft
The intentional acquisition, use, misuse, transfer,
possession, alteration, or deletion of identifying
information belonging to another, whether natural or
judicial without right.
7. Cyber Squatting
The acquisition of a domain name over the
internet in bad faith to profit, mislead, destroy
reputation, and deprive others from registering the
same.
8. Denial of Service Attack
The bandwidth of the victim’s network is flooded
or his e-mail box is filled with spam mail depriving him of
the services he is entitled to access or provide.
9. Virus Dissemination
This is usually done by means of a malicious code
or software that modifies or destroys data, steals data or
allows unauthorized access, or exploits or damages a
system in a manner not intended by the user.
10. Web Defacement
This is the act of the intruder into a server and
changing without permission all the aspect of a website
which the public can see.
12. Viruses
Programs that attach themselves to a computer or a
file and then circulate themselves to other files and to
other computers on a network.
13. Logic bombs
Event dependent programs. This implies that these
programs are created to do something only when a certain
event.
9. Use firewall
10. USE YOUR COMMON SENSE