Organized Crime Inv. (PCCR Book)
Organized Crime Inv. (PCCR Book)
Organized Crime Inv. (PCCR Book)
Course Description
The study of the nature of organized crimes, their attributes and categories. It
includes international and local organized groups. This also focuses on crimes
committed by a person, group of persons, or corporations while undertaking legitimate
profession or business occupation.
No of Units: 3
A. Definition
Attributes:
a) A complicated hierarchy
b) An extensive division of labor
c) Positions assigned on the basis if skills
d) Responsibilities carried out in an impersonal manner
e) Extensive written rules and regulations
f) Communication from top of the hierarchy to persons on the bottom,
usually in the written form
Chapter 2
The 5th United Nation Congress on crime prevention in 1975 put it that
transnational corporations breeds economic crimes in the understanding by
dependency theorists, but on broader sense, transnational crimes include
narcotics trafficking, smuggling of illegal aliens, arms smuggling, frauds and
terrorism. As to late, transnational crimes as seen both theoretically and
practically are border crimes that had become key security issue for policy
makers and law enforcement agencies. Efforts are increasingly shifted from
domestic organized crime to the international arena.
.
C. Types of Transnational Organized Crimes
1. Force Labor and Slavery. Refer to the extraction of work or services from any
person by means of enticement, violence, intimidation or threat, use of force or coercion,
including deprivation of freedom, abuse of authority or moral ascendency, debt-
bondage or deception. White Slavery is engagement in the business for profit, or
enlistment of services of any other person for the purpose of prostitution. By the end of
17th century the slavery trade was not only unlawful but desirable branch of commerce,
a participation in which was made the objects of wars, negotiations, and treaties
between different European States.
1. Theft of services, in which the criminal uses the computer for unauthorized
purposes or an unauthorized user penetrates the computer system. Included
within this category is the theft of processing time and services not entitled to an
employee.
5. Making the computer itself the subject of a crime- for example, when a virus is
placed in it to destroy data.
1. Personal gain
2. The criminals are typically motivated by revenge for some perceived wrong
3. A need to exhibit their technical prowess and superiority
4. A wish to highlight the vulnerability of computer security systems
5. A desire to spy on other people’s private financial and personal information
(computer voyeurism)
6. Or a philosophy of open access to all systems and programs.
Chapter
Pursuant to Executive Order No. 62, the Philippine Center for Transnational Crime is
created under the Office of the President to formulate and implement a concerted program
of action of all law enforcement, intelligence and other government agencies for the
prevention and control of transnational crime.
Powers and Functions
Organizational Structure
Presently, the PCTC have two (2) Executive Offices and four (4)
Directorates:
Coordinative Mechanism
8. Inter-Agency coordination through established institutions such
as the National Law Enforcement Coordinating Committee
(NALECC)
The NALECC issued a resolution in April 1999 to include
the PCTC as one of its regular members. The PCTC is the
Chairman of the Sub-Committee on International Law
Enforcement Cooperation (SCILEC).
Pursuant to E.O 829 NALECC was created to serve as the
venue for the coordination of all law enforcement activities
of various government law enforcement agencies to ensure
unified direction and integration of effort throughout the
country in the suppression of criminal activities on a day-
to-day basis, particularly at the operating levels.
Chapter
A. Introduction
Terrorist Act- any act that is unlawful, involves the use or threatened use
of violence or force against individuals or property is
designed to coerce a government or society and supports
political, ideological, or religious objectives.
B. Categories of Terrorism
C. Characteristics of Terrorists
c) Age:
Foot soldiers and operational members: 20 to 35 years old
d) Gender
Women are increasingly used in terrorist activities such as:
Suicide bombers
Smuggling of explosives
Step 9: Escape
a) Preplanned escape routes
b) Many included diversions
F. Types of Targets
a) Political and Social. Highly symbolic (commemorate battles)
Hard targets- a structure that has been fortified against attack i.e.
limited accessible and generally few in numbers.
e) Maritime System
a) Use of propaganda
b) Distribution of networks
c) Use of communication techniques
I. Information Sharing
K. Terrorist Financing
1. Zakat - The giving of alms for the poor and needy, as prescribed by the Quran.
Zakat is the primary means within the Muslim world for terror organizations to
“legitimately” receive money.
a) Saudi Arabia collects Zakat by government agency (similar to our IRS) and
distributes to recognized charities. Saudi collections are estimated to exceed $10
Billion. (Saudi Ministry of Finance and National Economy)
b) Most other countries, both Muslim and non-Muslim do not collect or control
where Zakat money goes.
d) The Internet has numerous Islamic charity sites asking believers to pay the Zakat
to them promising to apply it on their behalf.
e) The giver of Zakat knows only to whom they gave their money, for what they
believe will be the building of schools, mosques and to help the poor. Once
given however, the giver has no further control if the funds are diverted or a
portion is skimmed off for the purchase of weapons, explosives and operating
terror training camps.
f) Many Muslims send their Zakat through Islamic banks. This process is legal but
there is no assurance they have funded a legitimate charity vice a terrorist group.
g) The Islamic banking system has been a mystery to most in the West. Islamic
Banks cannot charge interest on loans. This requires that the Islamic Bank make
its money on its investments. Western style accounting and auditing practices to
monitor and track what those investments truly involve have only recently been
implemented and then only under international pressure since the attacks on the
US.
h) Zakat funds deposited in Islamic banks are taken off the books and “disappear”
because they are not considered part of the banks assets nor its liabilities and are
not reported. The bank has served only as a collection agent. The Zakat can then
be transferred, without regulation, to worthy charities as directed by the givers,
to any worthy recipient or have some or all of it skimmed off to Islamic radicals.
Some of the largest Islamic banks have their headquarters in Switzerland. The
Swiss banking philosophy and governmental regulation, adds a second layer of
secrecy yet gives the banks connectivity with world banking in general.
Hawala is the best known Informal Funds Transfer (IFT) system. Interpol
estimates India alone to have $680 Billion in transactions annually. The process uses
both legal and illegal means to move money in a way that avoids record keeping of
transmitters and receivers, taxes and customs duties. It is secure, trust-based,
paperless and generally untraceable.
Hawala came into public interest after the 2001 attacks on the US when it was
revealed that much of the money funding the attackers was transferred by Hawala.
It has no formal limitations on amounts but does have practical limits. It is well
suited for terror operations that cost $50-$70K to fund and complete in a short period
of time. It is illegal in many countries including the US, yet many banks in both
Islamic and Western countries utilize this system. It was originally benign in its
historical intent but is now consistently misused by those who take advantage of its
efficiencies. It will remain as a cultural alternative to regulated banking but certainly
will continue to adapt further to accommodate the modern world. The fact that it is
being made illegal in more and more countries will not end the practice in the near
term.
L. Responses to Terrorism
Responses to terrorism are broad in scope. They can include realignments of the
political spectrum and reassessments of fundamental values. Specific types of
responses include:
M. The Al Qaeda
It was in the year 1988 that Al Qaeda, Arabic for “The Base” was founded by
Osama bin Laden, Muhammed Atef, and Ayman al-Zawahiri to continue the
Jihad internationally. Al Qaeda is reportedly headquartered in Afghanistan and
Peshawar, Pakistan.
4. The Committees.
5. The Cells
6. The Headquarters
1.
1.
1.
Chapter
A. Terrorism Defined
REPUBLIC ACT NO. 9372 (AN ACT TO SECURE THE STATE AND
PROTECT OUR PEOPLE FROM TERRORISM ), otherwise known as “ Human
Security Act of 2007” defined Terrorism as “ Any person who commits an act
punishable under any of the following provisions of the Revised Penal Code:
1. Article 122 (Piracy in General and Mutiny in the High Seas or in the
Philippine Waters);
2. Article 134 (Rebellion or Insurrection);
or under
2. Any person who, not being a principal under Article 17 of the Revised Penal
Code or a conspirator as defined in Section 4 hereof, cooperates in the execution
of either the crime of terrorism or conspiracy to commit terrorism by previous or
simultaneous acts.
The provisions of Republic Act No. 4200 (Anti-wire Tapping Law) to the
contrary notwithstanding, a police or law enforcement official and the members of
his team may, upon a written order of the Court of Appeals, listen to, intercept and
record, with the use of any mode, form, kind or type of electronic or other
surveillance equipment or intercepting and tracking devices, or with the use of any
other suitable ways and means for that purpose, any communication, message,
conversation, discussion, or spoken or written words between members of a
judicially declared and outlawed terrorist organization, association, or group of
persons or of any person charged with or suspected of the crime of terrorism or
conspiracy to commit terrorism.
1. The identity, such as name and address, if known, of the charged or suspected
person whose communications, messages, conversations, discussions, or spoken or
written words are to be tracked down, tapped, listened to, intercepted, and recorded
and, in the case of radio, electronic, or telephonic (whether wireless or otherwise)
communications, messages, conversations, discussions, or spoken or written words,
the electronic transmission systems or the telephone numbers to be tracked down,
tapped, listened to, intercepted, and recorded and their locations or if the person
suspected of the crime of terrorism or conspiracy to commit terrorism is not fully
known, such person shall be subject to continuous surveillance provided there is a
reasonable ground to do so;
2. The identity (name, address, and the police or law enforcement organization) of
the police or of the law enforcement official, including the individual identity
(names, addresses, and the police or law enforcement organization) of the members
of his team, judicially authorized to track down, tap, listen to, intercept, and record
the communications, messages, conversations, discussions, or spoken or written
words;
4. The length of time within which the authorization shall be used or carried out.
The authorizing division of the Court of Appeals may extend or renew the
said authorization for another non-extendible period, which shall not exceed thirty
(30) days from the expiration of the original period: Provided, That the authorizing
division of the Court of Appeals is satisfied that such extension or renewal is in the
public interest: and Provided, further, That the ex parte application for extension or
renewal, which must be filed by the original applicant, has been duly authorized in
writing by the Anti-Terrorism Council.
If no case is filed within the thirty (30)-day period, the applicant police or law
enforcement official shall immediately notify the person subject of the surveillance,
interception and recording of the termination of the said surveillance, interception
and recording. The penalty of ten (10) years and one day to twelve (12) years of
imprisonment shall be imposed upon the applicant police or law enforcement
official who fails to notify the person subject of the surveillance, monitoring,
interception and recording as specified above.
All tapes, discs, and recordings made pursuant to the authorization of the
authorizing division of the Court of Appeals, including all excerpts and summaries
thereof as well as all written notes or memoranda made in connection therewith,
shall, within forty-eight (48) hours after the expiration of the period fixed in the
written order of the authorizing division of the Court of Appeals or within forty-
eight (48) hours after the expiration of any extension or renewal granted by the
authorizing division of the Court of Appeals, be deposited with the authorizing
Division of the Court of Appeals in a sealed envelope or sealed package, as the case
may be, and shall be accompanied by a joint affidavit of the applicant police or law
enforcement official and the members of his team.
In case of death of the applicant or in case he is physically disabled to execute
the required affidavit, the one next in rank to the applicant among the members of
the team named in the written order of the authorizing division of the Court of
Appeals shall execute with the members of the team that required affidavit.
It shall be unlawful for any person, police officer or any custodian of the
tapes, discs and recording, and their excerpts and summaries, written notes or
memoranda to copy in whatever form, to remove, delete, expunge, incinerate, shred
or destroy in any manner the items enumerated above in whole or in part under any
pretext whatsoever.
1. The number of tapes, discs, and recordings that have been made, as well
as the number of excerpts and summaries thereof and the number of
written notes and memoranda, if any, made in connection therewith;
2. The dates and times covered by each of such tapes, discs, and recordings;
The joint affidavit shall also certify under oath that no duplicates or copies
of the whole or any part of any of such tapes, discs, and recordings, and that no
duplicates or copies of the whole or any part of any of such excerpts, summaries,
written notes, and memoranda, have been made, or, if made, that all such
duplicates and copies are included in the sealed envelope or sealed package, as
the case may be, deposited with the authorizing division of the Court of Appeals.
Any person, police or law enforcement officer who violates any of the acts
proscribed in the preceding paragraph shall suffer the penalty of not less than
ten (10) years and one day to twelve (12) years of imprisonment.
The sealed envelope or sealed package and the contents thereof, which are
deposited with the authorizing division of the Court of Appeals, shall be deemed
and are hereby declared classified information, and the sealed envelope or sealed
package shall not be opened and its contents (including the tapes, discs, and
recordings and all the excerpts and summaries thereof and the notes and
memoranda made in connection therewith) shall not be divulged, revealed, read,
replayed, or used as evidence unless authorized by written order of the authorizing
division of the Court of Appeals, which written order shall be granted only upon a
written application of the Department of Justice filed before the authorizing division
of the Court of Appeals and only upon a showing that the Department of Justice has
been duly authorized in writing by the Anti-Terrorism Council to file the application
with proper written notice the person whose conversation, communication, message
discussion or spoken or written words have been the subject of surveillance,
monitoring, recording and interception to open, reveal, divulge, and use the
contents of the sealed envelope or sealed package as evidence.
Any person, law enforcement official or judicial authority who violates his
duty to notify in writing the persons subject of the surveillance as defined above
shall suffer the penalty of six (6) years and one day to eight (8) years of
imprisonment.
The written application with notice to the party concerned to open the
deposited sealed envelope or sealed package shall clearly state the purpose or
reason for:
Any person, law enforcement official or judicial authority who violates his
duty to notify as defined above shall suffer the penalty of six (6) years and one
day to eight (8) years of imprisonment.
The provisions of Article 125 of the Revised Penal Code to the contrary
notwithstanding, any police or law enforcement personnel, who, having been
duly authorized in writing by the Anti-Terrorism Council has taken custody of a
person charged with or suspected of the crime of terrorism or the crime of
conspiracy to commit terrorism shall, without incurring any criminal liability for
delay in the delivery of detained persons to the proper judicial authorities,
deliver said charged or suspected person to the proper judicial authority within a
period of three (3) days counted from the moment the said charged or suspected
person has been apprehended or arrested, detained, and taken into custody by
the said police, or law enforcement personnel: Provided, That the arrest of those
suspected of the crime of terrorism or conspiracy to commit terrorism must
result from the surveillance under Section 7 and examination of bank deposits
under Section 27 of this Act.
The police or law enforcement personnel concerned shall, before detaining
the person suspected of the crime of terrorism, present him or her before any
judge at the latter’s residence or office nearest the place where the arrest took
place at any time of the day or night. It shall be the duty of the judge, among
other things, to ascertain the identity of the police or law enforcement personnel
and the person or persons they have arrested and presented before him or her, to
inquire of them the reasons why they have arrested the person and determine by
questioning and personal observation whether or not the suspect has been
subjected to any physical, moral or psychological torture by whom and why. The
judge shall then submit a written report of what he/she had observed when the
subject was brought before him to the proper court that has jurisdiction over the
case of the person thus arrested. the judge shall forthwith submit his/her report
within three (3) calendar days from the time the suspect was brought to his/her
residence or office.
The penalty of ten (10) years and one day to twelve (12) years of
imprisonment shall be imposed upon the police or a law enforcement personnel
who fails to notify any judge as provided in the preceding paragraph.
J. Penalty for Failure to Deliver Suspect to the Proper Judicial Authority Within
Three (3) Days
The penalty of ten (10) years and one day to twelve (12) years of
imprisonment shall be imposed upon any police or law enforcement personnel
who has apprehended or arrested, detained and taken custody of a person
charged with or suspected of the crime of terrorism or conspiracy to commit
terrorism and fails to deliver such charged or suspected person to the proper
judicial authority within the period of three (3) days.
H. Anti-Terrorism Council
The Council shall implement this Act and assume the responsibility for
the proper and effective implementation of the anti-terrorism policy of the
country. The Council shall keep records of its proceedings and decisions. All
records of the Council shall be subject to such security classifications as the
Council may, in its judgment and discretion, decide to adopt to safeguard the
safety of the people, the security of the Republic, and the welfare of the nation.
In pursuit of its mandate in the previous Section, the Council shall have
the following functions with due regard for the rights of the people as mandated
by the Constitution and pertinent laws:
The Commission on Human Rights shall give the highest priority to the
investigation and prosecution of violations of civil and political rights of persons
in relation to the implementation of this Act; and for this purpose, the
Commission shall have the concurrent jurisdiction to prosecute public officials,
law enforcers, and other persons who may have violated the civil and political
rights of persons suspected of, accused of, or detained for the crime of terrorism
or conspiracy to commit terrorism.
Chapter
THE CYBERCRIME
A. Introduction
3. Identity Theft which occurs when a person uses the Internet to steal
someone’s identity and/or impersonate them to open a new credit card
account or conduct some other financial transactions.
1. Theft of Services such as the theft of processing time and services not
entitled to an employee
5. Making the computer itself the subject of crime such as placing virus in it
to destroy data.
C. Definition of Terms
7. Electronic Key- refers to a secret code which secures and defends sensitive
information that crossover public channels into a form decipherable only
with a matching electronic key.
(a) Where the law requires a document to be in writing, that requirement is met
by an electronic document if the said electronic document maintains its integrity
and reliability and can be authenticated so as to be usable for subsequent
reference, in that–
ii. The electronic document is reliable in the light of the purpose for which
it was generated and in the light of all relevant circumstances.
(b) Paragraph (a) applies whether the requirement therein is in the form of an
obligation or whether the law simply provides consequences for the document
not being presented or retained in its original form.
(c) Where the law requires that a document be presented or retained in its
original form, that requirement is met by an electronic document if-
(b) Said method is reliable and appropriate for the purpose for which the
electronic document was generated or communicated, in the light of all
circumstances, including any relevant agreement;
(c) It is necessary for the party sought to be bound, in or order to proceed further
with the transaction to have executed or provided the electronic signature; and
(d) The other party is authorized and enables to verify the electronic signature
and to make the decision to proceed with the transaction authenticated by the
same.
(b) On the ground that it is not in the standard written form, and the
electronic data message or electronic document meeting, and complying
with the requirements under Sections 6 or7 hereof shall be the best
evidence of the agreement and transaction contained therein.
F. Lawful Access
Except for the purposes authorized under the law(RA 8792), any person
who obtained access to any electronic key, electronic data message or electronic
document, book, register, correspondence, information, or other material
pursuant to any powers conferred, shall not convey to or share the same with
any other person.
G. Unlawful Acts Punished Under the Electronic Commerce Act
Chapter
HUMAN TRAFFICKING
Note:
Scope of Trafficking
It is very difficult to assess the real size of human trafficking because the
crime took place underground, and is often not identified. However, a
conservative estimate of the crime puts the number of victims at any one time at
2.5 million. It affects every region of the world and generates tens of billions of
dollars in profits for criminals each year.
1) Sexual exploitation
2) Forced labor
B. Modalities of Trafficking
While trafficking patterns may differ from country to country and region
to region, a number of common features can be identified.
At present, for organized criminal groups the risk is low and profits are
high in trafficking in human beings.
Low Risks
High Profits
1) When consumers are willing to buy goods and services from the
trafficking industry, they create a profit incentive for labor traffickers;
5.Facilitate, assist or help in the exit and entry of persons from/to the country
at international and local airports, territorial boundaries and seaports who are in
possession of unissued, tampered or fraudulent travel documents for the purpose of
promoting trafficking in persons;
7. Knowingly benefit from, financial or otherwise, or make use of, the labor or
services of a person held to a condition of involuntary servitude, forced labor, or
slavery.
The prescriptive period commences to run from the day on which the
trafficked person is delivered or released from the conditions of bondage and
interrupted by the filing of the complaint or information and commence to run
again when such proceedings terminate without the accused being convicted or
acquitted or are unjustifiably stopped for any reason not imputable to the
accused.
Chapter
MONEY LAUNDERING
A. Definitions
1. Double invoicing
2. Direct cash deposit
3. Back-to-back loans
7. Smurfing
E. Definitions
(1) banks, non-banks, quasi-banks, trust entities, and all other institutions
and their subsidiaries and affiliates supervised or regulated by the Bangko
Sentral ng Pilipinas (BSP);
Note:
(1) coins or currency of legal tender of the Philippines, or of any other country;
(d) Offender- refers to any person who commits a money laundering offense.
(h) Transaction- refers to any act establishing any right or obligation or giving rise to
any contractual or legal relationship between the parties thereto. It also includes any
movement of funds by any means with a covered institution.
(i) Unlawful activity- refers to any act or omission or series or combination thereof
involving or having relation to the following:
(1) Kidnapping for ransom under Article 267 of Act No. 3815, otherwise known
as the Revised Penal Code, as amended;
(2) Sections 3, 4, 5, 7, 8 and 9 of Article Two of Republic Act No. 6425, as
amended, otherwise known as the Dangerous Drugs Act of 1972;
(5) Robbery and extortion under Articles 294, 295, 296, 299, 300, 301 and 302 of
the Revised Penal Code, as amended;
(6) Jueteng and Masiao punished as illegal gambling under Presidential Decree
No. 1602;
(7) Piracy on the high seas under the Revised Penal Code, as amended and
Presidential Decree No. 532;
(8) Qualified theft under Article 310 of the Revised Penal Code, as amended;
(9) Swindling under Article 315 of the Revised Penal Code, as amended;
(11) Violations under Republic Act No. 8792, otherwise known as the Electronic
Commerce Act of 2000;
(12) Hijacking and other violations under Republic Act No. 6235; destructive
arson and murder, as defined under the Revised Penal Code, as amended,
including those perpetrated by terrorists against non-combatant persons and
similar targets;
(13) Fraudulent practices and other violations under Republic Act No. 8799,
otherwise known as theSecurities Regulation Code of 2000;
(14) Felonies or offenses of a similar nature that are punishable under the penal
laws of other countries.
(a) Any person knowing that any monetary instrument or property represents, involves,
or relates to, the proceeds of any unlawful activity, transacts or attempts to transact said
monetary instrument or property.
(b) Any person knowing that any monetary instrument or property involves the
proceeds of any unlawful activity, performs or fails to perform any act as a result of
which he facilitates the offense of money laundering referred to in paragraph (a) above.
(c) Any person knowing that any monetary instrument or property is required under
this Act to be disclosed and filed with the Anti-Money Laundering Council (AMLC),
fails to do so.
(2) to issue orders addressed to the appropriate Supervising Authority or the covered
institution to determine the true identity of the owner of any monetary instrument or
property subject of a covered transaction report or request for assistance from a foreign
State, or believed by the Council, on the basis of substantial evidence, to be, in whole or
in part, wherever located, representing, involving, or related to, directly or indirectly, in
any manner or by any means, the proceeds of an unlawful activity;
(3) to institute civil forfeiture proceedings and all other remedial proceedings through
the Office of the Solicitor General;
(4) to cause the filing of complaints with the Department of Justice or the Ombudsman
for the prosecution of money laundering offenses;
(7) to implement such measures as may be necessary and justified under this Act to
counteract money laundering;
(8) to receive and take action in respect of, any request from foreign states for assistance
in their own anti-money laundering operations provided in this Act;
(9) to develop educational programs on the pernicious effects of money laundering, the
methods and techniques used in money laundering, the viable means of preventing
money laundering and the effective ways of prosecuting and punishing offenders; and
(10) to enlist the assistance of any branch, department, bureau, office, agency or
instrumentality of the government, including government-owned and -controlled
corporations, in undertaking any and all anti-money laundering operations, which may
include the use of its personnel, facilities and resources for the more resolute prevention,
detection and investigation of money laundering offenses and prosecution of offenders.
The AMLC may inquire into or examine any particular deposit or investment
with any banking institution or non-bank financial institution upon order of any
competent court in cases of violation of RA 9160, when it has been established that there
is probable cause that the deposits or investments involved are in any way related to a
money laundering offense.
Chapter
1. Capability:
a) Organizational Structure
(1) Composition- highly structured and complex
(2) Disposition- members have infiltrated a vast variety of legitimate
businesses that circumvent government controls.
b) Resources
(1) High profile strength
(2) Highly sophisticated logistical support
(3) Highly specialized training and indoctrination
c) Networking/Connections
(1) Well-entrenched and fluid network
(2) Tight operating linkages and influenced with law enforcement and
other government agencies
(3) Initiated and maintained through bribery and corruption on public
officials
d) Modus Operandi
(1) High profile
(2) Difficult to counter
(3) Violence and intimidation
2. Motive:
a) Non-ideological/Non Sectarian
b) Organizational Profit and Advantage
Note:
The absence of the attending requirements in the definition of the OSCG will fall
on the concept of ordinary Criminal Gangs.
C. Criminal Gangs
1. Capability:
2. Resources:
3. Networking/Connections:
4. Modus Operandi:
5. Personalities:
2. Criminal Activity
7. Current Activities
9. Connections
14. Priority
20. Attachments
(1) Name/Alias- state the name and aliases used by the person.
(2) Last Known Address- indicate the recent known whereabouts of
the person
(3) Group Affiliation- if applicable, state the name of the group
wherein the person is a member or affiliated with.
(4) Area of Operation/Main Base- state the areas where the person is
conducting operations/harboring
(5) Position- if the person is a member of the group, indicate the
person’s position in the group
(6) Nature of Offense- state the criminal offense the person is charged
with
(7) Criminal Case Number- indicate the criminal case number
(8) Issuing Court- state the court which issued the warrant of arrest
(9) Remarks- state any other relevant information not mentioned
above such as whether there is a reward for the arrest of the person,
etc.
(10) Photograph- include the person’s photograph, if available
(1) Name/Alias- state the name and alias used by the person
(2) Last Known Address- indicate the recent known whereabouts of
the person
(3) Group Affiliation- if applicable, state the name of the group
wherein the person is a member or affiliated with
(4) Area of Operation/Main Base- state the area where the person is
conducting operations/harboring
(5) Position- if the person is a member of a group, indicate the person’s
position in the group
(6) Crime Committed/Involvement- state the crime where the person
is suspected to be involve and the person’s nature of involvement
(7) References- cite particular reference which are basis for the person’s
inclusion in the watch list such as information reports, police
investigation reports, etc.
(8) Photograph- include the person’s photograph, if available
(1) Escaped while in detention pending the resolution of the court case
(2) Jumped bail
(3) Escape while serving sentence
In cases where a person has been arrested and is out on bail but is
monitored to be involved in crimes defined in the criteria for the
priority/wanted list, same person’s name shall be removed from the
priority list on the watch list.
6. Drawing of Top Twenty Most Wanted Persons From the Wanted List
From among the entries in the priority list, “Top Twenty Most Wanted
Persons” shall be drawn. The parameters which serve as the bases for the
inclusion are as follows:
Pursuant to Executive Order No. 62, the Philippine Center for Transnational Crime is
created under the Office of the President to formulate and implement a concerted program
of action of all law enforcement, intelligence and other government agencies for the
prevention and control of transnational crime.
Presently, the PCTC have two (2) Executive Offices and four (4)
Directorates:
Coordinative Mechanism
8. Inter-Agency coordination through established institutions such
as the National Law Enforcement Coordinating Committee
(NALECC)
The NALECC issued a resolution in April 1999 to include
the PCTC as one of its regular members. The PCTC is the
Chairman of the Sub-Committee on International Law
Enforcement Cooperation (SCILEC).
Pursuant to E.O 829 NALECC was created to serve as the
venue for the coordination of all law enforcement activities
of various government law enforcement agencies to ensure
unified direction and integration of effort throughout the
country in the suppression of criminal activities on a day-
to-day basis, particularly at the operating levels.
PCTC as INTERPOL Manila NCB Secretariat
Pursuant to E.O 100 (May 7, 1999) and the Memorandum
on the Implementation of E.O 100 (February 7, 2000), the
general control and supervision of INTERPOL Manila
NCB Secretariat was transferred from the Directorate for
Operations of the PNP to the PCTC to serve as the liaison
office and main coordinating body for international police
cooperation against transnational crime representing all
law enforcement agencies in the Philippines that performs
the following functions:
Maintains an Operation Center
Acts on request for information from member
countries, local law enforcement agencies and other
government organizations.
Disseminates INTERPOL notices, media releases,
requests for investigative assistance and
announcement of conference to concerned bureaus,
law enforcement agencies and other concerned
office.
At PCTC, the INTERPOL Command and Coordination
Division, under its Directorates for Operations is the office
responsible for processing all requests and responses sent
via INTERPOL Global Communication System known as
1-24/7.
Pursuant to Executive Order No. 62, the Philippine Center for Transnational Crime is
created under the Office of the President to formulate and implement a concerted program
of action of all law enforcement, intelligence and other government agencies for the
prevention and control of transnational crime.
Presently, the PCTC have two (2) Executive Offices and four (4)
Directorates:
Coordinative Mechanism
9. Inter-Agency coordination through established institutions such
as the National Law Enforcement Coordinating Committee
(NALECC)
The NALECC issued a resolution in April 1999 to include
the PCTC as one of its regular members. The PCTC is the
Chairman of the Sub-Committee on International Law
Enforcement Cooperation (SCILEC).
Pursuant to E.O 829 NALECC was created to serve as the
venue for the coordination of all law enforcement activities
of various government law enforcement agencies to ensure
unified direction and integration of effort throughout the
country in the suppression of criminal activities on a day-
to-day basis, particularly at the operating levels.
PCTC as INTERPOL Manila NCB Secretariat
Pursuant to E.O 100 (May 7, 1999) and the Memorandum
on the Implementation of E.O 100 (February 7, 2000), the
general control and supervision of INTERPOL Manila
NCB Secretariat was transferred from the Directorate for
Operations of the PNP to the PCTC to serve as the liaison
office and main coordinating body for international police
cooperation against transnational crime representing all
law enforcement agencies in the Philippines that performs
the following functions:
Maintains an Operation Center
Acts on request for information from member
countries, local law enforcement agencies and other
government organizations.
Disseminates INTERPOL notices, media releases,
requests for investigative assistance and
announcement of conference to concerned bureaus,
law enforcement agencies and other concerned
office.
At PCTC, the INTERPOL Command and Coordination
Division, under its Directorates for Operations is the office
responsible for processing all requests and responses sent
via INTERPOL Global Communication System known as
1-24/7.
Chapter