@@@organized Crime Investigation@@@

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 188

Organized Crime

Investigation
Organized crime
 are transnational, national, or local
groupings of highly centralized
enterprises run by criminals for the
purpose of engaging in illegal
activity, most commonly
for monetary profit.

ERIC SAWATI CATTE 2


Organized Crime (OC)
Distinguished from Terrorism
 OC is a non ideological enterprise
which would differentiate it from
terrorist groups, such as those
religiously, politically, and some
socially motivated violent crimes
embraced in the technical definition of
terrorism

ERIC SAWATI CATTE 3


Organized Crime Group (OCG)
 is a structured group of three or more
persons existing for a period of time and
acting in concert with the aim of
committing one or more serious crimes in
order to obtain directly or indirectly a
financial or other material benefit.
 OC is organized in a hierarchical manner
which makes it “organized”
ERIC SAWATI CATTE 4
An Enforcer
• one who make
arrangement for
killing and injuring
(physically,
economically and
psychologically)
the member or
non member.
ERIC SAWATI CATTE 5
A Corrupter
• one who bribes, buys,
intimidates, threatens,
negotiates and “sweet talk”
into a relationship with the
police, public officials or
anyone else who might
help the member security
and maintain immunity
from arrest, prosecution
and punishments.
ERIC SAWATI CATTE 6
A Corruptee
 a public official,
usually not a
member of the
organization
family, who can
influence on
behalf of the
organization
interest. ERIC SAWATI CATTE 7
ERIC SAWATI CATTE 8
Non-ideological
No political goal
They just want to gain money,
material or fame/honor

ERIC SAWATI CATTE 9


Hierarchical
 Authority is defined
 There is chain of
command Boss
 There is delegation of
authority Underboss
 Tasks are provided
Captains

Soldiers
ERIC SAWATI CATTE 10
Limited or exclusive membership
 The members of the organization are
their family members, close friends or
associates.

ERIC SAWATI CATTE 11


Self perpetuating
The OCG continues overtime

ERIC SAWATI CATTE 12


Use bribery and illegal violence

Physical
Bribery Threat Death
Violence

ERIC SAWATI CATTE 13


Demonstrate a specific division of
labor
 In order to maintain chain of custody so that
if there are irregularities, they may trace
who do it and punish him.

PURPOSE?
1. Punishment
2. Security
3. Specialty
ERIC SAWATI CATTE 14
Monopolistic
 They monopolized the business so that all
the gains will be owned by them.
 They have the control to the business where
they can increase and decrease the price

ERIC SAWATI CATTE 15


Governed by explicit rules and
regulation
“Code of Omerta”
“Be true inside but not on the
outside”

ERIC SAWATI CATTE 16


What is the punishment for the
violation of this law?
Death

ERIC SAWATI CATTE 17


Bureaucratic or Corporate Model
Boss

Underboss Consigliere

Captains
ADVISER
A retired
member/ former
Soldiers/
boss of the OCG
Members
ERIC SAWATI CATTE 19
Presidential Commission on Organized Crime Model
Core
Boss, Underboss,
Member
Consigliere

Lawyers, Corrupt
Protector
Politician

Accountant,
Specialized
Chemist
Agents

Pushers and users of


Community
User Social illegal products and
Support support support
services
ERIC SAWATI CATTE 20
MAFIA
The word MAFIA is an
acronym…….
 Morta Alla Francia, Italia Anela

Italian for death this is Italy’s


to France cry

ERIC SAWATI CATTE 22


What is the original name of
Mafia?
La Cosa Nostra

Our Thing

ERIC SAWATI CATTE 23


At one point in their history,
what do they called their
group?
“The Honored Society”

ERIC SAWATI CATTE 24


What about their members?
 Mafiosi
 “Men of Honor”
 ” Made Men”

ERIC SAWATI CATTE 25


What is known as the most
powerful and most active
Italian organized crime group in
the US?

It is also considered the second


largest organization in Italy.
ERIC SAWATI CATTE 26
ERIC SAWATI CATTE 27
It is used to describe the
assassination of prominent
government officials.
“Excellent Cadaver”

ERIC SAWATI CATTE 28


Yakuza or Gokudo (Violence groups)
Aka “good for nothing”
The Yakuza or boryokudan, is the
most influential organized crime
group in Japan.

ERIC SAWATI CATTE 29


Ya-Ku-Sa
its name was originated from the
Japanese card game Oicho Kabu, a
card game that represents the
numbers eight, nine and three –
the total is 20, a useless number
that means also a bad fortune for
the player.
ERIC SAWATI CATTE 30
ERIC SAWATI CATTE 31
The ff are some characteristics of
the yakuza:
The manner
1. Members usually of
wear sunglasses and
walking
colorful suits so that their profession
could be immediately recognized by
civilians
2. Members walk arrogantly with wide
gaits
3. Members dress conservatively and flash
their tattoos only when the need arises
ERIC SAWATI CATTE 32
Yubitsume
 for the first offense, the transgressor
must cut off the tip of his left little
finger and hand the severed portion to
the boss as a form of penance or
apology. Sometimes, the Underboss
may do this himself to spare a member
of his gang

ERIC SAWATI CATTE 34


Irezumi
hand-poked full-body tattoos for
the members through hand-made
and hand-held tools with needles
of sharpened bamboo or steel

ERIC SAWATI CATTE 35


Pearlings
one pearl is inserted into the skin
of the penis of the member for
every year in prison

ERIC SAWATI CATTE 36


Oicho-Kabu
the members, whenever they play
this card game, are given the
chance to display their tattoos to
the other members as they
normally keep them concealed with
long-sleeved and high-necked
shirts
ERIC SAWATI CATTE 37
Sake-sharing ceremony
is used to seal bonds of
brotherhood between individual
yakuza members or groups

ERIC SAWATI CATTE 38


It refers to Chinese societies
common mystical symbol; an
equilateral triangle representing
Chinese basic concept of
Heaven, Earth and Man.
Chinese Triad

ERIC SAWATI CATTE 39


These OC are highly skilled in
Martial Arts, therefore police
officers special unit created in
combating OC, must be more than
physically fit.

ERIC SAWATI CATTE 40


Tongs
 originated among early-marginalized
Chinatown communities to protect
themselves from the natives, but
because it had no political motives,
they soon found themselves involved in
criminal activities like extortion,
gambling, human trafficking, murder
and prostitution.
ERIC SAWATI CATTE 41
1.Columbian Medellin Cartel
 Founded during the 1980’s by Colombian drug
lords in the name of Pablo Escobar Gaviria
and drug bosses Jose Gonzalo Rodriguez
Gacha and the top aid cocaine barons Juan
David and the Ochoa Brothers.
 The Medellin Cartel is reputedly responsible
for organizing world’s drug trafficking
network.
Eric S. Catte 42
Pablo Escobar Gaviria
2. The Cali Cartel
 The downfall of the Medellin Cartel is the rise of
the Cali Cartel- the newly emerged cocaine
monopoly.
 The cartel produces over 90% of cocaine in the
world. Due to this, it was called the best and the
brightest of the modern underworld. “they are
professionals of the highest order, intelligent,
efficient, imaginative, and nearly
impenetrable”- US- Drug Enforcement Agency.
Eric S. Catte 44
Boss
Soldiers
Soldiers
Soldiers

ERIC SAWATI CATTE 45


Gilberto Orajuela

Gilberto Rodriguez Orajuela- better known


as Don Chepe- “the chess player” heads the
syndicated organization. Under him, the Cali
Cartel was considered the most powerful
criminal organization in the world.
Extradition Treaty
Columbian government allowed
the extradition of the Columbian
members of the Cartel to US and to
be tried in US courts.

ERIC SAWATI CATTE 47


When they are just starting their
illegal activity, what drugs are they
trafficking?
Marijuana

ERIC SAWATI CATTE 48


Francisco Group
formerly called the Dragon or
Kuratong Baleleng Group
led by Manuel Francisco

ERIC SAWATI CATTE 50


Pentagon Group
 It is headed by Tahir Alonto
 it is a creation of the Moro Islamic
Liberation Front (MILF)
 Most of the members are also listed as
members of the MILF.

ERIC SAWATI CATTE 51


What is the main purpose of
the creation of pentagon
group?
To generate funds for the MILF and
insulate MILF members from
criminal accusations.

ERIC SAWATI CATTE 52


Lost Command KFR Group
 is mainly composed of ex-soldiers and
ex-policemen who were rendered
jobless after the 1986 EDSA Revolution.
 Most of its members are seasoned
combatants and have good background
in intelligence works.

ERIC SAWATI CATTE 53


Waray-Abuyog Group
is composed of hardened criminals
from Samar and Leyte.

ERIC SAWATI CATTE 54


Akyat Bahay Gang
 is known as a violent home invasion-
oriented gang which also has a history
with drug dealing.

ERIC SAWATI CATTE 55


Bahala Na Gang("Come What May")
A tattoo of a Question Mark (?) is
their identity as members of the
gang located in any of the parts of
their body.

ERIC SAWATI CATTE 56


Sigue Sigue Comando Gang
is one of the largest Gangs in the
Philippines. It has thousands of
members all over the Philippines.

ERIC SAWATI CATTE 57


Drugs Trafficking
 What is the most Shabu
abuse drugs in
the Philippines?
Shabu in the Philippines mainly
comes from the Southern
provinces of China – Guandong
and Fujian.
ERIC SAWATI CATTE 59
What is the most active and
indispensable ingredient of
shabu?
Ephedra or ephedrine

It is processed in China and


smuggled into the
Philippines as Shabu.
ERIC SAWATI CATTE 60
A person can die the first time they take METH,
while others can survive for years on the drug.

e
61
EFFECTS OF SHABU
Crank Bugs

Eric S. Catte 62
EFFECTS OF DRUGS ON THE FETUS
Kidnapping
• A person is guilty of kidnapping if he
unlawfully removes another from his
place of residence or business or a
substantial distance from the vicinity
where he find or if he unlawfully
confines another for a substantial
period in a place of isolation.

ERIC SAWATI CATTE 64


Kidnapping VS. Hostage Taking
Kidnapping Hostage Taking

MEANS OF Online/ Face to face


COMMUNICAT Electronic communication
ION Communication
(CP/Telephone/
Radio)
LOCATION Unknown Known

ERIC SAWATI CATTE 65


Modus Operandi of KFR Groups
1. Spotting – this is the stage of identifying
probable victims.
2.Surveillance – it is conducted to obtain
data to ensure success of the Kidnapping.
3.Risk Analysis and Target Selection –
Surveillance report is then analyzed and
victim is selected as a result of the data.
Plan is also prepared. Profit/ Risk
ERIC SAWATI CATTE 66
4. Abduction of Victim – the act of
abducting implemented as agreed or
planned.
5. Ransom for Demand – amount of money
is then relayed to the party of the victim
and negotiation by the police may happen
during this stage unless earlier or later
detected.
6. Collection of Ransom – money is then
collected and life here is in danger if
agreement was never meet.
ERIC SAWATI CATTE 67
It is considered as the most
organized among the crime
groups.
Bank robbery groups

ERIC SAWATI CATTE 68


What is RA 6539 ?
Anti-Carnapping Act
of 1972

ERIC SAWATI CATTE 69


Elements of Carnapping
 That the offender must have taken a motor
vehicle belonging to another;
 That
Any the taking
vehicle is withbyintent
propelled meanstoother
gain;than
and
muscular
 That powervehicle
the motor using the
waspublic
takenhighways,
without
butowner’s
the excepting road roller,
consent or bytrolley
meanscar, street
of violence
sweeper,
against orsprinkle, lawnmower,
intimidation bulldozer,
of persons, or by
grader,
using forklift,
force uponamphibian
things. trucks and crane,
tractor, trailer and all kinds used exclusively
for agricultural purposes.
ERIC SAWATI CATTE 70
Corruption Graft
• acting on • refers to
opportunities, exploitation of
created by virtue of
one’s role by
one’s authority, for
personal gain at accepting bribes
the expense of the or protection
public as one is money.
authorized to
serve.
ERIC SAWATI CATTE 72
What is the anti-graft and
corrupt practices act?
RA 3019

ERIC SAWATI CATTE 73


REPUBLIC ACT No. 10589
 AN ACT DECLARING DECEMBER OF
EVERY YEAR AS "ANTI-CORRUPTION
MONTH" IN THE ENTIRE COUNTRY
 Approved: MAY 27 2013

ERIC SAWATI CATTE 74


What is the lead agency that was
designated under RA 10589 for
coordination purposes on the said
program?
Office of the Ombudsman

ERIC SAWATI CATTE 75


What is the anti- plunder law?
RA 7080

ERIC SAWATI CATTE 76


Patronage- favoring supporters
during the previous election
Nepotism- favoring relatives
Cronyism - favoring personal
friends

ERIC SAWATI CATTE 77


Embezzlement Kickback
theft or  it is the official’s
misappropriati share of
misappropriated
on of entrusted funds from his
resources office made
possible by
corrupt bidders
ERIC SAWATI CATTE 78
3. Gambling
it is the wagering of money or
something of material value with
the intent to win more but the
outcome is uncertain.
Game of chance or luck

ERIC SAWATI CATTE 79


What is the law simplifying and
providing stiffer penalties for
violations of Philippine gambling
laws?
PRESIDENTIAL DECREE NO. 1602

ERIC SAWATI CATTE 80


What is the term called for
gambling that is permitted by
law?
GAMING

ERIC SAWATI CATTE 81


4. Loan sharking
is the lending of money to another
wherein the percentage of the
principal is too high (usurious
interest) for the lender to pay his
debt and the collection is done by
force or intimidation.

ERIC SAWATI CATTE 82


What is the other term for
loansharking?
Shylocking

ERIC SAWATI CATTE 83


5. Pornography
 is the depiction of
explicit sexual
subject matter for
sexually exciting
the viewer.

ERIC SAWATI CATTE 84


Sub Genres of Pornography
Softcore Hardcore
refers to pornography
pornography that depicts
that does not penetration
depict explicitly
penetration

ERIC SAWATI CATTE 85


It is an act defining the crime of
Child Pornography, prescribing
Penalties therefore and for other
purposes.
RA 9775

ERIC SAWATI CATTE 86


6. Prostitution
 is the act or practice of engaging in sex
acts for hire.
 It is considered as a victimless crime.

ERIC SAWATI CATTE 87


Whore Hooker or street
walker
 The usual term One who solicits
for a commercial customers in
sex worker or public places
sex trade worker

ERIC SAWATI CATTE 89


Call girl Kerb crawlers

Makes  Men who drive along


red-light districts to
appointments
solicit prostitutes
by phone (costumer).

ERIC SAWATI CATTE 90


Hustlers or
Gigolo
Rentboys
Male Male
prostitute who prostitute
offers services offering services
to female to male
customers customers

ERIC SAWATI CATTE 91


Pimps (male) and Madams (female)
organizers of prostitution or
procurers for customers

ERIC SAWATI CATTE 92


Johns or Tricks Punters
the customers the British
of prostitutes in customers of
North America prostitutes

ERIC SAWATI CATTE 93


Escort prostitution
Out Call In Call
 the act takes place  at the escort’s
at the customer’s residence or in
residence or at the hotel room
his or her hotel rented for the
room occasion by the
escort

ERIC SAWATI CATTE 95


Lot lizard Street prostitution
 Serves the  Solicits customers
trucking industry in street corners
or walking the
streets.

ERIC SAWATI CATTE 96


Skeezers Sex tourism
Trade sex for  The commercial
illegal drugs sexual relation by
the tourist with
residents at the
destination

ERIC SAWATI CATTE 97


Philippines
• Where is
considered as
the haven for
sex industry?

ERIC SAWATI CATTE 98


Thailand
• It is considered as the
most notorious in the
world in terms of sex
industry, importing at
least one (1) million
women from China,
Laos and Vietnam.
ERIC SAWATI CATTE 99
REPUBLIC ACT NO. 10158
 THE ACT DECRIMINALIZING
VAGRANCY
 Approved
• Any on March
person having 27, 2012means of
no apparent
subsistence, who has the physical ability to work
and who neglects to apply himself or herself to
some lawful calling;
• Any person found loitering about public or semi-
public buildings or places or trampling or
wandering about the country or the streets
without visible means of support;
ERIC SAWATI CATTE 100
Trafficking in Persons
 Recruitment, transportation,
harboring, or receipt of people for the
purpose of slavery, prostitution,
forced labor and servitude.
 It includes the act of removal or sale
of organ.

ERIC SAWATI CATTE 101


What is the Anti Trafficking in
persons act of 2003?
RA 9208

ERIC SAWATI CATTE 102


REPUBLIC ACT No. 10364
"Expanded Anti-Trafficking in
Persons Act of 2012″
Approved: FEB 06 2013

ERIC SAWATI CATTE 103


Slavery Slave
• the submission a person held in
to a dominating servitude as the
influence or the chattel of
state of a person another.
who is chattel of
another.
ERIC SAWATI CATTE 104
White slavery
engagement in the business for
profit, or enlistment of services
of any other person for the
purpose of prostitution.

ERIC SAWATI CATTE 105


Money Laundering
It is the practice of disguising
illegally obtained funds so
that they may seem legal.
Converting illegal money to a
legal one.

ERIC SAWATI CATTE 106


What is the anti- money
laundering act of 2001?
REPUBLIC ACT 9160

as amended by RA 9194

ERIC SAWATI CATTE 107


REPUBLIC ACT NO. 10167
 AN ACT TO FURTHER STRENGTHEN
THE ANTI-MONEY LAUNDERING
LAW.
Approved: June 06, 2012

ERIC SAWATI CATTE 108


Freezing of Monetary Instrument or
Property
 Upon verified petition by the AMLC
and after determination that probable
cause exists that any monetary
instrument or property is in any way
related to an unlawful activity, will be
issued a freeze order, which shall be
effective immediately.

ERIC SAWATI CATTE 109


Who is the authorized agency to
issue a freeze order in
accordance with RA 10167?
Court of Appeals

ERIC SAWATI CATTE 110


No court shall issue a temporary
restraining order or a writ of
injunction against any freeze order.
Who is only authorized by law to
issue TRO as an exemption?
Supreme Court

ERIC SAWATI CATTE 111


REPUBLIC ACT NO. 10365
 AN ACT FURTHER STRENGTHENING
THE ANTI-MONEY LAUNDERING LAW.
 Approved: FEB 15 2013

ERIC SAWATI CATTE 112


"Money laundering is also
committed by any covered
person who, knowing that a
covered or suspicious
Banks, non-banks,
transaction quasi-banks,
is required under
trust entities, foreign exchange
this Act to be reported
dealers, pawnshops, money
to the
Anti-Money Laundering
changers, remittance Council
and transfer
(AMLC), fails to do so."
companies
ERIC SAWATI CATTE 113
1. Placement Mixing of illicit
is the physical disposal
money of the
with licit one.
money by putting them into the
financial system, usually through
Smurfing and Immersion.

Moving small amounts at


times to avoid suspicion
ERIC SAWATI CATTE 115
2. Layering
also called heavy soaping
conversion of cash into monetary
instruments and the conversion of
tangible assets obtained by means
of cash purchases.

ERIC SAWATI CATTE 116


3. Integration
also called spin dry
the money is again available to the
criminal with its occupational and
geographical origin hidden.

ERIC SAWATI CATTE 117


Where is the best institution
for you to put your money
that comes from illegal means
in order to avoid detection
and prosecution?
ERIC SAWATI CATTE 118
Ponzi/Pyramid Schemes
 Pyramid schemes focus on the
exchange of money and recruitment.
 At the heart of each pyramid scheme
there is typically a representation that
new participants can recoup their
original investments by inducing two or
more prospects to make the same
investment.
ERIC SAWATI CATTE 119
ERIC SAWATI CATTE 120
Cyber Crime
Any offense that is committed
by a computer, computer system
or computer network

ERIC SAWATI CATTE 122


What is the anti cyber crime
law of 2012?
RA 10175

ERIC SAWATI CATTE 123


Reasons of the Vulnerability of
Computers
1. Capacity to store data in a
relatively small space
2. Easy to access
3. Loss of evidence

ERIC SAWATI CATTE 124


Onel De Guzman
 Had made the “I LOVE YOU VIRUS”
 It originates in the country May 4, 2000
and spread itself around the world in
one day from Hongkong to Europe to
United States. Like other corporations,
the Pentagon, CIA and British
Parliament had to shut down their mail
systems.
ERIC SAWATI CATTE 125
Hacking
Unauthorized access into or
interference in a computer
system in order to corrupt, alter,
steal, or destroy using a computer
or other similar information and
communication devices.

ERIC SAWATI CATTE 127


WHAT IS THE OTHER TERM FOR
HACKING?
CRACKING

ERIC SAWATI CATTE 128


ERIC SAWATI CATTE 129
Denial of Service Attack
The bandwidth of the victim’s
network is flooded or his e-mail
box is filled with spam mail
depriving him of the services he is
entitled to access or provide.

ERIC SAWATI CATTE 130


Virus Dissemination
This is usually done by means of a
malicious code or software.

ERIC SAWATI CATTE 131


Web Defacement
This is the act of the intruder into a
server and changing without
permission all the aspect of a
website which the public can see

ERIC SAWATI CATTE 132


Salami Attack
Logic bombs are introduced into
the bank’s system that result to
the deduction of an insignificant
amount from every account and
transferred into a single account

ERIC SAWATI CATTE 133


Virus or worm attack
Viruses are programs that attach
themselves to a computer or a file
and then circulate to other files
or to the other computers on a
network.

ERIC SAWATI CATTE 134


What is the kind of virus that
eats up the available space on a
computer’s memory?
Worms

ERIC SAWATI CATTE 135


Logic Bombs
Viruses that lie dormant and
only become active at
particular dates

ERIC SAWATI CATTE 136


Internet Time Theft
the internet surfing hours of the
victim are used up by another
person without his consent

ERIC SAWATI CATTE 137


Web Jacking
the hacker gains access and
control over the web site of
another.

ERIC SAWATI CATTE 138


Software Piracy
software are stolen through the
illegal copying of genuine
programs and the products
distributed to the customers

ERIC SAWATI CATTE 139


Phishing
 a form of identity theft in which
scammers send mass emails posing as
banks, credit card companies,
popular commercial web sites, asking
the recipients to confirm or update
financial information in a hyperlink in
order to appear like it came from the
original website
ERIC SAWATI CATTE 140
Cyber Stalking
the criminal follows the victim
by sending emails, and frequently
entering the chat rooms that causes
an intentional, substantial and
unreasonable intrusion into the
private life of the person.

ERIC SAWATI CATTE 141


What will be the result of cyber
stalking to the victim?
mental distress

ERIC SAWATI CATTE 142


Cyber Defamation/ Libel
The use of the computer system
to make false statements
against a person thereby
injuring his reputation

ERIC SAWATI CATTE 143


Computer vandalism
Any physical harm done to the
computer set

ERIC SAWATI CATTE 144


Cyber Terrorism
It is the premeditated use of
disruptive activities, or the threat
thereof, in cyber space, with the
intention to further social,
ideological, religious, political or
similar objectives, or to intimidate
any person in furtherance of such
objectives.
ERIC SAWATI CATTE 145
Republic Act No. 8792 or the E-
commerce Law was signed into
law which punishes certain crimes
such as computer hacking and
intrusion of viruses and worms to
computer networks.

ERIC SAWATI CATTE 146


R.A. 8484
Access Device Regulation Act of
1998.

ERIC SAWATI CATTE 147


Access Device
Is any card, plate, code, account
number, electronic serial number,
personal identification number or
other means of account access that
can be used to obtain money,
goods, services.
It includes Credit Cards.

ERIC SAWATI CATTE 148


Access Device
Punishable Acts

ERIC SAWATI CATTE 149


CYBER SEX
 Is a sexual activity of arousal through
communication using the computer.
 Cybersex-for-pay employs the Internet
and utilizes computer cameras and
microphones that allows client to see
and talk to girls doing the role play for
them
ERIC SAWATI CATTE 150
According to CIDG, where are the
cybersex “hot spots” here in the
Philippines (2014)?
Angeles Pampanga
San Fernando Pampanga
Las Pinas
Davao
ERIC SAWATI CATTE 151
R.A. 8293
the Intellectual Property Code
of the Philippines that tries to
protect patents, industrial
design, trademarks and
copyright

ERIC SAWATI CATTE 152


Patent
is the statutory grant, by government,
which confers to an INVENTOR to
exclude others from making, using,
selling or importing the invention
within the territory of the country
that granted the patent.

ERIC SAWATI CATTE 153


How many years will be the
patent of an invention will be
protected?

17 years

ERIC SAWATI CATTE 154


Copyright
 is the system of legal protection an
author enjoys in the form of
EXPRESSION OF IDEAS.
 The holder of the copyright enjoys the
right to reproduce, distribute, display,
perform, and to prepare derivative
works based on the copyrighted work

ERIC SAWATI CATTE 155


REPUBLIC ACT NO. 10372
 AN ACT AMENDING CERTAIN
PROVISIONS OF REPUBLIC ACT NO. 8293,
 Approved: FEB 28 2013

ERIC SAWATI CATTE 156


What is the main
purpose of terrorism?
“To inflict Massive Fear”

ERIC SAWATI CATTE 158


Terrorism
It is a threat or actual use of force or
violence for political or other
purpose, to foster fear, insecurity,
distrust and unrest among the
people

ERIC SAWATI CATTE 159


 The commission of crimes
(rebellion, murder,
kidnapping, hijacking etc.)
that sow or create a condition
of widespread and
extraordinary fear and
panic among the populace
in order to coerce the
government to give in to an
unlawful demand. (R.A. 9372
or the H.S.A.)
ERIC SAWATI CATTE 160
9/11 Bombing

ERIC SAWATI CATTE 161


REPUBLIC ACT NO. 10168
 "The Terrorism Financing, Prevention
and Suppression Act of 2012”
 June 20, 2012
 The State shall reinforce its fight
against terrorism by criminalizing the
financing of terrorism.

ERIC SAWATI CATTE 162


DOMESTIC TERRORISM
Involves persons
or groups
committing a
terrorist act/s in
their own
country.

ERIC SAWATI CATTE 163


INTERNATIONAL TERRORISM
Involves
citizens or
the territory
of more
than one
country.
ERIC SAWATI CATTE 164
Religious Terrorism
 Terror in the Mind
of God”.
 Terrorizing for
religious purpose.

ERIC SAWATI CATTE 165


In the Philippines, where is
considered as the ‘terrorist safe
haven’?
Southern
Philippines

ERIC SAWATI CATTE 166


Moro National Liberation Front
(MNLF)
The Moro National Liberation
Front's primary goal was the
creation of an autonomous
Nur Misuari
Muslim state in the southern
Philippines.
Who is the founder and leader?
ERIC SAWATI CATTE 167
Moro Islamic Liberation Front
(MILF)
 The Moro Islamic Liberation Front
(MILF) is a splinter of the Moro National
Liberation Front (MNLF). Following a
failed 1977 accord between MNLF and the
Philippine government, MNLF's second-
in-command broke away from the group.
Hashim Salamat then created the Moro
Islamic Liberation Front.
ERIC SAWATI CATTE 168
 Publicly, the Moro Islamic Liberation Front
demanded a fully independent Muslim
state in the southern Philippines.
However by the late 1990s, the MILF had
begun negotiations for simply an
autonomous Muslim region. By 1997, MILF
had begun negotiations with the Philippine
government.
 The Moro Islamic Liberation Front and the
Philippine president Gloria Arroyo signed a
peace agreement in June 2001.
ERIC SAWATI CATTE 169
Abu Sayyaf Group (ASG)
 The ASG was founded in 1991 by radical
Moro National Liberation Front
(MNLF) members who objected to
the MNLF's negotiations with the
Philippine government.
 Abu Sayyaf, which literally means
“bearer of the sword" in Arabic.

ERIC SAWATI CATTE 170


 The group's first major attack came in
1991, when an Abu Sayyaf grenade
killed two American evangelists.
 Its first leader was Abdurajak Janjalani
 From 1998 the group was led by
Khadaffy Janjalani

ERIC SAWATI CATTE 171


Talipao
Abu Sayyaf
Massacre in
Victims
Sulu

ERIC SAWATI CATTE 172


New People's Army (NPA)
 The New People's Army (NPA) was created as
the armed wing of the outlawed political
organization, the Communist Party of the
Philippines, Marxist-Leninist (CPP-ML).
Overthrow the Filipino government
 From 1969 to 1976, the People's Republic of
and
China replacematerial
provided it with support
a to the New
communist/socialist
People's state. of
Army. Following the cessation
China's support, the NPA went through a five-
year period of weakness.
ERIC SAWATI CATTE 173
Who is known as the founder of
NPA?
Jose Maria Sison (1969)

ERIC SAWATI CATTE 174


Bangsamoro Islamic Freedom
Fighters (BIFF)
 It is a group of radical armed Muslims
Ustadz Ameril Umbra Kato
espousing independence in the
Southern Philippines.
 Who is the leader?
 Where is there operation?

Central Mindanao
ERIC SAWATI CATTE 175
Jemaah Islamiyah
which is based in Indonesia
and has operated in the
Philippines, has had
particularly strong ties to al-
Qaeda.

ERIC SAWATI CATTE 176


Al-Qaeda
 "the base" in Arabic—is the network
of extremists organized by Osama bin
Laden.
 More than a month after bin Laden's
death al-Qaeda named Dr. Ayman al-
Zawahiri, al-Qaeda's theological
leader, as its leader.

ERIC SAWATI CATTE 177


Genocide Massacre
• It is the The mass killing
intentional of people
destruction of a without
national ethnic,
selection
racial, or
religious group
of people.

ERIC SAWATI CATTE 178


Three-tiered Defense System

A. TARGET
HARDENING
B. INTELLIGENCE

C. INCIDENT
MANAGEMENT

ERIC SAWATI CATTE 180


Target Hardening
this is envisioned through
education, information
dissemination and in-depth study
of the criminals’ modus operandi
through data gathering.

ERIC SAWATI CATTE 181


Intelligence
involves the gathering,
processing and use of
intelligence information.

ERIC SAWATI CATTE 182


Incident Management
crimes, especially those that affect
national security, are effectively
managed in order to lessen their
effects to the community and see to
it that as much as possible, they
will not happen again.

ERIC SAWATI CATTE 183


Philippine Drug Enforcement
Agency (PDEA)
it is patterned after the USDEA
and is the lead agency in the
implementation of RA 9165

ERIC SAWATI CATTE 184


Anti-Illegal Drug Special Operations
Task Force (AIDSOTF)
it supports the PDEA in its
campaign against illegal
drugs.

ERIC SAWATI CATTE 185


National Anti-Kidnapping Task
Force (NAKTF)
is tasked to lead a national,
integrated, comprehensive and
synchronized effort to reduce, if
not eliminate kidnapping in the
country.

ERIC SAWATI CATTE 186


Philippine Center On Transnational
Crime (PCTC)
it was created by EO 62 and is
mandated to formulate and
integrate a concerted program of
action of all law enforcement,
intelligence and other agencies for
the prevention and control of
transnational crime.
187

You might also like