Professional Documents
Culture Documents
ORGANIZED CRIMINAL GROUP – is structured group of three or more persons, existing for a period of time and
acting in concert with the aim of committing or more serious crimes or offenses established in accordance with this
convention, in order to obtain, directly or indirectly, a financial or material benefit.
For Organized Crime Group to Work usually it has at least the following:
1. A corrupter - (fixer/money mover)
2. A corruptee - public officials, law enforcers or anybody who not a member of the organization who can help the
organization. Someone who has been corrupted or influenced by someone or something else.
3. An enforcer – one who carries out difficult assignments involving the use of violence, including murder, in a
rational manner. He may use members or non-members or even a specialist to carry out the assignment
Question:
Q1. Could a corruptee be held legally accountable for a crime in relation to organize crime?
Answer:
A1. Yes, a corruptee be held liable for a crime. If a corruptee is found to have knowingly engaged in illegal activities
or collaborated with organized crime groups, they could face criminal charges. The punishment could include
fines, imprisonment, or both, depending on the severity of their actions and the laws of the jurisdiction.
SOME CHARACTERISTICS OF ORGANIZED CRIMES
1. Continuity – They operate beyond the lifetime of individual members and is structured to survive changes in
leadership. This continuity enables them to accumulate wealth and power, expand their influence, and adapt to
changes in law enforcement or market conditions. It allows them to develop intricate networks, establish
relationships with other criminal organizations, and exert control over various illicit activities such as drug trafficking,
money laundering, etc.
2. Hierarchy / Structure – They are structured as a collection of hierarchically arranged interdependent persons
devoted to the accomplishment of a particular function. The structured hierarchy enables them to maintain control,
coordinate their activities effectively, and minimized internal conflicts.
3. Corporate structure – They appoint a leader who is assisted by other members in hierarchical structure. Members
are appointed on the basis of skill, relationship with existing members etc. It has a boss, advisors, captains, crews &
soldiers. They may have specialized units for functions like logistics, finance, and enforcement. Similar to
corporations, they also prioritize profit maximization and risk management. They invest in market research to
identify lucrative opportunities, minimize costs, and mitigate risks associated with law enforcement or rival gangs.
4. Centralized authority – They function on the basis of centralized control vested either by one individual or a few
members. In such structures, there is typically a clear chain of command, with ultimate authority resting at the top.
However, while centralized authority provides certain advantages, it also poses risks whenever the leaders are
arrested or eliminated, it can disrupt the entire organization’s operations.
5. Membership – Is a critical aspect as they rely on a network of individuals to carry out their illicit activities. At the
core of the organization are the full-fledged members often referred to as “made men” or “made women.” These
individuals usually have undergone an initiation process, which may involve committing serious crime or proving
their loyalty to the group. These groups often have a network of contacts and allies who collaborate with them on
a more informal basis which include corrupt officials, business owners, etc.
- They are characterized by secrecy, loyalty, and a code of conduct that emphasizes obedience to the leader/s and
maintaining the group’s interest above all else. Individuals who betray or violate its rules may face severe
consequences.
- This is the KEY element of organized crime, providing the manpower and resources necessary for the group to
carry out its illegal activities and maintain its influence.
jimf45-3
6. Team Work – It enables them to overcome obstacles, exploit opportunities, and maintain their power and
influence in the underworld.
Teamwork considers the following:
Division of Labor – allows members to specialize and work in different roles and tasks.
Information sharing – enables members to share intelligence, assess risks, and adapt their strategies
accordingly to minimize exposure and maximize profits.
Mutual Protection – members rely on each other for protection and support. It fosters a sense of
camaraderie and loyalty, encouraging members to watch each other’s backs, resolve conflicts internally, and
retaliate against threats from outsiders.
Strategic planning – allows members to pool their expertise and resources, brainstorm creative solutions,
and devise strategic plans to achieve their goals against rival gangs and possible law enforcement detection.
7. Criminality – This is the DEFINING characteristics of organized crime group. They engage in a wide range criminal
activity for financial gain, power and control.
8. Planning – CRUCIAL aspect of organized crime group. Planning is integral to organized crime group in order to
maximize profits, minimize risks and maintain their power.
Things to consider in planning:
a. Long-Term Strategy - It involves assessing market trends, identifying opportunities, and allocating resources.
b. Operational Planning - This is to ensure the efficiency and success of their operation. This includes
coordinating logistics, managing supply chains, & scheduling criminal activities to minimize exposure to law.
c. Risk Assessment - Assess risks associated with their activities, including legal consequences, rivalries with
other groups, potential losses and detection of law enforcement agencies.
d. Resource allocation - Efficient allocation of resources to include personnel, finances and technology.
e. Adaptation - They constantly reassess their plans in response to changes in law enforcement tactics, market
conditions and rival activities.
f. Communication and coordination - It require a clear communication among members of the group. It
includes establishing communication channels, protocols for sharing information, and strategies for
resolving disputes or conflicts.
g. Security measures - Implementing security measures to protect the group’s activity from detection by law
enforcement and rival organization. This may include encryption technology, counter-surveillance tactics,
and compartmentalization.
9. Secrecy – In organized crime group, high secrecy is maintained. Only people holding higher posts know what
crime has to be committed, sometimes even criminal working at the grass-root level does not know who the boss
is. Head of the organization issue order to the person and second in command who in turn may instruct others to
commit the crime. There is possibility that the members are unaware of other members in the group.
10. Specialization – Some groups specialize in just one crime while some others may be simultaneously engaged in
multiple crimes. Those groups which are engaged in multiple crimes are more powerful and influential.
11. Division of labor – It involves delegation of duties & responsibilities & specialization of functions. The members
work like professionals whose duties and responsibilities are predefined based on their skills. Organized criminal
groups and their protectors rely on skilled individuals or specialist support to assist in the attainment of group ‘s
goal. The specialist assists the criminal groups on an ad-hoc basis and not permanently. They are non-the-less
considered part of the organized crime. The specialist includes pilots, chemists, arsonists, hijackers, shooters etc.
12. Violence - Violence and intimidation are an integral part of a criminal group. The violence or threat of it is used
against the members of the group to keep them in line as also against the outsiders to protect the economic interests
of the group. Members are expected to commit, condone or authorize violence.
13. Power/Profit goal – The political power is achieved through the corruption of public officials, including legislators
and political executive. Sometimes, such group may also penetrate the legitimate economy, through construction&
financing business.
14. Monopoly – From limited area, limited type of crime and with a limited number of persons to gradually expand
into a wider range of activities. jimf45-4
15. Protectors – Arranges permanent protection against interference from law-enforcement authorities and other
agencies of government. Corruption is the central tool of the criminal protectors.
16. Conspiracy – It allows the members to pool resources, share expertise, and evade law enforcement by operating
in secrecy. It also facilitates the coordination of complex criminal operations across different geographical areas or
jurisdictions.
17. Reserved fund – They maintain a reserve fund from profits which serves as capital for criminal enterprises,
seeking the help of the police, lawyers and even politicians, and for providing security to the arrested members and
their families.
Question:
Q2: What is the difference between attributes and contributions in relation to organized crime group?
Answer:
A2: Attributes refers to the inherent qualities or features, while characteristics denote observable traits or
behaviors.
Example: Hierarchical structure. This serves as both an attribute and a characteristic of organized crime,
encompassing both its inherent nature and observable traits. Hierarchical structure is primarily considered an
attribute because it’s an inherent quality or many criminal organizations. When we say inherent, it refers to a trait
that is intrinsic or fundamental to something, meaning it exists as a natural part of its essence or nature. It’s a
feature that is innate and integral, rather than acquired or external. However, it can also be considered a
characteristic because it’s an observable trait commonly associated with organized crime.
THEORIES OF CRIME
1. The strain of anomie
2. Differential association
3. Sub cultures and social disorganization
4. Social control theory
5. Ethnic succession
MAFIA
- the first organization to bear the label was the Sicilian Mafia based in Italy, known to its members as Cosa Nostra
- means protection against arrogance of the powerful, remedy to any damage, sturdiness of body, strength and
serenity of spirit, and the best and exquisite part of life.
- apparently Sicilian-Arabic derived from terms meaning to protect and to act as guardian; a friend or companion;
to defend; preservation, power, integrity, strength, and a condition that designates the remedy of damage and ill.
Q4: Who is the toughest gangster of all time?
A4: Upon his death from a torturous, four-day bout with pneumonia in 1932, Frank McErlane was described by
Chicago Police as the “toughest gangster of them all.” His ruthless bootlegging peers in the Windy City feared
him so much, they reportedly paid him a “pension” of hundreds of dollars a week just to stay out of town.
Jan 19, 2022
OMERTA
- is a code of silence and secrecy that forbids Mafiosi from betraying their comrades to the authorities.
- Ideal of manliness
- Non-cooperation with authorities
- Self-control in the face of adversity
- Vendetta-blood washes blood
- Neither government nor church to be trusted
The foundation of the entire mafia is respect. Fear is the engine, and money is the fuel. But longevity of the
mafia as an enterprise is built upon an abiding and uncommon sense of respect. The penalty for transgression is
death, and relatives of the turncoat may also be murdered.
jimf45-6
Mafiosi generally do not associate with law enforcers (aside perhaps from corrupting officers as necessary).
For instance, a mafioso will not call and ask the help of police when he is a victim of a crime. He is expected to take
care of the problem himself. To do otherwise would undermine his reputation as a capable protector of others, and
his enemies may see him as weak and vulnerable.
According to legend, the word Mafia was first used in the Sicilian revolt – the Sicilian Vespers against rule of
the Capetian House of Anjou on 30 March 1282. In this legend, Mafia stands for "Morte Alla Francia Italia Anela,"
which means "Death to France, Italy Yearns (cries)."
RULES OF AMERICAN MAFIA
- Omerta – the code of silence & non-cooperation with law enforcement. Members are expected to maintain secrecy.
- Always show respect to higher-ranking members, elders, and the organization itself.
- Observe the hierarchical structure in following orders.
- Loyalty to the organization is paramount. Betrayal & disloyalty is often resulting to death.
- Violence must be used, even if only a limited type, to ensure respect.
- While violence is often a part of the operation, there is typically a prohibition against killing civilians or non-
affiliated individuals unless absolutely necessary for business or protection.
- Do not use the telephone except to arrange a meeting place, preferably in code, from which you will then travel to
a place to discuss business.
- Avoid mentioning specifics when discussing business – for example: names, dates, and places
– Mafia families control specific territories, and conflicts over turf are resolved through negotiation or extreme cases,
violence.
- Keep your mouth shut–anything you hear and see, stays with you, in your head; don’t talk about it.
- Do not ask necessary questions. The amount of information given to you is all you need to carry out your
assignment/instruction.
- The boss cannot use violence against a member or close associate of another family without prior consultation
with that family’s boss.
- The principal form of security in the American Mafia is an elaborate system of referral and vouching.
Vouching – refers to the process of endorsing someone who seeks to become a member of the organization. It is a
crucial step in recruiting process, as it helps maintain the secrecy, security and internal cohesion of the organization.
However, it also carries risks, as vouching for someone who later proves to be untrustworthy, disloyal and
worst – an undercover law enforcer.
Vouching several purposes:
1. Verification of trustworthiness – an existing member is essentially vouching for the integrity, loyalty, and ability
of the interested individual.
2. Introduction to the organization – for being vouched for by an existing member provides introduction to the
group and can facilitate the entry of individual.
3. Establishing connection – it creates a connection between the prospective member and the existing members,
fostering a sense of trust and camaraderie within the organization.
4. Enhancing security – existing member ensure that the prospect new member is not undercover law
enforcement officers or informants.
JAPAN
Yakuza or Boryokudan
- is the most influential organized crime group in Japan; known for their strict codes of conduct and hierarchical
structures; Members often have distinctive tattoos and adhere to a strict set of rules and traditions; etc.
- Boryokudan means “violent group” or “violent organization.”
CAMBODIA
- Organized crime groups are usually involved in drug production, sex trafficking, labor exploitation, and smuggling
particularly along the borders with neighboring countries like Thailand, Vietnam, and others.
- Additionally, organized crime group have been linked to Illegal logging and natural resource exploitation leading
to deforestation and environmental degradation with the aid of some corrupt government officials and law
enforcement personnel.
TAIWAN
-Taiwan organized crime has close connection with the Chinese Triads and Hong Kong particularly the United
Bamboo Gang. They are involved in drug trafficking, prostitution, women and child trafficking.
-They implemented legal measures and policies to prevent and combat organized crime, including anti-money
laundering laws and regulations aimed at targeting the financial networks of criminal organizations.
SINGAPORE
-This is the country with the lowest cases of organized activities due to stringent laws and severe penalties and the
government’s strong will power for the implementation of laws. The Singapore Police Force is known for its proactive
approach in targeting and dismantling criminal syndicates. Singapore’s zero-tolerance policy towards crime, coupled
with efficient law enforcement measures, has helped to keep organized crime relatively low compared to other
countries in the region.
VIETNAM
- Vietnam is a hub for the illegal wildlife trade, with demand for products such as ivory, rhino horn, and tiger parts.
- is also a hotspot for the production and distribution of counterfeit goods, including counterfeit electronics,
clothing, pharmaceuticals, and luxury goods.
- “Nam Cam Gang” was one of the most noted organized crime groups in Vietnam led by Troung Van Cam who was
arrested and prosecuted together with many of his associates in a high-profile trial in 2003, which resulted in
multiple convictions and lengthy prison sentences, including a death sentence for Nam Cam who was executed by
firing squad on June 3, 2004, signaling a strong message from the Vietnamese government about its commitment
to combating organized crime.
TRANSNATIONAL CRIME - a continuing illegal activity of group of persons which is primarily concerned with the
generation of profits, irrespective of national boundaries as a result of globalization.
GLOBALIZATION - refers to the rapid development of the western culture that ultimately affects other cultures in
the world as brought by intellectual and technological advances, in which some crimes occurring in other countries
are attributed.
TRANSNATIONAL ORGANIZED CRIME - is a crime perpetuated by organized criminal group which the aim of
committing one or more serious crimes or offenses in order to obtain directly or indirectly, a financial or other
material benefits committed through crossing of borders or jurisdictions.
HUMAN TRAFFICKING
HUMAN TRAFFICKING / TRAFFICKING IN PERSON (TIP) - refers to the recruitment, transportation, transfer or
harboring, or receipt of persons with or without the victim's consent or knowledge, within or across national borders
by means of threat or use of force, or other forms of coercion, abduction, fraud, deception, abuse of power or of
position, taking advantage of the vulnerability of the person, or, the giving or receiving of payments or benefits to
achieve the consent of a person having control over another person for the purpose of exploitation which includes
at a minimum, the exploitation or the prostitution of others or other forms of sexual exploitation, forced labor or
services, slavery, servitude or the removal or sale of organs.
Forms of exploitation – victims can be subjected to various forms of exploitation, including forced labor in industries
such as agriculture, construction, domestic work, manufacturing, mining, maritime sectors, etc. They may also be
trafficked for sexual exploitation, including prostitution, pornography, online sexual exploitation (OSEC), street
begging, forced marriage, removal or sale of organs, etc.
Victims – it can be men, women or children of all ages and backgrounds. Vulnerable populations, such as migrants,
refugees, asylum seekers, homeless individuals, and those living in poverty, are often targeted by traffickers. Victims
may be lured with false promises of employment, education, or a better life, only to be exploited upon arrival at
their destinations.
jimf45-11
Traffickers
- Can be individuals, criminal organizations, or networks that profit from the exploitation of victims. They often use
coercion, deception, threats, and violence to control and manipulate their victims. Traffickers may operate locally,
nationally, or transnationally, taking advantage of gaps in law enforcement, language barriers, and border controls.
Global Phenomenon
- It occurs worldwide and usually driven by the following factors: Poverty, inequality, conflict, displacement,
corruption, and demand for cheap labor and commercial sex. The globalization of economies and the ease of travel
and communication have facilitated the growth of human trafficking.
Legal Framework
- International and national laws have been enacted to combat this problem and protect the rights of victims. The
United Nations Protocol to prevent, suppress and punish trafficking in persons, especially
women and children (commonly known as the Palermo Protocol) is the primary international legal instrument
addressing human trafficking.
Government, NGO and Civil Society Involvement
- Philippine government has taken steps to address this problem by enacting laws, establishing specialized law
enforcement units, and implementing programs to provide assistance and support to victims. NGO and other civil
society groups help in combating this problem by providing shelter, legal assistance, counseling, and reintegration
support to victims, advocacy awareness campaign, and capacity-building initiatives to prevent the problem and
promote the rights of victims.
Push Factors to Trafficking
1. Individual level:
- Lack of education & information - Women’s aspiration
- History of abuse and exploitation
2. Family
- Desertion - Separation
- Domestic violence or marital discord - Neglect of parents
- Bread winner or desire to improve family’s economic condition
3.Community
- Congested neighborhood - Lack of employment opportunities
- Lack of basic social services - Poor housing and living conditions
4.Society
- Political and economic insecurity - Power relations and gender inequality
- Political corruption - Lure of migration
- Conflict - Consumerism
- Poverty - Supply and demand
- Structural adjustment policies resulting in the rising cost of living
Pull factors to trafficking
- Increased ease of travel (cheaper and faster travel opportunities, easier access to passport);
- Higher salaries and standard of living in larger cities and countries abroad (greater possibilities for acquiring new
skills and education, increased job opportunity, and mobility);
- Established migration routes and ethnic, national communities;
- Active demand for migrant workers in destination countries combined with the existence of recruitment agencies
and persons willing to facilitate jobs and travel; and
- High expectations of opportunities in other countries boosted by global media and internet access and stories of
returning migrants or those whose families have profited from remittances.
Vulnerable sector
- Profiles of women trafficked shows that they are mostly young, without or less education coming from the rural
areas and poor families, which include some women displaced in Central Luzon due to the eruption of Mt. Pinatubo
or the landslide in Guinsaugon Southern Leyte. jimf45-12
Republic Act 9208 - Anti-Trafficking in Persons Act of 2003 that aims to combat human trafficking, particularly the
trafficking of women and children. It mandates the creation of the Inter-Agency Council Against Trafficking (IACAT)
to coordinate government efforts in addressing human trafficking issues.
Section 4. Acts of Trafficking in Persons - It shall be unlawful for any person, natural or juridical, to commit any of
the following acts:
(a) To recruit, transport, transfer, harbor, provide, or receive a person by any means, including those done
under the pretext of domestic or overseas employment or training or apprenticeship, for the purpose of prostitution,
pornography, sexual exploitation, forced labor, slavery, involuntary servitude or debt bondage;
(b) To introduce or match for money, profit, or material, economic or other consideration, any person or, as
provided for under Republic Act No. 6955, any Filipino woman to a foreign national, for marriage for the purpose of
acquiring, buying, offering, selling or trading him / her to engage in prostitution, pornography, sexual exploitation,
forced labor, slavery, involuntary servitude or debt bondage;
(c) To offer or contract marriage, real or simulated, for the purpose of acquiring, buying, offering, selling, or
trading them to engage in prostitution, pornography, sexual exploitation, forced labor or slavery, involuntary
servitude or debt bondage;
(d)To undertake or organize tours and travel plans consisting of tourism packages or activities for the
purpose of utilizing and offering persons for prostitution, pornography or sexual exploitation;
(e)To maintain or hire a person to engage in prostitution or pornography;
(f) To adopt or facilitate the adoption of persons for the purpose of prostitution, pornography, sexual
exploitation, forced labor, slavery, involuntary servitude or debt bondage;
(g) To recruit, hire, adopt, transport or abduct a person, by means of threat or use of force, fraud, deceit,
violence, coercion, or intimidation for the purpose of removal or sale of organs of said person; and
(h) To recruit, transport or adopt a child to engage in armed activities in the Philippines or abroad.
Section 5. Acts that Promote Trafficking in Persons -The following acts which promote or facilitate trafficking in
persons, shall be unlawful:
(a)To knowingly lease or sublease, use or allow to be used any house, building or establishment for the
purpose of promoting trafficking in persons;
(b) To produce, print and issue or distribute un issued, tampered or fake counseling certificates, registration
stickers and certificates of any government agency which issues these certificates and stickers as proof of compliance
with government regulatory and pre-departure requirements for the purpose of promoting trafficking in persons;
(c) To advertise, publish, print, broadcast or distribute, or cause the advertisement, publication, printing,
broadcasting or distribution by any means, including the use of information technology and the internet, of any
brochure, flyer, or any propaganda material that promotes trafficking in persons;
(d) To assist in the conduct of misrepresentation or fraud for purposes of facilitating the acquisition of
clearances and necessary exit documents from government agencies that are mandated to provide pre-departure
registration and services for departing persons for the purpose of promoting trafficking in persons;
(e) To facilitate, assist or help in the exit and entry of persons from /to the country at international and local
airports, territorial boundaries and seaports who are in possession of unissued, tampered or fraudulent travel
documents for the purpose of promoting trafficking in persons;
(f) To confiscate, conceal, or destroy the passport, travel documents, or personal documents or belongings
of trafficked persons in furtherance of trafficking or to prevent them from leaving the country or seeking redress
from the government or appropriate agencies; and
(g)To knowingly benefit from, financial or otherwise, or make use of, the labor or services of a person held
to a condition of involuntary servitude, forced labor, or slavery.
Section 6. Qualified Trafficking in Persons - The following are considered as qualified trafficking:
(a) When the trafficked person is a child;
(b) When the adoption is effected through Republic Act No. 8043, otherwise known as the "Inter Country
Adoption Act of 1995" and said adoption is for the purpose of prostitution, pornography, sexual exploitation, forced
labor, slavery, involuntary servitude or debt bondage; Deficiency Syndrome (AIDS).
(c) When the crime is committed by a syndicate, or in large scale. Trafficking is deemed committed
jimf45-13
by a syndicate if carried out by a group of three (3) or more persons conspiring or confederating with one another.
It is deemed committed in large scale if committed against three (3) or more persons, individually or as a group;
(d) When the offender is an ascendant, parent, sibling, guardian or a person who exercises authority over
the trafficked person or when the offense is committed by a public officer or employee;
Philippine Government Manifested its Commitment against TIP through the Creation/Amendment of the
following legislative acts:
Mail-Order Bride (RA 6955) – enacted in 1990. It regulates the business of matchmaking for marriage purposes between Filipino
women and foreign men. The law aims to protect Filipino women from being exploited and abused by foreign nationals through
mail-order bride arrangements
Anti-Rape law of 1997 (RA 8353) – enacted to address the crime of rape and provide protection to victims. It expanded the
definition of rape and increased the penalties for perpetrators. Among its provisions, the law recognizes marital rape and
imposes heavier penalties for rape committed by parents, guardians, or those in a position of authority over the victim.
Rape Victim Assistance and Protection Act of 1998 (RA 8505) – enacted to provide assistance and protection to victims of rape.
The law aims to ensure that victims receive proper medical, legal, and psychological support throughout the legal process.
Special Protection of Children Against Abuse, Exploitation and Discrimination Act (RA 7610) – enacted in 1992. It aims to
protect children from abuse, exploitation, and discrimination by providing special safeguards and remedies.
An Act Prohibiting the Employment of Children Below 15 Years of Age in Public and Private Undertakings (RA 7658) – enacted
to prohibit the employment of children below 15 years old in both public and private enterprises. It amended certain provision
of RA No. 7610 to strengthen the protection of children against child labor and exploitation. The law aims to ensure that children
are protected from hazardous working conditions and have access to education and opportunities for proper development.
Migrant Workers and Overseas Filipinos Act of 1995 (RA 8042) – it aims to promote the welfare and uphold the rights of Filipino
migrant workers and overseas Filipinos. It provides guidelines and support mechanisms for their protection, particularly in terms
of employment, remittances, legal assistance, and repatriation.
Philippine Passport Act of 1996 (RA 8239) – law that governs the issuances and use of Philippine passport holders. It also
defines offenses related to the use of fraudulent passports and impose penalties for such violations.
Inter-Country Adoption Act of 1995 (RA 8043) – law that governs the adoption of Filipino children by foreign citizens
permanently residing abroad. It establishes guidelines and procedures for inter-country adoption to ensure the welfare and
best interests of the adopted children. The law aims to safeguard against child trafficking and exploitation by setting stringent
requirements and monitoring mechanisms for the adoption process.
Expanded Anti-Trafficking in Persons Act of 2012 (RA 10364) – this law strengthens the legal framework against human
trafficking by broadening the scope of offenses, enhancing protection for victims, and improving coordination among
government agencies and stakeholders.
Anti-Child Pornography Act of 2009 (RA 9775) – law which aims to prevent and punish the production, distribution, and
possession of child pornography, often associated with human trafficking.
These laws provide a comprehensive legal framework to combat human trafficking in the Philippines, covering
prevention, prosecution, protection, and rehabilitation of victims.
Q4: Does RA 7658 prevent young actors from working in the entertainment industry?
A4: Yes. Under RA 7658, young actors are prohibited from working in the entertainment industry if they are below the
specified age limit BUT there are some exceptions or specific provisions within RA 7658 or other related regulations that
allow certain young actors to work in the entertainment industry under specific circumstances, such as obtaining permits,
parental consent, or meeting certain criteria set by labor laws.
CYBER CRIME
Introduction
Understanding Cybercrime is crucial specially in an increasingly digital world we live in now a day. But, like
other many crimes, the commission of it if not totally eradicated could be prevented or mitigated for simply studying
this and to developing effective prevention and response strategies. One should know the following before
designing ways and strategies to prevent the problem: History of Cybercrime; types, frequency and amount of
cybercrime; role of law enforcement; organized crime itself; cyber terrorism and terrorist online; cyberwar;
domestic response; international response and conclusion of the study.
jimf45-14
COMPUTER CRIME (CYBER CRIME) -Any crime accomplished through special knowledge of computer technology.
- Refers to criminal activities carried out using computers or the internet.
- Any illegal act in which knowledge of computer technology is used to commit the offense. (L. E. Quaratiello)
- All illegal activities that are committed by or with the aid of computer or information technology or in which the
computers are the target of the criminal enterprise. (Martin L. Forst)
Borderless - is an evolving form of transnational crime. It can be committed in one country toward a victim in
another country because of internet connection. Offender can be very mobile, moving from one place to another.
- In borderless crime like cybercrime, extradition usually happens. It is where the offender may be transported from
the nation where they committed their acts to their country. This usually create an obstacle for pursuing criminals.
Easy to commit
Cybercrimes are very easy to commit because it does not require many resources. Having your computer, internet
connection and building communication with their possible victims makes the crime possible.
Resources Are Lacking
Investigation associated with cybercrime is extremely costly and the facts of allegation is not easy to establish. In as
much as the government would like to address the issue, we still encounter problems such as: inadequate resources;
and proper training of law enforcement agencies.
Offenders Are Transient
Computers and internet gadgets are located everywhere and can be easily moved from one place to another.
Criminals can easily hide their tracks and evidence of their crimes. They usually choose areas or nations where laws
against cybercrime are lax or are less likely to investigate such activities.
Laws and Policies Are Ineffective
An act may be illegal in one country but legal in another country, allowing criminals to move from one place to
another and remain unpunished for their acts. In case the offender was successfully located, there are still obstacles
for pursuing criminals to consider: extradition, exemptions, etc.
Damage Is Unclear or Unreported
Many offenders are very good at hiding their crimes, and victims may not know or may not be aware of the full
extent of the harm in a long period of time. Thus, many cybercrimes are not officially reported because victims are
not aware an offense has occurred. Some may be embarrassed and they usually kept it by themselves.
Cultural Norms Differ
Norms differ from one country to another. A norm to one place seems acceptable while in another country is taboo.
Example: posting a child taking a bath seems acceptable in one country, while in other country it’s not acceptable
and they usually considered as cybercrime. Situation like this makes it difficult for law enforcement, as confusion
arises over what rules apply and who has jurisdiction.
Turf Wars Are Common
Sometimes turf wars break out between law enforcement agencies as to what agencies has jurisdiction over
cybercrime investigation.
The history of cybercrime in the Philippines
1. Early years (1980s – 1990s): cybercrime in the Philippines traces back to the early days of the internet when
hacking and computer-based crimes began to emerge.
- Cybercrimes were relatively low in volume but laid the foundation for more sophisticated forms of
cybercrime.
2. Emerge of cyber fraud (2000s): As internet usage grew in the Philippines, so did cyber fraud such as:
phishing; scams; online scams; identity theft; etc.
3. Rise of cybersex trafficking (2000s-2010s): Philippines became known as a hotspot for cybersex trafficking,
where individuals, i9ncluding minors, were coerced or forced into performing sexual acts on webcam for
paying customers abroad.
4. Legislation and Law Enforcements (2010s): The Philippine government enacted laws such as the Cybercrime
Prevention Act of 2012 to address various forms of cybercrime. Law enforcement agencies established
jimf45-15
specialized units against cybercriminals but they faced challenges due to the rapid evolution of technology
and the transnational nature of cybercrime.
5. Recent trends (2020s): In recent years, cybercrime in the Philippines has evolved to include more
sophisticated tactics such as ransomware attacks, business email compromise (BEC) scams, and
cryptocurrency-related crimes.
Overall, the history of cybercrime in the Philippines reflects the global trend of increasing digital
interconnectedness and the ongoing struggle to combat cyber threats effectively.
TECHNICALTERMS
ISP – stands for Internet Service Provider. It provides internet service to internet users.
IP Address – series of numbers assigned by an Internet Service Provider to an internet user when it connects to
the Internet
Dynamic IP Address – a type of IP Address that changes every time the internet user accesses his Internet Service
Provider. It is usually assigned to dial – up or base speed broad band service subscribers (eg. ISP Bonanza, Surf
maxx, PLDT my DSL 128 kbps service, etc.)
Static IP Address – a type of IP Address that is constant regardless of the time or number of attempts the internet
user accesses the internet. It is usually assigned to High – Speed Internet Users or Corporate Accounts (eg. ADSL
(Asymetric Digital Subscriber Line) connections, E1 Internet Connections, OC3 Internet Connections, T1 Internet
Connections, Leased Line Internet Connections)
Website – a portfolio of a person/organization/entity/company which is posted on the Internet for accessibility
worldwide.
The INTERNET PROTOCOL (IP) ADDRESS is the anchor of the investigation of all crimes committed via the internet.
The identification of the IP Address leads to the identity of the Internet Service Provider (ISP) used to access the
internet and eventually the subscriber of the account where the internet activity was performed.
The IP Address as given by the ISP depends on the type of internet account a subscriber
maintains, whether it is a DYNAMICIP or STATIC IP.
If Static: Subscriber information (name, billing address, installation address, type of internet account, usage and
costs etc.) if applicable
If Dynamic
log reports indicating telephone number used to make “dial-up” access
VERY IMPORTANT:
The address of the subscriber as given by the ISP or Phone Company should be. Analyzed to determine
whether it is a Billing Address or an Installation Address.
For purposes of a search warrant application, the Installation Address is the more important matter to
consider. The purpose of a Search Warrant application/implementation in a cybercrime investigation, as with any
other offense is to confiscate and seize the instruments/ implements, tools used in the commission of the offense.
Since the crime was committed with the aid of a computer, the same and its peripherals are the instruments used
in its commission.
Electronic Commerce Act (RA 8792) of 2000 – An act providing for the recognition and use of electronic commercial
and non-commercial transactions and documents, penalties for unlawful use thereof and for other purposes.
jimf45-19