Cdi-Organized Crime Investigation

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 71
At a glance
Powered by AI
Some of the key takeaways are the definition of organized crime and organized criminal groups, the history and founders of modern organized crime in the US, and the nature and attributes of organized criminal behavior.

Organized crime is defined as unlawful activities of members of a highly organized, disciplined association engaged in supplying illegal goods and services. The concept emerged in Chicago in 1919 under Al Capone. Some founders of modern organized crime in the US are listed.

Attributes of an organized crime group include being non-ideological, hierarchical, having limited/exclusive membership, being self-perpetuating, using violence/threats, constituting a unique subculture, being monopolistic, and having rules/regulations.

NOTES ON SPECIALIZED CRIME INVESTIGATION W/ SIMULATION ON INTERROGATION

Prepared by: DEAN RODOLFO V. CASTILLO JR.

PART I-TRANSNATIONAL ORGANIZED CRIMES

I. BASIC CONCEPTS, HISTORY AND NATURE OF ORGANIZED CRIMES

A. Definition and History of Organized Crime

Organized Crime- An unlawful activities of the members of a highly


organized, disciplined association engaged in supplying illegal goods and
services.

Organized Criminal Group (OCG)- Structural group of three or more


persons existing for the period of time and acting in concert, with the aim
of committing one or more serious crimes or offenses established in
accordance with this conviction in order to obtain, directly or indirectly, a
financial or other material benefit.

B. History of Organized Crimes

The concept of organized crime emerged in Chicago in 1919 when


Alphonse Capone, better known as Al Capone or Scarface [who was considered as
the most notorious gangster in the U. S.] ran Chicago with blood and
guns.

C. Founders of Modern Organized Crime in the US


1. Alphonse Capone [(Scarface) (1899-1947)]
2. Charles Luciano [(Lucky) (1897-1962)]{Salvatore Lucania}
3. Meyer Lansky [Morris Lieberman; Meyer Lamansky; Little Meyer; Meyer
the Bug; Charlie the Bug; Meyer the Lug (1902-1983)] {Maier
Suchchowljansky}
4. Louis Buchalter [(“Lepke” ; “Judge Louis”) (1897-1944)] {Louis
Bookhouse}
5. Joseph Adonis [ (Joey Adone, Joe Orosa, James Arosa, Joe DeMio) (
1902-1972)] {Giuseppe Antonio Dot}
6. Frank Costello [1891-1973]

D. NATURE AND ATTRIBUTES OF ORGANIZED CRIMES

Attributes of Organized Crime Group [OCG]: non-ideological; hierarchical;


limited or exclusive membership; self-perpetuating; use of violence (or the
threat of it) and bribery; constitutes a unique subculture; monopolistic;

1|Page
governed by rules and regulations; and it has specialization/ division of
labor

Functional Positions Filled in by a Qualified Members of the OCG: enforcer;


fixer; money mover; intelligence analyst

The Mafia: originated from the Sicilian struggle in the 13th Century against
French Rule. It was derived from the shouts of the Sicilian people, “ Morte
Alla Francia, Italia Anela!” (Death to France, Italy Groans!) in the course
of their resistance against French invaders forming the acronym MAFIA.
The Mafioso: connotes pride, self confidence, and vainglorious behavior.
Traditionally, refers to a brave and self reliant, man of action, and one not
to be taken lightly.
The Sicilians: refer to a “man of honor “ or “man of respect” who embodies
not just a criminal but other personality characteristics as well.

E. THE ORGANIZED CRIMINAL BEHAVIOR AND ITS CHARACTERISTICS

Behavior Commonly Associated Organized Criminal Behavior: provision of


illicit services; provision of illicit goods; conspiracy; penetration of
legitimate business; extortion; and corruption of it.

F. ORGANIZED CRIME GROUP MODELS

1. Donald Cressey’s Cosa Nostra (Our Thing) Model:-a national syndicate


of 25 or so Italian-dominated crime families who control crime in
distinct geographic areas; its primary unit is the family, which
embodies male members of Italian ancestry; the family is protected by
a code of conduct for members which prohibits them from revealing
organizational secrets.
Composition
a) The Boss: Supreme Leader; Typically, older members of the family;
and Oversees all organizational endeavors and has a final word on decisions
involving virtually all aspects of family business
b) The Consigliere: Often a lawyer, serves the boss as a trusted
advisor
c) The Underboss: Acts on the behalf of the boss if the latter is
incapacitated; Its primary role is to relay instructions to those occupying
lower positions in the family
d) The Capos (Caporegime): Sort of midlevel manager; Serve as a
buffer between the lowest-level members and the upper-level members of the
family

2|Page
e) Soldiers: Known as “wise guys”, “made guys”, or “button men”;
Report directly to the Capo and operate at least one specific criminal
enterprise; Constantly search for a new sources of revenue for the family

2. Joseph Albini’s Patron-Client Model: Consists of syndicates in a


loose system of power relationship; Made up of criminal patrons who
exchanged information, connections with governmental officials and
access to a network of operatives for the client’s economic and
political support
Composition
a) Boss (Capo), Underboss (Sottocapo) and Counselor(Consigliere)- at
the center of each OC units (famiglia-family)
b) The Captains (Caporegime)- it surrounds the boss which are called
clients
c) Made Guys (Soldati)- it orbit around the captain; lowest ranking
members who have been formally initiated in the Family

3. Dwight Smith Model: The Mafia Mystique (1974); OC is an entrepreneurial


activity that happens that happens to be illegal. Illegal enterprises
comes into existence because legitimate market place leaves a large
number of customers unserved.

4. Fancis Lanni’s Group Model: OC is nothing more than traditional social


system “organized by action and by cultural values that have nothing to
do with modern bureaucratic virtues; local kinship or ethnic social
networks; no structure apart from their functioning nor do they have
structure independent of their current personnel

5. William Chambliss’ Network Model: OC is a network of individuals, the


most powerful of which are business people, law enforcement official,
and political officeholders who direct activities of criminal actors
involved in illegal activities, e.g. prostitution, gambling,
pornography, and drugs.

6. Mark Haller’s Partnership Model: OC is not a bureaucratic sense but


merely a series of investment and joint business ventures with a wide
of variety of constantly changing partners; a series of small-scale
business partnerships, usually involving several senior partners and
many junior partners who sometimes conducted business in concert with
one another and often conduct business separately.

3|Page
7. Allan Block Enterprise and Power Syndicate
a) Enterprise Syndicate- groups of criminal entrepreneurs organized for
the purpose of producing and then distributing illicit goods and services
e.g. gambling, prostitution, and drugs.
b) Power Syndicates-loosely structured extraordinarily flexible
associations centered around violence, and deeply involved in the production
and distribution of informal power.
Five Cosa Nostra Families in New York: Gambino; Colombo (formerly
Profaci); Lucchese; Bonnano; and Genovese

G. THE TRADITIONAL AND NON-TRADITIONAL ORGANIZED CRIME


1. Traditional- i.e. Italian-American and Sicilian OCG
2. Non-Traditional OCG- i.e. Chinese Triad, Outlaw Motorcycle Gang
(involvement in drug trade)

II. THE TRANSNATIONAL CRIMINAL ORGANIZATION [TCO]/INTERNATIONAL CRIMINAL


ORGANIZATION [ICO]

A. DEFINITIONS
Transnational crime. An activity that is considered a criminal offense by at
least two countries. It is an offense whose inception, prevention and/or
direct or indirect effects involved more than one country.

Globalization- is defined as the package of transnational flow of people,


production, investment, information, ideas and authority.

Types of Transnational Organized Crimes


Historical: Force Labor and Slavery; Piracy; Smuggling
Modern: Terrorism; Illicit Trafficking (Plunder of Antiquities);
Computer Crimes; Trans-chemical Environmental Crimes; Drug
Trafficking ; Trafficking of Human Beings

B. NOTED TRANSNATIONAL ORGANIZED CRIMINAL GROUPS

Three (3) Main Groups of Global TCO

1. The Big Six (6) TCO: The Italian Criminal Enterprises [Sicilian and
American Mafia Families]; Russian Mafiya; Japanese Yakuza; Chinese Triads;
Colombian Cartels; and Mexican Federation.
2. Groups with certain criminal specialties that work with Big Six:
Nigeria; Panama; Jamaica; Puerto Rico and the Dominican Republic.
3. Terrorists groups which deal in contraband, narcotics, smuggling
etc. simply as a means to finance their political objectives: Japan’s Red

4|Page
Army; Peru’s Shining Path; Colombia’s FARC[ Revolutionary Armed Forces of
Colombia]; People’s Irish Republican Army

A. The Italian Criminal Enterprises


1. The Mafia [Refuge]: Sicilian Mafia/Cosa Nostra [Our Affairs]:
The most famous organized crime group in the world;
Controlled in Palermo, and operates in more than 40 countries in
the world.

Its members are bound by an oath of five (5) basic


principles: omerta, or code of silence; total obedience to the
“Don” or “Boss”; assistance to any befriended Mafia faction, no
question asked; to avenge any attack on members of the family;
and to avoid any and all contact with law enforcement
authorities.

Activities of the Mafia: Drug trafficking; money laundering;


labor racketeering; illegal gambling; political corruption;
extortion; kidnapping; fraud; counterfeiting; infiltration of
legitimate business; murders; bombing; and weapons trafficking.
Size and Structure: Operates on strict hierarchical structure
with 25,000 members total and 250,000 affiliates worldwide.

International Connections: Russian Mafiya; Sicilian Mafia and


Colombian Cartels

2. The Camorra: Based in Naples, Italy: made up of 30 clans with


approximately 6,000 memebrs; Have strong ties with Russian
Mafia; Approximately 7,000

3. ‘Ndrangheta: Third of the four Italian criminal enterprises:


Approximately 140 cells with 5,300 members, and is based out of
Calabria; Active in heroin trafficking; Approximately 6,000
members

4. Sacra Corona Unite [Sacred Crown]: Relatively new group;


founded in 1970; consists of 20 clans with approximately 1,400
members; Concentrated in Puglia, Italy; Approximately 2,000
members

B. The Russian Mafiya: known as Reketiry/Racketeers; Russian Mobs;


Russian Organized Crime; Redfellas; born on the day the former
Soviet Union collapsed; Much of its ruling class are from the KGB;
practice of receiving tattoos for every crime committed.
Main Group: Brigade of the Sun; Odessa Mafia and Armenian Organized
Crime Groups

Worldwide Activities: Slavery; Human smuggling, car theft; extortion;


arms smuggling; toxic waste disposal

5|Page
Major Activities: drug trafficking; arson; fraud; larceny; Money
Laundering; racketeering; extortion; arms trafficking; cybercrime;
human trafficking; prostitution; murder
Size: approximately 100,000 structured as many as 300 identifiable
groups.

International Connections: Sicilian Mafia, Camorra and Colombian


Cartels

C. The Cartels

Colombian Drug Cartels: Controller of Silver Triangle [Peru and


Bolivia (70%) and Colombia (30%)], where world’s coca leaves and
cocaine based products are grown
1. The Medellin Cartel
-Founded by Pablo Escobar Gaviria, Juan David Ochoa-
Vasquez, Gustavo de Jesus Gaviria Rivero, Escobar’s cousin and
right-hand man, and Drug Bosses, and Jose Gonzalo Rodriguez
Gacha, aka “El Mexicano”, who is reputed to be the most violent
of them all.
Operations: Cultivation- Bolivia and Peru; production-drug labs
in Colombia, Nicaragua, and Pnama; smuggling operations- Bahamas,
Turks, and Caicos, and later in Mexico.
Characteristics: Overtly violent; known to be los hampones (the
hoodlums)

2. The Cali Cartel


- Founded by Gilberto Rodriguez Orajuela. It rise upon the
downfall of the Medellin Cartel; An immensed monolithic network
of compartmentalized cells of smugglers, transporters,
distributors and money launderer; -Responsible for 80% of the
world cocaine supply; relied primarily on deception and guile.
- Characteristics: More circumspect; rise to prominence based on
the use of sound business practices; known as loss caballeros
(gentlemen)

3. Cartel De La Costa
- Emerged in 1995-1997 after the arrest of the leaders of
the Medellin and Cali Cartels; Routes is the Carribbean
corridor; Distributes cocaine in Europe and US
-Characeristics: Running smaller; extremely aggressive and
violent

4. Northern Valle Del Cauca


-Operated principally in the North Valle Del Cauca region
of Colombia; Rose to prominence during the second half of the
1990’s, after the Cali Cartel and Medellin Cartel; fragmented,
and became known as the most powerful; organizations involved in
illegal drug trade;Distributes cocaine and heroin
-Characeristics: Running smaller; extremely aggressive and

6|Page
violent

Mexican Criminal Organization: The Mexican Federation [Drug


Trafficking of: Heroine, Marijuana and Methamphetamine]

1. The Gulf Cartel


-Leaders: Juan Garcia Abrego and brother Humberto; Adolfo dela
Garza-Robles; Jose Luis Sosa Mayorga; and Oscar Malherbe de Leon
- Destination: US
-Operation: Cocaine trafficking and money laundering

2. The Juarez Cartel


Considered the most powerful in Mexico; Allied with the
Cali and Medellin Cartels
-Leaders: Amado Carillo-Fuentes (“Lord of the Skies”)
- Destinations: Europe and New York
- Operations: Cocaine and Real estate

3. Sonora Cartel
Known as the Caro-Quintero Organization
-Leaders: Miguel Caro-Quintero and brothers Jorge and Genero
-Destination: US
- Operation: Transhipment of Cocaine for Cali Cartel;
Cultivation and Distribution of Marijuana and some transportation
and distribution of methamphetamine

4. Tijuana Cartel
Most violent of the Mexican Cartels; known as AFO;
inherited from Miguel Angel Felix Gallardo.
- Leaders: Alberto Benjamin Arellano-Felix
-Destinations: California- Mexico borders
- Operations: Transportation, importation and distribution of the
“Big Four Drugs” i.e. Heroin, Cocaine, Marijuana and
Methamphetamine

2. Amezqua Organization
Not considered as one of the 4 major groups of the Mexican
Federation; A major force in narcotics trafficking, effectively
controlling the Mexican methamphetamine trade
-Destination: Mexico (Guadadalajara) and US
-Operation: Production, transportation and distribution of
methamphetamine; world’s largest smuggler of ephedrine using
contacts in Thailand and India

Sinaloa Cartel
-Known as the Guzmán-Loera Organization and the Pacific
Cartel; called the Federation and the  La Alianza de

7|Page
Sangre ("Blood Alliance"); drug trafficking, money laundering and
organized crime syndicate based in the city of Culiacán,
Sinaloa, with operations in the Mexican states of Baja
California, Durango, Sonora and Chihuahua.

Considered by the United States Intelligence Community "the


most powerful drug trafficking organization in the world“;
associated with the label "Golden Triangle", which refers to the
states of Sinaloa, Durango, and Chihuahua.

- Destination: U.S. border to distribution cells in  


Arizona, California, Texas, Chicago and New York.

- Operation: presence in 17 Mexican states, with important


centers in Mexico City, Tepic, Toluca, Zacatecas, Guadalajara,
and most of the state of Sinaloa. The cartel is primarily
involved in the smuggling and distribution of Colombian cocaine..

D. The Triads [Hung Society]


- Known as Heaven and Earth Society; began in the Fujian province
of China in 17th Century [thus roots back THOUSANDS of years], as an
“antidynastic secret society”. Their goal was to remove or bring and
end to the Manchu Ch’ing dynasty and to restore the native Chine Ming
dynasty.
- World’s OLDEST criminal organization

Noted Triad Affiliates


Hongkong-Based
1. Sun Yee On: 25,000 members
2. Wo Group: 20,000 members [Specializes in loan sharking and
protection rackets]
3. 14k: 20,000 members [ Specializes on guerilla warfare]
4. Big Circle Gang [Extremely violent and known in armed
robberies of jewelry stores and banks, and gold dealers]

Taiwan Criminal Gangs


1. United Bamboo Gang: 20, 000 in Taiwan; largest human smuggler
and white slave trader in the World. UNITED BAMBOO MEMBERS
established their own CODE OF ETHICS.
Area of Operations: Central and South America; US; North America;
Hongkong; Cambodia; Canada; Philippines
2. Four Seas Gang: 10,000 members; second to the largest in
Taiwan; involved in construction business.

Triad Ranks: All beginning with 4, which represents the four


oceans that were said to surround China in ancient times and so
signifies the universe as a whole.

8|Page
1. 489: The Dragon Head- Referred as 21(4+8+9), the character which
reflects the symbol hung, representing Hung Society.
2. 438: The Assistant Mountain Lord [Deputy]; The Incense Master
[Ceremonies Officer]; Vanguard [Operations Officer]- Referred as
15(4+3+8), which further breaks down into 3X5, 3 symbolizing CREATION,
5 symbolizing LONGEVITY.
- The Assistant Mountain Lord: Acts as proxy of the Dragon Head
and is often conferred with by the Dragon Head for important decisions.
- Incense Master and Vanguard: Officiate over Triad rituals;
preserve rituals and ensures that it remain potent symbols of the
Triad’s history and power.

3. 426: Red Pole [Enforcer], 415: White Paper Fan [ Administrator], and
432: Straw Sandal- Same level.
- Red Pole-426 : Military unit leaders; usually, about 50 men
under command; takes care of the messy aspects of Triad life.
- White Paper Fan-415: Highly educated and not a fighter;
responsible for keeping the books the books, investing the money,
determining legal strategy, etc.; consulted by the Red Pole for
Strategy
- The Straw Sandal-432: Triad messenger; ransom carrier;
organizers of branch meetings and gang fights.

4. 49: Ordinary Members: 49ers; Referred as 36(4X9)


-Almost all triad members belong to this category.
-Foot soldiers of organized crime

5. Blue Lanterns: Uniniated members

E. The Tongs
- Originated in San Francisco, California in 1874 as an extension
of a merchant association, founded by the Chinese as means of self-
preservation against the vile treatment they received in the US.

F. The Yakuza [Boryokudan]


- Originated in 1612 when Kabuki-mono (crazy one) terrorize the
towns people at their leisure; the group were servants of the
shogun (hatamoto-yakko) who were forced to unemployment during
the time of peace in the Tokugawa era.
- Machi-yokko (servants of the town) took up arms and defended
the villages against hatamoto- yakko.
They organized into families, adopting a relationship known as
OYABUN-KOBUN [FATHER-ROLE/CHILD-ROLE]. The oyabun is the father,
providing advice, protection and help; the kobun, acted as the
child, swearing unswerving loyalty and service whenever the
oyabun needed it.

9|Page
- TEKIYA: [ Yashi-peddler] followed the usual Yakuza
organization- Oyabun, underboss, officers, enlisted and
apprentices; The oyabun controlled the kobun and the
allocation of stalls along with the availability of the goods;
The oyabun collects the rents and the protection money;
everything is legal and the oyabun is allowed to carry swords.
However, the Tekiya embraced some criminal traits such as
protection rackets, harboring of fugitives and brawling with
other Tekiya and Gangs.
- BAKUTO: [The Gamblers]contributed to Japan’s tradition for
gambling, as well as Yakusa’s traditional fingercutting and
the origin of the word yakuza; The word comes from a hand in a
card game called hana-fuda (flower cards), similar to
blackjack. Three cards are dealt per player and the most
losing combination is 8-9-3 or ya(8)- ku(9)- 3(sa), which
denotes uselessness. The term began to be used about bakuto,
as they were, on the whole, useless to society.
- YUBITSUME: the custom of finger-cutting [top joint of the
little finger is ceremoniously severed] is performed as an act
of apology to the oyabun; further infraction would either mean
the severing of the next joint or the top section of another
finger. Also, a lasting punishment just before expulsion.
- TATTOOS: Black ring around an arm for each offense committed;
Marked a misfit, always unwilling to adopt to society; Test of
strength as they were applied by undergoing 100 hours for a
complete back tattoo.
- TRAININGS: trained militarily in languages; assassination;
blackmail
- YAKUZA STRUCTURE:
1. Oyabun- Head of the Clan
2. Saiko komon-Senior Advisor
3. So-honbucho-Headquarters chief
4. Wakagashira- Number two Man
5. Fuku-honbucho- Assistant [ komon- advisors, shingiin-
counselors, kumicho hisho-secretaries, kaikei-accountants,
wakagashira-hosa-underlings of the second-in-command]
6. Shateigashira- Number three Man
7. Senior Bosses [ Shatei-younger brothers; Wakashu- young
men]

Most active Boryukudan: Rokudaime Yamaguchi-gumi (about 20,400 in


strength); Sumiyoshi-Kai (about 6, 100 in strength); and,
Inagawa-Kai (about 4,800 in strength).

G. The Motorcycle Gangs [The Big Four]

Main Activities: Selling drugs [Controls 75% North American


methamphetamine market]; prostitution; extortion; theft; arson;
robbery; bombings; and contract murders.

10 | P a g e
The Big Four Motorcycle Gangs

1. The Hells Angels [Canada; Europe; Australia and New Zealand]


Fixed Chapter: Oakland
-Hells Angels Montreal Chapter; Hells Angel Nomads Chapter; Hells
Angels Sherbrooke
Chapter; Hells Angels South Chapter; Hells Angels Quebec
Chapter; Hells Angels Trois-Rivieres Chapter; Known as Popeyes;
engaged with a bloody war against Satan’s Choice and Divel’s
Disciples; Controls drugs trade and prostitution

2. The Outlaws [ Outlaws Motorcycle Club/ American Outlaw


Association]
Fixed Chapter: Detroit and Chicago
- Founded by John Davis in 1959, Chicago, Illinois; Have 900
members and 34 chapters in US, Canada and Australia
- Colors: Charlie- a white skull with cross pistons on a black
background. The skull has beady red eyes.
- Motto: ‘GOD FORGIVES, OULAWS DON’T’; Members work in pair.
- Activities: drug trafficking; extortion; contract murder;
motor vehicle thef; gun and explosive running; armed robbery;
rape; mail fraud; prostitution

3. The Pagans
Fixed Chapter: None
-The fiercest outlaw bikers in the US; about 900 members
and 44 chapters in New York and
Florida; the only major gang without international chapters
although have ties to gangs in Australia and Canada; Most
chapters are in New jersey, Pennsylvania. Delaware and
Maryland.
-More nomadic; Guided by the former Chapter Presidents;
They have President and Vice President who do not run the
club but responsible to set the price of drugs and women
they sell; the President receives a salary, the same as the
salary of the US President.
-Activities: Drug selling; prostitution; blackmail;
murders; drug couriers; enforcers; bodyguards; hitman for
the mob [ for Genovese and Gambino Crime Family]; labor
union racketeering; extortions; counterfeiting; car theft.

-They maintain their own chemist and drug laboratories in


their drug trades; drugs are bought from Colombian and
Cuban suppliers; maintain methamphetamine laboratories in
Georgia.

4. The Bandidos

11 | P a g e
Fixed Chapter: Corpus Christi
- Formed in 1966 in Houston by Donald Eugene Chambers to control
drug trafficking and prostitution in Texas.
- Color: Fat, machete-and pistol-wielding cartoon cowboy.
- Members of 500 with 30 chapters; Run by mother chapter made up
of a President; Four Regional vice Presidents and Regional and
Local Chapter Officers
- Activities: drug trafficking; prostitution; contract murder;
fencing; extortion; stealing and running weapons; welfare and
bank fraud, and arson.

H. Nigerian Criminal Organizations


- Drug smuggling specialists used by the “Big Six” criminal
organizations: 40% of all heroin smuggled is done by the NCO.
- THIRD-LARGEST ethnic drug smuggling group

I. Khun Sa
- World’s most notorious heroin trafficker: 60% of the heroin in
the streets
- Myanmar
- Golden Triangle: Myanmar, Laos and Thailand

III. TERRORISM

A. Definition

A. Terrorism

Any act intended to cause death or serious bodily harm to


civilians or non-combatants with the purpose of:
1. Intimidating a population of serious bodily harm; and
2. Compelling a government or an international organization to do
or abstain doing any act. [ UN Panel- 03-17-05]

Terrorists- One who does all acts of terrorism.


Terrorist Group- Any organization that engages in or had engaged
in, terrorist activity. This includes not only violent groups but
legitimate groups that fund terrorists operations.

Terrorist Act- any act that is unlawful, involves the use or


threatened use of violence or force against individuals or property is
designed to coerce a government or society and supports political,
ideological, or religious objectives.

Traditional Terrorist Tactics: bombing; hijacking; arson; assault;


kidnapping; taking hostages

12 | P a g e
Criteria in Defining Terrorism: target; objective; motive; perpetrator; and
legitimacy or legality of the act.

Acts of Terrorism Under the UN Conventions and Protocols


1. Unlawful seizure of aircraft (1970)
2. Unlawful acts against safety of civil aviation(1971)
3. Crimes against internationally protected persons including
diplomatic agents (1973)
4. Taking hostages (1979)
5. Nuclear material (1980)
6. Acts of violence in airports (1988)
7. Acts against safety of maritime navigation (1988)
8. Terrorist bombings (1977)
9. Acts against safety of fixed flat forms located on continental
shelf (1988)

Basic Organizational Structures of Terrorist Groups [James Fraser and Ian


Fulton (1984), Terrorism Counteraction]

1. Command- The smallest group, is at the top, and responsible for the
command. As in military circles, leadership makes policy and plans while
providing general direction.

2. Active Cadre [military term] – They are the people who we call
“terrorists”. They are responsible for carrying out the mission of the
terrorist organization. They have one or more specialties. Other terrorists
support each specialty, but the active cadre is the striking arm of the
terrorist group.

3. Active Supporters- They are the people who keep the terrorists in
the field. They maintain communication channels, provide safe houses, gather
intelligence, and ensure all other logistical needs are met. This is the
largest internal group in the organization.

4. Passive supporters – They complement active supporters. People who


do not readily join terrorist groups but simply represent a favourable
element of the political climate. Many times they were used without their
knowledge.

D. Characteristics of Terrorists
There is no single profile exist, no predictive tests, and
studies provide general characteristics.

13 | P a g e
1. Socioeconomics Status: Middle class to upper class backgrounds,
some extremely wealthy.
2. Education and Intellect: they have higher than average education;
often average or higher intelligence; and usually have a secular
education.
3. Age:
3.1 Foot soldiers and operational members: 20 to 35 years old
3.2 Leadership, support, and training cadres: 40 to 60 years old
3.3 Soldiers in guerilla groups: teens
3.4 Suicide Bombers: often young
4. Gender: Women are increasingly used in terrorist activities such as
suicide bombers and smuggling of explosives

E. Goals of Terrorist Plots


1. Minimize risk of failure
2. Achieve highest probability for success
3. Avoid opponents strengths
4. Concentrate on opponents weakness

F. Ten- Step Attack Planning Cycle

Step 1-Initial target selection consists of: Development of list of


potential targets; Objectives and capabilities drive preliminary target
selection; Factors [Desire to destroy target of symbolic or practical
significance, Benefits gain from practical targets, Access to the target
area and security, Access to documentations, Availability of weapons,
Transportation needs, Support network, Propaganda value]

Step 2- Initial Surveillance consists of: Surveillance against


pre-selected targets; Identify vulnerabilities; Weeks to months in
advance

Step 3- Final Target Selection and Preparation which:


Vulnerabilities receive priority; List narrowed; Objectives
capabilities

Step 4- Pre- Attack Surveillance wherein: Operational cells


appear; In-depth surveillance is conducted; Focus on vulnerabilities

Step 5- Planning by: Evaluating security; Recruiting personnel;


Renting safe houses; Designing escape routes; Determining methods of
attack; Selecting weapons and equipment

14 | P a g e
Step 6- Rehearsal by doing the following: Testing the plan;
Using actual or similar site; Evaluating equipment; Identifying
additional equipment.

Step 7- Attack Team deployment whereby the: Team selected based


on knowledge, skills and abilities; Attack team deployment; Cover or
concealment near the attack site

Step 8- Execution, which consider the: Advantages [ Surprise,


Choice of attack, Neutralization of target reaction and security
measures]; Often use diversions or secondary attacks

Step 9: Escape: Preplanned escape routes; Many included


diversions

Step 10: Exploitation: Establish notoriety; Create terror;


Increase funding; Improve recruitment; Use as a tool for exploitation
and propaganda

G. Types of Targets
1. Soft targets- a person or thing that is relatively unprotected or
vulnerable; hard to defend against attack i.e. highly accessible and
generally great in number.
Examples: hotels, schools, hospitals, places of worship, apartment buildings,
public transportation, banks, etc.

2. Hard targets- a structure that has been fortified against attack


i.e. limited accessible and generally few in numbers.
Examples: military bases, government buildings, military convoys, hardened
motorcades.

H. Structure of Terrorist Organizations


1. Centralized
2. Decentralized: Sophistication of Terrorist Organization

Note:
Its operations are organized and structured as evidenced by: Use of
propaganda; Distribution of networks; Use of communication techniques

I. Information Sharing

They increase their capabilities through: Direct sharing- one group


provides training or experienced personnel; Indirect sharing- one group’s
operation is used as a model.

15 | P a g e
J. Terrorist Financing
1. Zakat - The giving of alms for the poor and needy, as prescribed by
the Quran. Zakat is the primary means within the Muslim world for
terror organizations to “legitimately” receive money.

2. Islamic Banking

3. Hawala [ Informal Funds Transfer (IFT)]

4. Money Laundering

THE AL QAEDA

A. The Al Qaeda

- Arabic for “The Base” ; founded by Osama bin Laden, Muhammed Atef,
and Ayman al-Zawahiri to continue the Jihad internationally.

B. AlQaeda’s Organizational Structure


1.The Emir (Chief)
2.The Chief Counsel
3.Shura, or Consultation Council. This is a group of seasoned
terrorists and confidants kown as majilis al shura who approve
major decisions such as terrorist attacks and the issuance of
fatwas (edicts). The council members play leadership roles in
the organization’s major committees, made up of lower-ranking Al
Qaeda members.
4. The Committees.
a) The Military Committee- oversees recruitment, war, training,
and the purchase of the arms.
b) The Islamic Study Committee- makes rulings on religious law
and trains all recruits in the teachings of the Koran and
Jihad.
c) The Finance Committee- oversees corporate holdings, including
the travel office and several other companies.
5. The Cells. The network of terrorist recruitment and training
has sites throughout the world. Each cell engages in missions
independent of the others, and the members and activities of the other
cells are kept secret.

16 | P a g e
.
THE ISLAMIC STATE OF IRAN AND SYRIA (ISIS)
Formerly, the Islamic State of Iraq and the Levant [ISIL] , it is a
self-proclaimed Islamic State (IS) composed of  Sunni, extremist, jihadist
unrecognized state and caliphate based in Iraq and Syria. Later on it renamed
as the Islamic State of Iraq and Syria {[ISIS] Arabic
acronym Daʿish or Daesh}

Founder

Abu Bakr al-Baghdadi


-Known to his supporters as Amir al-Mu'minin Caliph Ibrahim. Formerly
known as Abu Du'a, who claimed to descent from the Islamic prophet Muhammad,
he is called Abu Bakr Al-Baghdadi Al-Husseini Al-Qurashi.

The Anti-Terrorism Law

REPUBLIC ACT NO. 9372 (AN ACT TO SECURE THE STATE AND PROTECT OUR
PEOPLE FROM TERRORISM ), otherwise known as “ Human Security Act of
2007” defined Terrorism as “ Any person who commits an act punishable
under any of the following provisions of the Revised Penal Code:

1. Article 122 (Piracy in General and Mutiny in the High Seas or in the
Philippine Waters);
2. Article 134 (Rebellion or Insurrection);
3. Article 134-a (Coup d‘Etat), including acts committed by private
persons;
Article 248 (Murder);
4. Article 267 (Kidnapping and Serious Illegal Detention);
5. Article 324 (Crimes Involving Destruction,

or under

1. Presidential Decree No. 1613 (The Law on Arson);


2. Republic Act No. 6969 (Toxic Substances and Hazardous and Nuclear
Waste Control Act of 1990);
3. Republic Act No. 5207, (Atomic Energy Regulatory and Liability Act
of 1968);
4. Republic Act No. 6235 (Anti-Hijacking Law);
5. Presidential Decree No. 532 (Anti-piracy and Anti-highway Robbery
Law of 1974); and,
6. Presidential Decree No. 1866, as amended (Decree Codifying the Laws
on Illegal and Unlawful Possession, Manufacture, Dealing in,

17 | P a g e
Acquisition or Disposition of Firearms, Ammunitions or
Explosives)thereby sowing and creating a condition of widespread and
extraordinary fear and panic among the populace, in order to coerce the
government to give in to an unlawful demand shall be guilty of the
crime of terrorism and shall suffer the penalty of forty (40) years of
imprisonment, without the benefit of parole as provided for under Act
No. 4103, otherwise known as the Indeterminate Sentence Law, as
amended. (Section 1 and 3, RA 9372)

IV. HUMAN TRAFFICKING

Anti-Trafficking In Persons Act Of 2003 [RA 9208]

The Fight against human trafficking in the Philippines is guided by


REPUBLIC ACT NO. 9208 (ACT TO INSTITUTE POLICIES TO ELIMINATE TRAFFICKING IN
PERSONS ESPECIALLY WOMEN AND CHILDREN, ESTABLISHING THE NECESSARY
INSTITUTIONAL MECHANISMS FOR THE PROTECTION AND SUPPORT OF TRAFFICKED
PERSONS, PROVIDING PENALTIES FOR ITS VIOLATIONS, AND FOR OTHER)which was
enacted on May 26, 2003.

Acts Considered as Trafficking in Persons

The following are considered as an act of trafficking persons,


to wit:

1. Recruiting, transporting, transferring; harboring, providing,


or receiving a person by any means, including those done under the
pretext of domestic or overseas employment or training or
apprenticeship, for the purpose of prostitution, pornography, sexual
exploitation, forced labor, slavery, involuntary servitude or debt
bondage;

2. Introducing or matching for money, profit, or material,


economic or other consideration, any person or, as provided for under
Republic Act No. 6955, any Filipino woman to a foreign national, for
marriage for the purpose of acquiring, buying, offering, selling or
trading him/her to engage in prostitution, pornography, sexual
exploitation, forced labor, slavery, involuntary servitude or debt
bondage;

18 | P a g e
3. Offering or contracting marriage, real or simulated, for the
purpose of acquiring, buying, offering, selling, or trading them to
engage in prostitution, pornography, sexual exploitation, forced labor
or slavery, involuntary servitude or debt bondage;

4. Undertaking or organizing tours and travel plans consisting of


tourism packages or activities for the purpose of utilizing and
offering persons for prostitution, pornography or sexual exploitation;

5. Maintaining or hiring a person to engage in prostitution or


pornography;

6. Adopting or facilitating the adoption of persons for the


purpose of prostitution, pornography, sexual exploitation, forced
labor, slavery, involuntary servitude or debt bondage;

7. Recruiting, hiring, adopting, transporting or abducting a


person, by means of threat or use of force, fraud, deceit, violence,
coercion, or intimidation for the purpose of removal or sale of organs
of said person; and

8. Recruiting, transporting or adopting a child to engage in


armed activities in the Philippines or abroad.

Acts that Promote Trafficking in Persons

1. Knowingly lease or sublease, use or allow to be used any house,


building or establishment for the purpose of promoting trafficking in
persons;

2. Produce, print and issue or distribute unissued, tampered or fake


counseling certificates, registration stickers and certificates of any
government agency which issues these certificates and stickers as proof of
compliance with government regulatory and pre-departure requirements for
the purpose of promoting trafficking in persons;

3. Advertise, publish, print, broadcast or distribute, or cause the


advertisement, publication, printing, broadcasting or distribution by any
means, including the use of information technology and the internet, of
any brochure, flyer, or any propaganda material that promotes trafficking
in persons;

4. Assist in the conduct of misrepresentation or fraud for purposes


of facilitating the acquisition of clearances and necessary exit documents
from government agencies that are mandated to provide pre-departure
registration and services for departing persons for the purpose of
promoting trafficking in persons;

19 | P a g e
5.Facilitate, assist or help in the exit and entry of persons
from/to the country at international and local airports, territorial
boundaries and seaports who are in possession of unissued, tampered or
fraudulent travel documents for the purpose of promoting trafficking in
persons;

6.Confiscate, conceal, or destroy the passport, travel documents, or


personal documents or belongings of trafficked persons in furtherance of
trafficking or to prevent them from leaving the country or seeking redress
from the government or appropriate agencies; and

7. Knowingly benefit from, financial or otherwise, or make use of,


the labor or services of a person held to a condition of involuntary
servitude, forced labor, or slavery.

Qualified Trafficking in Persons

The following are considered as qualified trafficking:

1. When the trafficked person is a child;

2. When the adoption is effected through Republic Act No. 8043,


otherwise known as the "Inter-Country Adoption Act of 1995" and said
adoption is for the purpose of prostitution, pornography, sexual
exploitation, forced labor, slavery, involuntary servitude or debt
bondage;

3. When the crime is committed by a syndicate, or in large scale.


Trafficking is deemed committed by a syndicate if carried out by a
group of three (3) or more persons conspiring or confederating with one
another. It is deemed committed in large scale if committed against
three (3) or more persons, individually or as a group;

4. When the offender is an ascendant, parent, sibling, guardian


or a person who exercises authority over the trafficked person or when
the offense is committed by a public officer or employee;

5. When the trafficked person is recruited to engage in


prostitution with any member of the military or law enforcement
agencies;

6. When the offender is a member of the military or law


enforcement agencies; and

7. When by reason or on occasion of the act of trafficking in


persons, the offended party dies, becomes insane, suffers mutilation or
is afflicted with Human Immunodeficiency Virus (HIV) or the Acquired
Immune Deficiency Syndrome (AIDS).

20 | P a g e
Investigation, Prosecution and Trial of the Crime Of Trafficking in Persons

Closed-door investigation, prosecution or trial. The name and


personal circumstances of the trafficked person or of the accused, or
any other information tending to establish their identities and such
circumstances or information shall not be disclosed to the public.

 Prescriptive Period of the Crime of Human Trafficking

Trafficking cases under RA 9208 prescribes in ten (10) years;


Trafficking cases committed by a syndicate or in a large scale
prescribes in twenty (20) years.The prescriptive period commences to
run from the day on which the trafficked person is delivered or
released from the conditions of bondage and interrupted by the filing
of the complaint or information and commence to run again when such
proceedings terminate without the accused being convicted or acquitted
or are unjustifiably stopped for any reason not imputable to the
accused.

V. MONEY LAUNDERING

4. The Anti-Money Laundering Act (REPUBLIC ACT NO. 9160, otherwise known as
the "Anti-Money Laundering Act of 2001, as amended by RA 9194 , RA10167, &
10365)

Money Laundering Offense 

Money laundering is a crime whereby the proceeds of an unlawful


activity (predicate crime) are transacted, thereby making them appear
to have originated from legitimate sources.

Money Laundering is committed as follows:

1. Any person who transacts or attempts to transact with any monetary


instrument knowing that it involves or relates to the proceed of an unlawful
activity

2. Any person who facilitates the commission of money-laundering as


defined in no.1 by knowingly performing or failing to perform an act

3. Any person who fails to disclose and file a report with AMLC of any
instrument or property as required under the law

21 | P a g e
VI. CRIMINAL INTELLIGENCE-BASED INVESTIGATION OF ORGANIZED/ SYNDICATED CRIME
GROUP

Definitions  

Organized Syndicated Crime Group- A profit motivated and highly capable


group of persons or an enterprise organized to undertake widespread, regular
or long term, large scale, high profile and diversified criminal activities
that has high impact to the economy and national security.

Criminal Gangs- A group of two or more persons who have common identifying
signs or symbols and whose members individually or collectively engaged in or
have engaged in a pattern of criminal activity, creating an atmosphere of
fear and intimidation within the community or a specific area using violence
and intimidation.

Essential Elements of an Organized Crime Group

1. Capability:

a. Organizational Structure: Composition is highly structured and


complex; and members have infiltrated a vast variety of legitimate businesses
that circumvent government controls.
 
b. Resources: High profile strength; Highly sophisticated logistical
support; Highly specialized training and indoctrination.

c. Networking/Connections: Well-entrenched and fluid network; Tight


operating linkages and influenced with law enforcement and other government
agencies; Initiated and maintained through bribery and corruption on public
officials.
d. Modus Operandi: High profile; Difficult to counter; Violence and
intimidation.

2. Motive
a. Non-ideological/Non Sectarian
b. Organizational Profit and Advantage

3. Nature of Criminal Activity


a. Crimes that are high profile, sensational, large scale, diversified
and have a high impact to the economy and National Security

4. Time, Duration and Frequency


a. Long term goals
b. Regular operations

22 | P a g e
c. Widespread or transcend provincial, regional, national or
international political boundaries

Essential Elements of a Criminal Gangs


 
1. Capability:
  a. Organizational Structure- tends to be less control over their
members.
b. Composition-loose collection of factions.
c. Disposition- members may have previous petty crime experience.

2. Resources: Basic criminal tools; Minimal logistical support; and Minimum


or no special training and indoctrination.

3. Networking/Connections: Local crime network, if any; and Few or no


operating linkages and influences with law enforcement agencies.

4. Modus Operandi: Less corporate-focus attention on making money from


specific criminal activity; Territorial-possession of “turf”; and Scavenger-
motivated by the need to belong to a group.

5. Personalities: Low level of criminal prominence, influence and linkages in


their locality; and Mainly from financially/socially disadvantaged sectors
of society.

6. Motive: Profit and personal advantage.

7. Nature of Criminal Activity: Crimes committed are perpetrated by hatred,


vendetta or if for profit on a particular crime such as kidnapping only, or
robbery; and Petty crimes.

CRIMINAL INTELLIGENCE ON ORGANIZED/SYNDICATED CRIME GROUP

List for Organized/Syndicated Crime Group

The Target List


Master reference list outlining pertinent data on organized crime groups.
Persons Included:
a. Those who are in “Priority/Wanted List”
b. Those who are in “Watch List”

Target List for Organized/Syndicated Crime Group Format

1. Name of the Group- Name which identifies the group from other groups with
the same or similar crime specialties.
2. Criminal Activity

23 | P a g e
a. Primary. main or principal crime specialty, for which the group was
originally established
b. Secondary. Alternative crime specialties which the group may
undertake from time to time as opportunities warrant.
3. Name the Leader/s- full name of the recognized head of the group ,
including nickname or alias. If possible, the bio-data, photograph and
physical and psychological profile of the individual are included.
4. Name of Members-enumeration of the members of the group, including the
bio-data, photograph and physical and psychological profile for each.
5. Area of Operation/Main Base
a. Main Base. Place or locality where the group usually plans or
prepares the conduct of its crime operations.
  b. Activity Area. Place or places where the group usually undertake its
crime operations.
  c. Sanctuary or Haven. Place where the group usually retires in safety
after the conduct of operations which is normally located outside of its
activity area.
  d. Safehouses. Places where the group embark or disembark in its crime
operations which is normally located within its activity area.
 
e. Stashouses. Places where the group normally store or conceal its
armaments, vehicles and other equipment prior to or immediately after each
criminal activity.
6. Arms and Equipment
a. Weapons: Type, make, caliber and serial numbers
b. Communication: Radio, Cellular phones etc.
c. Vehicles: Color, year of manufacture, model, brand, accessories and
license plates
7. Current Activities:  Crime activities acknowledged or identified to have
been committed ,by/ or attributed to the group.
8. Criminal Case Number

9. Connections- Associations and linkages from the government, private and


other sectors established and maintained by the group, to include their role
and circumstances in the group’s activities.
10. Modus Operandi- Distinct style or mode of operations used by the
group in perpetrating its crime operations
11. Criminal Records- Official criminal information of each individual
member, including criminal case number, offense, court of jurisdiction, case
status and warrant of arrests, if any.

12. Economic Assets- Individual or collective financial resources established


and maintained in the form of bank account/deposits, real estate and other
investment papers/documents resulting from its crime operations.
13. Group Status-Operational information on whether the group is active or
inactive.

Note:

24 | P a g e
An OCG/CG is considered active if it has conducted a reported criminal
activity for the past two (2) years, otherwise, it shall be considered as
inactive.
Priority- Covered by COPLAN to neutralize said OCG/CG

15. Lead Agency-Responsible for the direction, collection, production,


dissemination, case build-up and use of info.
 16. Support Agency- Responsible for providing support to lead agency,
particularly on info collection.
17. Pending Warrant of Arrests and Criminal Case Number of Leader and Members

18. Other Information- information reports on the group and may include any
other information that may be gathered against the group, i.e. sightings,
history, mystical symbolism and planned activities.
19. Remarks and Photographs of Members
20. Attachments- copies of warrants of arrest and other pertinent documents
on members of the group.

A. The Wanted/Priority List- List consisting of persons who can be directly


subject for arrest.

Person Included:
a. Must have an issued warrant of arrest
b. Accused of either organized or heinous crime.
c. Wanted List Format
  1. Name/Alias- name and aliases used.
2. Last Known Address- recent known whereabouts.
3. Group Affiliation- if applicable, name of the group wherein
the person is a member or affiliated with.
4. Area of Operation/Main Base- areas where he is conducting
operations/harboring.
5. Position- if the person is a member of the group, his
position.
6. Nature of Offense- criminal offense he is charged with.
7. Criminal Case Number- criminal case number.
8. Issuing Court- court which issued the warrant of arrest
9. Remarks- any other relevant information not mentioned above
such as whether there is a reward for the arrest, etc.
10. Photograph- photograph, if available

B. The Watch List- persons suspected to have committed organized or


heinous crimes based from unverified reports and are subject for
further monitoring, investigation and case build-up.

Persons included are those who have been implicated in:


a. Sworn statement of victims, witnesses and arrested suspects;
b. Tactical interrogation/debriefing reports
c. Intelligence information and agent’s reports
d. Signed letter complaints; and

25 | P a g e
e. Other official reports

Watch List Format

1. Name/Alias- name and alias used by the person


2. Last Known Address- recent known whereabouts.
3. Group Affiliation- if applicable, name of the group wherein he
is a member or affiliated with.
4. Area of Operation/Main Base- area where he is conducting
operations/harboring

5. Position- if the person is a member of a group, indicate his


position.

6. Crime Committed/Involvement- crime where the person is


suspected to be involve and the nature of his involvement

7. References- particular reference which are the basis for his


inclusion in the watch list such as information reports, police
investigation reports, etc.
8. Photograph- photograph, if available.

Drawing of the Top Twenty Most Wanted Persons From the Wanted List
Parameters:
  1. Number of warrant of arrests
2. Gravity of offenses
3. Notoriety and extent of atrocious activities of the person
4. Recidivism

Criminal Gangs in the Philippines

1. Akyat Bahay Gang- A group of robbers employing deceit


against housekeepers, caretakers, sales clerks and office personnel to
houses, business establishments and on stores when the owners or
managers are not around. A member will do the talking to the personnel
in charge while the other members will carry out the robbery without
them knowing it.

2. Salisi Gang- Group of burglars who open up an unguarded


vehicle in a parking area within a short period of time and cart-away
all valuables therein, such as stereo, CD player. Sometimes it also
lead to carnapping.

26 | P a g e
3. Bukas Kotse Gang- Robbers who forcibly take a parked vehicle,
which is done within 20 to 30 seconds depending on its security
features. In some cases, they take the vehicles at gunpoint.
Sometimes, they intentionally hit the rear portion of the would-be
victim’s vehicle and when the driver-victim alight from the car, they
will take at gunpoint.

  4. Dugo-Dugo Gang- A method of deceit where member of the group


will call the victim’s residence and contacted, they will inform the
receiver, usually a house helper, that a member of the employer’s
family have been involved in an accident and needs a large amount of
money. Then they will personally meet the helper who will bring the
money even in a public place. Once they received the money, the
suspects will hurriedly leave while the helper will go home only to
find out that all of which are a hoax.

5. Budol-Budol Gang- Form of deceit where the suspects presents


bundles of cash placed in an envelope of bag or gold bars to the victim
either as a payment or for safekeeping. The victim in return gives the
suspects any valuable items like jewelry or cash as assurance. Upon
swapping of “bags” the suspect hurriedly leaves from the place. The
victim will find out later that the cash bundles contained in the bag
are fake or that the gold bars are made of lead and copper.

6. Ipit-Taxi Gang- A group of robbers usually victimize women


boarding taxicabs. Upon boarding the taxi, two (2) men in a nearby
place board the cab on both sides and locking the woman victim at the
center; divest the victim of her cash, jewelry and other valuables.
Sometimes they rape the victim.

7. Bonet Gang- Group of armed bonet-wearing robbers who usually


victimize mini grocery stores, gas stations, banks, or pawn shops.
Using motorcycles and carnapped vehicles or taxis, they divest their
victims of cash, jewelry and other valuables.

8. Laglag Barya Gang- Sometimes called Stribo Gang. A group of


two or three pickpockets or robbers, usually victimizing bus
passengers, by way of falling coins in the floor, getting the victim’s
attention, while the other companion will slash the victim’s pocket or
bag .

9. Martilyo/Boltcutter Gang- A group of robbers who use hammers


or bolt cutter in destroying padlocks of ware house, pawn shops or
mini mart/stores then cart away monies, goods and other valuables
inside.

27 | P a g e
10. Acetylene Gang- A group of robbers who use acetylene or torch
or chemical in destroying padlocks of banks, ware house, pawn shops or
mini mart/stores then cart away the monies, goods other valuables
inside.

VII. THE PHILIPPINE CENTER ON TRANSNATIONAL CRIME AND THE ROLE OF INTERPOL IN
THE GLOBAL CAMPAIGN AGAINST TRANSNATIONAL ORGANIZED CRIME

The Philippine Center on Transnational Crime

Legal Basis: Executive Order No. 62

Administrative Supervision & Control: Office of the President

Functions: Formulate and implement a concerted program of action of all law


enforcement, intelligence and other government agencies for the prevention
and control of transnational crime.

Organization

Chairperson: President, through the Presidential Anti-Organized Crime


Commission (PAOCC); It is also supervised by SILG, who is the Vice-Chair of
PAOCC. Hence, The Executive Director of the PCTC reports to the President
through the SILG.

Coordinative Mechanism

1. Inter-Agency coordination through established institutions such as the


National Law Enforcement Coordinating Committee (NALECC)

2. PCTC as INTERPOL Manila NCB Secretariat


General control and supervision of INTERPOL Manila NCB Secretariat;
serve as the liaison office and main coordinating body for international
police cooperation against transnational crime representing all law
enforcement agencies in the Philippines [E.O 100 (May 7, 1999) and the
Memorandum on the Implementation of E.O 100 (February 7, 2000)]

3. Coordination and information exchanges; and training with local and


international counterpart.

Functions as INTERPOL NCB Secretariat

a. Maintains Operation Center


b. Acts on request for information from member countries, local law
enforcement agencies and other government organizations.
c. Disseminates INTERPOL notices, media releases, requests for
investigative assistance and announcement of conference to concerned bureaus,
law enforcement agencies and other concerned office.

28 | P a g e
Programs as INTERPOL NCB Manila Secretariat

1. 1-24/7 Expansion Program


2. INTERPOL "Red Notice" Project
3. Visa Check Project
4. Lost Passport Project
5. Fugitive Search Project

Other Functions
1. Designs programs and projects to enhance capacity building in combating
Transnational Crime
2. Monitoring Body of the Country's Compliance to the ASEAN Work Programs
to address Transnational Crime
3. Support to Policy-Making

The Role of INTERPOL in the Global Fight Against Transnational Crimes


 
INTERPOL [International Criminal Police Organization]

An organization established to promote international criminal police


cooperation
Conceptualized way back in 1920's after a meeting of the
representatives of criminal police in 20 nations, which discussed the
apparent problem of phenomenal increase in crimes on Europe that lead to the
creation of the International Police Commission which had its headquarters in
Vienna.

In 1956, the Commission Constitution was completed and formally


ratified and change the name into its present International Criminal Police
Organization, "INTERPOL".

Mission
 "To be the whole world pre-eminent police organization in support of all
organizations, authorities, and services whose mission is preventing,
detecting and suppressing crimes".

Functions
1. Provides both a global perspective and a regional focus
2. Exchanges information that is timely, accurate, relevant and complete
3. Facilitates international cooperation
4. Coordinates operational activities of the member countries and making
available know-how, expertise and good practice.

Three Core Services

  1. A unique global police communication system


2. A range of criminal data bases and analytical services
3. Proactive support for police operations throughout the world.

Organizational Structure

29 | P a g e
1. General Assembly - make major decisions on the policy, budget, working
methods, finances and programs of activities of INTERPOL.
 Composed of delegated appointed by the government of member countries.
 Each member country represented has one vote.

2. Executive Committee - supervises the execution of the decisions of the


general assembly and the work of the secretary general.
 Have 13 members, the president (chair of the committee), 4 vice
presidents, and 8 delegates.
 Members are elected by the general assembly and should represent
different countries.
 The president and the four vice presidents must come from different
continents.
 The president is elected for 4 years term and vice presidents for 3
years term.

3. General Secretariat - implements decisions and recommendations adopted by


the two governing bodies through Secretary General.

4. National Central Bureau - staffed with the countries own police officers.
These bureaus become the single point contact for foreign governments
requiring assistance, which oversees investigations and information on the
different police structures in other countries.

Rules in its Campaign Against Terrorism

INTERPOL'S Two-Fold Rule in fighting Terrorism


1. To prevents acts of international terrorism
2. If such acts are carried out, to ensure that the perpetrators are
brought to justice which could be achieved by exchanging information's with
its member countries through its source messaging system and by arranging
meetings of expert to address the subject.

Fugitive Investigation

1. Circulation, on an international scope, notices containing identification,


details and judicial information about wanted criminals.
2. Search for the arrest of fugitives.
3. Coordination and enhancement of an international cooperation in the field.
4. Collection and dissemination best practice and expert knowledge
5. Offering direct investigative support and specialized knowledge
6. Development and promotion of best practices and trainings.

The INTERPOL NOTICE SYSTEM

1. Red Notice – based on the national arrest warrants, are used to seek the
arrest and extradition of suspects.

30 | P a g e
2. Blue Notice – used to seek information on the identity of persons or on
their illegal activities related to criminal matters.

3. Green Notice – are used to provide warning and criminal intelligence about
persons who have committed criminal offenses and who are likely to repeat
these crimes in other countries.

4. Yellow Notice – used to locate missing persons

5. Black Notice – used to determine the identity of deceased person.

6. Orange Notice – to warn of an event, a person, an object or a process


representing an imminent threat and danger to persons or property.

7. Purple Notice – issued to provide information on modus operandi, objects,


devices and concealment methods used by criminals.

8. INTERPOL–United Nations Security Council Special Notice – is issued for


individuals and entities that are subject to UN sanctions.

PART II- INTERVIEW AND INTERROGATION AS A TOOL OF CRIMINAL INVESTIGATION

I. Basic Concepts and Principles

A. Interview vs. Interrogation

INTERVIEW
Is a conversation with a purpose, motivated by a desire to obtain
certain information from the person being interviewed as to what was done,
seen, felt, heard, tasted, smell or known.

This is the questioning of a person believed to possess knowledge that


is in official interest to the investigator.

INTERROGATION
It is the process of obtaining information from persons. Interrogation
is a forceful/rigid questioning of a person suspected of having committed an
offense or a person who is reluctant to make full disclosure of information
in his possession which is pertinent to the investigation.

B. Custodial Investigation- shall include the practice of issuing an


invitation to a person who is investigated in connection with an offense he
is suspected to have committed, without prejudice to the liability of an
inviting officer for any violation of law.

31 | P a g e
C. BASIC ASSUMPTIONS
Nobody has to talk to law enforcers. No law compels a person to talk
to the police if he does not want to. Therefore, people will have to be
persuaded, always within legal and ethical limits, to talk to law enforcers.

This makes interviewing an art

D. Hot and Cold Cases:

A HOT CASE is one where the violation of law or regulation has just
been unearthed or discovered and the suspects and the witnesses to the case
are still emotionally affected, upset or involved. A COLD CASE is a dormant
case where the witness and suspect have had luxury of ample time to mull over
the ramification of the case to put up their respective alibis or defenses or
otherwise form subjective impression of the case.

E. The Interview Format (I.R.O.N.I.C.)


The interview of a witness can be described by its acronym ‘IRONIC’
which stands for Identity, Rapport, Opening Statement, Narration, Inquiry,
and conclusion.

Identity–prior to the commencement of an interview, the investigator


should identify himself to the subject by name, rank and agency. Except when
there is no need to know the officer’s identity.

Rapport – it is good to get the positive feeling of the subject towards


the investigators, such friendly atmosphere is a vital for both the subject
and the investigator t have a better interaction.

Opening Statement – The investigator must have to indicate why the subject
is being contracted.

Narration – The witness should be allowed to tell all he knows with little
interruptions from the investigator.

Inquiry – after all information have been given by the subject, that is
the time for the investigator to as question to clarify him about the case
under investigation.

Conclusions – After the interview, it is but proper to close the interview


with outmost courtesy and thanking the subject for his cooperation.

F. Rules to be observed in questioning

1. One question at a time


2. Avoiding implied answer
3. Simplicity of the questions
4. Saving faces

32 | P a g e
5. Avoid close ended questions (yes or no)
6. Positive attitude

G. Three Main Questioning Techniques


1. Chronological (considered as easiest)
2. Going Backward (opposite of chronological)
3. General to Specific [(Deductive)most often used]

H. Purposes of Interrogation
1. To obtain confession to the crime
2. To induce the suspect to make admission
3. To learn the facts of the crime
4. To learn the identity of the accomplice
5. To develop information which will lead to the recovery of the fruits
of the crime
6. To discover the details of other crimes participated by the suspect

I. Attitude of the Interrogator


1. Dominate the interview
2. Avoid distracting mannerism
3. Language
4. Dress
5. Preliminary conduct
6. Presence of other person
7. Place

J. Description of the interrogation room

1. Privacy- can be achieved by having one door, absence of windows,


soundproof wall, and telephone without ringing bell
2. Simplicity- medium size room, bare walls, no glaring lights, minimum
furniture
3. Seating arrangement- straight back chair for the suspect, table with
flat surface, the back of the suspect must be facing the door.
4. Technical aid- installation of recording device and one-way mirror.

K. Legal Requirements of Interrogation


1. Voluntariness
2. The rights of the subject under the Constitution must be properly and
exhaustively explained to the subject

Note:

33 | P a g e
The statement of the subject must be obtained voluntary and trustworthy
and not by means or use of threat, fear, coercion, duress or any improper
tactics which will vitiate the free will of the subject. Remember RA
7438.

L. General Suggestions Regarding the Interrogation of Criminal Suspects


1. Interview the victim, the accuser, or the discoverer of the crime
before interrogating the suspects.
2. Be patient and persistent. Never conclude an interrogation at a time
when you feel discouraged and ready to give up; continue for a little
while longer.
3. Make no promises when asked, “What will happen to me if I tell the
truth?”
4. View with skepticism the so-called conscience-stricken confession.
5. When a subject has made a repeated denials of guilt to previous
investigators, first question him, whenever circumstances permit, abut
some other unrelated offense of a similar nature of which he is also
considered to be guilty.
6. An unintelligent, uneducated criminal suspect, with low cultural
background should be interrogated on a psychological level compared to
that usually employed in the questioning of a child.

M. INTERROGATION TECHNIQUES

1. Emotional Appeal
Place the subject in the proper frame of mind. The investigator
should provide emotional stimuli that will prompt the subject to
unburden himself by confiding.

Analyze the subject’s personality and decide what motivation


would prompt him to tell the truth, and then provide those motives
through appropriate emotional appeals.

3. Sympathetic appeal
The suspect may feel the need for sympathy or friendship

He is apparently in trouble. Gestures of friendship may win his


cooperation.

4. Kindness
The simplest technique is to assume that the suspect will confess
if he is treated in a kind and friendly manner.

5. Extenuation
The investigator indicates he does not consider his subject’s
indiscretion a grave offense.

34 | P a g e
6. Shifting the blame
The interrogator makes clear his belief that the subject is
obviously not the sort of person who usually gets mixed up in a crime like
this.

The interrogator could tell from the start that he was not
dealing with a fellow who is a criminal by nature and choice.

7. Mutt and Jeff


Two (2) Agents are employed.

a) Mutt, the relentless investigator, who is not going to waste any


time because he knows the subject is guilty.
b) Jeff, on the other hand, is obviously a kind-hearted man.

8. Bluff on a Split Pair

This is applicable when there are more than one suspect. The
suspects are separated and one is informed that other has talked.

9. Pretense of Physical Evidence –

The investigator may pretend that certain physical evidence has


found by laboratory experts against him.

10. Jolting

May be applied to calm and nervous subjects. By constantly


observing the suspects, the investigator chooses a propitious moment to
shout a pertinent question and appear as though he is beside himself
with rage. The subject may be unnerved to the extent of confessing:

N. A Philosophy of Interview and Interrogation:

The RIGHT officer

Asking the RIGHT questions

In the RIGHT manner

At the RIGHT time and in the RIGHT place

Will get the RIGHT answers

O. The Rights of Person Under Custodial Investigation


1. To be informed of the right to remain silent
2. To have competent and independent counsel, preferably of his own

35 | P a g e
choice
3. If the subject cannot afford the services of the counsel, he must
bee provided with one who is competent and of his choice
4. The rights cannot be waived except in writing and in the presence of
his competent and personally chosen counsel
5. The right to be informed of the above rights

Note:
Pls read/study Republic Act 7438-Rights of Person Arrested,
Detained and Under Custodial Investigation.

II. Confession and Admission

A. Confession – it is the declaration of an accused


expressing/acknowledging his guilt of the offense charged.
B. Effects of confession:
1. May be given in evidence against him in the investigation or
trial of the offense with which he is charged; and
2. Maybe given to prove the guilt of his companions but it will
pass a lot of organization and debate.

C. Types of Confession
1. Judicial Confession- Made by the suspect/accused in open court
2. Extra-Judicial Confession -This kind of confession is inadmissible
unless corroborated by proof of corpus delicti. The confession to
be admissible, it must be voluntary, in writing and made with the
assistance of a counsel of his own choice with full understanding of
the consequence of such confession. (get separate for separate
crimes).

D. Requisites for the Validity of an Extra-Judicial Confession Made by


Person Arrested, Detained or Under Custodial Investigation
1. Made in writing and signed by the person arrested, detained or under
Custodial Investigation
2. In the presence of his counsel, or in the latter’s absence, upon a
valid waiver;
3. In the event of a valid waiver, it must be signed in the presence of
the parents, brothers and sisters, his spouse, the municipal mayor,
the municipal judge, district school supervisor, or priest, or
minister of the group chosen by him.

E. Admission
An admission is a self-incriminatory statement by the subject
falling short of an acknowledgement of guilt. It is an acknowledgement
of a fact or circumstances from which guilt maybe inferred. It

36 | P a g e
implicates but does not incriminate. It is also an acknowledgement
that a fact, action or circumstances are true which strongly infer or
directly admit guilt but lacks the detail of the elements of the crime.

III. The Written Statement

A. Types of Written Statement


1. Narrative (Affidavit Pattern)
2. Question and Answer (Sworn Statement Pattern)

Note:
The Q and A is more preferable because it is easy to elicit
or develop the essential elements of the crime.

B. Basic Part of the Sworn Statement


1. The title or identification of the statement containing the
name, address and other personal circumstances of the
affiant, the name, rank and personal circumstances of the
investigator, the witnesses of the statement. Information
as to where and when the information is taken.
2. A statement informing the affiant of his Constitutional rights
3. A question revealing the personal circumstances of the affiant
4. A question asking the subject if he knows why he is being
questioned
5. Question providing the individual elements of the crime. This
is the body of the statement (Aims to answer the 5Ws and
1H).
6. Informing the affiant that no more questions to be asked to
him, and the latter will be asked further whether he has
something more to say or to delete from his statements
7. At the end of the statement, the subject will have to write in
his own hand that he read his statements, and he made it in
his own free will.

C. Requisites for a Valid Custodial Investigation Report


1. The report shall be reduced to writing by the investigating
officer.
2. If the person arrested or detained does not know how to read
and write, it shall be read and adequately explained to him by
his counsel or by assisting counsel in the language or dialect
known to such arrested or detained person. This is to be done
BEFORE the report is signed. If this procedure is not done,
the IR shall be NULL AND VOID and no effect whatsoever.

37 | P a g e
PART III-ANALYZING TEST ITEMS

Direction: Choose the letter of the correct answer.

1. Which organized crime group known for its overt violent behavior whose
members are known to be los hampones (the hoodlums), and controller of coca
cultivation in Bolivia and Peru; production-drug labs in Colombia, Nicaragua,
and Panama; smuggling operations- Bahamas, Turks, and Caicos, and later in
Mexico?
A. Colombian Drug Cartels C. The Cali Cartel
B. Medellin Cartel D. Northern Valle Del Cauca

2. An offense whose inception, prevention and/or direct or indirect effects


involved more than one country known as____.
A. Drug trafficking and human smuggling C. Transnational crimes
B Terrorism, piracy and cyber crimes D. Global crimes

3. Unlawful activities of the members of a highly organized, disciplined


association engaged in supplying illegal goods and services is known as___.
A. Enterprise Crime C. White collar crime
B. Organized Crime D. Economic crime

4. Organized crime is an enterprise of group of persons engaged in a


continuing illegal activity which has as its primary purpose___.
A. is the generation of profits irrespective of national boundaries
B. is the control of certain illegal activities in a specific territory
C. is the creation of fear among its enemies
D. is the domination of a certain community

5. The concept of organized crime emerged___


A. In China, when the Triad was established
B. In Japan, when Yakuza was founded
C. In Sicily Italy, when the Mafia was first to emerged
D. In the US, when Al Capone ran Chicago with blood and guns

6. Attributes of organized criminal group are______.


1. Non-Ideological, hierarchical and exclusive Membership
2. Dominating, witty, influential and generous contributor to the
church, politicians etc.
3. Self-perpetuating, violent, involvement in bribery and constitutes
a unique subculture
4. Monopolistic, governed by rules and regulations and has
specialization/ division of labor.
A. 1 and 3 only C. 1, 2 and 3

38 | P a g e
B. 2 and 4 only D. 1, 3 and 4

7. Who among the member/s of the organized criminal group tasked to


difficult assignments involving the use of violence in a rational manner?
A. Money mover C. Enforcer
B. Fixer D. Intelligence analyst

8. The Mafia is believed to be originated from___.


A. Morte Alla Francia, Italia Anela
B. the practice of the criminals to seal a black handprint at the scene
of the crime
C. Italian’s beauty, perfection, grace, and excellence
D. the Sicilian struggle in the 13th Century against French Rule

9. Which of the following is NOT one of the categories of organized crime


behaviour?
A. Violence and strong commitment and determination to get what they
what
B. Provision of illicit goods and services
C. Conspiracy and penetration of legitimate business
D. Extortion and corruption

10. “Once a member will always be a member”. This refers to attribute of


organized crime group which membership requires_______.
A. Loyalty C. Lifetime commitment
B. Obedience to the boss D. Specialized criminal skills

11. Criminality of an organized crime group is directed by_____.


A. The pursuit of profit along well-defined lines
B. Violence, when the interests of the organization are threatened
C. The boss
D. The pursuit of eliminating competitors

12. The Mafioso connotes:


1. Pride, self confidence, and vainglorious behavior
2. Brave and self reliant, a man of action, and one not to be taken
lightly
3. Man of honor or man of respect
4. Honor, courage and person who knows how to keep secrets

A. 1 and 2 only C. 1, 2 and 3 only


B. 3 and 4 only D. 1, 2, 3 and 4

13. How does organized crime groups maintain their power and profit?

39 | P a g e
A. Through violence
B. Through corruption
C. Through the silence and attitude of non-cooperation of law abiding
citizens
D. Through continuous association with criminal protectors

14. These are persons and organizations which grant power and the
perception of legitimacy to organized crime groups.
A. The Protectors composed of a network of corrupt officials who
protect them from the criminal justice system
B. The specialized supporter who provide them contract services such
as pilots, chemists, arsonists and hijackers.
C. Audience of consumers of illegal goods and services
D. Social supporters such as civic organizations, influential citizens
etc.

15. Donald Cressey’s Cosa Nostra model or organized crime group is


characterized by, EXCEPT:
A. Italian-dominated crime families who control crime in distinct
geographic areas
B. Extremely violent, dangerous and highly disciplined
C. Its primary unit is the family which embodies male members of
Italian ancestry.
D. The family is protected by a code of conduct for members which
prohibits them from revealing organizational secrets.

16. The boss of the Cosa Nostra is/are_____.


1. the supreme leader
2. the older members of the crime family
3. oversees all organizational endeavors and has a final word on
decisions involving virtually all aspects of crime family business
4. administer, control and supervise all the activities of the the
group
A. 1, 2 and 3 C. 1, 2 and 4
B. 1, 3 and 4 D. 2, 3 and 4

17. A sort of midlevel manager who serves as a buffer between the lowest-
level members and the upper-level members of the crime family. He is the
_____ of the Mafia.
A. The Consigliere C. The Capos
B. The Underboss D. Soldiers

18. The origin of terrorism can be traced from____.

40 | P a g e
A. The French Revolution which describe the actions of the French
government.
B. After World War II, when the world’s nationalist groups revolted
from European domination
C. Year 1960 to early 1980, when it was applied to violent left-wing
groups, as well as nationalist.
D. A large groups who are independent from a state, violent religious
fanatics, and violent groups who terrorize for a particular cause such as
the environment

19. The giving of alms for the poor and needy as prescribed by the Quran
which is the primary means within the Muslim world for terror organizations
to “legitimately” receive money. This is called____.
A. Zakat C. Hawala
B. Islamic Banking D. Money Laundering

20. In its self-proclaimed status as a caliphate, it claims religious


authority over all Muslims worldwide, and aims to bring most traditionally
Muslim-inhabited regions of the world under its political control. Which
world terror group is referred to?
A. Jimaah Islamiya C. Abu Sayyaf
B. Islamic State D. Al Qaeda

21. Money laundering’s main objective is/are_____.


A. to conceal the beneficial ownership or audit trail of illegally
obtained money or valuable so that it appears to have originated from a
legitimate source.
B. to keep the money hidden from the authorities
C. to gain interest from the money
D. to buy expensive jewelry

22. Placement in money laundering process means___.


A. Merging of money into legitimate economic and financial systems
B. Separating illicit proceeds from their source by creating complex
layers of financial transactions designed to disguise the source of money,
subvert the audit trail and provide anonymity
C. Disposal of cash proceeds derived from the unlawful activity
D. Investing dirty money to legitimate business

23. In 2000, the United Nations Convention against Transnational Organized


Crime extended the legal definition of money laundering to include all
serious crimes. This is known as__.
A. Palermo Convention C. Transnational Organized Crime Convention
B. United Nations Convention D. Organized Crime Convention

24. The Philippine Center on Transnational Crime which is created by virtue


of Executive Order No. 62, is under what office or agency?
A. Office of the President C. DOJ
B. DILG D. PNP

41 | P a g e
25. Drug trafficking, according to Comprehensive Drug Act of 2002 is
consists of any of the following act or acts, EXCEPT:
A. Cultivation, culture and delivery,
B. Administration, dispensation, manufacture, sale and trading,
C. Use, consumption, addiction and tolerance
D. Transportation, distribution, importation, exportation and
possession

26. Conceptualized in the 1920's and had its initial headquarters in


Vienna. This organization was established to promote international criminal
police cooperation.
A. International Police
B. International Criminal Police Organization
C. International Association of the Chiefs of Police
D. Asian National Police

26. Known as “Big Six” transnational organized crime group IS___.


A. Sicilian and American Mafia Families; Russian Mafiya; Yakuza;
Triads; Colombian Cartels; and Mexican Federation.
B Nigeria; Panama; Jamaica; Puerto Rico, Dominican Republic, Colombia
C. Red Army; Shining Path; Revolutionary Armed Forces of Colombia;
People’s Irish Republican Army; Al Qaeda; and ISIS
D. Gambino, Colombo, Profaci, Lucchese, Bonnano, Genovese Crime
Families

28. Members of the Mafia are bound by an oath of five basic principles. Which
of the following is NOT one of them?
A. Omerta, or code of silence and total obedience to the “Don” or
“Boss”
B. Assistance to any befriended Mafia faction, no question asked and to
avenge any attack on members of the family
C. Avoid killing police officer
D. Avoid any and all contact with law enforcement authorities

29. Three Core Services of the INTERPOL, EXCEPT:


a. Unique global police communication system
b. Range of criminal data bases and analytical services
c. Proactive support for police operations throughout the world.
d. Arrest of international terrorist

30. Known as the Guzmán-Loera Organization  called  La Alianza de


Sangre ("Blood Alliance"), which considered by the United States intelligence
community as the "the most powerful drug trafficking organization in the
world“.
A. The Gulf Cartel C. Tijuana Cartel
B. The Juarez Cartel D. Sinaloa Cartel

31. Which is NOT one of the Italian criminal enterprise?

42 | P a g e
A. The Camorra C. La Cosa Nostra
B. ‘Ndrangheta D. Sacred Crown

32. The Uninitiated member of the Hung Secret Society is CALLED:


A. Dragon Head C. Red Pole
B. Mountain Lord D. Blue Lanterns

33. An operation launch by the Philippine National Police- Special Action


Force Commandos that led to the killing of the international terrorist
Zulkifli bin Hir at the Mamasapano, Maguindanao was CALLED___.
A. Oplan Wolverine C. Oplan Neptune Spear
B. Oplan Terminator D. Oplan Exodus

34. Among choices A, B, C, D. which of the following is definition given by


the United Nations on terrorism?
A. The use or threatened use of force designed to bring about a
political change
B. An illegitimate use of force to achieve a political objective by
targeting innocent people
C. Socially and politically unacceptable violence aimed at an innocent
target to achieve psychological effect .
D. Any act intended to cause death or serious bodily harm to civilians
or non-combatants with the purpose of intimidating a population of serious
bodily harm and compelling a government or an international organization to
do or abstain doing any act

35. The Yakuza is organized into families which adopts a relationship known
as____.
A. Oyabun-Kobun C. Yubitsume
B. Kabuki-mono D. Bakuto

36. The operation launched by US Navy Seals that killed Osama Bin Laden was
NAMED__.
A. Operation Geronimo C. Operation Neptune Spear
B. Operation Jabbidah D. Operation Merdeka

37. In Joseph Albini’s Patron-Client Model. Organized crime group is


consists of syndicates in a loose system of power relationship. At the
center of each organized crime unit or crime family is/are:
A. Capo, Sottocapo and Consigliere C. Mafioso
B. Caporegime D. Soldati

38. The term used that refers to the process or methods used by
transnational organized crime group in protecting their leaders from
the soldiers, cell from cell, and functions from functions is –
A. insulation C. motivation
B. monopoly D. subversion

43 | P a g e
39. One characteristics shared by all transnational organized crime
groups is its continuity which means the organizations –
A. enforce obedience among its members through fear and violence
B. continue its efforts to gain a foothold in legitimate institutions
C. allowed entrenchment and refinement of criminal activities and
practices
D. survive the individuals who created and run it

40. This refers to the package of transnational flow of people,


production, investment, information, ideas and authority, which is
considered as one of the factors in the growth of transnational crimes.
Which of these?
A. Globalization C. Industrialization
B. Migration D. Commercialization

41. Known as the “Big Six” transnational criminal organization are:


1. Italian Criminal Enterprise
2. Shining Path
3. The Russian Mafia
4. Revolutionary Armed Forces Of Colombia
5. Japanese Yakuza
6. The Chinese Triads
7. Colombian Drug Cartels
8. Mexican Criminal Organization
A. 1, 3, 5, 6, 7 and 8 C. 2, 3, 4, 5, 6 and 7
B. 1, 2, 3, 4, 5 and 6 D. 3, 4, 5, 6, 7 and 8

42. The Italian criminal enterprise is organized on -


A. brotherhood C. deep friendship
B. family or clan affiliation D. blood relationship

43. The Sicilian Mafia members are bound by an oath of the following
five basic principles. Which of the following that refers to “omerta”?
A. Total obedience to the “Don” or “Boss”
B. Assistance to any befriended Mafia faction, no question asked
C. Code of silence
D. To avenge any attack on members of the family

44. The concept of money laundering was first to master by –


A. Al Capone C. Benjamin “Bugsy” Siegel
B. Meyer Lansky D. Lucky Luciano

44 | P a g e
45. The head of the Boryukudan is the –
A. oyabun C. saiko komon
B. blue lantern D. dragon head

46. If Yakuza membership is governed by oyabun kubon relationship,


the Triad which is headed by the Dragon Head is governed by –
A. dai-lo and sai-lo C. la alianza de sangre
B. sestima del potere D. sun yee on or new righteousness and
peace

47. Believed to be the controller of Silver Triangle where world’s


coca leaves and cocaine based products are grown are –
A. Colombian Drug Cartels C. The Motorcyle Gang
B. The Mexican Federation D. Sinaloa Cartel

48. Organized crime group victimizes not only private business


entities and individual persons but also, the State. Which of the
following crimes that the victim is the State?
A. Hichjacking of cargo trucks, bankruptcy, insurance, and stock frauds
B. Counterfeiting and smuggling
C. Car theft, burglary and credit card fraud
D. Contract murder

49. Traditionally, organized crime groups’ activities are classified


into theft and fraud, providing illegal goods and services, and
business and labor racketeering. Which of the following are considered
miscellaneous activities?
A. Money laundering, political corruption and kleptocracy
B. Bid-rigging, labor union abuses and monopolies
C. Loan sharking, prostitution, arms dealing, murder for hire, and
toxic waste dumping
D. Bootlegging and butt legging, insider trading and bust out

50. The United Nations Panel 03-17-05 defined terrorism as –


A. the use or threatened use of force designed to bring about a
political change
B. the illegitimate use of force to achieve a political objective by
targeting innocent people
C. any act intended to cause death or serious bodily harm to civilians
with the purpose of intimidating a population and compelling a
government or organization to do or abstain doing any act
D. socially and politically unacceptable violence aimed at an innocent
target to achieve psychological effect

45 | P a g e
51. Terrorism has originated from the French Revolution (1789-1795)
which describe -
A. the actions of the government
B. labor organizations, anarchists, nationalist groups revolting
against the foreign powers and ultranationalist political organizations
C. violent revolutionaries who revolted against the government.
D. large groups who are independent from a state, violent religious
fanatics, and violent groups who terrorize for a particular cause

52. The following are criteria in defining terrorism prescribed by


the United Nations, EXCEPT-
A. the target and the perpetrator C. the extent and effect of the acts
B. the motive and objective D. The legitimacy or legality of the act

-ooOoo-

INSTRUCTION: CHOOSE THE LETTER OF THE BEST ANSWER.

1. Based on the INTERPOL 1998 General Assembly, organized crime is –

A. an organization of persons who are engaged in a serious crimes which aims


to obtain material gain

B. an enterprise or group of persons engaged in a continuing illegal activity


which has as its primary purpose the generation of profits irrespective of
national boundaries.

C. an unlawful activities of the members of a highly organized, disciplined


association engaged in supplying illegal goods and services.

D. An act or acts committed by a structured association with the end goal of


obtaining power and worldwide dominance

2. Organized criminal group refers to a structural group of ______________


existing for the period of time and acting in concert, with the aim of

46 | P a g e
committing one or more serious crimes to obtain, directly or indirectly, a
financial or other material benefit.

A. three or more persons C. ten persons

B. two or more persons D. four persons

3. When a criminal group is non-ideological, it possess no political agenda


of its own hence it is motivated by -

A. religious motive C. power

B. profit D. self actualization

4. Unlawful activities of the members of a highly organized, disciplined


association engaged in supplying illegal goods and services is known as –

A. enterprise crime C. organized crime

B. white collar crime D. economic crime

5. Among the founders of organized crime in the US, who among the following
is known as “Scarface”?

A. Louis Buchalter C. Charles Luciano

B. Alphonse Capone D. Meyer Lansky

6. Where does the concept of organized crime emerged?

A. In China, when the Triad was established

B. In Japan, when Yakuza was founded

C. In Sicily Italy, when the Mafia was first to emerged

D. In the US, when Al Capone ran Chicago with blood and guns

7. Organized crime is an American invention that have been superimposed on a


heterogeneous European crime landscape. It is sometimes referred to as the:

47 | P a g e
1. Mob

2. MAFIA

3. Syndicate

4. Cosa Costra

5. 5th state

6. Enemy within, crime confederation, and second government

A. 1, 2 and 4 only C. 4, 5 and 6 only

B. 2 only D. 1, 2, 3, 4, 5 and 6

8. One of the attribute of organized crime group is its continuous existence


and survival even the leader died. Which is being referred?

A. It is self perpetuating C. It is hierarchical

B. It is monopolistic D. It has limited or exclusive membership

9. Which position in the organized crime group tasks to transact and or


invest illegally obtained money into a legitimate enterprise?

A. Enforcer C. Money mover

B. Fixer D. Intelligence analyst

10. Which of the following is NOT one of the attributes of organized criminal
group?

A. Non-Ideological, hierarchical and exclusive membership

B. Dominating, witty, influential and generous contributor to the church,


politicians etc.

C. Self-perpetuating, violent, involvement in bribery and constitutes a


unique subculture

D. Monopolistic, governed by rules and regulations and has specialization/


division of labor.

48 | P a g e
11. Which of the following is NOT true about organized crimes?

A. It is characterized by conspiracy activity involving coordination of


members whose primary goal is economic gain

B. Its members are dedicated for political and social changes

C. It aim to achieve economic goal through illegal means, employing predatory


tactics

D. It effectively control their members, associates and victims

12. Known as “Honoured Society” and its members called themselves as “Men of
Honour or Men of Respect” is the -

A. Sicilian Mafia C. American Mafia

B. Costra Nostra D. Mofioso

13. Consider the following:

Statement No. 1- Mafia operates on a strict hierarchical structure with


members and affiliates only in the US.

Statement No. 2- Mafia is often used as a benchmark for understanding the


phenomenon of organized crime.

Choose the correct answer

A. Statement no. 1 is TRUE while statement no. 2 is FALSE

B. Statement no. 1 is FALSE while statement no. 2 is TRUE

C. Statements no. 1 and 2 are BOTH TRUE

D. Statements no. 1 and 2 are BOTH FALSE

14. How does organized crime infiltrate legitimate business?

A. Corruption C. Coercion

B. Conspiracy D. Extortion

49 | P a g e
15. Which position in the organized crime group usually occupied by a lawyer
and close associate of the boss who serves as the latter’s trusted advisor?

A. Soldato C. Underboss

B. Capos D. Consigliere

16. In the US, organized crime group Cosa Nostra is headed by the boss who:

1. is its supreme leader

2. is the older members of the crime family

3. oversees all organizational endeavors

4. has a final word on decisions involving virtually all aspects of crime


family business

A. 1 only C. 1, 2 and 4 only

B. 1 and 2 only D. 1, 2, 3 and 4

17. In this model, organized criminals occupy intersections and are


critically positioned facilitators in complex social relationships that
permit clients to deal with the larger society. Which of these?

A. Traditional C. Enterprise Model

B. Patron-Client Network D. Kinship Group Model

18. The Alien Conspiracy Theory of organized crime phenomenon postulates


that-

A. external influences, such as the increased risks of apprehension, could


serve to deter person from joining organized crime.

B. people who joined organized crime group did so after considering the risks
of detection and punishment for the crime as well as the rewards of
completing the act successfully.

C. organized crime is a result of a plot by a covert group of organization;


considered as outsiders from foreign ethnicity

50 | P a g e
D. organized crime group was established by the people who has sinister
motive against the United States of America

19. Transnational crimes are committed with several motives. Which of the
following is NOT one of them?

A. Political influence C. Social control in a global scope

B. Economic gain D. Self aggrandizement

20. Which statements that may describe the nature of transnational crime?

1. It is committed in more than one state

2. It is committed in one state but a substantial part of its preparation


planning, direction or control takes place in another state

3. It is committed in one state but involves an organized crime group that


engages in criminal activities in more than one state

4. It is committed in one State but has substantial effects in another state

A. 1 and 3 only C. 1 only

B. 1, 2 and 3 only D. 1, 2, 3 and 4

21. The term used that refers to the process or methods used by transnational
organized crime group in protecting their leaders from the soldiers, cell
from cell, and functions from functions is –

A. insulation C. motivation

B. monopoly D. subversion

22. One characteristics shared by all transnational organized crime groups is


its continuity which means the organizations –

A. enforce obedience among its members through fear and violence

B. continue its efforts to gain a foothold in legitimate institutions

C. allowed entrenchment and refinement of criminal activities and practices

51 | P a g e
D. survive the individuals who created and run it

23. This refers to the package of transnational flow of people, production,


investment, information, ideas and authority, which is considered as one of
the factors in the growth of transnational crimes. Which of these?

A. Globalization C. Industrialization

B. Migration D. Commercialization

24. Known as the “Big Six” transnational criminal organization are:

1. Italian Criminal Enterprise

2. Shining Path

3. The Russian Mafia

4. Revolutionary Armed Forces Of Colombia

5. Japanese Yakuza

6. The Chinese Triads

7. Colombian Drug Cartels

8. Mexican Criminal Organization

A. 1, 3, 5, 6, 7 and 8 C. 2, 3, 4, 5, 6 and 7

B. 1, 2, 3, 4, 5 and 6 D. 3, 4, 5, 6, 7 and 8

25. The Italian criminal enterprise is organized on -

A. brotherhood C. deep friendship

B. family or clan affiliation D. blood relationship

26. The Sicilian Mafia members are bound by an oath of the following five
basic principles. Which of the following that refers to “omerta”?

A. Total obedience to the “Don” or “Boss”

52 | P a g e
B. Assistance to any befriended Mafia faction, no question asked

C. Code of silence

D. To avenge any attack on members of the family

27. The concept of money laundering was first to master by –

A. Al Capone C. Benjamin “Bugsy” Siegel

B. Meyer Lansky D. Lucky Luciano

28. The head of the Boryukudan is the –

A. oyabun C. saiko komon

B. blue lantern D. dragon head

29. If Yakuza membership is governed by oyabun kubon relationship, the Triad


which is headed by the Dragon Head is governed by –

A. dai-lo and sai-lo C. la alianza de sangre

B. sestima del potere D. sun yee on or new righteousness and peace

30. Believed to be the controller of Silver Triangle where world’s coca


leaves and cocaine based products are grown are –

A. Colombian Drug Cartels C. The Motorcyle Gang

B. The Mexican Federation D. Sinaloa Cartel

31. Organized crime group victimizes not only private business entities and
individual persons but also, the State. Which of the following crimes that
the victim is the State?

A. Hichjacking of cargo trucks, bankruptcy, insurance, and stock frauds

B. Counterfeiting and smuggling

C. Car theft, burglary and credit card fraud

53 | P a g e
D. Contract murder

32. Traditionally, organized crime groups’ activities are classified into


theft and fraud, providing illegal goods and services, and business and labor
racketeering. Which of the following are considered miscellaneous activities?

A. Money laundering, political corruption and kleptocracy

B. Bid-rigging, labor union abuses and monopolies

C. Loan sharking, prostitution, arms dealing, murder for hire, and toxic
waste dumping

D. Bootlegging and butt legging, insider trading and bust out

33. The United Nations Panel 03-17-05 defined terrorism as –

A. the use or threatened use of force designed to bring about a political


change

B. the illegitimate use of force to achieve a political objective by


targeting innocent people

C. any act intended to cause death or serious bodily harm to civilians with
the purpose of intimidating a population and compelling a government or
organization to do or abstain doing any act

D. socially and politically unacceptable violence aimed at an innocent target


to achieve psychological effect

34. Terrorism has originated from the French Revolution (1789-1795) which
describe -

A. the actions of the government

B. labor organizations, anarchists, nationalist groups revolting against the


foreign powers and ultranationalist political organizations

C. violent revolutionaries who revolted against the government.

D. large groups who are independent from a state, violent religious fanatics,
and violent groups who terrorize for a particular cause

54 | P a g e
35. The following are criteria in defining terrorism prescribed by the United
Nations, EXCEPT-

A. the target and the perpetrator C. the extent and effect of the acts

B. the motive and objective D. The legitimacy or legality of the act

36. Under the present conditions terrorist groups pertain to:

1. any organization that engages in or had engaged in terrorist activity

2. any person or persons that sympathize terrorists’s cause

3. any groups that fund terrorists operations

4. any person who looks like a terrorist

A. 1 and 2 only C. 1 and 3 only

B. 1 only D. 4 only

37. Under various UN Conventions and Protocols which of the following acts
that constitute terrorism?

1. Unlawful seizure of aircraft

2. Unlawful acts against safety of civil aviation

3. Crimes against internationally protected persons including diplomatic


agents

4. Taking hostages

5. Terrorist bombings

A. 1, 3, 4 and 5 C. 4 and 5 only

B. 2, 3, 4 and 5 D. 1, 2, 3, 4 and 5

38. Criminals are uncommitted and no cause to pursue, while terrorists are –

A. motivated by ideology or religion and consumed with purpose

B. fighting for political objective trained and motivated for the mission

55 | P a g e
C. induced by a group even bersekers or lone wolves

D. motivated by self actualization

39. While ordinary criminals are self centered and escape oriented,
terrorists are –

A. fighting for political objective

B. motivated by ideology or religion

C. trained and motivated for the mission

D. group and attacked-focused

40. A country employing state-sponsored terrorism –

A. employs force in a terroristic manner but for non-political ends

B. aims to destabilize and topple the incumbent regime, replacing it with a


political apparatus more acceptable to them

C. involves the employment of lethal force by state governments upon


civilian populations for the express purpose of weakening or destroying their
will to resist.

D. does not use its own military instrument to deliver the lethal force, but
harness social elements within the targeted entity to do so

41. Which of the following is the sequential phases of a typical terrorist’s


attack?

A. Initial target selection; initial surveillance; final target selection


and preparation ; pre- attack surveillance; planning; rehearsal by doing;
attack team deployment; execution; escape; and exploitation

B. Initial surveillance; initial target selection; pre- attack surveillance;


final target selection and preparation ; planning; rehearsal by doing;
attack team deployment; execution; escape; and exploitation

C. Planning; rehearsal by doing; attack team deployment; execution;


escape; and exploitation

56 | P a g e
B. Planning; initial target selection; initial surveillance; pre- attack
surveillance; final target selection and preparation ; rehearsal by doing;
attack team deployment; execution; escape; and exploitation

42. In fighting terrorism, the government employ the three-tiered defense


system by Lee Tom Ridge. Which of these?

A. Intelligence, target hardening and incident management

B. Information, interrogation and instrumentation

C. Victim, evidence and suspect

D. Enforcement, investigation and legal offensives

43. Terrorist groups are able to increase its striking power without
increasing the strength of their unit through their force multipliers such
as:

1. Technology

2. Transnational support

3. Media

4. Religion

A. 1 and 3 only C. 1, 2 and 3 only

B. 1 only D. 1, 2, 3 and 4

44. Safe haven is an area of relative security exploited by terrorists to


indoctrinate, recruit, train, and regroup, as well as prepare and support
their operations. Based on the study which of the following are considered
terrorists’ most intractable safe havens worldwide?

A. Regions where ineffective governance allows their presence

B. In Muslim areas where they found their sympathizers

C. In the poor countries like the Philippines

D. In a state where anarchy prevails by which they gain armed support

57 | P a g e
 

45. Among the identified method of terrorist financing, which of the


following that refers to the giving of alms for the poor and needy, as
prescribed by the Quran and the primary means within the Muslim world for
terror organizations to “legitimately” receive money?

A. Islamic Banking C. Hawala

B. Zakat D. Money Laundering

46. Of the terrorists organizational structure, which group that are


responsible for keeping the terrorists operatives in the field and maintain
their communication channels, provide safe houses, gather intelligence, and
ensure that all of their logistical needs are met?

A. The command group C. Active supporters group

B. The active cadre group D. Passive supporters group

47. The head of the Al Qaeda is known as the –

A. emir C. shura

B. chief counsel D. supremo

48. Al Qaeda is global terrorist Sunni Islamist group founded by Osama Bin
Laden who was killed by the US Navy Seals in Pakistan on May 2, 2011 through
“Operation Neptune Spear”. “Al Queda” literally means-

A. Bearer of the Sword C. The Base

B. Party of God D. Holy War

49. It means a personal struggle in devotion to Islam especially involving


spiritual discipline.

A. Jihad C. Taliban

B. Qur’an D. Daesh

58 | P a g e
50. Which law that punishes the act of directly or indirectly, willfully and
without legal excuse, possesses, provides, collects or uses, funds or
property, or makes available property, funds or financial service or other
related services to terrorism?

A. Republic Act No. 10168 C. Republic Act No. 10175

B. Republic Act No. 9372 D. Republic Act No. 9160

51. EXCEPT ONE, any of the acts committed with the aim of sowing and creating
a condition of widespread and extraordinary fear and panic among the populace
in order to coerce the government to give in to an unlawful demand constitute
a crime of terrorism pursuant to Human Security of 2007.

A. Highway robbery C. Illegal possession of firearms

B. Direct assault D. Coup de etat committed by a private person

52. Although motive is not one of the elements of a felony, in the crime of
terrorism, it is indispensable. Which should be the motive to be established
before one could be charged with the crime of terrorism?

A. Coerce the government C. Political, social or religious

B. Material gain D. Dominance

53. Under Republic Act 9372, persons liable for the commission of terrorism
are:

1. Conspirators

2. Principal by direct participation

3. Principal by induction

4. Accomplice

5. Accessory

A. 1, 2, 3, 4 and 5 C. 2 and 3 only

B. 1, 2, 4 and 5 only D. 2, 3, 4 and 5 only

59 | P a g e
54. Which law enforcement act that is NOT authorized by Republic Act 9372
against a suspected terrorist?

A. Surveillance

B. Third degree

C. Apprehension and detention without warrant

D. Judicial authorization to examine bank deposits, accounts and records

55. An ex parte written application of a police or of a law enforcement


official to conduct surveillance, intercept and record the communications of
suspected terrorists may be granted only by the Court after securing
written authorization from-

A. the Anti-Terrorism Council

B. the National Anti-Terrorism Task force

C. the Secretary of the Department of Justice

D. the National Intelligence Coordinating Agency

56. Upon examination under oath or affirmation of the police applicant and
his witness/es, application to conduct surveillance, intercept and record the
communications of a suspected terrorist may be granted by the court, provided
that the following should be established, EXCEPT-

A. probable cause based on personal knowledge of facts that terrorism or


conspiracy to commit terrorism has been committed, or is being committed, or
is about to be committed

B. probable cause based on personal knowledge of circumstances that


evidence, which is essential to his conviction will be obtained

C. probable cause that evidence, which is essential to his arrest will be


obtained

D. there is no other effective means readily available for acquiring evidence


against the suspected terrorist

60 | P a g e
57. The Anti-Money Laundering Council can freeze the funds of a suspected
terrorist for a period of _______ which may be extended by the Court of
Appeals up to _______.

A. 15 days - 30 days C. 6 months - 1 year

B. 30 days – 60 days D. 20 days - 6 months

58. The commission of a criminal acts using the instruments of modern


technology such as computers and the internet is known as -

A. cybercrime C. computer crimes

B. cyberterrorism D. Crimes in the internet

59. Under Republic Act 10175, forgery, fraud, and identity theft shall be
classified as –

A. computer-related offenses C. cybertheft offenses

B. cybercrimes D. felonies punishable by the Anti-


Cybercrime law  

60. Cybercrimes can be committed by the aid or use of the computer technology
or the technology itself is subject of an attack such as offenses against the
confidentiality, integrity and availability of computer data system. Which of
the following should be EXCLUDED?

A. Illegal access, interception and data interference

B. System interference and misuse devices

C. Cybersex, child pornography, and libel

D. Cybersquating.

61. Statement No. 1  Crimes defined and punished under the Revised
Penal Code and other Special Penal Laws, if committed by, through with the
use of information and communication technologies shall be punished one (1)
degree higher than that provided.

61 | P a g e
Statement No. 2 Prosecution under the Anti-Cybercrime law is with prejudice
to any liability for violation of the Revised Penal Code and Special Penal
Law

A. Statement no. 1 is TRUE while statement no. 2 is FALSE

B. Statement no. 1 is FALSE while statement no. 2 is TRUE

C. Statements no. 1 and 2 are BOTH TRUE

D. Statements no. 1 and 2 are BOTH FALSE

62. Under the anti-cybercrime law, any public or private entity that
provides to users of its service the ability to communicate by means of
computer system, or any other entity that process or stores computer data on
behalf of such communication service or users of such service shall be
referred to as -

A. computer center C. service provider

B. internet café D. cyber net

63. Service providers are bound to preserve computer data within the period
of _______ from the date of transaction.

A. 6 months C. 60 days

B. 1 month D. 1 year

64. Content data shall be preserved by the service provider _________ from
the date of receipt of the order from law enforcement authorities requiring
its preservation.

A. 6 months C. 3 months

B. 1 year D. 15 days

65. Under Republic Act 10175, service provider shall disclose computer data
within ________ from receipt of the order in relation to a valid complaint
officially docketed for investigation.

A. 24 hours C. 30 days

62 | P a g e
B. 36 hours D. 72 hours

66. Duties of law enforcement authorities during the search, seizures and
examination of computer data are to:

1. secure a computer system or a computer data storage system

2. make and retain a copy of those computer data secured

3. maintain the integrity of the relevant stored computer data

4. conduct forensic analysis or examination of the computer data storage


medium

5. render inaccessible or remove those computer data in the accessed computer


and communications network

A. 1, 3 and 5 only C. 1, 2, 3 and 5 only

B. 2 and 4 only D. 1, 2, 3, 4 and 5

67. Computer data shall be deposited under the custody of the


________________ within 48 hours after the examination as provided by the
warrant.

A. Department of Justice

B. National Bureau of Investigation

C. Cybercrime Investigation and Coordinating Center

D. Special Cybercrime Court

68. Among the following, who serves as the Chairperson of Cybercrime


Investigation And Coordinating Center?

A. The Executive Director of the Information and Communications Technology,


Department of Science and Technology

B. The Director of the National Bureau of Investigation

C. The Chief of the Philippine National Police

D. The Head of the Department of Justice, Office of Cybercrime

63 | P a g e
69. In defining human trafficking core elements should be established. These
are the action which means the recruitment, transportation, transfer,
harboring or receipt of persons; the means which include threat of or the use
of force, deception, coercion, abuse of power or position of vulnerability
and –

A. the purpose, which is always exploitation

B. the motive, which is for profit

C. the modus operandi or method of operation

D. the perpetrators, who are usually organized crime groups

70. At present, the commonly identified form of human trafficking are:

1. sexual exploitation

2. forced labor

3. domestic servitude and forced marriage

4. organ removal

5. exploitation of children in begging, the sex trade and warfare

A. 1, 3 and 5 only C. 1 and 5 only

B. 2 and 4 only D. 1, 2, 3, 4 and 5

71. Which of the following is NOT one of the methods that victims of human
trafficking are controlled and exploited?

A. Victims are compelled into slave-like working conditions and women or


children are forced into prostitution.

B. Victims are kept in debt bondage

C. Women are found up in factories

D. Victims and even their relatives back home are subjected to physical
threats and violence.

64 | P a g e
72. In human trafficking, victims are sometimes sold and pass on among
various groups. This condition is known as the phenomenon of –

A. countries of circulation C. cycle of exploitation

B. cycle of violence D. syndicated human trafficking

73. Under Republic Act 9208, trafficking in persons can be committed in any
of the following acts, EXCEPT –

A. recruiting person as dometic helper but found her in the brothelhouse

B. transporting or transferring the victim from one place to another

C. harboring and receiving a person who is known to be a victim of human


trafficking

D. accepting a person to work as domestic servant

74. Trafficking in Persons become qualified if committed against the


following, EXCEPT-

A. The victim is a child.

B. The adoptee

C. The offended person is a policeman

D. The offended party is afflicted with Acquired Immune Deficiency Syndrome


(AIDS).

75. Trafficking is deemed committed in large scale –

A. if carried out by a group of three persons conspiring or confederating


with one another

B. if committed against 3 or more persons, individually or as a group

C. if committed by a group of 2 or more persons conspiring or confederating


with one another

D. if committed against 4 or more persons, individually or as a group

65 | P a g e
76. In the investigation, prosecution and trial of trafficking in persons
cases the name and personal circumstances of the victim or the offender, or
any other information tending to establish their identities and such
circumstances or information –

A. shall be revealed to the public

B. shall be disclosed for public protection

C. shall be open and public

D. shall not be disclosed to the public

77. Under Republic Act 9208 trafficking cases committed by a syndicate or in


a large scale prescribes in –

A. 10 years C. 20 years

B. 15 years d. 30 to 40 years

78. Section 4 of the Anti-Money Laundering Act defines money laundering as a


crime whereby the proceeds of an unlawful activity are transacted, thereby
making them appear –

A. a lawful money

B. to have originated from legitimate sources

C. to be derived from legal transactions

D. to have been taken from its legitimate owner

79. In 1988 the United Nations Convention against Illicit Trafficking in


Narcotic Drugs and Psychotropic Substances made drug money laundering a
criminal offense. This international protocol is known as –

A. Vienna Convention C. Palermo Convention

B. Riyadh Convention D. Beijing Convetion

66 | P a g e
80. To effectively combat money laundering The G-7 Nations formed the
FINANCIAL ACTION TASK FORCE (FATF) which were mandated to devise
international standards and policies to combat money laundering. These G-7
Nations are composed of: 1) France; 2) Germany; 3) China; 4) Italy; 5)
Japan; 6) United Kingdom; 7) United States; 8) Canada; 9) Australia; 10)
Philippines

A. 1, 2, 3, 4, 7, 8 and 9 C. 1, 2, 4, 5, 6, 7 and 8

B. 1, 2, 4, 7, 8, 9 and 10 D. 4, 5, 6, 7, 8, 9 and 10

81. In 2000, the United Nations Convention against Transnational Organized


Crime popularly known as PALERMO CONVENTION was signed in Palermo, Italy.
This international treaty –

A. extended the legal definition of money laundering to include all serious


crimes

B. formed an alliance among European countries to fights international


terrorism

C. condemn transnational organized crimes

D. Provided the legal definition of money laundering to serve as a basis of


all country-members

82. Layering in money laundering process refers to an act of –

A. physical disposal of cash proceeds derived from the unlawful activity

B. separating illicit proceeds from their source

C. Integrating money into legitimate economic and financial systems

D. disguising the source of money, subvert the audit trail and provide
anonymity

83. Which of the following in NOT one of the methods of money laundering?

A. Mixing money with legitimate funds C. Using money for legitimate


purposes

67 | P a g e
B. Keeping money in the vault D. Investing money legitimate
business

84. Money Laundering as a crime can be committed in any of the following


acts, EXCEPT -

A. transacting with any monetary instrument knowing that it involves or


relates to the proceed of a criminal activity

B. facilitating the commission of money-laundering by knowingly performing or


failing to perform an act

C. using the money for goods and services knowing it to be derived from
unlawful activities

D. failing to disclose and file a report with Anti-Money Laundering Council


of any instrument as required under the law

85. Which international treaty that obliges nations to make money laundering
a criminal offense and provide for the extradition of persons charged with
money laundering offenses?

A. The 1998 UN Vienna Convention C. The UN Resolution 1373

B. The UN Drug Control Program D. Asia Pacific Group on Money


Laundering

86. A group of two or more persons who have common identifying signs or
symbols and whose members individually or collectively engaged in or have
engaged in a pattern of criminal activity, creating an atmosphere of fear and
intimidation within the community or a specific area using violence and
intimidation. Which is being described?

A. Terrorist C. Fraternity

B. Organized crime group D. Criminal Gang

87. Which list that contains the master reference outlining pertinent data on
organized crime?

A. Target list C. Watch list

68 | P a g e
B. Wanted list D. Hit list

88. Term used that refers to the place where the organized crime group
normally store or conceal its armaments, vehicles and other equipment prior
to or immediately after each criminal activity is -

A. safe house C. safe haven

B. stash house D. hideout

89. An Organized Crime Groups or Criminal Gangs are considered active if it


have conducted a reported criminal activities for the past ________ ,
otherwise, it shall be considered as inactive.

A. 10 years C. 2 years

B. 5 years D. 1 year

90. The Executive Director of the Philippine Center on Transnational Crimes


which is charged to formulate and implement a concerted program of action of
all law enforcement, intelligence and other government agencies for the
prevention and control of transnational crime is reporting to –

A. the President through the Secretary of Interior and Local Government

B. the Presidential Anti-Organized Crime Commission

C. Secretary of the Department of Justice

D. Secretary of the Interior and Local Government

91. Which of the following agency that serves as INTERPOL’s National Central
Bureau Secretariat?

A. National Law Enforcement Coordinating Committee

B. Philippine Center on Transnational Crimes

C. National Bureau of Investigation

69 | P a g e
D. National Security Adviser

92. Conceptualized in the 1920's this organization was established to promote


international criminal police cooperation due the apparent problem of
phenomenal increase in crimes in Europe. Which of these?

A. European Police Organization

B. International Criminal Police Organization

C. United Nations

D. International Association of the Chiefs of Police

93. Which of the following organ that makes major decisions on the policy,
budget, working methods, finances and programs of activities of the INTERPOL?

A. General Assembly C. Executive Committee

B. President D. Secretariat

94. INTERPOL’s Executive Committee that supervises the execution of the


decisions of the general assembly and the work of the secretary general is
headed by the President, four Vice Presidents and eight delegates. The
President is being by the general assembly with a term of –

A. 5 years C. 3 years

B. 4 years D. 2 years

95. Which INTERPOL notice is issued to a State’s law enforcement agency that
request information on the identity of persons or on their illegal activities
related to criminal matters?

A. Red Notice C. Green Notice

B. Blue Notice D. Yellow Notice

96. INTERPOL’s Orange Notice is issued -

70 | P a g e
A. to determine the identity of deceased person.

B. to warn of an event, a person, an object or a process representing an


imminent threat and danger to persons or property.

C. to provide information on modus operandi, objects, devices and concealment


methods used by criminals.

D. to inform member-state that a certain individuals and entities were


subjected to UN sanctions.

71 | P a g e

You might also like