Comparative Policing Models PDF
Document Details
Uploaded by WellManagedTulsa
M.A. Garcia
Tags
Summary
This document provides an overview of comparative policing models from around the world, outlining different structures and approaches to crime prevention and control. It explores centralized and decentralized systems, problem-oriented policing, and intelligence-led approaches. The theory and practice of policing are discussed across various societal types.
Full Transcript
**[CHAPTER 1: INTRODUCTION TO COMPARATIVE POLICING]** **Intended Learning Outcomes:** Fire is the manifestation of rapid chemical reaction occurring between fuel and an oxidizer- typically the oxygen in the air. Such rapid chemical reaction releases energy in the form of heat and light. Fire is...
**[CHAPTER 1: INTRODUCTION TO COMPARATIVE POLICING]** **Intended Learning Outcomes:** Fire is the manifestation of rapid chemical reaction occurring between fuel and an oxidizer- typically the oxygen in the air. Such rapid chemical reaction releases energy in the form of heat and light. Fire is heat and light resulting from the rapid combination of oxygen, or in some cases gaseous chlorine, with other materials. The light is in the form of a flame, which is composed of glowing particles of the burning material and certain gaseous products that are luminous at the temperature of the burning material. ![](media/image2.png) **[INTRODUCTION]** The first police force (Metropolitan Police Force of London or Scotland Yard) created in 1829, by Sir Robert Peel, he created 17 metropolitan police divisions in London. In 1856 the rest of the country was required to establish police force. Since then, many different models of policing have been developed and experimented with, developments in policing and crime control were fairly rapid during the 1990s this is due to any reasons such as; changing patterns of crime, changing demand on the police, and changing expectation of the police and their role in communities. **[POLICING]** - Is the practice for the maintenance of peace and order, law enforcement and for the security of the community. - It is the methods practice by police officers for the maintenance of peace and order. **[COMPARATIVE POLICE SYSTEM]** - It is the science and art of investigating and comparing the police system of nations. - It covers the study of police organizations, trainings and methods of policing of various nations. **[METHODS COMPARING POLICE SYSTEM]** - **Safari Method** \- it is a type of research in comparative criminology wherein a researcher will visit another country for comparison purposes. - **Collaborative Method** \- one researcher will collaborate the work to a foreign researcher. - **Historical Comparative** \- most often employed by researchers, used quantitative and qualitative method (known as Historiography or Holism). - **Unpublished Works Comparison** \- single culture study and two culture study using published works. **[INTERNATIONAL CRIMINAL JUSTICE]** It involves the study and description of one country\'s law, criminal procedure or justice process. It attempts to build on the knowledge of criminal justice of one country by investigating and evaluating, in terms of another country, culture or institution. **[COMPARATIVE CRIMINAL JUSTICE]** It is a subfield of the study of criminal justice that compares justice system worldwide. Such study can take descriptive, historical or political approach. It studies the differences and similarities in the structure, goals, punishments and emphasis on rights as well as the history and political structure of different systems. **[TRANSNATIONAL POLICING]** It pertains to all forms of policing that transgress national borders. **[INTERNATIONAL POLICING]** It indicates to those type of policing that are formally directed by institutions usually responsible for international affairs **[GLOBAL POLICING]** Indicates those forms of policing that are fully global in scope. **[THEORIES OF COMPARATIVE POLICING]** **1. Alertness to Crime Theory** Explains that people\'s alertness to crime is heightened so they report more crimes to the police and also demand the police to become more effective in solving crime problems. **2. Economic or Migration Theory** Crime is a result of unrestrained migration and overpopulation in urban areas such as ghettos and slums. **3. Opportunity Theory** Along with higher standard of living, victims become more careless of their belongings and opportunities for committing of crime multiply. **4. Demographic Theory** Greater numbers of children are being born, because as these baby booms grow up, delinquent subcultures develop out of the adolescent identity crisis. **5. Deprivation Theory** Progress comes along with rising expectations and people at the bottom develop unrealistic expectations while people at the top do not see themselves rising fast enough. **6. Modernization Theory** Sees the problem as society becoming too complex. **7. Anomie and Synomie Theory** The latter being is a term referring to social cohesion on values; suggest that progressive lifestyle and norms result in the disintegration of older norms that once held people together. **[FOUR KINDS OF SOCIETIES IN THE WORLD]** **1. Folk-Communal Society** -- has little codification of law, no specialization among police, and system of punishment that just let things go for a while without attention until things become too much, and then harsh, barbaric punishment is resorted to. **2. Urban-Commercial Society** -- has civil law (some standards and customs are written down), specialized police forces (some for religious offense, others for enforcing the King's Law), and punishment is inconsistent, sometimes harsh, sometimes lenient. **3. Urban- Industrial Society** -- not only has codified laws (statutes that prohibit) but laws that prescribe good behavior, police become specialized in how to handle property crimes, and the system of punishment is run on market principles of creating incentives and disincentives. **4. Bureaucratic Society** -- has a system of laws (along with army lawyers), police who tend to keep busy handling political crime and terrorism, and a system of punishment characterized by over criminalization and overcrowding. **5. Post-Modern Society** -- where the emphasis is upon the meaning of words and the deconstruction of institutions. **[NATIONAL SYSTEMS OF CRIMINAL JUSTICE SYSTEM ACROSS THE WORLD]** **1. Common law systems - (Anglo- American Justice)** \- Exist in most English-speaking countries in the world (U.S.; England; Australia; and New Zealand. \- Strong Adversarial System (the accused is innocent until proven guilty) \- Primarily rely upon oral system of evidence in which the public trial is a main focal point. (Anglo-American - An American who was born in Britain or one whose ancestors were British) **2. Civil law systems - (Continental justice or Romano-Germanic justice)** \- Exist mostly in European countries such as Sweden; Germany; France; and Japan. \- Distinguished by strong inquisitorial system (the accused is guilty until proven innocent). \- The written is law is taken as gospel and subject to little interpretation. \- Founded on the basis of natural law in respect for tradition and custom. \- Always opposed to the common law notion that nobody is above the law. **3. Socialist systems - (Marxist-Leninist Justice)** \- Exist mostly in Africa and Asia and other Countries. \- Distinguished by procedures designed to rehabilitate or retrain people into fulfilling their responsibilities to the state. (ultimate expression of positive law). \- Primarily characterized by administrative law. **4. Islamic systems - (Muslim or Arabic Justice)** \- Derive all their procedures and practices from interpretation of the Koran. \- Characterized by the absence of positive law. \- Given always an important emphasis on the Religion. **[TYPES COMPARATIVE COURT SYSTEM]** 1\. **Adversarial** -- where the accused is innocent until proven guilty. 2\. **Inquisitorial** -- where the accused is guilty until proven innocent or mitigated. **[TYPES OF GOVERNMENT]** **1. Monarchy** One which supreme power of sovereignty is vested in the rules of a monarch. Monarchy is classified into two: **a. Absolute Monarchy** -- where the ruler rules the divine right. **2. Aristocracy** Form of government in which supreme power is vested in the few privileged class or group wherein high power is based from birth, wealth and wisdom. Related terms: **3. Democracy** Rule by people Democracy is classified into two: **a. Direct Democracy** -- where the people directly govern themselves. **b**. **Indirect Democracy** -- the people elect representative to act on their behalf. **4. Anarchy** Derived from the GREEK word anarchia which means \"without a ruler\". Related terms: **a. Anarchism** -- a philosophical movement rise in the mmid-19^th^ century, with its idea of freedom being based upon political and economic self-culture. **b. Anarchist** -- those who advocate the absence of the state, arguing that common sense would allow people to come together in agreement to form a functional society allowing for the participants to freely develop their sense of morality, ethics or principle behavior. **[CONTINENTAL THEORY]** Policemen are considered as servants of the higher authorities and the people have little or no share at all in their duties, nor any direct connection with them. **[HOME RULE THOERY]** On the other hand, home rule considered policemen as servants of the community who depends on the effectiveness of their functions upon the express wishes of the people. **[OLD CONCEPT]** Punishment is the sole instrument of crime control and yardstick of police efficiency is more on arrest. **[MODERN CONCEPT]** This concept considers the police as an organ of crime prevention. Here, the yardstick of police efficiency is the absence of crime. **REFERENCE:** Garcia, M.A. (2021) Comparative Models of Policing, Wiseman's Books Trading, Inc. **[CHAPTER 2: MODELS OF POLICING ACCORDING TO STRUCTURE AND APPROACH]** **Intended Learning Outcomes:** Fire is the manifestation of rapid chemical reaction occurring between fuel and an oxidizer- typically the oxygen in the air. Such rapid chemical reaction releases energy in the form of heat and light. Fire is heat and light resulting from the rapid combination of oxygen, or in some cases gaseous chlorine, with other materials. The light is in the form of a flame, which is composed of glowing particles of the burning material and certain gaseous products that are luminous at the temperature of the burning material. ![](media/image2.png) **[I. MODELS OF POLICING ACCORDING TO STRUCTURE.]** **1. Centralized Policing System** A system wherein there is only one police force that is recognized and operates entire a certain country. **2. Decentralized Policing System** A police system wherein police administration and operation are independent from one state to another. It is more applicable to countries with federal government. **[II. MODELS OF POLICING ACCORDING TO APPROACH]** **1. Problem-Oriented Policing** - A model of policing which is focused in preventing crime from happening. - This policing model involves detectives monitoring for patterns in crime to help understand when and how crime are being committed. **2. Intelligence-Led Policing Model** (Sir David Philips) - It draws upon the notion that the police can do know a great deal about offending patterns. - The Police should actively gather information about criminals and their organization. 1. The focus on crime alone; 2. The means used are enforcement and disruption of criminal groups; **3. Reactive or Traditional Policing** - It is a model of policing wherein police will respond when a call was received. **4. Predictive Policing** - A model of policing which includes predictive and analytical techniques in Law Enforcement to identify potential offenders. - It is the usage of mathematical predictive and analytic techniques to identify possible criminal activity. **5. Value-based Policing** - Value centered police leadership is based on a shared notion of ethical values, a delivery of the maximum value to the "customer", and rewards based on the value people contribute to their organization. - Seeks to avoid negative attitudes against the police and seeks to avoid low trust levels. **6. Nodal Policing** - Nodal policing practices are built around the assumption that security is not only provided by central state authorities, but also by non-central authorities, and the private and informal sectors. **7. Reassurance Policing** - It is a model of policing with the aim of identifying signals and it involves the community in solving community-related problems. It is similar to community oriented policing system. Signal crimes are those that shape the community\'s perception of risk from a particular type of crime during a given period. - It gives a feeling of safety that a citizen experiences when he knows that a police officer or patrol car is nearby. **8. Scanning, Analysis, Responses, Assessment (SARA)** - **Scanning** -- the objectives of scanning are to identify a basic problem, determine the nature of that problem, determine the scope of seriousness of the problem, and establish baseline measures. - **Analysis** -- the objectives of analysis are to develop an understanding of the dynamics of the problem, develop an understanding of the limits of current responses, establish correlation, and develop an understanding of cause and effect. - **Response** -- the response phase of the SARA model involves developing and implementing strategies to address an identified problem by searching for strategic responses that are both broad and uninhibited. - **Assessment** -- assessment attempts to determine if the response strategies were successful by understanding if the problem declined and if the response contributed to the decline. **9. Community Oriented Policing System** Is a philosophy based on the premise that police stations work together with their communities to resolve not only crime, but also quality-of-life issues that are important to the community and will better fulfill the police mission. **10. Democratic Policing** The police are accountable to the rule of law and the community, respect the rights and guarantee the security of all citizens in a non-discriminatory manner. **11. Neighborhood Policing** Access to local police through a named point of contact. Influence that can be exercised by members of the community over policing priorities. **12. Human Rights Policing** This pertains to how human rights is being implemented by the police organization in the community. **[III. COUNTRIES WITH LOW CRIME RATE]** **1. JAPAN** - Strong shame-based country rather than guilt-based. - Some reasons of low crime rate. - Community policing. - Patriarchal family system. - Importance of higher education. - The way business serve as surrogate families. **2. EGYPT** - Siwa Oasis embraces the law of tradition (URRF LAW) - Composed of 23,000 population, 11 tribes - Plato: fashioned his model of a perfect government. - Last crime around 1950. - Case is manslaughter. - Punishment: social ostracization or shunning. **3. IRELAND** - Low crime rate despite of serious unemployment problem, presence of large urban ghettos, crisis with religious terrorism. **4. SWITZERLAND** - Advertised in travel brochures as no crimes in Switzerland. - High rate of firearm ownership but low crime rate. - Effective in using "iron fist" or velvet gloves. **REFERENCE:** Garcia, M.A. (2021) Comparative Models of Policing, Wiseman's Books Trading, Inc. **[CHAPTER 3: GLOBALIZATION]** **Intended Learning Outcomes:** 1\. Discuss the concept of Globalization. 2\. Identify the advantages and disadvantages of Globalization. 3\. Understand the effects, threats and opportunities of Globalization to law enforcement. Fire is the manifestation of rapid chemical reaction occurring between fuel and an oxidizer- typically the oxygen in the air. Such rapid chemical reaction releases energy in the form of heat and light. Fire is heat and light resulting from the rapid combination of oxygen, or in some cases gaseous chlorine, with other materials. The light is in the form of a flame, which is composed of glowing particles of the burning material and certain gaseous products that are luminous at the temperature of the burning material. ![](media/image2.png) **[GLOBALIZATION]** \- It is a process of interaction and integration among the people, companies, and governments of different nations, a process driven by international trade and investment and aided by information technology. \- This process has effects on the environment, on culture, on political systems, on economic development and prosperity, and on human physical well-being in societies around the world. The following are some of the most significant effects of globalization. **Industry:** The world has become a huge market where you can buy and sell things produced in any part of the world. **Culture:** Globalization means a decrease in the cultural diversity that used to exist in the world earlier. **Legislation:** There has been an increase in the establishments of international courts of justice where someone accused could be dealt with any part of the world. **Language:** With increased globalization, people tend to forget their mother tongue and use English instead as there is an idea that it makes them superior in some way. **Information:** With the wide use of Internet and other kinds of information technology, it has become much easier and faster to share information worldwide. **Finance:** Globalization has made it easier to raise finance through individuals and firms outside the country. **Politics:** Powerful countries and individuals nowadays have political control over the whole world, not only their country. **[Advantages of Globalization]** **1. Peaceful Relations** \- Most of the countries have resorted to trade relations with each other in order to boost their economy, leaving behind any bitter part experiences if any. **2. Employment** \- Considered as one of the most crucial advantages, globalization has led to the generation of numerous employment opportunities. **3. Education** \- A very critical advantage that has aided the population is the spread of education. **4. Product Quality** \- The product quality has been enhanced so as to retain the customers. **5. Cheaper Prices** \- Globalization has brought in fierce competition in the market. **6. Communication** \- Every single information is easily accessible from almost every corner of the world. **7. Transportation** \- Considered as the wheel of every business organization, connectivity to various parts of the world is no more a serious problem. **8. GDP Increase (GDP)** \- The measure of an economy adopted by the United States in 1991; the total market values of goods and services produced by workers and capital within a nation\'s borders during a given period (usually 1 year). **9. Free Trade** \- Is a policy in which a country does not levy taxes, duties, subsidies or quota on the import/export of goods or services from other countries. **10. Travel and Tourism** \- Globalization has promoted tourism to great heights. **11. External Borrowing** \- With the help of globalization, there is opportunity for corporate, national, and sub-national borrowers to have better access to external commercial borrowing and syndicated loans. **[Disadvantages of Globalization]** **1. Health Issues** \- Globalization has given rise to more health risks and presents new threats and challenges for epidemics. **2. Loss of Culture** \- With large number of people moving into and out of a country, the culture takes a backseat. People may adapt to the culture of the resident country. **3. Uneven Wealth Distribution** \- It is said that the rich are getting richer while the poor are getting poorer. **4. Environment Degradation** \- The industrial revolution has changed the outlook of the economy. **5. Disparity (Inequality)** \- Though globalization has opened new avenues like wider markets and employment, there still exist a disparity in the development of the economies. **6. Conflicts** \- It has given rise to terrorism and other forms of violence. **7. Cut-throat Competition** \- Opening the doors of international trade has given birth to intense competition. **[Effects of Globalization to Law Enforcement]** 1\. The facilitation of transnational crimes and criminals can be easily achieved. 2\. There is a need for transnational policing. The cooperation among police organizations in the world is vital. 3\. Training instructions for incoming law enforcement officers must include advance computer to prepare them as cyber cops so they can be better prepared to deal with cyber-crimes. 4\. Development of new strategies to deal with international organized crimes is a must. 5\. Provisions of law enforcement with updated legislation related to modernization theories of crime. **[Threats of Globalization on Law Enforcement]** 1\. Increasing volume of human rights violation evident by genocide or mass killing. 2\. The underprivileged gain unfair access to global mechanisms on law enforcement and security. 3\. Conflict between nations. 4\. Transnational criminal networks for drug trafficking, money laundering, terrorism, etc. **[Effects of Globalization on Human Rights]** 1\. The effect of globalization on the state-based human rights violations will depend on the type of state and its history. 2\. In general, analysts of globalization find that states international integration improves security rights, but increases inequality and threatens the social rights and citizens. 3\. Findings on the effectiveness of the intonational pressure on state human rights policy suggests that target must be structurally accessible, internationally sensitive, and contain local human rights activists for linkage. **[Opportunities for Law Enforcement]** \- While globalization brings the threats and many other threats to law enforcement, opportunities like the following are carried: 1\. Creation of International tribunals to deal with human rights problems. 2\. Humanitarian interventions that can promote universal norms and link them to the enforcement power of states. 3\. Transnational professional network and cooperation against transnational crimes. 4\. Global groups for conflict monitoring and coalitions across transnational issues. **REFERENCE:** A. (2021) Comparative Models of Policing, Wiseman's Books Trading, Inc. **[CHAPTER 4: TRANSNATIONAL CRIMES]** **Intended Learning Outcomes:** Fire is the manifestation of rapid chemical reaction occurring between fuel and an oxidizer- typically the oxygen in the air. Such rapid chemical reaction releases energy in the form of heat and light. Fire is heat and light resulting from the rapid combination of oxygen, or in some cases gaseous chlorine, with other materials. The light is in the form of a flame, which is composed of glowing particles of the burning material and certain gaseous products that are luminous at the temperature of the burning material. ![](media/image2.png) **Transnational Crime** - are crimes that have actual or potential effect across national borders and crimes which are intra-State but which offend fundamental values of the international. - transnational crimes also include crimes that take place in one country, but their consequences significantly affect another country and transit countries may also be involved. **A working definition of transnational crime.** - Crime that impacts on more than one jurisdiction. i.e., one country to another. **Adopted from the United Nations Convention on Transnational Organized Crime.** - Committed by Organized criminal groups that have a home base in one state, but cooperated in one or more host states where there are favorable market opportunities. **Well known types:** - Drugs, economic, people smuggling, money laundering, environmental. **What about:** - People trafficking, sea piracy, arms trafficking, precursor chemicals, terrorism and the crimes that underpin or facilitated terrorism. **Crossing of borders by:** - People - criminals, fugitives and victims - Things - commodities - Intent - traffic, defraud, circumvent, etc. **With international recognition of the crime:** - conventions, treaties and laws **Transnational Organized Crime** - involves the planning and execution of illicit business ventures by groups or networks of individuals working in more than one country. **Organized crime** - is a combination of two or more person for the purpose of establishing by terror, threat, intimidation or conception in the city or municipality or any community of either monopoly or criminal activities in field that provides continuing financial support. **Criminal Syndicate** - an organized and relatively stable business which uses violence and threat against competitors. **Criminal World** - refers to the social organization of criminals with its own social classes and norms. **Historical Types of Transnational Crime** **1. Slavery** - the submission to a dominating influence or the state of a person who is a chattel of another. - slave a person held in servitude as the chattel of another. **2. Piracy** - is typically an act of robbery or criminal violence at sea. The term can include acts committed on land, in the air, or in other major bodies of water or on a shore. **3. Opium Smuggling** - smuggling the act of conveying or introducing surreptitiously or to import export secretly contrary to law and especially without paying duties imposed by law. **Modern Types of Transnational Crime** **1.TERRORISM** - define as the unlawful use of force or violence against person or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives. (FBI, 1997) - the term terrorism comes from French \"terrorisme\", from Latin: \"terror\" which means "great fear\", \"dread\", related to the Latin verb \"terrere", which means "to frighten". **In November 2004, a United Nations Secretary General report described terrorism** - As any act intended to cause death or serious bodily harm to civilians or non-combatants with the purpose of intimidating a population or compelling a government or an international organization to do or abstain from doing any act. **Characteristics of Terrorism:** 1. Premeditated or Planned 2. Politically motivated 3. Aimed at civilians 4. Carried out by sub-national groups **Organized Crime Group (OCG) vs. Terrorism** - OCG are motivated by money - Terrorists are motivated by ideology a. terrorist may use: 1. weapons of mass destruction 2. threats to create fear 3. traditional weapons **Typology of Terrorism** **1. Nationalist Terrorism** - seek to form a separate state of their own and frequently depict their activities as a fight for liberation. **2. Religious Terrorism** - pursue their own vision of the divine will and use violence intended to bring about social and cultural changes. **3. State-Sponsored Terrorism** - deliberately used by radical states as foreign policy tools. **4. Left-Wing Terrorism** - seek to destroy economies based on free enterprise and to replace them with socialist or communist economic system. **5. Right-Wing Terrorism** - motivated by fascist ideals and work toward the dissolution of democratic governments. **6. Anarchist (Revolutionary) Terrorism** - are revolutionaries who seek to overthrow all established forms of government. **7. Domestic Terrorism** - refers to the unlawful use of force or violence by a group or an individual who is based and operates within a state. **8. International Terrorism** - is the unlawful use of force or violence by a group or an individual who has connection to a foreign power or whose activities transcend national boundaries against person or property to intimidate or coerce a government. **9. Cyber Terrorism** - is a form of terrorism that makes use of highly technology especially computers, the internet and the World Wide Web, in the planning and carrying out of terrorist attacks. **10. Pathological Terrorism** - this describes the use of terrorism by individuals who utilize such strategies for the sheer joy of terrorizing others. Pathological terrorist often operates alone rather in groups like the others on the list and often are not true terrorist as they lack any well-defined political motive. **11. Issue Oriented Terrorism** - this type of terrorism is carries out for the purpose of advancing a specific issue. Commonly these issues are social in nature or deal with the environment. Here this definition is used to include environmental terrorism. **12. Separatist Terrorism** - separatists seek to cause fragmentation within a country and established a new state. This type of terrorism is typical of minorities within a nation-state that desire their own, commonly due to discrimination from the majority group. **13. Narco-Terrorism** - this term originally refers to organizations that gain funds through the sale of drugs. It can also deal with the use of violence by those groups or gangs designed to make the sale of their drugs easier. **Human Security Act of 2007 (RA 9372)** - Policy (Sec. 2) - protect, liberty and property from acts of terrorism; - Condemn terrorism as inimical and dangerous to the national security of the country and to the welfare of the people; - Make terrorism a crime against the Filipino people, against humanity and against the law of nations. **Terrorism (Sec. 3, RA 9372) three-part definition:** **1. Predicate act** a. Piracy and mutiny on high seas (Art.122) a. Rebellion or insurrection (Art.134) b. Coup d'état (Art.134-A) c. Murder (Art.248) d. Kidnapping and Serious illegal Detention (Art.267) e. Arson (Art.324\*; PD 1613) f. RA No.6235(Anti-Hijacking Law) g. PD No.532 (Anti-Piracy and Anti-Highway Robbery Law of 1974) h. PD No. 1866 as amended by RA 8294 & 10592 (illegal Possession of Firearms and Ammunition) **2. Results/Consequences** - Thereby sowing and creating a condition of widespread and extraordinary fear and panic among the populace. **3. Objectives** - In order to coerce the government to give in to an unlawful demand. **Penalty** - 40 years of imprisonment **Counterterrorism** - refers to the practices, tactics and strategies that governments, militaries and other groups adopt in order to fight terrorism. **Types of Counterterrorism:** **1. Strategic Counterterrorism** - deny resources, such as finances or base areas to the terrorist. It will capture, kill, or convert terrorist leaders. **2.Tactical and Operational Counterterrorism** - creation of elite units or forces, whose role is to directly engage terrorists and prevent terrorist attacks. They perform both in preventive actions, hostage rescue and responding to on-going attacks. **Counter-Terrorist Groups** 1. Australia - Tactical Assault Group (TAG) and Special Air Service Regiment (SASR) 2. Germany - Grenzchutzgruppe-9 (GSG) 3. Israel -- Sayeret Mat\'kal (General Staff Reconnaissance Unit 269) 4. Netherlands -- Bijzondre Bijstand Eenheid (BBE) 5. Norway -- Forsvarets Special Kommando (FSK) - (Special Commando of the Defense) 6. Oman - Sultan\'s Special Forces "Cobras\" 7. United Kingdom (UK) - Special Air Service (SAS) 8. United States of America - Delta Force and Seal Team Six 9. Philippines - Special Action Force (PNP-SAF) and Special Operations Group (PASCOM-SOG) **United Nation\'s Counter-Terrorism Committee** - The CTC was established by Security Control resolution 1373, which was adopted unanimously on Sept. 28,2001 in the wake of the Sept.11 terrorist attack in the United States. **United States of America\'s National Counterterrorism Center (NCTC)** - Established by President Executive Order 133354 in August 2004 and codified by the Intelligence Reform and Terrorism Prevention Act of 2004. **Philippine Center on Transnational Crime (PCTC)** - Created on January 15, 1999 by Executive Order No.62 under the Office of the President to formulate and implement a concerted of action of all law enforcement, intelligence and other government agencies for the prevention and control of transnational crime. **Terrorist Organization in the World** **1. Al-Qaeda** - founded by Osama Bin Laden in 1988 in Saudi Arabia. - an Islamic Jihadist Movement to replace Western-controlled or dominated Muslim countries with Islamic fundamentalist regimes. \* Osama Bin Laden born on March 10, 1957 in Riyadh, Saudi Arabia; the only son of his father\'s 10th wife. At the age of17, Osama married his first wife. Osama married four women and fathered roughly 26 children. \* the September 11,2001 attack - Al Qaeda\'s well known attack; 19 men hijacked 4 commercial passenger jet airliners, crashing 2 of them into the World Trade Center,1 in Pentagon and the other in Pennyslvania, 2, 973 died and the 19 hijackers. **2. Islamic State** - also known in the Arab world as Daesh and by the acronyms ISIS and ISIL, Islamic State has been the deadliest terrorist group in the world for the past three years. - it has been largely defeated in its home territory of Syria and Iraq but it remains capable of launching attacks in those countries and has also inspired individuals and affiliated groups to stage attacks in other parts of the Middle East as well as Europe and Asia. - ISIS tends to prefer bombings or explosions-these accounted for 69% of its attacks last year. However, it also carries out hostage takings and assassinations. - -however, Islamic State\'s powers now look to be on the wane. Last year it carried out 22% fewer attacks than the year before, with the number of deaths dropping from 9,150 in 2016 to 4,350 in 2017. The number of deaths per attack also dropped from eight in 2016 to 4.9 in 2017. ***Note:*** **Islamic State of Iraq and ash-Sham (ISIS) network in Philippines** **aim(s):** replace the Philippine Government with an Islamic state and implement ISIS\'s strict interpretation of sharia **area(s) of operation:** Mindanao and the Sulu Archipelago region (April 2018) **3.The Taliban** - the Afghan group has been waging a war of attrition with the U.S.-backed coalition since 2001 and has proven remarkably resilient. As of mid-2017, it controlled an estimated 11% of the country and was contesting a further 29% of Afghanistan\'s 398 districts. It is active in 70% of Afghanistan\'s provinces. - in 2017, Taliban forces were responsible for 699 attacks, causing 3,571 deaths, with armed assaults and bombings the most common form of attack. In addition, its affiliate in neighboring Pakistan, Tehrik-i-Taliban Pakistan, was responsible for a further 56 attacks and 233 deaths. - the Taliban\'s actions have become more deadly in the past year, killing an average of 5.1 people per attack in 2017 (up from 4.2 people the year before). The group has adjusted its tactics in recent years, switching its focus away from attacks on civilian targets and towards police and military personnel. - the Taliban killed 2,419 police and military personnel in 2017, up from 1,782 the year before. The number of attacks on such targets also increased from 369 in 2016 to 386 in 2017. At the same time, the number of civilian deaths caused by the Taliban fell to 548 in 2017, compared to 1,223 in 2016. **4. Al-Shabaab** - the extremist militant group Al-Shabaab emerged in 2006. It is an affiliate of Al-Qaeda and while its main area of operations is Somalia, it has also carried out attacks in Ethiopia, Kenya and Uganda. - Al-Shabaab was the deadliest terror group in sub-Saharan Africa in 2017, being responsible for 1,457 deaths, a rise of 93% on the year before. Two-thirds of the deaths were in the Somali capital Mogadishu. The worst incident was in October 2017, when 588 people were killed and 316 injured in an explosion outside the Safari Hotel in the Hodan area of the city. - many of the countries worst affected by terrorism have seen a decline in the number of deaths over recent years, including Afghanistan, Iraq, Syria, Nigeria and Pakistan. Somalia, however, has been an unfortunate exception to that trend, due to the actions of Al-Shabaab. There have been almost 6,000 deaths from terrorism in the country since 2001. **5. Boko Haram** - the Nigerian terrorist group Boko Haram (also known by the far longer name Jama\'tuAhlis Sunna Lidda\'awatiwal-Jihad) was once the world\'s deadliest terror group but it has been in decline since 2014 and has recently started to splinter into different factions, the largest of which is the Islamic State West African Province (ISWAP). - Since it emerged in the northeast of the country in 2002 it has spread out to other nearby countries including Chad, Cameroon and Niger and the group has sworn allegiance to Islamic State. - the fall in terrorist deaths in Nigeria in recent years- the number of deaths is down 83% from the 2014 peak - indicates that the region\'s security forces, assisted by international allies, are having an impact on groups such as Boko Haram. The battle is far from won, though. Boko Haram carried out 40% more attacks and was responsible for 15% more deaths in 2017 than in the year before. - most of the group\'s attacks last year were carried out in Nigeria-particularly in Borno State - with smaller numbers in Cameroon and Niger. The group has gained notoriety for mass hostage takings and the extensive use of children and women as suicide bombers. **Terrorism in the Philippines** **A. Islamic Terrorist Group:** **1. Bangsa Moro "the MORO people"** - is the generic name for the 13 ethno linguistic Muslim tribes in the Philippines which constitute a quarter of the population in Mindanao in the Southern Philippines. - three Major Groups: Maguindanaons, Maranaos, Tausogs. - established in 1971 to fight for an independent Moro (Islamic) state in Mindanao, the Moro National Liberation Front (MNLF) was the first Islamic extremist group in the Philippines. Filipino Muslims refer to themselves as Moro, which is a derivation of the word \'Moor,\' a derogatory term used by Spanish colonialists to refer to Islamic North Africans. The term was then adopted by the Christian majority of the Philippines to describe their Muslim neighbors in the southern islands of the country. After over a decade of fighting and negotiations between the Philippine government and MNLF leaders, then-President Corazon Aquino signed a law in 1989 that established the Autonomous Region in Muslim Mindanao (ARMM), allowing for self-rule of predominately Muslim areas. Nonetheless, violent conflict continued until 1996, when the MNLF and the Philippine government ultimately reached a final peace agreement, effectively ending the group\'s armed struggle. (Sources: BBC News, CNN Philippines) - the Moro Islamic Liberation Front (MILF) split from the MNLF in 1978 over leadership and strategic conflicts. Salamat Hashim, a member of the MNLF, was unhappy with the group\'s agreement with the Philippine government, which allowed for an autonomous but not independent region in Mindanao. Hashim rallied more radical elements to breakaway and form the MILF. The MILF has been in negotiations with the Philippine government for over 18 years and has since denounced violence and terrorist acts. In March 2014, the MILF and the government of then-President Benigno Aquino III signed a peace agreement, known as the Comprehensive Agreement on the Bangsamoro (CAB). The CAB laid a foundation for a legislative framework that would replace the ARMM and grant greater autonomy. (Sources: BBC News, The Economist, Reuters, The Diplomat) - on July 26, 2018, Duterte signed the Bangsamoro Organic Law (BOL), which would create a new autonomous region, to be called the Bangsamoro Autonomous Region in Muslim Mindanao (BARMM). The BOL adds more territories to the pre-existing autonomous region, subject to a plebiscite wherein locals voted on inclusion. The law allows for the BARMM to have a parliament and more autonomy over issues such as budgeting, the judicial system, indigenous rights, and natural resources. Both MNLF and MILF support the law, which has received praise from the United Nations and countries with ties to the peace efforts in Mindanao. Both separatist groups pledged to fight violent extremism and promised to work with the government for peace. On January 21, 2019, a majority of voters in the ARMM approved the BOL and it was officially deemed ratified on January 25. (Sources: The Diplomat, Rappler) **2. Abu Sayyaf Group (ASG)** - Aliases: Al-Hakarat - "Bearer of the Sword\" and Al- Islamiyah -Father of the Swordsman. - Founding Philosophy: The Abu Sayyaf Group (ASG) was formed in 1991 during the peace process between the Philippine government and the nationalist/separatist terrorist group, the Moro National Liberation Front (MNLF) - ASG was led by Abdurajak Janjalani, who was recruited for training in Afghanistan. - the Abu Sayyaf Group (ASG) is the smallest, though most radical of the separatist groups in Mindanao. ASG split from the MNLF in 1991, like the MILF, amidst criticism that the parent organization was weakening due to its willingness to enter into peace talks with the Philippine government. ASG is the most violent of the groups and is of most concern to Australia and United States, due to its historical ties to al-Qaeda and Jemaah Islamiyah. The group is divided into two main factions: the Sulu-based faction led by Radulan Sahiron, one of the United States\' most-wanted terrorists; and the Basilan-based faction, which was led by Isnilon Totoni Hiplon until his death in October 2017. In a video posted on January 2016, a band of ASG members, using the group\'s alternative name Harakatul Islamiyah (Islamic Movement), pledged allegiance to ISIS and named Hapilon their new leader. Hapilon was on the FBI\'s list of Most Wanted Terroristsfor his involvement with ASG. (Sources: Stanford University, BBC News, Manila Time). ***Note:*** **Abu Sayyaf Group (ASG):** **aim(s):** establish an Islamic State in the Philippines Mindanao Island and the Sulu Archipelago, and ultimately, an Islamic caliphate across Southeast Asia. **area(s) of operation:** southern Philippines in Mindanao and the Sulu Archipelago region (April 2018). **3. Rajah Solaiman Movement** - Aliases: "Balik Islam\" or "Back to Islam". - Founded by Hilariondel Rosario Santos III, a.k.a Hannah Santos, Ahmed Santos, Hilarion del Rosario. - Converted to Islam in 1993 and married into the top ranks of the leadership of the Abu Sayyaf Group (ASG). **4. Jimaah Islamiyah (JI)** - Aliases: Islamic Community and Islamic Group. - The Philippine cell is the smallest of the Jl cells in Southeast Asia. - Considered as the major logistics cell, responsible for acquiring explosives, guns and other equipment. **Communist Influence** **1. New People\'s Army (NPA)** - Formed in 1969 with support from China. - Created as the armed wing of the Communist Party of the Philippines. - the Philippines\' longest-running extremist conflict is with the Communist People\'s Party (CPP) and its military wing the New People\'s Army (NPA). Jose Maria Sison, a student activist in Manila, established the CPP in 1968 after being expelled from the existing Communist party, the Partido Komunista ng Pilipinas (PKP). - the CPP\'s ideology is based heavily on Maoist thought and singled out U.S. imperialism, capitalism, and feudalism as issues to be confronted via revolution or a "Protracted people\'s war,\" rooted in the peasantry. Unlike Islamist groups that are located primarily in the southern Philippines, the CPP has a presence in Manila and is active throughout the country. On August 9, 2002, the U.S. Department of State designated the \"Communist Party of the Philippines/New People\'s Army (CPP/NPA)" as a Foreign Terrorist Organization at the request of then-President Gloria Macapagal-Arroyo. (Sources: CTC Sentinel, International Crisis Group, U.S. Department of State) ***Note:*** **Communist Party of the Philippines/New People\'s Army (CPP/NPA)** **aim(s):** destabilize the Philippines\' economy to inspire the populace to revolt against the government and, ultimately, overthrow the Philippine Government **area(s) of operation:** operates throughout most of the country, primarily in rural regions, with its strongest presence in the Sierra Madre Mountains, rural Luzon, Visayas, and parts of northern and eastern Mindanao; maintains cells in Manila, Davao City, and other metropolitan areas (April 2018). **2. DRUG TRAFFICKING** - is also known as illegal drug trade or drug distribution, is the crime of selling, transporting, or illegally importing unlawful controlled substances, such as heroin, cocaine, marijuana, or other illegal drugs. - it is a global black-market activity consisting of production, distribution, packaging and sale of illegal psychoactive substances. **Techniques used by drug traders when crossing borders:** 1. Avoiding border checks, such as by small ships, small aircraft, and through overland smuggling routes. 1. Carrying to border checks with the drugs hidden in a vehicle, between other merchandise, in luggage, in or under clothes, inside the body etc. 2. Buying off diplomats to smuggle drugs in diplomatic mail/luggage, to avoid border checks. **Mule** - is a lower-echelon criminal recruited by a smuggling organization to cross a border carrying drugs, or sometimes an unknowing person in whose bag or vehicles the drugs are planted, for the purpose of retrieving them elsewhere. **Illicit Drug Routes** **A. 1st Important Drug Traffic Route** Middle East (discovery, plantation, cultivation, harvest) Turkey (preparation for distribution) Europe (manufacture, synthesis, refine) U.S. (marketing, distribution) **B. 2nd Major Drug Traffic Route** a\. Drugs that originates from the **Golden Triangle (Burma/Myanmar-Laos-Thailand)** - Approximately produced 60% of opium in the world, 90% of opium in the eastern part of Asia; also the officially acknowledged source of Southeast Asian Heroin. - Southeast Asia: Heroin is produced and passed thru nearby countries in relatively small quantities thru air transport while in transit to the US and European countries. b\. Drugs that originates from the **Golden Crescent** **Iran-Afghanistan-Pakistan-India** - Southwest Asia-Golden Crescent: major supplier of opium poppy, MJ and Heroin products in the western part of Asia. **The World\'s Drug Scene** 1. **Middle East: Becka Valley of Lebanon** - considered to be the biggest producer of cannabis in the Middle East. 2. **Spain** - The major transshipment point for international drug traffickers in Europe; -paradise of drug users in Europe. 3. **South America: Columbia, Peru, Uruguay, and Panama** - principal sources of all cocaine supply in the world due to the robust production of the coca plants-source of cocaine drug. 4. **Mexico** - No.1 producer of marijuana (cannabis sativa). 5. **Philippines** - 2nd to Mexico in MJ production; major transshipment point for the worldwide distribution of illegal drugs particularly shabu and cocaine from Taiwan and South America; - also known as the drug paradise of drug abusers in Asia. 6. **India** - Center of the world\'s drug map, leading to rapid addiction among its people. 7. **Indonesia: Northern Sumatra** - the main cannabis growing area in Indonesia; Bali Indonesia - an important transit point for drugs end route to Australia and New Zealand. 8. **Singapore, Malaysia, & Thailand** -The most favorable sites of drug distribution from the \"Golden Triangle\" and other parts of Asia. 9. **China** - The transit route for heroin from the \"Golden Triangle\" to Hong Kong. - the country where the \"epedra\" plant is cultivated. Epedra is the source of the drug ephedrine - the principal ingredient for producing the drug shabu. 10. **Hong Kong** - The world\'s transshipment point of all forms of heroin. 11\. **Japan** - The major consumer of cocaine and shabu from the U.S. and Europe. **Drug Enforcement Administration (DEA)** - the Federal Agency responsible for controlling the spread of illegal drugs in the United States and abroad. **Philippine Drug Enforcement Agency (PDEA)** - created through RA No.9165 "Comprehensive Dangerous Drug Act of 2002\" under the Dangerous Drugs Board. - Dangerous Drug Board-the Philippine government agency mandated to formulate policies, strategies and programs on drug prevention and control. ***Note:*** **Drug Trade in the Philippines** - the Philippines is a producer, exported and consumer of cannabis plant-based drugs (marijuana, hashish, et.al). - the Philippines is an importer and consumer of synthetic drugs, in particular methamphetamine hydrochloride (shabu). **3. MONEY LAUNDERING** - is the method by which criminals disguise the illegal origins of their wealth and protect their asset bases. - conversion or transfer of property knowing that such property is derived from a criminal offense, for the purpose of concealing or disguising the illicit origin or the property, or assisting any person who is involved in the commission of such offense, or offenses, to evade legal consequences of his action (UN definition). - money laundering suggests a cycle of transactions in which the illegitimate dirty money comes out clean after being processes into a legitimate legal source (Fairchild, 2001). **Brief History** - the term \"money laundering\" originated from Mafia ownership of Laundromats in the United States. - the first use of the term \"money laundering\" was during the Watergate Scandal 1973 in United States. **Watergate scandal** - A political scandal involving abuse of power and bribery and obstruction of justice; led to the resignation of Richard Nixon in 1974. - "Money Laundering\" is called what it is because the term perfectly describes what takes place, illegal or dirty money is put through a cycle of transactions, or \"washed\", or "laundered\", so that it comes out the other end as legal, or clean money. **The three common factors identified in laundering operations are:** 1. The need to conceal the origin and true ownership of the proceeds; 2. The need to maintain control of the proceeds; and 3. The need to change the form of the proceeds in order to shrink the huge volumes of cash generated by the initial criminal activity, the so-called "predicate offense\" or \"unlawful activity\". **Stages of Money Laundering (Three Basic Steps in Money Laundering)** 1. **Placement** -The first stage in the washing cycle, the money is placed into the financial system or retail economy or is smuggled out of the country. The aim is to remove the case from the location of acquisition. 2. **Layering** -The first attempt at concealment or disguise of the course of the ownership of the funds by creating complex layers of financial transactions designed to disguise the audit trail and provide anonymity. Moving money in and out of the bank account bearer through electronic funds transfer. 3. **Integration** - The final stage in the process, the money is integrated into the legitimate economic and financial system and assimilated in all other assets in the systems **MONEY- LAUNDERING METHODS:** **1. Structuring** Often known as smurfing, this is a method of placement whereby cash is broken into smaller deposits of money, used to defeat suspicion of money laundering and to avoid anti-money laundering reporting requirements. A sub-component of this is to use smaller amounts of cash to purchase bearer instruments, such as money orders, and then ultimately deposit those, again in small amounts. **2. Bulk Cash Smuggling** This involves physically smuggling cash to another jurisdiction and depositing it in a financial institution, such as an offshore bank, with greater bank secrecy or less rigorous money laundering enforcement. **3. Cash - Intensive Businesses** In this method, a business typically expected to receive a large proportion of its revenue as cash uses its accounts to deposit criminally derived cash. Such enterprises often operate openly and in doing so generate cash revenue from incidental legitimate business in addition to the illicit cash in such cases the business will usually claim all cash received as legitimate earnings. Service businesses are best suited to this method, as such businesses have little or no variable costs and/or a large ratio between revenue and variable costs, which makes it difficult to detect discrepancies between revenues and costs. Examples are parking buildings, strip clubs, tanning beds, car washes and casinos. **4. Trade - Based Laundering** This involves under or overvaluing invoices to disguise the movement of money. **5. Shell Companies and Trust** Trusts and shell companies disguise the true owner of money. Trusts and corporate vehicles, depending on the jurisdiction, need not disclose their true, beneficial, owner. Sometimes referred to by the slang term rathole though that term usually refers to a person acting as the fictitious owner rather a business entity. **6. Round - Tripping** In Round Tripping here, money is deposited in a controlled foreign corporation offshore, preferably in a tax haven where minimal records are kept, and then shipped back as foreign direct investment, exempt from taxation. A variant on this is to transfer money to a law firm or similar organization as funds on account of fees, then to cancel the retainer and, when the money is remitted, represent the sums received from the lawyers as a legacy under a will or proceeds of litigation. **7. Bank Capture** In this case, money launderers or criminals buy a controlling interest in a bank, preferably in a jurisdiction with weak money laundering controls, and then move money through the bank without scrutiny. **8. Casinos** In this method, an individual walks into a casino and buys chips with illicit cash. The individual will then play for a relatively short time. When the person cashes in the chips, they will expect to take payment in a check, or at least get a receipt so they can claim the proceeds as gambling winnings. **9. Other Gambling** Money is spent on gambling, preferably on higher odds. One way to minimize risk with this method is to bet on every possible outcome of some event where there are many possible outcomes and no outcome(s) have short odds -the bettor will lose only the vigorous and will have a \"winning\" bet(s) that can be shown as they so. **10. Real Estate** Someone purchases real estate with illegal proceeds and then sells the property. To outsiders, the proceeds from the sale look like legitimate income. Alternatively, the price of the property is manipulated: the seller agrees to a contract that under represents the value of the property, and receives criminal proceeds to make up the difference. **11. Black salaries** A company may have unregistered employees without a written contract and pay them cash salaries. Dirty money might be used to pay them. **NOTABLE CASE OF MONEY LAUNDERING:** **1. White - collar laundering: Eddie Antar** In the 1980s, Eddie Antar, the owner of Crazy Eddie\'s Electronics, skimmed millions of dollars from the company to hide it from the IRS. That was the original plan, anyway, but he and his co-conspirators eventually decided they could make better use of the money if they sent it back to the company disguised as revenue. This would inflate the company\'s reported assets in preparation for its IPO. In a series of trips to Israel, Antar carried millions of dollars strapped to his body and in his suitcase. **2. Drug - money laundering: Franklin Jurado** In the late 1980s and early \'90s, Harvard-educated economist Franklin Jurado ran an operation to launder money for Colombian drug lord Jose Santacruz - Londono. **Republic Act No. 9160 as amended by RA No.9194** - \"Anti-Money Laundering Act of 2001.\" **Anti-Money Laundering Council** - Financial intelligence unit in the Philippines that conducts investigations on suspicious transactions. **4. HUMAN TRAFFICKING** - The United Nations defines human trafficking as: \"The recruitment, transportation, transfer, harboring or receipt of persons, by means of the threat or use of force or other forms of coercion, of abduction, of fraud, of deception, of the abuse of power or of a position of vulnerability or of the giving or receiving of payments or benefits to achieve the consent of a person having control over another person, for the purpose of exploitation.\" - a crime against humanity. It involves an act of recruiting, transporting. transferring, harboring or receiving a person through the use of force, coercion or other means, for the purpose of exploiting them. - is the act of recruiting, harboring, transporting, providing or obtaining a person for compelled labor or commercial sex acts through the use of force, fraud or coercion. It\'s important to note, though, that human trafficking can include, but does not require, movement. You can be a victim of human trafficking in your hometown. At the heart of human trafficking is the traffickers\' goal of exploitation and enslavement. **Human Trafficking vs. Human Smuggling** Human Trafficking - usually involves coercion. - characterized by subsequent exploitation after the illegal entry of a person into a foreign country. - considered a human rights issue. Human Smuggling - usually does not involve coercion. - characterized by facilitating for an illegal entry of a person into a foreign country. -considered a migration concern. **Elements of Human Trafficking** 1. **The Act (What is done)** - recruitment, transportation, transfer, harboring or receipt of persons. 2. **The Means (How it is done)** - threat or use of force, coercion, abduction, fraud, deception, abuse of power or vulnerability, or giving payments or benefits to a person in control of the victim. 3. **The Purpose (Why it is done)** - for the purpose of exploitation, which includes exploiting the prostitution of others, sexual exploitation, forced labor, slavery or similar practices and the removal of organs. **Philippine Domestic Laws** 1. **RA No.9208** - "Anti-trafficking in Persons Act of 2013.\" As amended by RA No.10364-\"The Expanded Anti-Trafficking in Persons Act of 2012.\" 2. **RA No.7610** -\"Special Protection of Children Against Abuse, Exploitation and Discrimination Act." 3. **RA No.8042** - \"Migrant Workers and Overseas Filipino Act.\" 4. **RA No. 6955** - "An Act to Declare Unlawful the Practice of Matching Filipino Women for Marriage to Foreign Nationals on a Mail-Order Basis and Other similar Practices. 5. **RA No. 8239** - \"Philippine Passport Act of 1996.\" **Causes of Human Trafficking** 1. Poverty 2. Uneven economic development 3. Family orientation and values 4. Weak enforcement of laws 5. Corruption 6. Immediate benefits of working abroad **Common examples of Human Trafficking** **1. Forced Labor (Involuntary servitude)** - A family gives up a child to an adoption agent in Nepal because they cannot afford to care for him. He is then, in turn, sold to a sweatshop owner who forces the child to learn to sew garments without pay for hours each day. The child receives minimal nutrition and does not attend school. **2. Sex Trafficking** - Disproportionately affects women and children and involves forced participation in commercial sex acts. **3. Debt Bondage** - Is another form of human trafficking in which an individual is forced to work in order to pay a debt. **4. Child Sex Trafficking** - A 15-year-old boy runs away from his home in San Francisco to Oakland, where he lives on the street. He is seduced by a pimp who coerces him into participating in a prostitution ring and controls all the profits generated. **Types of Human Trafficking** 1. Sexual Exploitation 2. Forced labor 3. Poverty 4. Corruption 5. Civil unrest 6. Weak government 7. Lack of access to education or jobs 8. Family disruption or dysfunction 9. Lack of human rights 10. Economic disruptions **Signs of Human Trafficking** - A person who has been trafficked may: 1. Show signs that their movement is controlled 2. Have false identity or travel documents 3. Not know their home or work address 4. Have no access to their earnings 5. Be unable to negotiate working conditions 6. Work excessively long hours over long periods 7. Have limited or no social interaction 8. Have limited contact with their families or with people outside of their immediate environment 9. Think that they are bonded by debt **5. CYBERCRIME** - is defined as a crime where a computer is the object of the crime or is used as a tool to commit an offense. A cybercriminal may use a device to access a user\'s personal information, confidential business information, government information, or disable a device. It is also a cybercrime to sell or elicit the above information online. **History of Cybercrime** The malicious tie to hacking was first documented in the 1970s when early computerized phones were becoming a target. Tech-savvy people known as \"phreakers\" found a way around paying for long distance calls through a series of codes. They were the first hackers, learning how to exploit the system by modifying hardware and software to steal long distance phone time. This made people realize that computer systems were vulnerable to criminal activity and the more complex systems became, the more susceptible they were to cybercrime. Fast Forward to 1990, where a large project named Operation Sundevil was exposed. FBI agents confiscated 42 computers and over 20,000 floppy disks that were used by criminals for illegal credit card use and telephone services. This operation involved over 100 FBI agents and took two years to track down only a few of the suspects. However, it was seen as a great public relations effort, because it was a way to show hackers that they will be watched and prosecuted. The Electronic Frontier Foundation was formed as a response to threats on public liberties that take place when law enforcement makes a mistake or participates in unnecessary activities to investigate a cybercrime. Their mission was to protect and defend consumers from unlawful prosecution. While helpful, it also opened the door for hacker loopholes and anonymous browsing where many criminals practice their illegal services. Crime and cybercrime have become an increasingly large problem in our society, even with the criminal justice system in place. Both in the public web space and dark web, cybercriminals are highly skilled and are not easy to find. **Cybercrime in the Philippines** The **LOVE BUG** By far the most popular incidence of cybercrime in the Philippines is the "ILOVEYOU Virus\" or the LOVE BUG. The suspect in the case, a 23-year-old student from a popular computer university in the Philippines drafted the virus with the vision of creating a program that is capable of stealing passwords in computers, ultimately to have free access to the internet. During the height of the LOVE BUG incident, Reuters has reported: \"The Philippines has yet to arrest the suspected creator of the \'Love Bug\' computer virus because it lacks laws that deal with computer crime, a senior police officer said\". The fact of the matter is that there are no laws relating to Cybercrime in the Philippines. The National Bureau of Investigation is finding it difficult to legally arrest the suspect behind the \'Love Bug\' computer virus. As such, the need for countries to legislate Cyber laws relating to Cybercrime arises on an urgent priority basis. Due to the incident, the Philippines have seen the necessity for the passage of a law to penalize cybercrimes, thus the enactment of Republic Act 8792 otherwise known as the Electronic Commerce Act. **RA 8792** - legislated because of I love you virus - This Act shall be known and cited as the \"Electronic Commerce Act.\" - Approved June 14,2000 **RA 10175** - \"The Cybercrime Prevention Act of 2012.\" - is a law in the Philippines approved on September 12,2012. It aims to address legal issues concerning online interactions and the Internet in the Philippines. Among the cybercrime offenses included in the bill are cybersquatting, cybersex, child pornography, identity theft, illegal access to data and libel. **RA 8484** - \"Access Device Act.\" **Categories of Cybercrime** - there are three major categories that cybercrime falls into: individual, property and government. The types of methods used and difficulty levels vary depending on the category. **1. Property** - this is similar to a real-life instance of a criminal illegally possessing an individual\'s bank or credit card details. The hacker steals a person\'s bank details to gain access to funds, make purchases online or run phishing scams to get people to give away their information. They could also use a malicious software to gain access to a web page with confidential information. **2. Individual** - this category of cybercrime involves one individual distributing malicious or illegal information online. This can include cyber stalking, distributing pornography and trafficking. **3. Government** - this is the least common cybercrime, but is the most serious offense. A crime against the government is also known as cyber terrorism. Government cybercrime includes hacking government websites, military websites or distributing propaganda. These criminals are usually terrorists or enemy governments of other nations. **The Department of Justice Categorizes Computer Crime in three ways:** **1. The computer as a target** - attacking the computers of others (spreading viruses is an example) **2.The computer as a weapon** - using a computer to commit \"traditional crime\" that we see in the physical world (such as fraud or illegal gambling). **3. The computer as an accessory** - using a computer as a \"fancy filing cabinet\" to store illegal or stolen information. **Computer as a Weapon** **1. Hacking/Cracking** - refers to unauthorized access into or interference in a computer system/server or information and communication system. **2. Virus** - a small file that attaches to emails or downloads and infects computers. **3. Denial-of-Service (DoS)** - Illegal act to bring a particular system down or to malfunction a system. **4. Web defacement** - a form of malicious hacking in which a Web site is \"vandalized.\" **5. Malicious Email Sending** - the act of Sending malicious and defamatory electronic mails. **6. Internet Pornography** - the trafficking, distribution, posting, and dissemination of obscene material including children\'s nude pictures, indecent exposure, and child sex slavery posted into the internet, live streaming videos aired through internet under a certain fee. **7. Online Auction Fraud** **Famous Viruses and Worms** **1. I love You Virus** - Onel De Guzman (May 4,2000) - Filipino Science Student. **2. Internet Worm** - Robert Morris - the world-famous worm. - it almost brought development of internet to a complete halt. **3. Melissa Virus** - David Smith - he was sentenced to 20 months of imprisonment. **4. Ms Blaster Worm/W32** - attacks the Microsoft Windows. **Types of Cybercrime** **1. DDoS Attacks (Distributed Denial of Service Attacks)** - these are used to make an online service unavailable and take the network down by overwhelming the site with traffic from a variety of sources. Large networks of infected devices known as Botnets are created by depositing malware on users\' computers. The hacker then hacks into the system once the network is down. **2. Botnets** - Botnets are networks from compromised computers that are controlled externally by remote hackers. The remote hackers then send spam or attack other computers through these botnets. Botnets can also be used to act as malware and perform malicious tasks. **3. Identity Theft** - this cybercrime occurs when a criminal gains access to a user\'s personal information to steal funds, access confidential information, or participate in tax or health insurance fraud. They can also open a phone/internet account in your name, use your name to plan a criminal activity and claim government benefits in your name. They may dothis by finding out user\'s passwords through hacking, retrieving personal information from social media, or sending phishing emails. - defined as the criminal act of assuming person\'s name, address, social security number, and date of birth in order to commit fraud. **4. Cyberstalking** - this kind of cybercrime involves online harassment where the user is subjected to a plethora of online messages and emaiIs. Typically, cyber stalkers use social media, websites and search engines to intimidate a user and instill fear. Usually, the cyberstalker knows their victim and makes the person feel afraid or concerned for their safety. **5. Social Engineering** - social engineering involves criminals making direct contact with you usually by phone or email. They want to gain your confidence and usually pose as a customer service agent so you\'ll give the necessary information needed. This is typically a password, the company you work for, or bank information. Cybercriminals will find out what they can about you on the internet and then attempt to add you as a friend on social accounts. Once they gain access to an account, they can sell your information or secure accounts in your name. **6. PUPs** - PUPS or Potentially Unwanted Programs are less threatening than other cybercrimes, but are a type of malware. They uninstall necessary software in your system including search engines and pre-downloaded apps. They can include spyware or adware, so it\'s a good idea to install an antivirus software to avoid the malicious download. **7. Phishing** - this type of attack involves hackers sending malicious email attachments or URLs to users to gain access to their accounts or computer. Cybercriminals are becoming more established and many of these emails are not flagged as spam. Users are tricked into emails claiming they need to change their password or update their billing information, giving criminals access. - sending fraudulent e-mails or website pop-ups, to get victims to divulge sensitive financial information such as credit card numbers or social security numbers. **8. Prohibited/lllegal Content** - his cybercrime involves criminals sharing and distributing inappropriate content that can be considered highly distressing and offensive. Offensive content can include, but is not limited to, sexual activity between adults, videos with intense violent and videos of criminal activity. lllegal content includes materials advocating terrorism-related acts and child exploitation material. This type of content exists both on the everyday internet and on the dark web, an anonymous network. **9. Online Scams** - these are usually in the form of ads or spam emails that include promises of rewards or offers of unrealistic amounts of money. Online scams include enticing offers that are \"too good to be true\" and when clicked on can cause malware to interfere and compromise information. **10. Exploit Kits** - Exploit kits need a vulnerability (bug in the code of a software) in order to gain control of a user\'s computer. They are readymade tools criminals can buy online and use against anyone with a computer. The exploit kits are upgraded regularly similar to normal software and are available on dark web hacking forums. **How to Fight Cybercrime** It seems like in the modern age of technology, hackers are taking over our systems and no one is safe. The average dwell-time, or time it takes a company to detect a cyber-breach, is more than 200 days. Most internet users are not dwelling on the fact that they may get hacked and many rarely change their credentials or update passwords. This leaves many people susceptible to cybercrime and it\'s important to become informed. Educate yourself and others on the preventive measures you can take in order to protect yourself as an individual or as a business. 1. 1.Become vigilant when browsing websites. 2. Flag and report suspicious emails. 3. Never click on unfamiliar links or ads. 4. Use a VPN (Virtual Private Network) whenever possible. 5. Ensure websites are safe before entering credentials. 6. 6.Keep antivirus/application systems up to date. 7. Use strong passwords with 14+characters. ***Note:*** **Major transnational organized crime groups** Transnational crimes often operate in well-organized groups, intentionally united to carry out illegal actions. Group typically involve certain hierarchies and are headed by a powerful leader. Well-known organized crime groups include: such as credit card numbers or social security numbers. **1. Russian Mafia** - Around 200 Russian groups that operate in nearly 60 countries worldwide. They have been involved in racketeering fraud, tax evasion, gambling. drug trafficking, ransom, robbery and murder. **2. La Cosa Nostra** - Also known as Italian or Italian- America mafia. The most prominent organized crime group in the world from the 1920\'s to the 1990\'s. They have been involved in violence, arson bombings, torture, sharking, gambling, drug trafficking, health insurance fraud and political and judicial corruption. **3. Yakuza** - A Japanese criminal group. Often involved in multinational criminal activities, including human trafficking. gambling, prostitution and undermining licit businesses. **4. FukChing** - A Chinese organized group in the United States. They have been involved in smuggling, street violence and human trafficking. **5. Triads (Gangs)** - An underground criminal society based in Hong Kong. They control secret markets and bus routes and are often involved in money laundering and drug trafficking. **6. Heijin** - A Taiwanese gangster who are executives in large corporations. They are often involved in white collar crimes such as illegal stock trading and bribery and sometimes run for public office. **7. Jao Pho** - An organized crime group in Thailand that are often involved in in illegal political and business activity. **8. Red Wa** - They are involved in manufacturing and trafficking methamphetamine. **REFERENCE:** A. (2021) Comparative Models of Policing, Wiseman's Books Trading, Inc. **[CHAPTER 5: POLICE MODELS]** Fire is the manifestation of rapid chemical reaction occurring between fuel and an oxidizer- typically the oxygen in the air. Such rapid chemical reaction releases energy in the form of heat and light. Fire is heat and light resulting from the rapid combination of oxygen, or in some cases gaseous chlorine, with other materials. The light is in the form of a flame, which is composed of glowing particles of the burning material and certain gaseous products that are luminous at the temperature of the burning material. ![](media/image3.png) ![](media/image5.png)![](media/image4.png) ![](media/image6.png) ![](media/image7.png) ![](media/image8.png) ![](media/image9.png) ![](media/image11.png) ![](media/image13.png) **REFERENCE:** A. (2021) Comparative Models of Policing, Wiseman's Books Trading, Inc. **[CHAPTER 6: INTERPOL]** Fire is the manifestation of rapid chemical reaction occurring between fuel and an oxidizer- typically the oxygen in the air. Such rapid chemical reaction releases energy in the form of heat and light. Fire is heat and light resulting from the rapid combination of oxygen, or in some cases gaseous chlorine, with other materials. The light is in the form of a flame, which is composed of glowing particles of the burning material and certain gaseous products that are luminous at the temperature of the burning material. ![](media/image2.png) ![](media/image16.png) ![](media/image17.png) **Current President and Secretary General** **Ahmed Naser Al-Raisi** -- President **Jurgen Stock** -- Secretary General FYI : **Jolly Bugarin** -- the first Filipino to become the president (1980-1984) ![](media/image19.png) ![](media/image18.png) ![](media/image20.png) ![](media/image21.png) ![](media/image22.png) ![](media/image23.png) ![](media/image24.png) ![](media/image25.png) ![](media/image26.png) **REFERENCE:** A. (2021) Comparative Models of Policing, Wiseman's Books Trading, Inc.