Podcast
Questions and Answers
What is cybercrime?
What is cybercrime?
Cybercrime refers to illegal activities carried out using computers or digital networks.
What techniques do cybercriminals use to control multiple computers for large-scale attacks?
What techniques do cybercriminals use to control multiple computers for large-scale attacks?
Cybercriminals use techniques like Trojan horse programs to control multiple computers in a botnet for large-scale attacks.
Ethical hacking, which involves reporting system vulnerabilities, is considered a criminal act.
Ethical hacking, which involves reporting system vulnerabilities, is considered a criminal act.
False (B)
What does ICT stand for and what types of systems does it include?
What does ICT stand for and what types of systems does it include?
What is the difference between a URL and an IP Address?
What is the difference between a URL and an IP Address?
What is the full name and purpose of Republic Act No. 10175?
What is the full name and purpose of Republic Act No. 10175?
Under which section of RA 10175 is identity theft penalized?
Under which section of RA 10175 is identity theft penalized?
What is the purpose of RA 10173, the Data Privacy Act of 2012?
What is the purpose of RA 10173, the Data Privacy Act of 2012?
What does RA 9775 prohibit, and how does it define its subject?
What does RA 9775 prohibit, and how does it define its subject?
Define 'Traffic' in the context of traffic investigation.
Define 'Traffic' in the context of traffic investigation.
What distinguishes a 'Professional Driver' from a regular 'Driver'?
What distinguishes a 'Professional Driver' from a regular 'Driver'?
What are the key components involved in Traffic Management?
What are the key components involved in Traffic Management?
Which action involves issuing a ticket requiring a violator to appear in court without being physically arrested?
Which action involves issuing a ticket requiring a violator to appear in court without being physically arrested?
What is the Bantay Krimen Mobile Application and when was it launched?
What is the Bantay Krimen Mobile Application and when was it launched?
Match the PNP IT System with its primary function:
Match the PNP IT System with its primary function:
What is the minimum daily case encoding standard for investigators using CIDMS?
What is the minimum daily case encoding standard for investigators using CIDMS?
What are the three essential qualities of a good Investigative Report?
What are the three essential qualities of a good Investigative Report?
Which type of investigative report serves as an endorsement to the Prosecutor's Office for legal action?
Which type of investigative report serves as an endorsement to the Prosecutor's Office for legal action?
What is a Tickler System used for in investigations?
What is a Tickler System used for in investigations?
What are the three Core Values upheld by the PNP?
What are the three Core Values upheld by the PNP?
Match the Republic Act with its relevance to the PNP's legal framework:
Match the Republic Act with its relevance to the PNP's legal framework:
Which of the following is NOT a strategic perspective under the PNP Performance Governance System (PGS)?
Which of the following is NOT a strategic perspective under the PNP Performance Governance System (PGS)?
What is the primary aim of Case Reviews in investigations?
What is the primary aim of Case Reviews in investigations?
What is the focus of a Case Development Review, also known as a Cold Case Review?
What is the focus of a Case Development Review, also known as a Cold Case Review?
Which type of interview uses a pre-planned sequence of questions, often close-ended?
Which type of interview uses a pre-planned sequence of questions, often close-ended?
What legal provision mandates the timely delivery of an arrested person to judicial authorities during inquest cases?
What legal provision mandates the timely delivery of an arrested person to judicial authorities during inquest cases?
What are the main disadvantages of using unstructured interviews?
What are the main disadvantages of using unstructured interviews?
What is the main objective of conducting witness interviews?
What is the main objective of conducting witness interviews?
What is the primary goal of Police-Community Relations (PCR)?
What is the primary goal of Police-Community Relations (PCR)?
Conducting military operations is one of the main functions of the PNP under RA 8551.
Conducting military operations is one of the main functions of the PNP under RA 8551.
Which of the following is NOT one of the four components of the PNP Quality Service Lane?
Which of the following is NOT one of the four components of the PNP Quality Service Lane?
How does non-traditional law enforcement differ from traditional law enforcement?
How does non-traditional law enforcement differ from traditional law enforcement?
Who are the members of the CSOP (Community and Service-Oriented Policing) Triumvirate?
Who are the members of the CSOP (Community and Service-Oriented Policing) Triumvirate?
What is the focus of the 'Scanning' phase in the SARA model used in community policing?
What is the focus of the 'Scanning' phase in the SARA model used in community policing?
What does 'Personal Diplomacy' emphasize in the context of etiquette and social graces?
What does 'Personal Diplomacy' emphasize in the context of etiquette and social graces?
What was the original meaning of 'protocol' in Byzantine diplomacy?
What was the original meaning of 'protocol' in Byzantine diplomacy?
What element is key in Corporate Diplomacy for ensuring respect across cultures?
What element is key in Corporate Diplomacy for ensuring respect across cultures?
Which of the following is NOT typically considered a phase of Community Organizing by the Community Affairs Division (CAD)?
Which of the following is NOT typically considered a phase of Community Organizing by the Community Affairs Division (CAD)?
What is the key objective of the Community Affairs Division (CAD) in community organizing?
What is the key objective of the Community Affairs Division (CAD) in community organizing?
During the Integration Phase of community organizing, participants should ideally live in isolation from community members.
During the Integration Phase of community organizing, participants should ideally live in isolation from community members.
Why is maintaining public trust considered crucial in policing ethics?
Why is maintaining public trust considered crucial in policing ethics?
How should ethical conflicts arising from orders be handled in law enforcement?
How should ethical conflicts arising from orders be handled in law enforcement?
What function does the retina perform in visual perception?
What function does the retina perform in visual perception?
Explain the Gestalt principle of Proximity.
Explain the Gestalt principle of Proximity.
What is Change Blindness?
What is Change Blindness?
Which of the following is NOT a primary role of Barangay Tanods, Bantay Bayan, and CVOs in Barangay Peacekeeping Operations (BPO)?
Which of the following is NOT a primary role of Barangay Tanods, Bantay Bayan, and CVOs in Barangay Peacekeeping Operations (BPO)?
A core concept in police-community relations is: 'The community is the _____, and the police is the _____.'
A core concept in police-community relations is: 'The community is the _____, and the police is the _____.'
Which function is specifically excluded from the responsibilities of the Salaam Police?
Which function is specifically excluded from the responsibilities of the Salaam Police?
What is the purpose of Counter Violent Extremism (CVE) initiatives like monitoring Friday sermons (Khutbah)?
What is the purpose of Counter Violent Extremism (CVE) initiatives like monitoring Friday sermons (Khutbah)?
What is the difference between Bottom-Up and Top-Down processing in perception?
What is the difference between Bottom-Up and Top-Down processing in perception?
What phenomenon demonstrates perceiving continuous motion from a series of still images?
What phenomenon demonstrates perceiving continuous motion from a series of still images?
List the core capabilities of Information Operations.
List the core capabilities of Information Operations.
What is the goal of Psychological Operations (PSYOP)?
What is the goal of Psychological Operations (PSYOP)?
How does media coverage influence public perception of law enforcement?
How does media coverage influence public perception of law enforcement?
What is the role of a PNP Spokesperson?
What is the role of a PNP Spokesperson?
Flashcards
Cybercrime
Cybercrime
Illegal activities carried out using computers or digital networks.
Actions of Cybercriminals
Actions of Cybercriminals
Unauthorized access to accounts, hacking, and distributing malicious software.
Trojan horse programs
Trojan horse programs
Programs used to control multiple computers in a botnet for large-scale attacks.
Email spoofing and spamming
Email spoofing and spamming
Signup and view all the flashcards
Ethical hacking
Ethical hacking
Signup and view all the flashcards
ICT (Information and Communications Technology)
ICT (Information and Communications Technology)
Signup and view all the flashcards
URL (Uniform Resource Locator)
URL (Uniform Resource Locator)
Signup and view all the flashcards
IP Address
IP Address
Signup and view all the flashcards
IP Address (e.g., 192.0.2.1)
IP Address (e.g., 192.0.2.1)
Signup and view all the flashcards
Republic Act No. 10175
Republic Act No. 10175
Signup and view all the flashcards
Identity Theft
Identity Theft
Signup and view all the flashcards
RA 10173 (Data Privacy Act of 2012)
RA 10173 (Data Privacy Act of 2012)
Signup and view all the flashcards
RA 9775
RA 9775
Signup and view all the flashcards
Child pornography
Child pornography
Signup and view all the flashcards
Importance of Cybercrime Laws
Importance of Cybercrime Laws
Signup and view all the flashcards
Traffic
Traffic
Signup and view all the flashcards
Motor Vehicle
Motor Vehicle
Signup and view all the flashcards
Traffic Arrest
Traffic Arrest
Signup and view all the flashcards
Informal 'Golden Hour' Review
Informal 'Golden Hour' Review
Signup and view all the flashcards
External Case Review
External Case Review
Signup and view all the flashcards
Study Notes
Understanding Cybercrime
- Cybercrime involves illegal activities using computers or digital networks.
- Identity theft, hacking, and online fraud are common cybercrimes.
- Installing antivirus software is not considered a cybercrime.
Actions of Cybercriminals
- Cybercriminals engage in unauthorized access, hacking, and malicious software distribution.
- Trojan horse programs are used to control computers in botnet attacks.
- Email spoofing and spamming disguise emails to deceive victims.
- Ethical hacking, which aims to improve system security by reporting vulnerabilities, is not a crime.
Information and Communications Technology (ICT)
- ICT includes systems for telecommunications, broadcasting, network control, and monitoring.
- Telecommunication networks, digital media, and smart building systems are examples of ICT applications.
- A URL (Uniform Resource Locator) is an internet address used to access online resources.
- An IP Address is a numerical label for devices connected to the internet.
Internet Protocol (IP) Address
- An IP Address (e.g., 192.0.2.1) identifies devices on a network using the Internet Protocol.
- IP addresses are essential for network security, tracking, and location identification.
- Unlike URLs, which are human-readable, an IP address is a machine-readable identifier.
Republic Act No. 10175 (Cybercrime Prevention Act of 2012)
- RA 10175 covers crimes using digital platforms and information technology.
- Section 6 covers crimes penalized under the Revised Penal Code and special laws when committed through ICT.
- Identity theft is penalized under Section 4 (b)(3), addressing fraudulent use of personal information.
Identity Theft and Data Privacy Laws
- Identity theft involves unauthorized acquisition and use of personal information, potentially leading to fraud.
- RA 10173 (Data Privacy Act of 2012) protects personal information in both government and private sectors, ensuring privacy.
Cybercrimes Against Children
- RA 9775 (Anti-Child Pornography Act of 2009) prohibits child pornography, including images, videos, and digital representations.
- Child pornography includes visual, audio, or written depictions of explicit activities involving children.
Importance of Cybercrime Laws
- Cybercrime laws protect against digital threats like hacking, fraud, and privacy violations.
- These laws aid in recognizing and preventing cybercrimes.
Understanding Traffic and Roadways
- Traffic includes the movement of vehicles, pedestrians, and goods.
- Highways include public roads, streets, boulevards, and alleys, excluding private properties.
Motor Vehicles and Drivers
- A motor vehicle is powered by an engine and does not include human-powered vehicles that use public highways.
- A driver is a licensed person who operates a motor vehicle.
- A professional driver is paid to operate a vehicle for private or public transport.
- An owner is the registered legal owner of a vehicle, as recorded with the Land Transportation Office (LTO).
Traffic Management
- Traffic Management involves controlling and supervising transportation systems.
- Traffic management includes lane closures, intersection control, speed limits, and ramp metering.
- The goal is to ensure smooth traffic flow and enhance road safety.
Law Enforcement in Traffic Violations
- A traffic arrest involves taking a person into custody for a traffic law violation to ensure they answer charges in court.
- A traffic citation involves issuing a ticket that requires the violator to appear in court without physical arrest.
- A traffic warning is a formal notice without penalty, serving as a caution for future compliance.
Crime Awareness and Prevention
- The Bantay Krimen Mobile Application, launched on March 16, 2016, promotes crime awareness, reporting, and prevention.
- The Directorate for Investigation and Detection Management (DIDM) launched the app at Camp Crame.
Features of Bantay Krimen App
- Users can check crime reports by setting a specific area using the View Crime Incidents feature.
- The Report Crimes feature allows users to report crimes in real-time to the nearest police station.
- The Hotspot Notification feature uses GPS to notify users near crime-prone areas.
- The Call the Nearest Police Station feature is a one-click function for contacting authorities during emergencies.
Crime and Case Management Systems
- CIRAS (Crime Information Reporting and Analysis System) collates and analyzes complex crime data through visual intelligence.
- CIDMS (Case Information Database Management System) is used by investigators to track and manage case files.
- CMAS (Case Monitoring and Analysis System) analyzes investigative data for better decision-making.
Digital Crime Solutions
- E-Rogue serves as an electronic rogues' gallery, storing photos and records of wanted persons.
- E-Warrant is an electronic system for tracking and managing warrants.
- E-Subpoena manages subpoenas issued by the police.
Investigation and Record-Keeping
- Crime mapping is used to visualize and study crime trends.
- The Crime Registrar affixes a signature on police blotter entries.
- CIRAS handles crime reporting, while CIDMS manages case investigations and full-blown cases.
Case Prioritization and Encoding
- High-profile cases of killings of activists, media practitioners, drug-related offenses, heinous crimes, and election-related incidents are encoded to CIDMS.
- The case encoding standard requires a minimum of two case folders per day to be entered by investigators.
IT and System Requirements
- Minimum hardware and software requirements include an Intel Core i3 processor, 2GB RAM, 160GB HDD, Windows 7 OS, and a high-speed scanner.
- A web-based CIDMS is being developed as a centralized server version to store and integrate data across police stations.
Investigative Reports
- Investigative Reports provide an official record of findings and be accurate, complete, and timely, with no personal opinions.
Types of Investigative Reports
- Spot Report: initial investigative report submitted to higher headquarters
- Coordination Report: tool for agencies to coordinate with police or military units during operation
- Case Referral Report: endorsement to the Prosecutor's Office for legal action
Tickler System
- Tickler System: method to regularly check pending cases filed under an officer's name. It helps in monitoring case progress.
Minimum Requirements for a Good Investigative Report
- A good investigative report needs Accuracy (factual and free from errors)
- Completeness (Should contain all necessary details for proper documentation)
- Timeliness (Must be submitted promptly to aid in case resolution)
Primary Function of the PNP
- The Philippine National Police (PNP) is mandated to maintain public safety, enforce the law, and prevent crimes.
Core Values of the PNP
- The PNP upholds Integrity, Service, and Honor as core values and ensure ethical conduct in law enforcement.
PNP Ethical Doctrine
- Police officers ensure truthfulness and honesty, guided by the PNP Honor Code and Code of Conduct.
Legal Framework of the PNP
- Republic Act No. 6975 established the PNP under the Department of the Interior and Local Government (DILG)
- Republic Act No. 9165 governs drug-related offenses under the Comprehensive Dangerous Drugs Act.
- Republic Act No. 10591 regulates licensing and possession of firearms.
- Republic Act No. 7610 protects children from maltreatment, discrimination, and exploitation.
###.PNP Performance Governance System (PGS)
- Learning and Growth: Capacity Building and personal development
- Community Relations: Ties with the public will strenghten to gain suport for policing efforts.
- Operational Excellence: Efficiency and effectiveness in law enforcement functions
- Budget Allocation: Not a strategic perspective under PGS yet essential for resource management
Purpose of Case Review
- Reviews to develop investigative opportunities, improve case handling, and lower the risk of errors affecting the outcomes of the review cases
Informal "Golden Hour" Review
- Helps identify errors quickly and ensures that the investigation stays on track
- Review helps in the early stage
Benefits of a Case Review
- Reduction helps with problem reduction, litigation avoidance, and giving new insights.
- May increase investigation costs due to additional reviews.
Self-Inspection Review
- Investigator's assess their work without external interference
- Review does not disrupt ongoing investigations
28-Day Progress Review
- Conducted after four weeks to track the quality and investigation progress
- Ensuring effectiveness and recognizing new leads
Concluding Review
- The long term investigation will determine if the operational resources should be withdrawn
- A case review is done to determine
Case Development Review (Cold Case Review)
- To revive unsolved cases, focus on using new forensic and testimonie technologies
External Case Review
- Offers a nationally agreed audit process that is unbiased
Thematic Reviews
- Investigates Forensic Evidence and other investigative techniques
Purpose of a Witness in Court
- A witness is required to answer questions and evidence relevant to the case and does not determine sentences or provide legal advice.
Types of Interviews
- Structured Interview: Uses a pre-planned sequence of questions.
- Unstructured Interview: Allows for spontaneous questioning based on responses.
- Semi-structured Interview: A mix of both structured and unstructured formats.
Treatment of Witnesses
- Witnesses should be treated well to encourage participation in future investigations and to ensure their cooperation.
Question Types in Structured Interviews
- These interviews mainly use close-ended questions to ensure consistency and ease of data analysis.
Inquest Case Requirements
- Investigators and arresting officers MUST OBSERVE Article 125 of the Revised Penal Code, which mandates the timely delivery of an arrested person to judicial authorities.
Disadvantages of Unstructured Interviews
- Due to a lack of a structured format, unstructured interviews, make making data analysis difficult
- Comparing statements is difficult as responses may be inconsistent
Characteristics of an Unstructured Interview
- Interviewer is able to form new questions, making the experience flexible yet less reliable
Reliability Concerns
- UNSTRUCTURED are less reliable due to High subjectivity and inconsistency
Objective of Witness Interviews
- Maintain accuracy and raise recall instead of pressuring
Avoid in Unstructured Interviews
- Prevent influence by avoinding Leading questions in unstructured interviews
Definition of Witness Role
- Roles include providing testimony and answering questions about the case in the court of law
- Functions include giving knowledge based evidence of events
Types of Interviews
- Structured: Strict sequence of planed questions
- Unstructured: formulate new questions based on the response
- Semi-Standard: mix of structured and unstructured
Question Types
- Used in structured interviews is Closed-ended questions for specific answers
- Used in Unstructured is Open-ended questions for detail
key objectives of the witness interviews
- Accuracy and recall quantity
- Reliability and consistency
Factors affecting an interview
- Unreliability and lack of consistency is UNSTRUCTURED Neutrality - Don't maintain lead questions
Investigative Guidelines
- Obey Article 125 of the Revise Penal Code in inquest Cases
- Treat witnesses well for future involvement
challenges in witness processing
- Structured interviews - has more reliable data- Due to the standard approach
- Analyzing categorize - Disadvantage of unstructured interviews
Primary Goal of Police - Community Relations (PCR)
- To build trust, foster cooperation, and strengthen the partnership
Nature of (Philippine National Police)PNP under RA 8551
- Scope - Civilian
- Character- Civilian
Functions of The Directorate Of Police Community Relations (DPCR)
- Create policies, programs, and plans for community engagement
Challenges in implementing police community relation programs
- PCR programs - hindered by attentional problems
Controversy in police work (Michael P. Tremoglie)
- Police duties are controversial as they are responsible for restoring order
Police - Community Relations
- Priority on community engagement and partnership
Main functions of the PNP under RA 8551
- Ensure public safety, enforce laws and maintain peace
Fundamentals of PCAD and Service oriented Policing
- 4 components - HRD, improvement of facilities, quality works, mobilization
- PNP QSL - Not Strenthening criminal investigation
Purpose of Transforming desks into lanes
- Aim for client friendly service to improve relations
Etiquette Protocol
- falls under personal diplomacy
- dressing code
- Speaking Culture
- Presentation
Definition of Diplomatic Protocol Macquarie Dictionary
- Customs and regulations ceremonies and etiquette of the diplomatic forces
Protocol in byzantine
- first part of the written document lists the names
- seating and precedence ceremony
corporate diplomacy
- cross cultures= communication and understanding
Cad and Community Organizing
- Build relationship
- Select , investigate , form and exclude laws
- Multiplier through community involvement
- Participate in economic activity, share responsibilities , and involvement
Idenntifying leaders
- Responsive and influence
Safety Security Assistance
- ensure public safety with measures
Ethical Policing and Decision-Making
- integrity and fairness in policing
Ethics vs Legal
legal - legal reasoning ethics- moral Reasoning
visual and sensory information
- retina + Neural is Light
- Shape changes is focused with adjustments
Absolute tresholds
intensity on smallest stimuli
perceptual processes
- processing by known information
depth perception
- uses monocular cues and binocular perspectives
Gestalt principle
- objects close groups together
Webers law
- constant stimulus for a certain proportion
perceptual phenomena
- difficulty with conflicting info is stoop effect
Baranagy peacekeeper operations
- effective crime control disaster management
roles of CVOS, Bantay bayan, and tanods
- community partner
- assists in disaster
- not responsible for court
Core components of BPO
- community in law enforcement
community and relations
- the community is police
BPO Teams
- conduct activities supervided
objectives of salaam police
- postive relaations
functions of the police
- educational campaigns
- liaisons within communitites
partnership and cooperation
- in collabrotuion with comminities
protection of muslims.
- prevents discrimiantion through netowrking
Minority jursidiction of muslim minorities
- debates in local territory
Counter vioelent extremism
- monitor ideological sermons
Bottom up process
- individual process
Thamas
- relays sensory information
Selective attention
- filitering distraction from converstaions
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.