Understanding Cybercrime and ICT

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is cybercrime?

Cybercrime refers to illegal activities carried out using computers or digital networks.

What techniques do cybercriminals use to control multiple computers for large-scale attacks?

Cybercriminals use techniques like Trojan horse programs to control multiple computers in a botnet for large-scale attacks.

Ethical hacking, which involves reporting system vulnerabilities, is considered a criminal act.

False (B)

What does ICT stand for and what types of systems does it include?

<p>ICT stands for Information and Communications Technology. It includes systems used for telecommunications, broadcasting, network control, and monitoring functions.</p> Signup and view all the answers

What is the difference between a URL and an IP Address?

<p>A Uniform Resource Locator (URL) is a human-readable web address used to access resources on the internet, while an IP Address is a numerical label (machine-readable identifier) assigned to each device connected to the internet.</p> Signup and view all the answers

What is the full name and purpose of Republic Act No. 10175?

<p>Republic Act No. 10175 is the Cybercrime Prevention Act of 2012. It covers crimes committed using digital platforms and information technology.</p> Signup and view all the answers

Under which section of RA 10175 is identity theft penalized?

<p>Identity theft is penalized under Section 4 (b)(3) of RA 10175.</p> Signup and view all the answers

What is the purpose of RA 10173, the Data Privacy Act of 2012?

<p>RA 10173 protects personal information in both government and private sectors, ensuring the right to privacy.</p> Signup and view all the answers

What does RA 9775 prohibit, and how does it define its subject?

<p>RA 9775 (Anti-Child Pornography Act of 2009) prohibits any form of child pornography. It is defined as the visual, audio, or written depiction of explicit activities involving children.</p> Signup and view all the answers

Define 'Traffic' in the context of traffic investigation.

<p>Traffic refers to the movement of vehicles, pedestrians, and goods from one place to another.</p> Signup and view all the answers

What distinguishes a 'Professional Driver' from a regular 'Driver'?

<p>A 'Driver' is any licensed person operating a motor vehicle, while a 'Professional Driver' is specifically paid or hired to operate a vehicle, for either private or public transport.</p> Signup and view all the answers

What are the key components involved in Traffic Management?

<p>Traffic Management involves controlling and supervising transportation systems, including aspects like lane closures, intersection control, speed limits, and ramp metering.</p> Signup and view all the answers

Which action involves issuing a ticket requiring a violator to appear in court without being physically arrested?

<p>Traffic Citation (B)</p> Signup and view all the answers

What is the Bantay Krimen Mobile Application and when was it launched?

<p>The Bantay Krimen Mobile Application was launched by the Directorate for Investigation and Detection Management (DIDM) on March 16, 2016, at Camp Crame to promote crime awareness, reporting, and prevention.</p> Signup and view all the answers

Match the PNP IT System with its primary function:

<p>CIRAS = Visual intelligence tool collating and analyzing complex crime data CIDMS = Case management system for investigators to track and manage case files CMAS = Used to analyze investigative data for better decision-making E-Rogue = Electronic rogues' gallery storing photos and records of wanted persons E-Warrant = Electronic system for tracking and managing warrants E-Subpoena = System for managing subpoenas issued by the police</p> Signup and view all the answers

What is the minimum daily case encoding standard for investigators using CIDMS?

<p>Investigators should enter a minimum of two (2) case folders per day into CIDMS.</p> Signup and view all the answers

What are the three essential qualities of a good Investigative Report?

<p>A good Investigative Report must be accurate (factual, error-free), complete (contain all necessary details), and timely (submitted promptly).</p> Signup and view all the answers

Which type of investigative report serves as an endorsement to the Prosecutor's Office for legal action?

<p>Case Referral Report (A)</p> Signup and view all the answers

What is a Tickler System used for in investigations?

<p>A Tickler System is a method used to regularly check pending cases filed under an officer's name, helping to monitor case progress.</p> Signup and view all the answers

What are the three Core Values upheld by the PNP?

<p>The PNP upholds Integrity, Service, and Honor as its core values.</p> Signup and view all the answers

Match the Republic Act with its relevance to the PNP's legal framework:

<p>RA 6975 = Established the PNP under the DILG RA 9165 = Governs drug-related offenses (Comprehensive Dangerous Drugs Act) RA 10591 = Regulates the possession and licensing of firearms RA 7610 = Protects children from abuse, exploitation, and discrimination</p> Signup and view all the answers

Which of the following is NOT a strategic perspective under the PNP Performance Governance System (PGS)?

<p>Budget Allocation (B)</p> Signup and view all the answers

What is the primary aim of Case Reviews in investigations?

<p>Case Reviews aim to develop investigative opportunities, improve case handling, and prevent errors that may affect case outcomes.</p> Signup and view all the answers

What is the focus of a Case Development Review, also known as a Cold Case Review?

<p>A Case Development Review (Cold Case Review) focuses on using new forensic technologies or witness testimonies to revive unsolved cases.</p> Signup and view all the answers

Which type of interview uses a pre-planned sequence of questions, often close-ended?

<p>Structured Interview (B)</p> Signup and view all the answers

What legal provision mandates the timely delivery of an arrested person to judicial authorities during inquest cases?

<p>Article 125 of the Revised Penal Code mandates the timely delivery of an arrested person to judicial authorities.</p> Signup and view all the answers

What are the main disadvantages of using unstructured interviews?

<p>Unstructured interviews make data analysis difficult due to their lack of structure, and responses may be inconsistent, making comparisons harder.</p> Signup and view all the answers

What is the main objective of conducting witness interviews?

<p>The main goal is to increase recall (quantity of information) while maintaining accuracy, rather than pressuring witnesses to testify.</p> Signup and view all the answers

What is the primary goal of Police-Community Relations (PCR)?

<p>The primary goal of PCR is strengthening the partnership between the police and the community to foster trust and cooperation.</p> Signup and view all the answers

Conducting military operations is one of the main functions of the PNP under RA 8551.

<p>False (B)</p> Signup and view all the answers

Which of the following is NOT one of the four components of the PNP Quality Service Lane?

<p>Strengthening Criminal Investigation Units (A)</p> Signup and view all the answers

How does non-traditional law enforcement differ from traditional law enforcement?

<p>Traditional law enforcement typically responds to crime after it occurs, while non-traditional law enforcement involves analyzing crime problems to develop effective, proactive solutions.</p> Signup and view all the answers

Who are the members of the CSOP (Community and Service-Oriented Policing) Triumvirate?

<p>The CSOP Triumvirate is composed of the Mayor, Chief of Police, and Barangay Officials.</p> Signup and view all the answers

What is the focus of the 'Scanning' phase in the SARA model used in community policing?

<p>The Scanning phase focuses on identifying and prioritizing community concerns by determining the frequency and impact of recurring problems.</p> Signup and view all the answers

What does 'Personal Diplomacy' emphasize in the context of etiquette and social graces?

<p>Personal Diplomacy emphasizes appropriate behavior and presentation in professional and social settings, encompassing proper dressing code, speaking culture, and self-presentation.</p> Signup and view all the answers

What was the original meaning of 'protocol' in Byzantine diplomacy?

<p>In Byzantine diplomacy, 'protocol' originally referred to the first part of solemn written documents listing participants.</p> Signup and view all the answers

What element is key in Corporate Diplomacy for ensuring respect across cultures?

<p>Cross-cultural etiquette is the key element, ensuring effective communication and understanding among diverse groups.</p> Signup and view all the answers

Which of the following is NOT typically considered a phase of Community Organizing by the Community Affairs Division (CAD)?

<p>Law Enforcement Operations (A)</p> Signup and view all the answers

What is the key objective of the Community Affairs Division (CAD) in community organizing?

<p>The key objective of CAD is to develop force-multipliers through community empowerment.</p> Signup and view all the answers

During the Integration Phase of community organizing, participants should ideally live in isolation from community members.

<p>False (B)</p> Signup and view all the answers

Why is maintaining public trust considered crucial in policing ethics?

<p>Maintaining Public Trust is crucial because it is fundamental to police legitimacy and effectiveness. Ethical conduct builds this trust.</p> Signup and view all the answers

How should ethical conflicts arising from orders be handled in law enforcement?

<p>Ethical conflicts or issues related to orders should be reported through proper channels.</p> Signup and view all the answers

What function does the retina perform in visual perception?

<p>The retina converts light into neural signals that the brain can process.</p> Signup and view all the answers

Explain the Gestalt principle of Proximity.

<p>The principle of Proximity states that objects that are close together are perceived as belonging to a group.</p> Signup and view all the answers

What is Change Blindness?

<p>Change Blindness is a perceptual phenomenon where individuals fail to notice significant changes in their visual field, often due to attention shifts.</p> Signup and view all the answers

Which of the following is NOT a primary role of Barangay Tanods, Bantay Bayan, and CVOs in Barangay Peacekeeping Operations (BPO)?

<p>Conducting court trials and sentencing (A)</p> Signup and view all the answers

A core concept in police-community relations is: 'The community is the _____, and the police is the _____.'

<p>police, community</p> Signup and view all the answers

Which function is specifically excluded from the responsibilities of the Salaam Police?

<p>Legal arbitration in Muslim communities (D)</p> Signup and view all the answers

What is the purpose of Counter Violent Extremism (CVE) initiatives like monitoring Friday sermons (Khutbah)?

<p>The purpose is to detect radical ideologies being spread that could incite violence or extremism.</p> Signup and view all the answers

What is the difference between Bottom-Up and Top-Down processing in perception?

<p>Bottom-Up Processing involves identifying stimuli based on individual features (data-driven), like recognizing letters to form a word. Top-Down Processing is guided by prior knowledge, expectations, and context to interpret stimuli.</p> Signup and view all the answers

What phenomenon demonstrates perceiving continuous motion from a series of still images?

<p>The Phi Phenomenon.</p> Signup and view all the answers

List the core capabilities of Information Operations.

<p>Psychological Operations (PSYOP), Electronic Warfare (EW), Computer Network Operations (CNO), Operational Security (OPSEC), and Military Deception (MILDEC).</p> Signup and view all the answers

What is the goal of Psychological Operations (PSYOP)?

<p>The goal of PSYOP is to shape the perceptions, attitudes, and behaviors of target audiences through strategic messaging.</p> Signup and view all the answers

How does media coverage influence public perception of law enforcement?

<p>The public often relies on media coverage to form opinions. The way police actions and incidents are reported can significantly shape public trust, confidence, and perceptions of safety.</p> Signup and view all the answers

What is the role of a PNP Spokesperson?

<p>A PNP spokesperson is responsible for representing the organization, delivering official statements, and communicating key messages to the public through the media.</p> Signup and view all the answers

Flashcards

Cybercrime

Illegal activities carried out using computers or digital networks.

Actions of Cybercriminals

Unauthorized access to accounts, hacking, and distributing malicious software.

Trojan horse programs

Programs used to control multiple computers in a botnet for large-scale attacks.

Email spoofing and spamming

Deceiving victims by disguising emails as legitimate.

Signup and view all the flashcards

Ethical hacking

Reporting vulnerabilities in systems to improve security.

Signup and view all the flashcards

ICT (Information and Communications Technology)

Systems used for telecommunications, broadcasting, network control, and monitoring functions.

Signup and view all the flashcards

URL (Uniform Resource Locator)

An address used to access resources on the internet.

Signup and view all the flashcards

IP Address

A numerical label assigned to each device connected to the internet.

Signup and view all the flashcards

IP Address (e.g., 192.0.2.1)

Identifies devices on a network that communicate via the Internet Protocol.

Signup and view all the flashcards

Republic Act No. 10175

Covers crimes committed using digital platforms and information technology.

Signup and view all the flashcards

Identity Theft

Unauthorized acquisition and use of another person's identifying information.

Signup and view all the flashcards

RA 10173 (Data Privacy Act of 2012)

Protects personal information in both government and private sectors.

Signup and view all the flashcards

RA 9775

Prohibits any form of child pornography.

Signup and view all the flashcards

Child pornography

The visual, audio, or written depiction of explicit activities involving children

Signup and view all the flashcards

Importance of Cybercrime Laws

Protects individuals and institutions from digital threats.

Signup and view all the flashcards

Traffic

Movement of vehicles, pedestrians, and goods from one place to another.

Signup and view all the flashcards

Motor Vehicle

Any vehicle powered by an engine, excluding those powered by human effort.

Signup and view all the flashcards

Traffic Arrest

Taking a person into custody for a traffic-related law violation.

Signup and view all the flashcards

Informal 'Golden Hour' Review

Helps identify errors quickly and ensures the investigation stays on track.

Signup and view all the flashcards

External Case Review

Provides an unbiased, nationally agreed audit process, ensuring transparency and fairness.

Signup and view all the flashcards

Study Notes

Understanding Cybercrime

  • Cybercrime involves illegal activities using computers or digital networks.
  • Identity theft, hacking, and online fraud are common cybercrimes.
  • Installing antivirus software is not considered a cybercrime.

Actions of Cybercriminals

  • Cybercriminals engage in unauthorized access, hacking, and malicious software distribution.
  • Trojan horse programs are used to control computers in botnet attacks.
  • Email spoofing and spamming disguise emails to deceive victims.
  • Ethical hacking, which aims to improve system security by reporting vulnerabilities, is not a crime.

Information and Communications Technology (ICT)

  • ICT includes systems for telecommunications, broadcasting, network control, and monitoring.
  • Telecommunication networks, digital media, and smart building systems are examples of ICT applications.
  • A URL (Uniform Resource Locator) is an internet address used to access online resources.
  • An IP Address is a numerical label for devices connected to the internet.

Internet Protocol (IP) Address

  • An IP Address (e.g., 192.0.2.1) identifies devices on a network using the Internet Protocol.
  • IP addresses are essential for network security, tracking, and location identification.
  • Unlike URLs, which are human-readable, an IP address is a machine-readable identifier.

Republic Act No. 10175 (Cybercrime Prevention Act of 2012)

  • RA 10175 covers crimes using digital platforms and information technology.
  • Section 6 covers crimes penalized under the Revised Penal Code and special laws when committed through ICT.
  • Identity theft is penalized under Section 4 (b)(3), addressing fraudulent use of personal information.

Identity Theft and Data Privacy Laws

  • Identity theft involves unauthorized acquisition and use of personal information, potentially leading to fraud.
  • RA 10173 (Data Privacy Act of 2012) protects personal information in both government and private sectors, ensuring privacy.

Cybercrimes Against Children

  • RA 9775 (Anti-Child Pornography Act of 2009) prohibits child pornography, including images, videos, and digital representations.
  • Child pornography includes visual, audio, or written depictions of explicit activities involving children.

Importance of Cybercrime Laws

  • Cybercrime laws protect against digital threats like hacking, fraud, and privacy violations.
  • These laws aid in recognizing and preventing cybercrimes.

Understanding Traffic and Roadways

  • Traffic includes the movement of vehicles, pedestrians, and goods.
  • Highways include public roads, streets, boulevards, and alleys, excluding private properties.

Motor Vehicles and Drivers

  • A motor vehicle is powered by an engine and does not include human-powered vehicles that use public highways.
  • A driver is a licensed person who operates a motor vehicle.
  • A professional driver is paid to operate a vehicle for private or public transport.
  • An owner is the registered legal owner of a vehicle, as recorded with the Land Transportation Office (LTO).

Traffic Management

  • Traffic Management involves controlling and supervising transportation systems.
  • Traffic management includes lane closures, intersection control, speed limits, and ramp metering.
  • The goal is to ensure smooth traffic flow and enhance road safety.

Law Enforcement in Traffic Violations

  • A traffic arrest involves taking a person into custody for a traffic law violation to ensure they answer charges in court.
  • A traffic citation involves issuing a ticket that requires the violator to appear in court without physical arrest.
  • A traffic warning is a formal notice without penalty, serving as a caution for future compliance.

Crime Awareness and Prevention

  • The Bantay Krimen Mobile Application, launched on March 16, 2016, promotes crime awareness, reporting, and prevention.
  • The Directorate for Investigation and Detection Management (DIDM) launched the app at Camp Crame.

Features of Bantay Krimen App

  • Users can check crime reports by setting a specific area using the View Crime Incidents feature.
  • The Report Crimes feature allows users to report crimes in real-time to the nearest police station.
  • The Hotspot Notification feature uses GPS to notify users near crime-prone areas.
  • The Call the Nearest Police Station feature is a one-click function for contacting authorities during emergencies.

Crime and Case Management Systems

  • CIRAS (Crime Information Reporting and Analysis System) collates and analyzes complex crime data through visual intelligence.
  • CIDMS (Case Information Database Management System) is used by investigators to track and manage case files.
  • CMAS (Case Monitoring and Analysis System) analyzes investigative data for better decision-making.

Digital Crime Solutions

  • E-Rogue serves as an electronic rogues' gallery, storing photos and records of wanted persons.
  • E-Warrant is an electronic system for tracking and managing warrants.
  • E-Subpoena manages subpoenas issued by the police.

Investigation and Record-Keeping

  • Crime mapping is used to visualize and study crime trends.
  • The Crime Registrar affixes a signature on police blotter entries.
  • CIRAS handles crime reporting, while CIDMS manages case investigations and full-blown cases.

Case Prioritization and Encoding

  • High-profile cases of killings of activists, media practitioners, drug-related offenses, heinous crimes, and election-related incidents are encoded to CIDMS.
  • The case encoding standard requires a minimum of two case folders per day to be entered by investigators.

IT and System Requirements

  • Minimum hardware and software requirements include an Intel Core i3 processor, 2GB RAM, 160GB HDD, Windows 7 OS, and a high-speed scanner.
  • A web-based CIDMS is being developed as a centralized server version to store and integrate data across police stations.

Investigative Reports

  • Investigative Reports provide an official record of findings and be accurate, complete, and timely, with no personal opinions.

Types of Investigative Reports

  • Spot Report: initial investigative report submitted to higher headquarters
  • Coordination Report: tool for agencies to coordinate with police or military units during operation
  • Case Referral Report: endorsement to the Prosecutor's Office for legal action

Tickler System

  • Tickler System: method to regularly check pending cases filed under an officer's name. It helps in monitoring case progress.

Minimum Requirements for a Good Investigative Report

  • A good investigative report needs Accuracy (factual and free from errors)
  • Completeness (Should contain all necessary details for proper documentation)
  • Timeliness (Must be submitted promptly to aid in case resolution)

Primary Function of the PNP

  • The Philippine National Police (PNP) is mandated to maintain public safety, enforce the law, and prevent crimes.

Core Values of the PNP

  • The PNP upholds Integrity, Service, and Honor as core values and ensure ethical conduct in law enforcement.

PNP Ethical Doctrine

  • Police officers ensure truthfulness and honesty, guided by the PNP Honor Code and Code of Conduct.
  • Republic Act No. 6975 established the PNP under the Department of the Interior and Local Government (DILG)
  • Republic Act No. 9165 governs drug-related offenses under the Comprehensive Dangerous Drugs Act.
  • Republic Act No. 10591 regulates licensing and possession of firearms.
  • Republic Act No. 7610 protects children from maltreatment, discrimination, and exploitation.

###.PNP Performance Governance System (PGS)

  • Learning and Growth: Capacity Building and personal development
  • Community Relations: Ties with the public will strenghten to gain suport for policing efforts.
  • Operational Excellence: Efficiency and effectiveness in law enforcement functions
  • Budget Allocation: Not a strategic perspective under PGS yet essential for resource management

Purpose of Case Review

  • Reviews to develop investigative opportunities, improve case handling, and lower the risk of errors affecting the outcomes of the review cases

Informal "Golden Hour" Review

  • Helps identify errors quickly and ensures that the investigation stays on track
  • Review helps in the early stage

Benefits of a Case Review

  • Reduction helps with problem reduction, litigation avoidance, and giving new insights.
  • May increase investigation costs due to additional reviews.

Self-Inspection Review

  • Investigator's assess their work without external interference
  • Review does not disrupt ongoing investigations

28-Day Progress Review

  • Conducted after four weeks to track the quality and investigation progress
  • Ensuring effectiveness and recognizing new leads

Concluding Review

  • The long term investigation will determine if the operational resources should be withdrawn
  • A case review is done to determine

Case Development Review (Cold Case Review)

  • To revive unsolved cases, focus on using new forensic and testimonie technologies

External Case Review

  • Offers a nationally agreed audit process that is unbiased

Thematic Reviews

  • Investigates Forensic Evidence and other investigative techniques

Purpose of a Witness in Court

  • A witness is required to answer questions and evidence relevant to the case and does not determine sentences or provide legal advice.

Types of Interviews

  • Structured Interview: Uses a pre-planned sequence of questions.
  • Unstructured Interview: Allows for spontaneous questioning based on responses.
  • Semi-structured Interview: A mix of both structured and unstructured formats.

Treatment of Witnesses

  • Witnesses should be treated well to encourage participation in future investigations and to ensure their cooperation.

Question Types in Structured Interviews

  • These interviews mainly use close-ended questions to ensure consistency and ease of data analysis.

Inquest Case Requirements

  • Investigators and arresting officers MUST OBSERVE Article 125 of the Revised Penal Code, which mandates the timely delivery of an arrested person to judicial authorities.

Disadvantages of Unstructured Interviews

  • Due to a lack of a structured format, unstructured interviews, make making data analysis difficult
  • Comparing statements is difficult as responses may be inconsistent

Characteristics of an Unstructured Interview

  • Interviewer is able to form new questions, making the experience flexible yet less reliable

Reliability Concerns

  • UNSTRUCTURED are less reliable due to High subjectivity and inconsistency

Objective of Witness Interviews

  • Maintain accuracy and raise recall instead of pressuring

Avoid in Unstructured Interviews

  • Prevent influence by avoinding Leading questions in unstructured interviews

Definition of Witness Role

  • Roles include providing testimony and answering questions about the case in the court of law
  • Functions include giving knowledge based evidence of events

Types of Interviews

  • Structured: Strict sequence of planed questions
  • Unstructured: formulate new questions based on the response
  • Semi-Standard: mix of structured and unstructured

Question Types

  • Used in structured interviews is Closed-ended questions for specific answers
  • Used in Unstructured is Open-ended questions for detail

key objectives of the witness interviews

  • Accuracy and recall quantity
  • Reliability and consistency

Factors affecting an interview

  • Unreliability and lack of consistency is UNSTRUCTURED Neutrality - Don't maintain lead questions

Investigative Guidelines

  • Obey Article 125 of the Revise Penal Code in inquest Cases
  • Treat witnesses well for future involvement

challenges in witness processing

  • Structured interviews - has more reliable data- Due to the standard approach
  • Analyzing categorize - Disadvantage of unstructured interviews

Primary Goal of Police - Community Relations (PCR)

  • To build trust, foster cooperation, and strengthen the partnership

Nature of (Philippine National Police)PNP under RA 8551

  • Scope - Civilian
  • Character- Civilian

Functions of The Directorate Of Police Community Relations (DPCR)

  • Create policies, programs, and plans for community engagement

Challenges in implementing police community relation programs

  • PCR programs - hindered by attentional problems

Controversy in police work (Michael P. Tremoglie)

  • Police duties are controversial as they are responsible for restoring order

Police - Community Relations

  • Priority on community engagement and partnership

Main functions of the PNP under RA 8551

  • Ensure public safety, enforce laws and maintain peace

Fundamentals of PCAD and Service oriented Policing

  • 4 components - HRD, improvement of facilities, quality works, mobilization
  • PNP QSL - Not Strenthening criminal investigation

Purpose of Transforming desks into lanes

  • Aim for client friendly service to improve relations

Etiquette Protocol

  • falls under personal diplomacy
  • dressing code
  • Speaking Culture
  • Presentation

Definition of Diplomatic Protocol Macquarie Dictionary

  • Customs and regulations ceremonies and etiquette of the diplomatic forces

Protocol in byzantine

  • first part of the written document lists the names
  • seating and precedence ceremony

corporate diplomacy

  • cross cultures= communication and understanding

Cad and Community Organizing

  • Build relationship
  • Select , investigate , form and exclude laws
  • Multiplier through community involvement
  • Participate in economic activity, share responsibilities , and involvement

Idenntifying leaders

  • Responsive and influence

Safety Security Assistance

  • ensure public safety with measures

Ethical Policing and Decision-Making

  • integrity and fairness in policing

legal - legal reasoning ethics- moral Reasoning

visual and sensory information

  • retina + Neural is Light
  • Shape changes is focused with adjustments

Absolute tresholds

intensity on smallest stimuli

perceptual processes

  • processing by known information

depth perception

  • uses monocular cues and binocular perspectives

Gestalt principle

  • objects close groups together

Webers law

  • constant stimulus for a certain proportion

perceptual phenomena

  • difficulty with conflicting info is stoop effect

Baranagy peacekeeper operations

  • effective crime control disaster management

roles of CVOS, Bantay bayan, and tanods

  • community partner
  • assists in disaster
  • not responsible for court

Core components of BPO

  • community in law enforcement

community and relations

  • the community is police

BPO Teams

  • conduct activities supervided

objectives of salaam police

  • postive relaations

functions of the police

  • educational campaigns
  • liaisons within communitites

partnership and cooperation

  • in collabrotuion with comminities

protection of muslims.

  • prevents discrimiantion through netowrking

Minority jursidiction of muslim minorities

  • debates in local territory

Counter vioelent extremism

  • monitor ideological sermons

Bottom up process

  • individual process

Thamas

  • relays sensory information

Selective attention

  • filitering distraction from converstaions

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser