Beruflich Dokumente
Kultur Dokumente
STUDENTS NAME:
I. COURSE DESCRIPTION:
This study covers the comparison of selected police models and their
relation with the INTERPOL and UN bodies in the campaign against transnational crimes and
the promotion of peace.
1. Single-culture studies
– the crime problem of a single foreign country is discussed
2. Two-culture studies
-Comprehensive books (it covers three or more countries).
-The examination of crime and its control in the comparative context often requires a
historical perspective since the phenomena under the study seen as having historical
perspective since the phenomena under study are seen as having developed under unique
social, economic, and political structures.
3. Historical-comparative method
–the most often employed by researchers. It basically an alternative to both quantitative and
qualitative research methods that is sometimes called historiography or holism.
GLOBALIZATION
Globalization is a process of interaction and integration among the people, companies, and
governments of different nations, a process driven by international trade and investment and aided
by information technology. This process has effects on the environment, on culture, on political
systems, on economic development and prosperity, and on human physical well-being in societies
around the world “Globalization101” (n.d).
Transnational Crimes
Transnational
(adjective) -involving or operating in several nations or nationalities
https://www.vocabulary.com/dictionary/transnational
Transnational crimes are violations of law that involve more than one country in their planning,
execution, or impact. These offenses are distinguished from other crimes in their multinational
nature, which poses unique problems in understanding their causes, developing prevention
strategies, and in mounting effective adjudication procedures.
Transnational crimes can be grouped into three broad categories involving provision of illicit
goods (drug trafficking, trafficking in stolen property, weapons trafficking, and counterfeiting),
illicit services (commercial sex and human trafficking), and infiltration of business and
government (fraud, racketeering, money laundering, and corruption) affecting multiple countries.
Transnational crimes are distinct from international crime, which involves crimes against
humanity that may or may not involve multiple countries. Examples of international crimes are
genocide and terrorism, which are also included in this guide to sources.
(Albanese, J.S, 2017)
Offences whose inception, prevention and/or direct or indirect effects involved more than one
country.’ (UN Doc. A.CONF. 169/15/Add.1 (1995)).
Human Trafficking
Article 3, paragraph (a) of the Protocol to Prevent, Suppress and Punish Trafficking in Persons defines:
Human Trafficking is defined in the Trafficking Protocol as "the recruitment, transport, transfer,
harbouring or receipt of a person by such means as threat or use of force or other forms of coercion,
abduction, fraud or deception for the purpose of exploitation."
The definition of trafficking consists of three core elements:
1) The action of trafficking which means the recruitment, transportation, transfer, harboring or receipt of
persons
2) The means of trafficking which includes threat of or use of force, deception, coercion, abuse of
power or position of vulnerability
3) The purpose of trafficking which is always exploitation. In the words of the Trafficking Protocol,
article 3 "exploitation shall include, at a minimum, the exploitation of the prostitution of others or other
forms of sexual exploitation, forced labor or services, slavery or practices similar to slavery, servitude or
the removal of organs.
Definition of Terms:
"(a) Trafficking in Persons – refers to the recruitment, obtaining, hiring, providing, offering,
transportation, transfer, maintaining, harboring, or receipt of persons with or without the victim’s
consent or knowledge, within or across national borders by means of threat, or use of force, or other
forms of coercion, abduction, fraud, deception, abuse of power or of position, taking advantage of
the vulnerability of the person, or, the giving or receiving of payments or benefits to achieve the
consent of a person having control over another person for the purpose of exploitation which
includes at a minimum, the exploitation or the prostitution of others or other forms of sexual
exploitation, forced labor or services, slavery, servitude or the removal or sale of organs.
"(b) Child – refers to a person below eighteen (18) years of age or one who is over eighteen (18) but
is unable to fully take care of or protect himself/herself from abuse, neglect, cruelty, exploitation, or
discrimination because of a physical or mental disability or condition.
"(c) Prostitution – refers to any act, transaction, scheme or design involving the use of a person by
another, for sexual intercourse or lascivious conduct in exchange for money, profit or any other
consideration.
"(d) Forced Labor – refers to the extraction of work or services from any person by means of
enticement, violence, intimidation or threat, use of, force or coercion, including deprivation of
freedom, abuse of authority or moral ascendancy, debt-bondage or deception including any work or
service extracted from any person under the menace of penalty.
"(e) Slavery – refers to the status or condition of a person over whom any or all of the powers
attaching to the right of ownership are exercised.
"(f) Involuntary Servitude – refers to a condition of enforced and compulsory service induced by
means of any scheme, plan or pattern, intended to cause a person to believe that if he or she did not
enter into or continue in such condition, he or she or another person would suffer serious harm or
other forms of abuse or physical restraint, or threat of abuse or harm, or coercion including depriving
access to travel documents and withholding salaries, or the abuse or threatened abuse of the legal
process.
"(g) Sex Tourism – refers to a program organized by travel and tourism-related establishments and
individuals which consists of tourism packages or activities, utilizing and offering escort and sexual
services as enticement for tourists. This includes sexual services and practices offered during rest
and recreation periods for members of the military.
"(i) Debt Bondage – refers to the pledging by the debtor of his/her personal services or labor or
those of a person under his/her control as security or payment for a debt, when the length and
nature of services is not clearly defined or when the value of the services as reasonably assessed is
not applied toward the liquidation of the debt.
"(k) Council – shall mean the Inter-Agency Council Against Trafficking created under Section 20 of
this Act."
May or may not involve coercion, Usually does not involve coercion Usually does not involve coercion
fraud, but uses more deception,
deception, abuse of vulnerability, promises and fraud
etc.
Characterized by subsequent Characterized by facilitating entry Characterized by facilitating, for
exploitation after the illegal entry of of one person from one country to a fee, the illegal entry of a person
one person from another through an unauthorized into a foreign country
one place to another or one country or unlicensed agency
to another
There is a need to prove the presence Mere recruitment without license Proof of illegal entry by none
of exploitation or that theis punishable, no compliance with the necessary
recruitment was facilitated for theneed to prove the consequential requirements for travel
purpose of exploitation exploitation
Considered a human rights issue Considered a migration concern Considered a migration concern
The three (3) categories of trafficking in persons and its punishable acts are:
• To recruit, obtain, hire, provide, offer, transport, transfer, maintain, harbor, or receive a person by
any means, including those done under the pretext of domestic or overseas employment or training or
apprenticeship, for the purpose of prostitution, pornography, or sexual exploitation;
• To introduce or match for money, profit, or material, economic or other consideration, any
person or, as provided for under Republic Act No. 6955, any Filipino woman to a foreign national for
marriage for the purpose of acquiring, buying, offering, selling or trading him/her to engage in
prostitution, pornography, sexual exploitation, forced labor, slavery, involuntary servitude or debt
bondage;
• To offer or contract marriage, real or simulated, for the purpose of acquiring, buying, offering,
selling, or trading them to engage in prostitution, pornography, sexual exploitation, forced labor or
slavery, involuntary servitude or debt bondage;
• To undertake or organize tours and travel plans consisting of tourism packages or activities for
the purpose of utilizing and offering persons for prostitution, pornography or sexual exploitation;
• To adopt persons by any form of consideration for exploitative purposes or to facilitate the same for
purposes of prostitution, pornography, sexual exploitation, forced labor, slavery, involuntary
servitude or debt bondage;
• To adopt or facilitate the adoption of persons for the purpose of prostitution, pornography, sexual
exploitation, forced labor, slavery, involuntary servitude or debt bondage;
• To recruit, hire, adopt, transport, transfer, obtain, harbor, maintain, provide, offer, receive or abduct a
person, by means of threat or use of force, fraud, deceit, violence, coercion, or intimidation for the
purpose of removal or sale of organs of said person;
• To recruit, transport, obtain, transfer, harbor, maintain, offer, hire, provide, receive or adopt a
child to engage in armed activities in the Philippines or abroad;
• To recruit, transport, transfer, harbor, obtain, maintain, offer, hire, provide or receive a person by
means mentioned in the preceding paragraph for purposes of forced labor, slavery, debt bondage and
involuntary servitude, including a scheme, plan, or pattern intended to cause the person either:
a. To believe that if the person did not perform such labor or services, he or she or another
person would suffer serious harm or physical restraint; or
b. To abuse or threaten the use of law or the legal processes;
• To recruit, transport, harbor, obtain, transfer, maintain, hire, offer, provide, adopt or receive a
child for purposes of exploitation or trading them, including but not limited to, the act of buying
and/or selling a child for any consideration or for barter for purposes of exploitation. Trafficking for
purposes of exploitation of children shall include:
a. All forms of slavery or practices similar to slavery, involuntary servitude, debt bondage and
forced labor, including recruitment of children for use in armed conflict;
b. The use, procuring or offering of a child for prostitution, for the production of pornography,
or for pornographic performances;
c. The use, procuring or offering of a child for the production and trafficking of drugs; and
d. The use, procuring or offering of a child for illegal activities or work which, by its nature or
the circumstances in which it is carried out, is likely to harm their health, safety or morals; and
• Toorganize or direct other persons to commit the offenses defined as acts of trafficking.
• Attempted Trafficking in Persons – when there are acts to initiate the commission of a trafficking
offense but the offender failed to or did not execute all the elements of the crime, by accident or by
reason of some cause other than voluntary desistance. As such, an attempt to commit any of the
offenses mentioned in the preceding paragraph shall constitute attempted trafficking in persons.
If the victim is a child, any of the following acts shall be deemed as attempted trafficking in persons:
a. Facilitating the travel of a child who travels alone to a foreign country or territory without valid
reason and without the required clearance or permit from the DSWD or a written permission from the
child’s parent or legal guardian;
b. Executing, for a consideration, an affidavit of consent or a written consent for adoption;
c. Recruiting a woman to bear a child for the purpose of selling the child;
d. Simulating a birth for the purpose of selling a child; and
e. Soliciting a child and acquiring the custody through any means from among hospitals, clinics,
nurseries, daycare centers, refugee or evacuation centers, and low-income families, for the
purpose of selling the child.
• Accomplice Liability – knowingly aids, abets, and cooperates in the execution of the offense by
previous or simultaneous acts of trafficking.
• Accessories – whoever has the knowledge of the commission of the crime, and without having
participated therein, either as principal or accomplice, take part in its commission in any of the
following manners:
a. Profiting themselves or assisting the offender to profit by the effects of the crime;
b. Concealing or destroying the body of the crime or effects or instruments in order to prevent its
discovery; and
c. Harboring, concealing or assisting in the escape of the principal of the crime, provided the
accessory acts with abuse of his or her public functions or is known to be habitually guilty of
some other crime.
2. Acts that Promote Trafficking in Persons
• To knowingly lease or sublease, use or allow to be used any house, building or establishment for the
purpose of promoting trafficking in persons;
• To produce, print and issue or distribute unissued, tampered or fake counseling certificates,
registration stickers, overseas employment certificates or other certificates of any government
agency which issues these certificates, decals and such other markers as proof of compliance
with government regulatory and pre-departure requirements for the purpose of promoting
trafficking in persons;
• To advertise, publish, print, broadcast or distribute, or cause the advertisement, publication, printing,
broadcasting or distribution by any means, including the use of information technology and
the internet, of any brochure, flyer, or any propaganda material that promotes trafficking in
persons;
• To assist in the conduct of misrepresentation or fraud for purposes of facilitating the acquisition of
clearances and necessary exit documents from government agencies that are mandated to
provide pre-departure registration and services for departing persons for the purpose of promoting
trafficking in persons;
• To facilitate, assist or help in the exit and entry of persons from/to the country at international and
local airports, territorial boundaries and seaports who are in possession of unissued, tampered or
fraudulent travel documents for the purpose of promoting trafficking in persons;
To knowingly benefit from, financial or otherwise, or make use of, the labor or services of a person
held to a condition of involuntary servitude, forced labor, or slavery;
• To tamper with, destroy, or cause the destruction of evidence, or to influence or attempt to influence
witnesses, in an investigation or prosecution of a case;
• To destroy, conceal, remove, confiscate or possess, or attempt to destroy, conceal, remove, confiscate
or possess, any actual or purported passport or other travel, immigration or working permit
or document, or any other actual or purported government identification, of any person in order
to prevent or restrict, or attempt to prevent or restrict, without lawful authority, the person’s
liberty to move or travel in order to maintain the labor or services of that person; and
• To utilize his or her office to impede the investigation, prosecution or execution of lawful orders
in a case.
• When the adoption is effected through Republic Act No. 8043, otherwise known as the “Inter-Country
Adoption Act of 1995” and said adoption is for the purpose of prostitution, pornography, sexual
exploitation, forced labor, slavery, involuntary servitude or debt bondage;
• When the offender is a spouse, an ascendant, parent, sibling, guardian or a person who exercises
authority over the trafficked person or when the offense is committed by a public officer or
employee;
• When the trafficked person is recruited to engage in prostitution with any member of the military or
law enforcement agencies;
• When by reason or on occasion of the act of trafficking in persons, the offended party dies,
becomes insane, suffers mutilation or is afflicted with Human Immunodeficiency Virus (HIV) or the
Acquired Immune Deficiency Syndrome (AIDS);
• When the offender commits one or more violations over a period of sixty (60) or more days, whether
those days are continuous or not; and
• When the offender directs or through another manages the trafficking victim in carrying out the
S.Y. 2018-2019 SUMMER PERIOD
9
Any person who has the personal knowledge on the trafficking incidence can immediately report to any of the
following:
• Barangay authorities;
• Nearest police or other law enforcement agencies;
• Local social welfare and development office;
• Any member agencies of the Inter-Agency Council Against Trafficking (IACAT);
• Local anti-trafficking committee or task force;
• Local council for the protection of children; or
• 1343 Action line against Human Trafficking.
• Philippine Embassy/Consulate which has jurisdiction over the place where the trafficking
occurred or where the trafficked person is or may be found;
• All officers, representatives and personnel of the Philippine government posted abroad under the
leadership of the Ambassador or the head of mission; or
• Office of the Undersecretary for Migrant Workers Affairs (OUMWA) of the Department of Foreign
Affairs (DFA).
• Any person, including a law enforcement officer, who has personal knowledge of the commission of the
offense;
• The trafficked person or the offended party;
• Parents or legal guardians;
• Spouse;
• Siblings; or Children
Cases involving trafficking in persons should not be dismissed based on the affidavit of desistance executed
by the victims or their parents or legal guardians. Prosecutors are directed to oppose and manifest
objections to motions for dismissal.
Trafficking cases can be filed within 10 years after they are committed. If trafficking is committed by a syndicate
or on a large scale or against a child, cases can be filed within 20 years after the commission of the act.
The prescriptive period is counted from the day the trafficked person is delivered or released from the
conditions of bondage.
What are the penalties for violations of R.A. 9208 as amended by R.A. 10364?
Act Penalty
20 years imprisonment and a fine of P 1 Million to P 2 Million
Acts of Trafficking
Attempted Trafficking 15 years imprisonment and a fine of P 500,000 to P 1 Million
Accomplice Liability 15 years imprisonment and a fine of P 500,000 to P 1 Million
15 years imprisonment and a fine of P 500,000 to P 1 Million
Accessories
Acts that Promote Trafficking 15 years imprisonment and a fine of P 500,000 to P 1 Million
Qualified Trafficking Life imprisonment and a fine of P 2 Million to P 5 Million
Violation of Confidentiality Six (6) years imprisonment and a fine of P 500,000 to P 1 Million
Use of Trafficked Person Imprisonment of Prision Correccional or 6 months and 1 day to 6 years
and P50,000 to P100,000 fine
Programs Offered:
Implementing
Programs Agencies
Prosecution of trafficking cases DOJ, POEA, LGUs
Reintegration and rehabilitation programs resulting in gender responsive and DSWD, OWWA, CHED,
anti-trafficking oriented activities DepED, TESDA
Complaints, investigation and apprehension system PNP, NBI, BI, CHR
Effects the cancellation of licenses of establishments which violate the LGUs, POEA
provisions of RA 9208 / 10364
Repatriation of trafficked persons regardless of whether they are DFA, DOLE
documented or undocumented
Counseling and temporary shelter DSWD, OWWA
Medical and psycho-social services DOH, DSWD
Monitoring and documentation of trafficking cases DOJ, DOLE, OWWA,
LGUs, CFO
Training of special prosecutors who are handling and prosecuting trafficking DOJ
cases
Bilateral, regional, international initiatives and arrangements against DFA, PCW, CFO, CHR, BI
trafficking
Prevention and detection of trafficking with transnational crime dimensions PCTC, NBI, DFA
and coordination with international law enforcement agencies
Efficient implementation of passporting system to protect the integrity of DFA
Philippine passports
Strict administration and enforcement of immigration and alien BI, DOJ
administration laws
The act of disguising the source or true nature of money obtained through illegal means.
(Content Team, 2015, MONEY LAUNDERING retrieved on https://legaldictionary.net/money-laundering/)
Money laundering is the process of disguising the proceeds of crime and integrating it into the
legitimate financial system.
(Global Financial Integrity retrieved on https://gfintegrity.org/issue/money-laundering/)
Placement Stage
Layering Stage
Integration Stage
A. Placement
- It represents the initial entry of the "dirty" cash or proceeds of crime introduce into the financial
system.
- The physical disposal of bulk cash proceeds derived illegal activity.
- This is the movement of cash from its source.
- Generally, this stage serves two purposes:
(a) it relieves the criminal of holding and guarding large amounts of bulky of cash; and (b) it
places the money into the legitimate financial system.
- It is during the placement stage that money launderers are the most vulnerable to being caught.
This is due to the fact that placing large amounts of money (cash) into the legitimate financial
system may raise suspicions of officials.
- This is followed by placing it into circulation through financial institutions, casinos, shops, bureau
de change and other businesses, both local and abroad. The process of placement can be
carried out through many processes including:
1. Currency Smuggling – This is the physical illegal movement of currency and monetary
instruments out of a country.
2. Bank Complicity – This is when a financial institution, such as banks, is owned or controlled by
unscrupulous individuals suspected of conniving with drug dealers and other organized crime
groups. This makes the process easy for launderers. The complete liberalization of the financial
sector without adequate checks also provides leeway for laundering.
3. Currency Exchanges – In a number of transitional economies the liberalization of foreign
exchange markets provides room for currency movements and as such laundering schemes
can benefit from such policies.
4. Securities Brokers – Brokers can facilitate the process of money laundering through structuring
large deposits of cash in a way that disguises the original source of the funds.
5. Blending of Funds – The best place to hide cash is with a lot of other cash. Therefore, financial
institutions may be vehicles for laundering. The alternative is to use the money from illicit
activities to set up front companies. This enables the funds from illicit activities to be obscured in
legal transactions.
6. Asset Purchase – The purchase of assets with cash is a classic money laundering method. The
major purpose is to change the form of the proceeds from conspicuous bulk cash to some
equally valuable but less conspicuous form.
Remove the cash from the location of acquisition so as to avoid detection from the
authorities.
Smurfs - A popular method used to launder cash in the placement stage. This technique involves the
use of many individuals (the"smurfs") who exchange illicit funds (in smaller, less conspicuous amounts)
for highly liquid items such as traveller cheques, bank drafts, or deposited directly into savings
accounts. These instruments are then given to the launderer who then begins the layering stage.
B.Layering
- Involves the frequent series of money transfers and transactions used to “cover the tracks” of the
illegal funds.
- Illegal money hides from its origin
- “Heavy soaping”
- The use of the electronic methods is the most cost effective layering (cover)
- The substantive stage of the process in which the property is ‘washed’ and its ownership and
source is disguised.
The purpose of this stage is to make it more difficult to detect and uncover a laundering activity. It is
meant to make the trailing of illegal proceeds difficult for the law enforcement agencies. The known
methods are:
1. Cash converted into Monetary Instruments – Once the placement is successful within the
financial system by way of a bank or financial institution, the proceeds can then be converted
into monetary instruments. This involves the use of banker’s drafts and money orders.
(Purchasing)
2. Material assets bought with cash then sold – Assets that are bought through illicit funds can be
resold locally or abroad and in such a case the assets become more difficult to trace and thus
seize.
*Putting funds through series of financial operation to mislead potential investigators and to give the
funds the appearance of having legal origins
*It involves the frequent series of money transfer transactions used to cover the tracks of illegal funds
C.Integration
- When the money is returned to the regular economy through purchase of investment.
- The launderer then makes the proceeds available to the criminals in an apparently legitimate
form.
- “spin dry”
- This is the movement of previously laundered money into the economy mainly through the
banking system and thus such money’s appear to be normal business earnings.
- The known methods used are:
1. Property Dealing – The sale of property to integrate laundered money back into the economy is
a common practice amongst criminals. For instance, many criminal groups use shell companies
to buy property; hence proceeds from the sale would be considered legitimate.
2. Front Companies and False Loans – Front companies that are incorporated in countries with
corporate secrecy laws, in which criminals lend themselves their own laundered proceeds in an
apparently legitimate transaction.
3. Foreign Bank Complicity – Money laundering using known foreign banks represents a higher
order of sophistication and presents a very difficult target for law enforcement. The willing
assistance of the foreign banks is frequently protected against law enforcement scrutiny. This is
not only through criminals, but also by banking laws and regulations of other sovereign
countries.
4. False Import/Export Invoices – The use of false invoices by import/export companies has
proven to be a very effective way of integrating illicit proceeds back into the economy. This
involves the overvaluation of entry documents to justify the funds later deposited in domestic
banks and/or the value of funds received from exports.
RA 9194 –
“AN ACT AMENDING REPUBLIC ACT NO. 9160, OTHERWISE KNOWN AS THE “ANTI-MONEY
LAUNDERING ACT OF 2001”
Approved: Mar 07 2003
(SGD.) GLORIA MACAPAGAL-ARROYO
RA 10167
“AN ACT TO FURTHER STRENGTHEN THE ANTI-MONEY LAUNDERING LAW, AMENDING FOR
THE PURPOSE SECTIONS 10 AND 11 OF REPUBLIC ACT NO. 9160, OTHERWISE KNOWN AS
THE “ANTI-MONEY LAUNDERING ACT OF 2001”, AS AMENDED, AND FOR OTHER PURPOSES”
Approved:
(Sgd.) BENIGNO S. AQUINO III
RA 10927
(Sgd.) RODRIGO ROA DUTERTE
Approved: November 4th, 2017.
“A Philippine gambling law that plugs holes left by previous legislation and enforces heavy regulations
on all gambling operators”.
Organization:
The AMLC is composed of:
1. Chairman - Governor of the Bangko Sentral ng Pilipinas (BSP)
2. Members - (a) Commissioner of the Insurance Commission;
(b) Chairman of the Securities and Exchange Commission
CYBERCRIME
also known as Computer crimes and Technology or Electronic crimes
is a crime that involves a computer and a network.[1]
The computer may have been used in the commission of a crime, or it may be the target.[2]
It can be defined as: "Offences that are committed against individuals or groups of individuals with a
criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or
loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet
(networks including chat rooms, emails, notice boards and groups) and mobile phones
(Bluetooth/SMS/MMS)".[3]
Cybercrime may threaten a person or a nation's security and financial health. .[4]
“ulawful acts wherein the computer is either a tool or target or both”
(a) Access refers to the instruction, communication with, storing data in, retrieving data from, or
otherwise making use of any resources of a computer system of communication network.
(b) Alteration refers to the modification or change, in form or substance, of an existing computer data
or program.
(c) Communication refers to the transmission of information through ICT media, including voice,
video, and other forms of data.
(d) Computer refers to an electronic, magnetic, optical, electromechanical, or other data processing or
communications device, or grouping of such devices, capable of performing logical, arithmetic, routing,
or storage functions and which includes any storage facility, or equipment or communications facility or
equipment directly related to or operating in conjunction with such device. It covers any type of
computer device including devices with data processing capabilities like mobile phones, smart phones,
computer networks and other devices connected to the Internet.
(e) Computer data refers to any representation of facts, information, or concepts in a form suitable for
processing in a computer system including a program suitable for processing in a computer system
including a program suitable to cause on a computer system to perform a function and includes
electronic documents and / or electronic data messages whether stored in local computer systems or
online.
(f) Computer program refers to a set of instructions executed by the computer to achieve intended
results.
(g) Computer system refers to any device or group of interconnected or related devices, one or more
of which pursuant to a program, performs automated processing of data. It covers any type of device
with data processing capabilities including, but not limited to, computers and mobile phones. The
device consisting of hardware and software may include input, output and storage components which
may stand alone or be connected in a network or other similar devices. It also includes computer data
storage devices or media.
S.Y. 2018-2019 SUMMER PERIOD
18
(h) Without right refers to either: (i) conduct undertake without or in excess of authority; or (ii) conduct
not covered by established legal defenses, excuses, court orders, justifications, or relevant principles
under the law.
(i) Cyber refers to a computer or a computer network, the electronic medium in which online
communication takes place.
(j) Critical infrastructure refers to the computer systems, and / or networks, whether physical or
virtual, an / or the computers, computer data and / or traffic data so vital to this country that the
incapacity or destruction of or interference with such system and assets would have debilitating impact
on security, national or economic security, national public health and safety, or any combination of
those matters.
(k) Cybersecurity refers to the collection of tools, policies, risk management approaches, actions,
training, best practices, assurance and technologies that can be used to protect the cyber environment
and organization and user’s assets.
(l) Database refers to a representation of information, knowledge, facts, concepts or instructions which
are being prepared, processed, or stored or have been prepared, processed or stored in a formalized
manner and which are intended for use in a computer system.
(m) Interception refers to listening to, recording, monitoring or surveillance of the content of
communications, including procuring of the content of data, either directly, through access and use of a
computer system or indirectly, through the use of electronic eavesdropping or tapping devices, at the
same time that the communication is occurring.
(1) Any public or private entity that provides to users of its service the ability to communicate by means
of a computer system, and
(2) Any other entity that processes or stores computer data on behalf of such communication service or
users of such service.
(o) Subscriber’s information refers to any information contained in the form of computer data or any
other form that is held by a service provider, relating to subscribers of its services other than traffic or
content data and by which identity can be established:
(1) The type of communication service used, the technical provisions taken thereto and the period of
service;
(2) The subscriber’s identity, postal or geographic address, telephone and other access numbers, any
assigned network address, billing, and payment information, available on the basis of the service
agreement or arrangement, and
(3) Any other available information on the site of the installation of communication equipment, available
on the basis of the service agreement or arrangement.
(p) Traffic data or non-content data refers to any computer data other than the content of the
communication including, but not limited to, the communication’s origin, destination, route, time, data,
size, duration, or type of underlying service.
PUNISHABLE ACTS
Section 4 Cybercrime Offenses. – The following acts constitute the offense of cybercrime punishable
under this Act:
(1) Illegal access – The access to the whole or any part of a computer system without right.
(2) Illegal interception – The interception made by technical means without right of any non-public
transmission of computer data to, from, or within a computer system including electromagnetic
emissions from a computer system carrying such computer data.
(3) Data Interference – The intentional or reckless alteration, damaging, deletion or deterioration of
computer data, electronic document, or electronic data message, without right, including the
introduction or transmission of viruses.
(4) System Interference – The intentional alteration or reckless hindering or interference with the
functioning of a computer or computer network by inputting, transmitting, damaging, deleting,
deteriorating, altering or suppressing computer data or program, electronic document, or electronic data
messages, without right or authority, including the introduction or transmission of viruses.
(i) The use, production, sale, procurement, importation, distribution, or otherwise making available,
without right, of:
(aa) a device, including a computer program, designed or adapted primarily for the purpose of
committing any of the offenses under this Act; or
(bb) A computer password, access code, or similar data by which the whole or any part of a computer
system is capable of being accessed with intent that it be used for the purpose of committing any of the
offenses under this Act.
(ii) The possession of an item referred to in paragraphs 5(i)(aa) or (bb) above with the intent to use said
devices for the purpose of committing any of the offenses under this section.
(6) Cyber-squatting. The acquisition of domain name over the Internet in bad faith to profit, mislead,
destroy reputation, and deprive others from the registering the same, if such a domain name is:
(i) Similar, identical, or confusingly similar to an existing trademark registered with the appropriate
government agency at the time of the domain name registration;
(ii) Identical or in any way similar with the name of a person other than the registrant, in case of a
personal name, and
(i) The input, alteration, or deletion of computer data without right resulting in inauthentic data with the
intent that it be considered or acted upon for legal purposes as if it were authentic, regardless whether
or not the data is directly readable and intelligible; or
(ii) The act of knowingly using computer data which is the product of computer-related forgery as
defined here, for the purpose of perpetuating a fraudulent or dishonest design.
(2) Computer-related Fraud. The unauthorized input, alteration, or deletion of computer data or
program or interference in the functioning of a computer system, causing damage thereby with
fraudulent intent; Provided, That if no damage has yet been caused, the penalty imposed shall be one
(1) degree lower.
(3) Computer-related Identity Theft. The intentional acquisition, use, misuse, transfer, possession,
alteration or deletion of identifying information belonging to another, whether natural or juridical, without
right. Provided, That if no damage has yet been caused, the penalty imposed shall be one (1) degree
lower.
(1) Cybersex – The willful engagement, maintenance, control, or operation, directly or indirectly, of any
lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or
consideration.
(2) Child Pornography – The unlawful or prohibited acts defined and punishable by Republic Act No.
9775 or the Anti-Child Pornography Act of 2009, committed through a computer system. Provided, That
the penalty to be imposed shall be one (1) degree higher than that provided for in Republic Act No.
9775.
(ii) The primary intent of the communication is for service and / or administrative announcements from
the sender to its existing users, subscribers or customers; or
(aa) The commercial electronic communication contains a simple, valid, and reliable way for the
recipient to reject receipt of further commercial electronic messages (opt-out) from the same source;
(bb) The commercial electronic communication does not purposely disguise the source of the electronic
message; and
(cc) The commercial electronic communication does not purposely include misleading information in
any part of the message in order to induce the recipients to read the message.
(4) Libel. – The unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code,
as amended committed through a computer system or any other similar means which may be devised
in the future.
Section 5. Other Offenses – The following acts shall also constitute an offense:
(a) Aiding or Abetting in the Commission of Cybercrime – Any person who willfully abets or aids in
the commission of any of the offenses enumerated in this Act shall be held liable.
(b) Attempt in the Commission of Cybercrime – Any person who willfully attempts to commit any of
the offenses enumerated in this Act shall be held liable.
Penalties
Jurisdiction:
The Regional Trial Court shall have jurisdiction over any violation of the provisions of this Act including
any violation committed by a Filipino national regardless of the place of commission. Jurisdiction shall
lie if any of the elements was committed within the Philippines or committed with the use of any
computer system wholly or partly situation in the country, or when by such commission any damage is
caused to a natural or juridical person who, at the time the offense was committed, was in the
Philippines.
There shall be designated special cybercrime courts manned by specially trained judges to handle
cybercrime cases.
Competent Authorities
Department of Justice (DOJ). There is hereby created an Office of Cybercrime within the DOJ
designated as the central authority in all matters relating to international mutual assistance and
extradition.
Cybercrime Investigation and Coordinating Center (CICC). An inter-agency body under the
administrative supervision of the Office of the President, for policy coordination among concerned
agencies and for the formulation and enforcement of the national cybersecurity plan.
CICC Composition:
*The CICC shall be manned by a secretariat of selected existing personnel and representatives from
the different participating agencies.
Mode/Manner Definition
1. Hacking The unauthorized access to computer system or network
Illegal intrusion into computer system without the permission of
the computer owner/user
2. Software Piracy Theft of information contained in electronic form.
Information stored in computer hard disks, removable storage
media, theft of software through illegal copying of genuine
S.Y. 2018-2019 SUMMER PERIOD
23
INTERPOL
- Facilitates cross-border police cooperation and supports and assists organization , authorities
and services whose mission is to prevent or combat international crime.
- it is not a police force rather it’s a the machinery for international police cooperation and
communication
Some of the important provisions of the Interpol constitution provide for the following:
a. To ensure and promote the widest possible mutual assistance between all criminal police
authorities, within the limits of the laws existing in the different countries and in the spirit of the
Universal Declaration of Human Rights; and
b. To establish and develop all institutions likely to contribute effectively to the prevention and
suppression of ordinary law crimes.
c. “It is strictly forbidden for the Organization to undertake any intervention or activities of a
political, military, religious or racial character”.
2. Official Abbreviation?
-ICPO “International Criminal Police Organization”
In French – OIPC “Organization Internationale De Police Criminelle”
THE EMBLEM
Used in 1950
Symbolism
6 Elements Meaning
GLOBE WORLDWIDE ACTIVITIES
OLIVE BRANCHES SYMBOLIZE PEACE;
"INTERPOL" BELOW THE GLOBE IN THE CENTER OF THE OLIVE
BRANCHES
A VERTICAL SWORD BEHIND SYMBOLIZING POLICE ACTION.
THE GLOBE
THE ABBREVIATIONS "OIPC" ABOVE THE GLOBE EITHER SIDE OF THE SWORD
AND "ICPO"
THE SCALES BELOW THE SYMBOLIZE JUSTICE.
OLIVE BRANCHES
The Flag
Used in 1950
Parts
• It has a light-blue background
• The emblem is in the center
• The four lightning flashes arranged
symmetrically around the emblem symbolize
telecommunications and speed in police
action.
HISTORY OF INTERPOL
YEAR EVENT
First International Criminal Police Congress held in Monaco. Police officers, lawyers and
1914 magistrates from 24 countries meet to discuss arrest procedures, identification
techniques, centralized international criminal records and extradition proceedings.
Creation of the International Criminal Police Commission (ICPC) with headquarters in
1923 Vienna, Austria, on the initiative of Dr Johannes Schober, president of the Vienna Police.
Wanted persons notices first published in INTERPOL’s International Public Safety
Journal.
The General Assembly, held in Berlin, proposes that each country establish a central
1926 point of contact within its police structure: the forerunner of the National Central Bureau
(NCB).
1927 Resolution to establish NCBs adopted.
1930 Specialized departments established to deal with currency counterfeiting, criminal
records and passport forgery.
1932 Following the death of Dr Schober, new statutes put in place creating the post of
Secretary General. The first was Austrian Police Commissioner Oskar Dressler.
1992 An automated search facility for remote searches of INTERPOL databases introduced.
1995 As part of a programme of regionalization the General Assembly adopts guidelines for
the establishment and operation of Regional Bureaus.
2003 Official inauguration of the Command and Coordination Centre at the General
Secretariat, enabling the organization to operate 24 hours a day, seven days a week.
2004 INTERPOL liaison office inaugurated at the United Nations in New York and first Special
Representative appointed.
2005 First INTERPOL-United Nations Special Notices issued for individuals subject to UN
sanctions against Al Qaeda and the Taliban.
Technology known as MIND/FIND allows frontline officers to connect directly to
INTERPOL's systems.
2009 Official opening of the Office of the Special Representative to the European Union in
Brussels.
2015 Official inauguration of the INTERPOL Global Complex for Innovation in Singapore. It
works to combat cybercrime and help police around the world address emerging threats
through innovation and training.
1. STRATEGY
A. GENERAL ASSEMBLY
B. EXECUTIVE COMMITTEE
Meets three times a year and sets organizational policy and direction.
2. IMPLEMENTATION
A. GENERAL SECRETARIAT
Located in Lyon, France
Operates 24 hours a day, 365 days a year.
• Run by SECRETARY GENERAL
• Officials from more than 80 countries works side any side in any of the organization’s four
official language; SPANISH, ARABIC, FRENCH & ENGLISH (SAFE)
a. Collects documents and criminal intelligence, which have a direct bearing on international police
co-operation from sources in that own countries, and pass this material on to the other NCBs
and the General Secretariat.
b. Ensures that police action or operations requested by another country’s NCBs are carried out
on their territory;
c. Receives requests for information, checks, etc. from another NCBs and reply to such request.
d. Transmits request for international co-operation made by their own courts or police departments
to the NCBs of other countries; and
e. The Heads of the NCBs attend Interpol General Assembly sessions as members of their
countries delegations, and subsequently ensure that the Assembly’s resolution are
implemented.
The NCBs communicate directly among themselves. However, they keep the General Secretariat
informed of their investigations so that the latter can perform its task of centralizing information and
coordinating cooperation.
3. OVERSIGHT
A. Advisers
- these are the experts in a purely advisory capacity, who may be appointed by the Executive Committee and
confirmed by the General Assembly.
- It ensures that the processing of personal data – such as names and fingerprints – is in line with
INTERPOL's rules, in order to protect both the fundamental rights of individuals and the cooperation among
police internationally.
Interpol expertise
1. TECHNICAL TOOLS (Secure global police communication services)
All INTERPOL member countries are connected through a secure communications system known as
I-24/7.
I – stands for INTERPOL
24 – 24 hours a day
7 – 7 days a week
- a secure global police network or global police communications system to connect law
enforcement officers in all our member countries
- is the foundation of information exchange between the world's police
- installed at all National Central Bureaus
- This gives police real-time access to criminal databases containing millions of records
- A unique system of Notices is used to alert member countries to fugitives, dangerous criminals,
missing persons or weapons threats
- It enables authorized users to share sensitive and urgent police information with their
counterparts around the globe, 24 hours a day, 365 days a year
- It enables investigators to access INTERPOL's range of criminal databases. Authorized users
can search and cross-check data in a matter of seconds, with direct access to databases on
suspected criminals or wanted persons, stolen and lost travel documents, stolen motor vehicles,
fingerprints, DNA profiles, stolen administrative documents and stolen works of art
I-Link
- a unique and dynamic operational system that centralizes and continually enhances database
features.
- It helps make connections between seemingly unrelated investigation, by identifying common
threads.
INTERPOL Notices
- International requests for cooperation or alerts allowing police in member countries to share
critical crime-related information.
- It is published by INTERPOL’s General Secretariat at the request of National Central
Bureaus(NCBs) and authorized entities
- published in any of the Organization’s official languages:
(SAFE : Spanish, Arabic, French & English)
DIFFUSION
- Another request for cooperation or alert mechanism similar to notice
- Less formal than a notice but is also used to request :
a. the arrest or location of an individual
b. additional information in relation to a police investigation
- Circulated directly by an NCB to the member countries of their choice, or to the entire
INTERPOL membership and is simultaneously recorded in INTERPOL’s Information System.
The exchange of police information lies at the core of INTERPOL’s mandate. We manage secure
communication channels that connect National Central Bureaus in all our member countries, along with
other authorized law enforcement agencies and partners, and which give access to a range of criminal
databases
.
We are working to reinforce this technical infrastructure, expand access to our services and enable
interoperability with other relevant information systems. We also support member countries in
improving the quality of data exchanged and producing analysis, in order to enable the law enforcement
community to make well-informed tactical, operational or strategic decisions.
2: Deliver state-of-the-art policing capabilities that support member countries to fight and
prevent transnational crimes
A large number of policing capabilities – such as forensics and training – underpin our three Global
Programmes to fight crime (Counter-terrorism, Cybercrime, and Organized and emerging crime). We
seek to serve as the catalyst for efforts in global, regional and national law enforcement.
In particular, we will work directly with National Central Bureaus and specialized agencies, but also
through multidisciplinary groups, to become a recognized hub for providing expertise, facilitating the
exchange of best practices, and hosting training facilities. Ultimately, these capabilities will combine to
deliver the best operational outcome.
We will seek to federate the international community around common goals on security, and to
strengthen the regional and ground-level delivery of programmes and capabilities to meet those goals.
This could also require strengthening the legal foundations of the Organization for more effective
service delivery.
Crime Areas:
1. Corruption 11. Pharmaceutical Crime
2. Crimes against children 12. Terrorism
3. Cyber Crime 13. Trafficking in Human Beings
4. Drugs 14. Trafficking in illicit goods
5. Environmental crime 15. Vehicle Crime
6. Financial crime
7. Firearms
8. Fugitive Investigation
9. Maritime piracy
10. Organized crimes
Philippines
- The NCB-Interpol Manila traces its beginnings in 1961 when the Philippines became a member of the
ICPO – INTERPOL, with the National Bureau of Investigation (NBI) as its focal point. Since then, the
NCB-Interpol Manila has undergone changes, which enable it to confront the challenges of the times.
- In one of the General Assembly meetings of the ICPO-INTERPOL, its has been decided and adopted
that the National Central Bureau shall be handled by the controlling body or Headquarters of the
Criminal Police Organization of a member State to be able to do its undertakings with authority.
- In compliance thereto the President of the Philippines issued Memorandum Order Nr. 92 on
February 15, 1993 designating the Philippine National Police as the INTERPOL National Central
Bureau for the Philippines, with the Chief, Philippine National Police (PNP) as its concurrent
Chairman.
The Interpol National Central Bureau was originally composed of the following members:
Director General Philippine National Police ——- Chairman
Director, National Bureau of Investigation ——– Member
Commissioner, Bureau of Customs ———Member
Commissioner, Bureau of Internal Revenue ———Member
Commissioner, Bureau of Immigration ———Member
Governor, Bangko Sentral ng Pilipinas ———Member
Executive Director, Dangerous Drug Board ———Member
Commissioner, Economic Intelligence and Investigation Bureau (EIIB) ———Member
NCB-Manila
- is an inter-ministerial entity which is not part of the Philippine National Police but instead is
directly attached to the Office of the President. As such it benefits from direct access to the
services of all law enforcement agencies in the Philippines.
- The NCB is referred to as “NALECC-SCILEC” (National Law Enforcement Coordinating
Committee - Sub Committee on International Law Enforcement Cooperation)
NCB-INTERPOL Manila serves as the office and main coordinating body for international police cooperation
against transnational crimes representing all law enforcement agencies in the Philippines. In the
accomplishment of its mission, NCB-INTERPOL Manila has the following functions.
1. Monitor and coordinate all activities of all law enforcement agencies relative to transnational crime
committed against or affecting the Philippines;
2. Maintain records and minutes of all meetings of NCB-INTERPOL Manila.
3. Operate and maintain the operation center of NCB-INTERPOL Manila as the focal point for
international cooperation against transnational crimes for all law enforcement agencies in the
Philippines; and
4. The NCB-INTERPOL Manila also functions as a sub-committee of the NALECC for the monitoring of the
sensitive activities of the latter.
1. Receives request for information and record checks of local and foreign nationals and reply to such
request.
2. Conduct investigation of cases brought to their attention involving Filipino’s and foreign nationals as
requested by other Interpol member countries.
3. Monitor result of investigation for cases referred by Interpol for compliance and feedback.
4. Ensures that cases referred for action are acted upon and reports are rendered promptly.
5. Informs Interpol Manila on any case being handled by their agency involving foreign nationals or
seek assistance for verification or any coordination needed with other Interpol member countries
based on the Standard Message Format.
6. Maintain a list of wanted persons (local/foreign) circulated by Interpol and inform Interpol Manila of
any arrest.
7. Gives summaries of the most important international cases in which their agency was involved; and
8. Submits periodic activity report of accomplishments to Interpol Manila based on the Standard
Message Format.
ASEANAPOL
VISION
S.Y. 2018-2019 SUMMER PERIOD
36
MISSION
" PREVENTING AND COMABTING TRANSNATIONAL CRIME THROUGH A GREATER NEXUS AND
CREATIVE POLICING COLLABORATION "
To mutually contribute and synergize policing resources and expertise to effectively thwart organised
and emerging international criminal enterprises for a safer ASEAN Community.
ASEANAPOL CONFERENCE
The Conference shall be held annually on a rotational basis amongst member countries. The
Conference will be attended by the Chiefs of Police.
- The Executive Committee shall comprise of Deputy Heads of delegation attending the annual
Conference.
- The Executive Committee shall meet annually, immediately before the Conference.
- The Executive Director of the ASEANAPOL Secretariat shall present a report of its activities, including
amongst others, issues on financial performance, procurement of works, supplies and services and
control and management of contracts, to the Executive Committee.
-The Executive Committee shall provide a summary report of the activities of the Secretariat to the
Heads of Delegation at the Conference and at the Closing Plenary Session of the Conference.
EXECUTIVE DIRECTOR
The Executive Director of the Secretariat shall be appointed by the ASEANAPOL Conference upon
nomination on a rotational basis in alphabetical order for a term of two years. The Executive Director of
the Secretariat shall be a Senior Police Officer of the rank of Colonel and above or its equivalent. The
Executive Director will be assisted by Director for Police Services and Director for Plans and
Programmes shall be a Senior Police Officer of the rank of Major and above or its equivalent.
OBJECTIVE OF ASEANAPOL
Enhance police professionalism
Forge stronger regional cooperation in policing
Promote lasting friendship amongst police officers of member countries
OBJECTIVES
FUNCTIONS
Prepare and implement work plans for effective implementation of all the resolutions adopted in
the annual Joint Communiqués signed at the ASEANAPOL Conferences;
Facilitate and coordinate cross-border cooperation on intelligence and information sharing and
exchange;
Facilitate and coordinate joint operations and activities involving criminal investigations, the
building and maintenance of the ASEANAPOL database, training, capacity building, the
development of scientific investigative tools, technical support and forensic science;
Provide support and necessary assistance in organising the ASEANAPOL Conferences;
Submit on a quarterly basis to the Chiefs of ASEAN Police Forces proposals on all planned
programmed and activities to be carried out;
Prepare an annual report on its activities and expenditure to be presented to the ASEANAPOL
Executive Committee immediately before the ASEANAPOL Conference, and distributed to all
members and to the ASEANAPOL Conference; and;
Act as a custodian of all documents and records of ASEANAPOL
PREFACE
The first formal meeting of the Chiefs of ASEAN Police was held in Manila, Philippines on the 21 to 23
October 1981.
ASEANAPOL Flag
Symbolism
1.1. The ASEANAPOL Flag is a symbol of the organization of the ASEAN Chiefs of National Police (ASEANAPOL) on the
regional cooperation in the prevention and combating transnational crime.
1.2. The ASEANAPOL Flag represents a firmed, determined, honest and protected ASEAN National Police organization
denoted by the colors of the flag which are (black, white, blue, yellow and brown)
1.3. The spray of rice and cotton represent prosperity, friendship and solidarity of the ASEAN National Police.
1.5. The three steps on the top of pillars symbolises the police motto on the fight against crime, love of humanity and helping
of delinquents while the ten steps at the bottom of pillar represent the ten ASEAN countries.
One of the important objectives of the Secretariat is to serve as a communication mechanism to allow Member
Countries to establish and to maintain all channels of interaction amongst Member Countries and Dialogue Partners. It also
includes the effective implementation of the adopted resolutions of the Conference and any issues at hand regarding
ASEANAPOL. In this regard, it is deemed necessary for the appointment of Contact Persons from the respective Member
Countries and Dialogue Partners as critical focal points amongst ASEANAPOL Member Countries, Dialogue Partners and the
Secretariat.
2. REFERENCE
A person given the authority by the respective Chief of Police of Member Countries or Head of the
respective ministry or other relevant agencies/ organisations concerned for Dialogue Partners to provide information
and to act as an intermediary between ASEANAPOL Member Countries/Dialogue Partners and ASEANAPOL Secretariat.
4.1 A senior police officer/ civilian staff working for the respective Police Forces for Member Countries or asenior police officer/
civilian staff working with the relevant ministries/organisations/ agencies of the Dialogue Partners.
4.2 Preferably is a senior police officer not below the rank of Lt. Colonel (or equivalent) or a senior civilian staff with leadership
and managerial experience.
4.3 Good communication in English, both written and oral, as the official language for ASEANAPOL is English as well as
knowledgeable in Information Technology.
5.1 Shall be appointed in writing by the respective Chiefs of Police for Member Countries or Head of the respective ministries
or other relevant agencies/organisations concerned for Dialogue Partners.
5.2 The tenure of these Contact Persons shall be the prerogative of the respective Chiefs of ASEAN Police, Heads of
ministries/ organisations/ agencies.
6.1 Shall be the link of information between his/her respective country with other ASEANAPOL Member Countries/Dialogue
Partners through all means of communication including email, telephone or facsimile for any issue which needs timely
approval by all Chiefs of ASEAN Police by way of circulation.
6.2. Shall acknowledge all correspondences from ASEANAPOL Secretariat and act on it promptly.
6.3 Shall be the link with the person in charge of each mandated areas of crimes subjects/issues discussed at the
ASEANAPOL Conference i.e. Illicit Drugs Trafficking, Terrorism, Arms Smuggling, Human Trafficking, Maritime Fraud, Wildlife
Crime, Commercial Crime, Bank Offences and Credit Card Fraud,Cyber Crime, Fraudulent Travel Documents, Transnational
Fraud, Progress on Electronic ASEANAPOL Database System (e-ADS), Mutual Assistance in Criminal Matters, and Exchange
of Personnel and Training Programmes amongst ASEAN Police Forces and any other matters stipulated in the Joint
Communique.
6.4 Shall be the person representing the respective Member Countries/ Dialogue Partners at the annual ASEANAPOL Contact
Persons Meeting (ACPM).
6.5 Shall report on the progress of implementation of all adopted resolutions promulgated and issued during previous
ASEANAPOL Conferences and shall send updated reports to ASEANAPOL Secretariat, two months prior to the annual
ASEANAPOL Conference.
6.6 To be at liberty to cooperate, exchange ideas/opinions with other Member Countries/ Dialogue Partners and ASEANAPOL
Secretariat and to a certain extent be able to obtain and convey decisions on behalf of the respective Member Countries/
Dialogue Partners.
Europol
- is a high-security operational centre that operates non-stop: 24 hours a day, seven days a week and was
fully operational on July 1, 1999
- Europol officers are always ready to travel at short notice and provide support through mobile office.
- Its presence was also in demand in the fight against illicit drugs, and fully operational team to help
dismantle synthetic drugs laboratories on the spot.
- focuses on different areas of criminal and terrorist activity from one year to the next, depending on
requirements.
- Europol is the central European office for combatting euro counterfeiting
- Headquartered in The Hague, the Netherlands
- -Supports the 28 EU Member States in their fight against terrorism, cybercrime and other serious and
organized forms of crime and also work with many non-EU partner states and international
organizations.
Large-scale criminal and terrorist networks pose a significant threat to the internal security of the EU and to the
safety and livelihood of its people.
UNIQUE SERVICES
Our position at the heart of the European security architecture allows us to offer a unique range of services and
to serve as a:
support centre for law enforcement operations;
hub for information on criminal activities;
centre for law enforcement expertise.
EUROPOL IN NUMBERS
More than 1000 staff
220 Europol Liaison Officers
Around 100 crime analysts
Supporting over 40 000 international investigations each year
1. EU Serious and Organised Crime Threat Assessment (SOCTA), which updates Europe’s law enforcement
community and decision-makers on developments in serious and organised crime and the threats it
poses;
2. EU Terrorism Situation and Trend Report (TE-SAT), which gives a detailed account of the state of
terrorism in the EU;
3. Internet Organised Crime Threat Assessment (iOCTA), which reports on key findings and emerging
threats and developments in cybercrime;
4. Europol Review, an annual publication that details the progress that the we and our partners has made
in fighting crime.
Through these reports and in other ways, Europol serves as an EU centre of expertise, providing a
central platform for law enforcement experts from the Member States.
International crime and terrorist groups operate worldwide and make use of the latest technology. To
ensure an effective and coordinated response, Europol needs to be equally flexible and innovative, and
to make sure its methods and tools are up to date.
Europol's specialised systems, which offer fast and secure capabilities for storing, searching,
visualising and linking information, thus comprise a sophisticated crime-fighting toolbox, which include:
MANDATE
Europol supports law enforcement authorities throughout the EU on crime fighting activities in all its
mandated areas.
Operational activities
These activities focus on:
illicit drugs
trafficking in human beings
facilitated illegal immigration
cybercrime
intellectual property crime
cigarette smuggling
euro counterfeiting
VAT fraud
money laundering and asset tracing
mobile organized-crime groups
outlawing motorcycle gangs
terrorism
Organizational Structure
Europol is headed by an Executive Director, who is Europol’s legal representative and is appointed by
the Council of the European Union.
Mission
The International Association of Chiefs of Police is dedicated to advancing the policing
profession through advocacy, research, outreach, and education in order to provide for safer
communities worldwide
Vision
Shaping the future of the policing profession
as the world’s largest and most influential professional association for police leaders
The world's oldest and largest nonprofit membership organization of police executives, with over
20,000 members in over 89 different countries. IACP's leadership consists of the operating chief
executives of international, federal, state and local agencies of all sizes.
is committed to advancing the safety of communities worldwide
With more than 30,000 members in 150 countries
Recognized leader in global policing, committed to advancing safer communities through
thoughtful, progressive police leadership
Since 1893, the association has been serving communities worldwide by speaking out on behalf
of law enforcement and advancing leadership and professionalism in policing worldwide.
Known for its commitment to enhancing community safety by shaping the future of the police
profession
Preparing current and emerging police leaders—and the agencies and communities they
serve—to succeed in addressing the most pressing issues, threats, and challenges of the day.
is a not-for-profit organization headquartered in Alexandria, Virginia.
It is the publisher of The Police Chief magazine
IACP membership is open to law enforcement professionals of all ranks, as well as non-sworn
leaders across the criminal justice system.
UNITED NATION
- The name "United Nations", coined by United States President Franklin D. Roosevelt was first
used in the Declaration by United Nations of 1 January 1942, during Second World War.
- It is an international organization founded in 1945
- Currently made up of 193 Member States.The mission and work of the United Nations are
guided by the purposes and principles contained in its founding Charter.
- An international organization whose stated aims are facilitating cooperation in international law,
international security, economic development, Social progress, Human rights and achievement of world
peace.
- The UN provides a forum for its members to express their views in the General Assembly, the Security
Council, the Economic and Social Council, and other bodies and committees. By enabling dialogue
between its members, and by hosting negotiations, the Organization has become a mechanism for
governments to find areas of agreement and solve problems together.
UN Main Organs
1. General Assembly
The General Assembly is the main deliberative, policymaking and representative organ of the UN. All 193
Member States of the UN are represented in the General Assembly, making it the only UN body with universal
representation. Each year, in September, the full UN membership meets in the General Assembly Hall in New
York for the annual General Assembly session, and general debate, which many heads of state attend and
address. Decisions on important questions, such as those on peace and security, admission of new members and
budgetary matters, require a two-thirds majority of the General Assembly. Decisions on other questions are by
simple majority. The General Assembly, each year, elects a GA President to serve a one-year term of office.
Security Council
The Security Council has primary responsibility, under the UN Charter, for the maintenance of international peace
and security. It has 15 Members (5 permanent and 10 non-permanent members). Each Member has one vote.
Under the Charter, all Member States are obligated to comply with Council decisions. The Security Council takes
the lead in determining the existence of a threat to the peace or act of aggression. It calls upon the parties to a
dispute to settle it by peaceful means and recommends methods of adjustment or terms of settlement. In some
cases, the Security Council can resort to imposing sanctions or even authorize the use of force to maintain or
restore international peace and security. The Security Council has a Presidency, which rotates, and changes,
every month.
Trusteeship Council
The Trusteeship Council was established in 1945 by the UN Charter, under Chapter XIII, to provide international
supervision for 11 Trust Territories that had been placed under the administration of seven Member States, and
ensure that adequate steps were taken to prepare the Territories for self-government and independence. By
1994, all Trust Territories had attained self-government or independence. The Trusteeship Council suspended
operation on 1 November 1994. By a resolution adopted on 25 May 1994, the Council amended its rules of
procedure to drop the obligation to meet annually and agreed to meet as occasion required -- by its decision or
the decision of its President, or at the request of a majority of its members or the General Assembly or the
Security Council.
Secretariat
The Secretariat comprises the Secretary-General and tens of thousands of international UN staff members who
carry out the day-to-day work of the UN as mandated by the General Assembly and the Organization's other
principal organs. The Secretary-General is chief administrative officer of the Organization, appointed by the
General Assembly on the recommendation of the Security Council for a five-year, renewable term. UN staff
members are recruited internationally and locally, and work in duty stations and on peacekeeping missions all
around the world. But serving the cause of peace in a violent world is a dangerous occupation. Since the
founding of the United Nations, hundreds of brave men and women have given their lives in its service.
What UN DO?
MAINTAIN INTERNATIONAL PEACE AND SECURITY
The United Nations came into being in 1945, following the devastation of the Second World War, with
one central mission: the maintenance of international peace and security. The UN does this by working
to prevent conflict; helping parties in conflict make peace; peacekeeping; and creating the conditions to
allow peace to hold and flourish. These activities often overlap and should reinforce one another, to be
effective. The UN Security Council has the primary responsibility for international peace and security.
S.Y. 2018-2019 SUMMER PERIOD
45
The General Assembly and the Secretary-General play major, important, and complementary roles,
along with other UN offices and bodies.
The term “human rights” was mentioned seven times in the UN's founding Charter, making the
promotion and protection of human rights a key purpose and guiding principle of the Organization. In
1948, the Universal Declaration of Human Rights brought human rights into the realm of international
law. Since then, the Organization has diligently protected human rights through legal instruments and
on-the-ground activities.
One of the purposes of the United Nations, as stated in its Charter, is "to achieve international co-
operation in solving international problems of an economic, social, cultural, or humanitarian
character." The UN first did this in the aftermath of the Second World War on the devastated continent
of Europe, which it helped to rebuild. The Organization is now relied upon by the international
community to coordinate humanitarian relief operations due to natural and man-made disasters in
areas beyond the relief capacity of national authorities alone.
The UN Charter, in its Preamble, set an objective: "to establish conditions under which justice and
respect for the obligations arising from treaties and other sources of international law can be
maintained". Ever since, the development of, and respect for international law has been a key part of
the work of the Organization. This work is carried out in many ways - by courts, tribunals, multilateral
treaties - and by the Security Council, which can approve peacekeeping missions, impose sanctions, or
authorize the use of force when there is a threat to international peace and security, if it deems this
necessary. These powers are given to it by the UN Charter, which is considered an international
treaty. As such, it is an instrument of international law, and UN Member States are bound by it. The
UN Charter codifies the major principles of international relations, from sovereign equality of States to
the prohibition of the use of force in international relations
The Design
S.Y. 2018-2019 SUMMER PERIOD
46
The original UN logo was created by a team of designers during the United Nations Conference on
International Organization in 1945. The design team was led by Oliver Lincoln Lundquist.
Approval
The UN logo was approved on 7 December 1946.
Its Use
The UN logo has been incorporated into the logos of several UN Family members. The logo is also
used on United Nations stamps.
OFFICIAL LANGUANGE
(SCAFER)
There are six official languages of the UN. These are Arabic, Chinese, English, French, Russian and
Spanish. The correct interpretation and translation of these six languages, in both spoken and written
form, is very important to the work of the Organization, because this enables clear and concise
communication on issues of global importance.
“Knowing Is Not Enough; We Must Apply. Wishing Is Not Enough; We Must Do.” –
Johann Wolfgang Von Goethe
Apply what we learn and take action toward success, rather than waiting and hoping.
GOD BLESS!!!