Sie sind auf Seite 1von 46

1

S.Y. 2018-2019 SUMMER PERIOD


2

STUDENTS NAME:

LEA2 (Models in Policing System) Hand Outs

I. COURSE DESCRIPTION:
This study covers the comparison of selected police models and their
relation with the INTERPOL and UN bodies in the campaign against transnational crimes and
the promotion of peace.

What is Comparative Police System?


 It is the science and art of investigating and comparing the police system of nations. It covers
the study of police organizations, trainings and methods of policing of various nations.
(V. Delos Santos)
 The process of outlining the similarities and dissimilarities of one police system to another in
order to discover insights in the field of international policing. (Manwong R.K, 2011)

WHY COMPARE SYSTEMS AND ISSUES IN CRIMINAL JUSTICE?


According to Harry Damner there are many reasons we need to compare but the basic reasons
are:

 To benefit from the experience of others


 To broaden our understanding of the different cultures and approaches to problems
 To help us deal with the many transnational crime problems that plague our world today.

COMPARATIVE RESEARCH METHODS

a. “SAFARI” Method (a researcher visits another country) or “collaborative method” (the


researcher communicates with a foreign researcher)
b. Published Works tend to fall into three categories:

1. Single-culture studies
– the crime problem of a single foreign country is discussed

2. Two-culture studies
-Comprehensive books (it covers three or more countries).
-The examination of crime and its control in the comparative context often requires a
historical perspective since the phenomena under the study seen as having historical
perspective since the phenomena under study are seen as having developed under unique
social, economic, and political structures.

3. Historical-comparative method
–the most often employed by researchers. It basically an alternative to both quantitative and
qualitative research methods that is sometimes called historiography or holism.

GLOBALIZATION

Globalization is a process of interaction and integration among the people, companies, and
governments of different nations, a process driven by international trade and investment and aided
by information technology. This process has effects on the environment, on culture, on political
systems, on economic development and prosperity, and on human physical well-being in societies
around the world “Globalization101” (n.d).

Globalization, or the increased interconnectedness and interdependence of peoples and countries, is


generally understood to include two inter-related elements: the opening of international borders to
increasingly fast flows of goods, services, finance, people and ideas; and the changes in institutions
and policies at national and international levels that facilitate or promote such flows (World Health
Organization)

In Law enforcement parlance, GLOBALIZATION is the process of interaction and integration


among police officers, law enforcement organization of different nations aided by information
technology purposely for combating crimes and attainment of a more peaceful and international world.

S.Y. 2018-2019 SUMMER PERIOD


3

EFFECTS OF GLOBALIZATION TO LAW ENFORCEMENT


 Facilitation of transnational crimes and criminals can be easily achieved
 There is a need for transnational policing. The cooperation among police organization in the
world is vital.
 Training instructions for incoming law enforcement officers must include advancement of
technologies to prepare them as cyber cops so they can be better prepared to deal with
cybercrimes.
 Development of new strategies to deal with international organized crime is a must.
 Provisions of law enforcement with updated legislations related to modernization theory of
crime.
(Delos Santos, V)

A. FUNDAMENTAL THEORIES OF THE POLICE SERVICE


1. Continental theory – Police officers are regarded as servant of higher authorities and the
people have little or no share in their law enforcement duties, nor any direct connection with
them. This is prevalent in continental countries like France, Italy, and Spain where
centralized government is the dominant governmental structure.
2. Home – rule theory – Police officers are regarded as servants of the community rather than
the higher authorities. The effectiveness of the police in performing their function is
dependent upon the express wishes of the people. This theory supports that policemen are
civil employees whose primary duty is to preserve the public peace and security. This is
commonly practiced in countries having decentralized governmental structure such as in
England, United State, and other democratic country like the Philippines. (Guiao, D
.,2011).

B. CONCEPTS OF POLICE SERVICE


1. Old concept (traditional) – police service is looked upon as merely repressive machinery.
This philosophy was supported by throwing more offenders and violators in the jail rather
than keeping them out of jail. This concept emphasized punishment as the sole instrument
of crime control. The yardstick or measurement of police efficiency was the more number of
arrests.
2. Modern concept – police is considered as an organ of crime prevention. The police have
broadened activities including certain aspects of social service, and its objective is the
welfare of the individual as well as that of the society. The yardstick or measurement of
police efficiency here is the absence of crime (Guiao, D .,2011).

Transnational Crimes

Transnational
(adjective) -involving or operating in several nations or nationalities
https://www.vocabulary.com/dictionary/transnational

 Transnational crimes are violations of law that involve more than one country in their planning,
execution, or impact. These offenses are distinguished from other crimes in their multinational
nature, which poses unique problems in understanding their causes, developing prevention
strategies, and in mounting effective adjudication procedures.
 Transnational crimes can be grouped into three broad categories involving provision of illicit
goods (drug trafficking, trafficking in stolen property, weapons trafficking, and counterfeiting),
illicit services (commercial sex and human trafficking), and infiltration of business and
government (fraud, racketeering, money laundering, and corruption) affecting multiple countries.
 Transnational crimes are distinct from international crime, which involves crimes against
humanity that may or may not involve multiple countries. Examples of international crimes are
genocide and terrorism, which are also included in this guide to sources.
(Albanese, J.S, 2017)
 Offences whose inception, prevention and/or direct or indirect effects involved more than one
country.’ (UN Doc. A.CONF. 169/15/Add.1 (1995)).

Crime is TRANSNATIONAL if:


a. Committed in more than in one State;
b. Substantial part of preparation, planning, direction or control takes place in another state;
c. Involves an organized criminal group engaging in criminal activities in more than one State; or
d. Has substantial effects in another State.
(United Nations, Office on Drugs and Crimes (n.d) (UNTOC Convention art.3.2)
S.Y. 2018-2019 SUMMER PERIOD
4

Transnational organized crime (TOC)


 is organized crime coordinated across national borders, involving groups or networks of
individuals working in more than one country to plan and execute illegal business ventures
(Voronin.Y.A, 2000).
 Transnational organized crime involves the planning and execution of illicit business ventures by
groups or networks of individuals working in more than one country. These criminal groups use
systematic violence and corruption to achieve their goals. Crimes commonly include money
laundering; human smuggling; cybercrime; and trafficking of humans, drugs, weapons,
endangered species, body parts, or nuclear material.• Transnational crime ring activities weaken
economies and financial systems and undermine democracy. These networks often prey on
governments that are not powerful enough to oppose them, prospering on illegal activities, such
as drug trafficking, that bring them immense profits. In carrying out illegal activities, they upset
the peace and stability of nations worldwide, often using bribery, violence, or terror to achieve
their goals (Nakapalau.J, 2013)

Covered Crimes to be discussed under Transnational Crime:


Human Trafficking
 Money Laundering
 Cybercrime

Human Trafficking
Article 3, paragraph (a) of the Protocol to Prevent, Suppress and Punish Trafficking in Persons defines:
Human Trafficking is defined in the Trafficking Protocol as "the recruitment, transport, transfer,
harbouring or receipt of a person by such means as threat or use of force or other forms of coercion,
abduction, fraud or deception for the purpose of exploitation."
The definition of trafficking consists of three core elements:
1) The action of trafficking which means the recruitment, transportation, transfer, harboring or receipt of
persons
2) The means of trafficking which includes threat of or use of force, deception, coercion, abuse of
power or position of vulnerability
3) The purpose of trafficking which is always exploitation. In the words of the Trafficking Protocol,
article 3 "exploitation shall include, at a minimum, the exploitation of the prostitution of others or other
forms of sexual exploitation, forced labor or services, slavery or practices similar to slavery, servitude or
the removal of organs.

Domestic Laws in the Philippines covering Transnational Crime:

 Republic Act No. 9208


-“Anti-Trafficking in Persons Act of 2003”
-May 26, 2003
-GLORIA MACAPAGAL-ARROYO
 REPUBLIC ACT No. 10364
-July 23, 2012
-"Expanded Anti-Trafficking in Persons Act of 2012″.
- BENIGNO S. AQUINO III

S.Y. 2018-2019 SUMMER PERIOD


5

Republic Act No. 10364


“EXPANDED ANTI-TRAFFICKING IN PERSONS ACT OF 2012”
July 23, 2012

Definition of Terms:

"(a) Trafficking in Persons – refers to the recruitment, obtaining, hiring, providing, offering,
transportation, transfer, maintaining, harboring, or receipt of persons with or without the victim’s
consent or knowledge, within or across national borders by means of threat, or use of force, or other
forms of coercion, abduction, fraud, deception, abuse of power or of position, taking advantage of
the vulnerability of the person, or, the giving or receiving of payments or benefits to achieve the
consent of a person having control over another person for the purpose of exploitation which
includes at a minimum, the exploitation or the prostitution of others or other forms of sexual
exploitation, forced labor or services, slavery, servitude or the removal or sale of organs.

"(b) Child – refers to a person below eighteen (18) years of age or one who is over eighteen (18) but
is unable to fully take care of or protect himself/herself from abuse, neglect, cruelty, exploitation, or
discrimination because of a physical or mental disability or condition.

"(c) Prostitution – refers to any act, transaction, scheme or design involving the use of a person by
another, for sexual intercourse or lascivious conduct in exchange for money, profit or any other
consideration.

"(d) Forced Labor – refers to the extraction of work or services from any person by means of
enticement, violence, intimidation or threat, use of, force or coercion, including deprivation of
freedom, abuse of authority or moral ascendancy, debt-bondage or deception including any work or
service extracted from any person under the menace of penalty.

"(e) Slavery – refers to the status or condition of a person over whom any or all of the powers
attaching to the right of ownership are exercised.

"(f) Involuntary Servitude – refers to a condition of enforced and compulsory service induced by
means of any scheme, plan or pattern, intended to cause a person to believe that if he or she did not
enter into or continue in such condition, he or she or another person would suffer serious harm or
other forms of abuse or physical restraint, or threat of abuse or harm, or coercion including depriving
access to travel documents and withholding salaries, or the abuse or threatened abuse of the legal
process.

"(g) Sex Tourism – refers to a program organized by travel and tourism-related establishments and
individuals which consists of tourism packages or activities, utilizing and offering escort and sexual
services as enticement for tourists. This includes sexual services and practices offered during rest
and recreation periods for members of the military.

"(h) Sexual Exploitation – refers to participation by a person in prostitution, pornography or the


production of pornography, in exchange for money, profit or any other consideration or where the
participation is caused or facilitated by any means of intimidation or threat, use of force, or other
forms of coercion, abduction, fraud, deception, debt bondage, abuse of power or of position or of
legal process, taking advantage of the vulnerability of the person, or giving or receiving of payments
or benefits to achieve the consent of a person having control over another person; or in sexual
intercourse or lascivious conduct caused or facilitated by any means as provided in this Act.

"(i) Debt Bondage – refers to the pledging by the debtor of his/her personal services or labor or
those of a person under his/her control as security or payment for a debt, when the length and
nature of services is not clearly defined or when the value of the services as reasonably assessed is
not applied toward the liquidation of the debt.

"(j) Pornography – refers to any representation, through publication, exhibition, cinematography,


indecent shows, information technology, or by whatever means, of a person engaged in real or
simulated explicit sexual activities or any representation of the sexual parts of a person for primarily
sexual purposes.

"(k) Council – shall mean the Inter-Agency Council Against Trafficking created under Section 20 of
this Act."

S.Y. 2018-2019 SUMMER PERIOD


6

How is Trafficking in Persons different from


Illegal Recruitment and Human Smuggling?

Trafficking in Persons Illegal Recruitment Human Smuggling

May or may not involve coercion, Usually does not involve coercion Usually does not involve coercion
fraud, but uses more deception,
deception, abuse of vulnerability, promises and fraud
etc.
Characterized by subsequent Characterized by facilitating entry Characterized by facilitating, for
exploitation after the illegal entry of of one person from one country to a fee, the illegal entry of a person
one person from another through an unauthorized into a foreign country
one place to another or one country or unlicensed agency
to another
There is a need to prove the presence Mere recruitment without license Proof of illegal entry by none
of exploitation or that theis punishable, no compliance with the necessary
recruitment was facilitated for theneed to prove the consequential requirements for travel
purpose of exploitation exploitation

Considered a human rights issue Considered a migration concern Considered a migration concern

What are the three (3) categories


of Trafficking in Persons?

The three (3) categories of trafficking in persons and its punishable acts are:

1. Acts of Trafficking in Persons

• To recruit, obtain, hire, provide, offer, transport, transfer, maintain, harbor, or receive a person by
any means, including those done under the pretext of domestic or overseas employment or training or
apprenticeship, for the purpose of prostitution, pornography, or sexual exploitation;

• To introduce or match for money, profit, or material, economic or other consideration, any
person or, as provided for under Republic Act No. 6955, any Filipino woman to a foreign national for
marriage for the purpose of acquiring, buying, offering, selling or trading him/her to engage in
prostitution, pornography, sexual exploitation, forced labor, slavery, involuntary servitude or debt
bondage;

• To offer or contract marriage, real or simulated, for the purpose of acquiring, buying, offering,
selling, or trading them to engage in prostitution, pornography, sexual exploitation, forced labor or
slavery, involuntary servitude or debt bondage;

• To undertake or organize tours and travel plans consisting of tourism packages or activities for
the purpose of utilizing and offering persons for prostitution, pornography or sexual exploitation;

• To maintain or hire a person to engage in prostitution or pornography;

• To adopt persons by any form of consideration for exploitative purposes or to facilitate the same for
purposes of prostitution, pornography, sexual exploitation, forced labor, slavery, involuntary
servitude or debt bondage;

• To adopt or facilitate the adoption of persons for the purpose of prostitution, pornography, sexual
exploitation, forced labor, slavery, involuntary servitude or debt bondage;

• To recruit, hire, adopt, transport, transfer, obtain, harbor, maintain, provide, offer, receive or abduct a
person, by means of threat or use of force, fraud, deceit, violence, coercion, or intimidation for the
purpose of removal or sale of organs of said person;

S.Y. 2018-2019 SUMMER PERIOD


7

• To recruit, transport, obtain, transfer, harbor, maintain, offer, hire, provide, receive or adopt a
child to engage in armed activities in the Philippines or abroad;

• To recruit, transport, transfer, harbor, obtain, maintain, offer, hire, provide or receive a person by
means mentioned in the preceding paragraph for purposes of forced labor, slavery, debt bondage and
involuntary servitude, including a scheme, plan, or pattern intended to cause the person either:

a. To believe that if the person did not perform such labor or services, he or she or another
person would suffer serious harm or physical restraint; or
b. To abuse or threaten the use of law or the legal processes;

• To recruit, transport, harbor, obtain, transfer, maintain, hire, offer, provide, adopt or receive a
child for purposes of exploitation or trading them, including but not limited to, the act of buying
and/or selling a child for any consideration or for barter for purposes of exploitation. Trafficking for
purposes of exploitation of children shall include:

a. All forms of slavery or practices similar to slavery, involuntary servitude, debt bondage and
forced labor, including recruitment of children for use in armed conflict;
b. The use, procuring or offering of a child for prostitution, for the production of pornography,
or for pornographic performances;
c. The use, procuring or offering of a child for the production and trafficking of drugs; and
d. The use, procuring or offering of a child for illegal activities or work which, by its nature or
the circumstances in which it is carried out, is likely to harm their health, safety or morals; and

• Toorganize or direct other persons to commit the offenses defined as acts of trafficking.

The R.A. 10364 includes the following as Acts of Trafficking in Persons:

• Attempted Trafficking in Persons – when there are acts to initiate the commission of a trafficking
offense but the offender failed to or did not execute all the elements of the crime, by accident or by
reason of some cause other than voluntary desistance. As such, an attempt to commit any of the
offenses mentioned in the preceding paragraph shall constitute attempted trafficking in persons.

If the victim is a child, any of the following acts shall be deemed as attempted trafficking in persons:

a. Facilitating the travel of a child who travels alone to a foreign country or territory without valid
reason and without the required clearance or permit from the DSWD or a written permission from the
child’s parent or legal guardian;
b. Executing, for a consideration, an affidavit of consent or a written consent for adoption;
c. Recruiting a woman to bear a child for the purpose of selling the child;
d. Simulating a birth for the purpose of selling a child; and
e. Soliciting a child and acquiring the custody through any means from among hospitals, clinics,
nurseries, daycare centers, refugee or evacuation centers, and low-income families, for the
purpose of selling the child.

• Accomplice Liability – knowingly aids, abets, and cooperates in the execution of the offense by
previous or simultaneous acts of trafficking.

• Accessories – whoever has the knowledge of the commission of the crime, and without having
participated therein, either as principal or accomplice, take part in its commission in any of the
following manners:

a. Profiting themselves or assisting the offender to profit by the effects of the crime;
b. Concealing or destroying the body of the crime or effects or instruments in order to prevent its
discovery; and
c. Harboring, concealing or assisting in the escape of the principal of the crime, provided the
accessory acts with abuse of his or her public functions or is known to be habitually guilty of
some other crime.
2. Acts that Promote Trafficking in Persons

• To knowingly lease or sublease, use or allow to be used any house, building or establishment for the
purpose of promoting trafficking in persons;

S.Y. 2018-2019 SUMMER PERIOD


8

• To produce, print and issue or distribute unissued, tampered or fake counseling certificates,
registration stickers, overseas employment certificates or other certificates of any government
agency which issues these certificates, decals and such other markers as proof of compliance
with government regulatory and pre-departure requirements for the purpose of promoting
trafficking in persons;

• To advertise, publish, print, broadcast or distribute, or cause the advertisement, publication, printing,
broadcasting or distribution by any means, including the use of information technology and
the internet, of any brochure, flyer, or any propaganda material that promotes trafficking in
persons;
• To assist in the conduct of misrepresentation or fraud for purposes of facilitating the acquisition of
clearances and necessary exit documents from government agencies that are mandated to
provide pre-departure registration and services for departing persons for the purpose of promoting
trafficking in persons;

• To facilitate, assist or help in the exit and entry of persons from/to the country at international and
local airports, territorial boundaries and seaports who are in possession of unissued, tampered or
fraudulent travel documents for the purpose of promoting trafficking in persons;

• To confiscate, conceal, or destroy the passport, travel documents, or personal documents or


belongings of trafficked persons in furtherance of trafficking or to prevent them from leaving the
country or seeking redress from the government or appropriate agencies;

 To knowingly benefit from, financial or otherwise, or make use of, the labor or services of a person
held to a condition of involuntary servitude, forced labor, or slavery;

• To tamper with, destroy, or cause the destruction of evidence, or to influence or attempt to influence
witnesses, in an investigation or prosecution of a case;
• To destroy, conceal, remove, confiscate or possess, or attempt to destroy, conceal, remove, confiscate
or possess, any actual or purported passport or other travel, immigration or working permit
or document, or any other actual or purported government identification, of any person in order
to prevent or restrict, or attempt to prevent or restrict, without lawful authority, the person’s
liberty to move or travel in order to maintain the labor or services of that person; and

• To utilize his or her office to impede the investigation, prosecution or execution of lawful orders
in a case.

3. Qualified Trafficking in Persons

• When the trafficked person is a child or below 18 years old;

• When the adoption is effected through Republic Act No. 8043, otherwise known as the “Inter-Country
Adoption Act of 1995” and said adoption is for the purpose of prostitution, pornography, sexual
exploitation, forced labor, slavery, involuntary servitude or debt bondage;

• When the crime is committed by a syndicate, or in large scale;

• When the offender is a spouse, an ascendant, parent, sibling, guardian or a person who exercises
authority over the trafficked person or when the offense is committed by a public officer or
employee;

• When the trafficked person is recruited to engage in prostitution with any member of the military or
law enforcement agencies;

• When the offender is a member of the military or law enforcement agencies;

• When by reason or on occasion of the act of trafficking in persons, the offended party dies,
becomes insane, suffers mutilation or is afflicted with Human Immunodeficiency Virus (HIV) or the
Acquired Immune Deficiency Syndrome (AIDS);

• When the offender commits one or more violations over a period of sixty (60) or more days, whether
those days are continuous or not; and

• When the offender directs or through another manages the trafficking victim in carrying out the
S.Y. 2018-2019 SUMMER PERIOD
9

exploitative purpose of trafficking.

Where to report incidence of Trafficking in Persons?

Any person who has the personal knowledge on the trafficking incidence can immediately report to any of the
following:

• Barangay authorities;
• Nearest police or other law enforcement agencies;
• Local social welfare and development office;
• Any member agencies of the Inter-Agency Council Against Trafficking (IACAT);
• Local anti-trafficking committee or task force;
• Local council for the protection of children; or
• 1343 Action line against Human Trafficking.

International trafficking in persons can be reported to the following:

• Philippine Embassy/Consulate which has jurisdiction over the place where the trafficking
occurred or where the trafficked person is or may be found;
• All officers, representatives and personnel of the Philippine government posted abroad under the
leadership of the Ambassador or the head of mission; or
• Office of the Undersecretary for Migrant Workers Affairs (OUMWA) of the Department of Foreign
Affairs (DFA).

Who can file cases for Trafficking in Persons?


The following persons may file cases of trafficking in persons:

• Any person, including a law enforcement officer, who has personal knowledge of the commission of the
offense;
• The trafficked person or the offended party;
• Parents or legal guardians;
• Spouse;
• Siblings; or Children

Where to file cases of Trafficking in Persons?


A complaint for violation of the Act for the purpose of inquest or preliminary investigation may be filed with the
following:

a. Department of Justice - National Prosecution Service, or


b. Provincial/City Prosecution Office;

• where the offense was committed;


• where any of the elements of the offense occurred; or
• where the trafficked person resides at the time of the commission of the crime.

Cases involving trafficking in persons should not be dismissed based on the affidavit of desistance executed
by the victims or their parents or legal guardians. Prosecutors are directed to oppose and manifest
objections to motions for dismissal.

What is the prescriptive period for filing of cases?

Trafficking cases can be filed within 10 years after they are committed. If trafficking is committed by a syndicate
or on a large scale or against a child, cases can be filed within 20 years after the commission of the act.

The prescriptive period is counted from the day the trafficked person is delivered or released from the
conditions of bondage.

S.Y. 2018-2019 SUMMER PERIOD


10

What are the penalties for violations of R.A. 9208 as amended by R.A. 10364?

Act Penalty
20 years imprisonment and a fine of P 1 Million to P 2 Million
Acts of Trafficking
Attempted Trafficking 15 years imprisonment and a fine of P 500,000 to P 1 Million
Accomplice Liability 15 years imprisonment and a fine of P 500,000 to P 1 Million
15 years imprisonment and a fine of P 500,000 to P 1 Million
Accessories
Acts that Promote Trafficking 15 years imprisonment and a fine of P 500,000 to P 1 Million
Qualified Trafficking Life imprisonment and a fine of P 2 Million to P 5 Million
Violation of Confidentiality Six (6) years imprisonment and a fine of P 500,000 to P 1 Million

Use of Trafficked Person Imprisonment of Prision Correccional or 6 months and 1 day to 6 years
and P50,000 to P100,000 fine

If involves sexual intercourse or lascivious conduct with a child:

-Imprisonment of Reclusion Temporal in its medium period to


Reclusion Perpetua and P500,000 to 1 Million fine
If involves carnal knowledge of, or sexual intercourse with, a male or
female trafficking victim and also involves the use of force or
intimidation, to a victim deprived of reason or to an unconscious
victim, or a victim under 12 years of age:

-Imprisonment of Reclusion Perpetua or 20 years and 1 day to 40


years and 1 Million to 5 Million fine
If committed by a foreigner:

-Deportation after serving the sentence and permanently barred from


entering the country

Programs Offered:
Implementing
Programs Agencies
Prosecution of trafficking cases DOJ, POEA, LGUs
Reintegration and rehabilitation programs resulting in gender responsive and DSWD, OWWA, CHED,
anti-trafficking oriented activities DepED, TESDA
Complaints, investigation and apprehension system PNP, NBI, BI, CHR
Effects the cancellation of licenses of establishments which violate the LGUs, POEA
provisions of RA 9208 / 10364
Repatriation of trafficked persons regardless of whether they are DFA, DOLE
documented or undocumented
Counseling and temporary shelter DSWD, OWWA
Medical and psycho-social services DOH, DSWD
Monitoring and documentation of trafficking cases DOJ, DOLE, OWWA,
LGUs, CFO
Training of special prosecutors who are handling and prosecuting trafficking DOJ
cases
Bilateral, regional, international initiatives and arrangements against DFA, PCW, CFO, CHR, BI
trafficking
Prevention and detection of trafficking with transnational crime dimensions PCTC, NBI, DFA
and coordination with international law enforcement agencies
Efficient implementation of passporting system to protect the integrity of DFA
Philippine passports
Strict administration and enforcement of immigration and alien BI, DOJ
administration laws

S.Y. 2018-2019 SUMMER PERIOD


11

Pre-marriage, on-site and pre- departure counseling program on inter-


marriages CFO, DFA, DSWD
Strict implementation and compliance with the rules and guidelines on local DOLE
and overseas employment
Establishment of database for law enforcement and prosecutory efforts DILG, LGUs, POEA, PCTC
Monitoring of trafficking related activities in the internet DOTC, DTI, PNP, NBI
Integration of topics on migration and trafficking in the education curricula DepEd, CHED
Integration of anti-trafficking efforts in the barangay level and CHR, DILG
monitoring government compliance with international human rights treaties
Addressing issues on trafficking of children through policy and program CWC
interventions
Comprehensive community education, advocacy and information campaign POEA, OWWA, DILG,
programs on trafficking LGUs, CHR, CFO, PCW
Formulate and implement preventive measures to stop sex tourism DOT
packages and other
activities of tourism establishments which contribute to trafficking in persons

Standardize guidelines for monitoring trafficking in persons in every port DOTC

Enhance public awareness on trafficking in persons PIA


Agency Acronyms :
 CHED – Commission on Higher Education  DOTC -Department of Transportation and Communication
 CHR- Commission on Human Rights  LGUs - Local Government Units
 CWC- Council of the Welfare of the Children  NBI -National Bureau of Investigation
 DEPED- Dep’t of Education  OWWA -Overseas Workers Welfare Administration
 DOH – Dep’t of Health  PIA -Philippine Information Agency
 DOT – Dept. of Tourism

MONEY LAUNDERING (Turning of dirty money to clean money”)


 The process of taking the proceeds of criminal activity and making them appear legal.
(THE FREE DICTIONARY retrieved on https://legaldictionary.thefreedictionary.com/money+laundering)

 The act of disguising the source or true nature of money obtained through illegal means.
(Content Team, 2015, MONEY LAUNDERING retrieved on https://legaldictionary.net/money-laundering/)

 Money laundering is the process of disguising the proceeds of crime and integrating it into the
legitimate financial system.
(Global Financial Integrity retrieved on https://gfintegrity.org/issue/money-laundering/)

Methods and Stages of Money Laundering

There are three stages involved in money laundering;

 Placement Stage
 Layering Stage
 Integration Stage

A. Placement
- It represents the initial entry of the "dirty" cash or proceeds of crime introduce into the financial
system.
- The physical disposal of bulk cash proceeds derived illegal activity.
- This is the movement of cash from its source.
- Generally, this stage serves two purposes:
(a) it relieves the criminal of holding and guarding large amounts of bulky of cash; and (b) it
places the money into the legitimate financial system.
- It is during the placement stage that money launderers are the most vulnerable to being caught.
This is due to the fact that placing large amounts of money (cash) into the legitimate financial
system may raise suspicions of officials.

S.Y. 2018-2019 SUMMER PERIOD


12

- This is followed by placing it into circulation through financial institutions, casinos, shops, bureau
de change and other businesses, both local and abroad. The process of placement can be
carried out through many processes including:

1. Currency Smuggling – This is the physical illegal movement of currency and monetary
instruments out of a country.
2. Bank Complicity – This is when a financial institution, such as banks, is owned or controlled by
unscrupulous individuals suspected of conniving with drug dealers and other organized crime
groups. This makes the process easy for launderers. The complete liberalization of the financial
sector without adequate checks also provides leeway for laundering.
3. Currency Exchanges – In a number of transitional economies the liberalization of foreign
exchange markets provides room for currency movements and as such laundering schemes
can benefit from such policies.
4. Securities Brokers – Brokers can facilitate the process of money laundering through structuring
large deposits of cash in a way that disguises the original source of the funds.
5. Blending of Funds – The best place to hide cash is with a lot of other cash. Therefore, financial
institutions may be vehicles for laundering. The alternative is to use the money from illicit
activities to set up front companies. This enables the funds from illicit activities to be obscured in
legal transactions.
6. Asset Purchase – The purchase of assets with cash is a classic money laundering method. The
major purpose is to change the form of the proceeds from conspicuous bulk cash to some
equally valuable but less conspicuous form.

MONEY LAUNDERERS AIM:

 Remove the cash from the location of acquisition so as to avoid detection from the
authorities.

Smurfs - A popular method used to launder cash in the placement stage. This technique involves the
use of many individuals (the"smurfs") who exchange illicit funds (in smaller, less conspicuous amounts)
for highly liquid items such as traveller cheques, bank drafts, or deposited directly into savings
accounts. These instruments are then given to the launderer who then begins the layering stage.

B.Layering

- Involves the frequent series of money transfers and transactions used to “cover the tracks” of the
illegal funds.
- Illegal money hides from its origin
- “Heavy soaping”
- The use of the electronic methods is the most cost effective layering (cover)
- The substantive stage of the process in which the property is ‘washed’ and its ownership and
source is disguised.

The purpose of this stage is to make it more difficult to detect and uncover a laundering activity. It is
meant to make the trailing of illegal proceeds difficult for the law enforcement agencies. The known
methods are:

1. Cash converted into Monetary Instruments – Once the placement is successful within the
financial system by way of a bank or financial institution, the proceeds can then be converted
into monetary instruments. This involves the use of banker’s drafts and money orders.
(Purchasing)
2. Material assets bought with cash then sold – Assets that are bought through illicit funds can be
resold locally or abroad and in such a case the assets become more difficult to trace and thus
seize.

*Putting funds through series of financial operation to mislead potential investigators and to give the
funds the appearance of having legal origins

*It involves the frequent series of money transfer transactions used to cover the tracks of illegal funds

S.Y. 2018-2019 SUMMER PERIOD


13

C.Integration

- When the money is returned to the regular economy through purchase of investment.
- The launderer then makes the proceeds available to the criminals in an apparently legitimate
form.
- “spin dry”
- This is the movement of previously laundered money into the economy mainly through the
banking system and thus such money’s appear to be normal business earnings.
- The known methods used are:

1. Property Dealing – The sale of property to integrate laundered money back into the economy is
a common practice amongst criminals. For instance, many criminal groups use shell companies
to buy property; hence proceeds from the sale would be considered legitimate.
2. Front Companies and False Loans – Front companies that are incorporated in countries with
corporate secrecy laws, in which criminals lend themselves their own laundered proceeds in an
apparently legitimate transaction.
3. Foreign Bank Complicity – Money laundering using known foreign banks represents a higher
order of sophistication and presents a very difficult target for law enforcement. The willing
assistance of the foreign banks is frequently protected against law enforcement scrutiny. This is
not only through criminals, but also by banking laws and regulations of other sovereign
countries.
4. False Import/Export Invoices – The use of false invoices by import/export companies has
proven to be a very effective way of integrating illicit proceeds back into the economy. This
involves the overvaluation of entry documents to justify the funds later deposited in domestic
banks and/or the value of funds received from exports.

OBJECTIVES OF MONEY LAUNDERING CAUSES OF MONEY LAUNDERING


1. Hide 1. Absence of Legislation
2. Move 2. Increase of tax
3. Invest 3. Increase in Profits
4. To make black money to white money’
5. Limited risk of exposure
DOMESTIC LAWS COVERING OF ANTI MONEY LAUNDERING IN THE PHILIPPINES:

RA 9160 - The Anti-Money Laundering Act of 2001


“AN ACT DEFINING THE CRIME OF MONEY LAUNDERING, PROVIDING PENALTIES THEREFOR
AND FOR OTHER PURPOSES”
Approved: SEP 29 2001
(Sgd.) GLORIA MACAPAGAL-ARROYO

RA 9194 –
“AN ACT AMENDING REPUBLIC ACT NO. 9160, OTHERWISE KNOWN AS THE “ANTI-MONEY
LAUNDERING ACT OF 2001”
Approved: Mar 07 2003
(SGD.) GLORIA MACAPAGAL-ARROYO

S.Y. 2018-2019 SUMMER PERIOD


14

RA 10167
“AN ACT TO FURTHER STRENGTHEN THE ANTI-MONEY LAUNDERING LAW, AMENDING FOR
THE PURPOSE SECTIONS 10 AND 11 OF REPUBLIC ACT NO. 9160, OTHERWISE KNOWN AS
THE “ANTI-MONEY LAUNDERING ACT OF 2001”, AS AMENDED, AND FOR OTHER PURPOSES”
Approved:
(Sgd.) BENIGNO S. AQUINO III

[REPUBLIC ACT NO. 10365]


“AN ACT FURTHER STRENGTHENING THE ANTI-MONEY LAUNDERING LAW, AMENDING FOR
THE PURPOSE REPUBLIC ACT NO. 9160, OTHERWISE KNOWN AS THE “ANTI-MONEY
LAUNDERING ACT OF 2001”, AS AMENDED”
Approved:
(Sgd.) BENIGNO S. AQUINO III

RA 10927
(Sgd.) RODRIGO ROA DUTERTE
Approved: November 4th, 2017.
“A Philippine gambling law that plugs holes left by previous legislation and enforces heavy regulations
on all gambling operators”.

The Anti-Money Laundering Council (AMLC)


 created pursuant to Republic Act No. 9160, otherwise known as the “Anti-Money Laundering Act
of 2001” (AMLA)
 It protects the integrity and confidentiality of bank accounts and to ensure that the Philippines
shall not be used as a money laundering site for the proceeds of any unlawful activity.
 The Philippines’ Financial Intelligence Unit (FIU) tasked to implement the AMLA

Organization:
The AMLC is composed of:
1. Chairman - Governor of the Bangko Sentral ng Pilipinas (BSP)
2. Members - (a) Commissioner of the Insurance Commission;
(b) Chairman of the Securities and Exchange Commission

The AMLC is assisted by :


* Secretariat - headed by an Executive Director; and
*five (5) units — (a) Office of the Executive Director
(b) Compliance and Investigation Group
(c) Legal Services Group
(d) Information Management and Analysis Group
(e) Administrative and Financial Services Division

S.Y. 2018-2019 SUMMER PERIOD


15

S.Y. 2018-2019 SUMMER PERIOD


16

CYBERCRIME

also known as Computer crimes and Technology or Electronic crimes

is a crime that involves a computer and a network.[1]

The computer may have been used in the commission of a crime, or it may be the target.[2]

It can be defined as: "Offences that are committed against individuals or groups of individuals with a
criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or
loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet
(networks including chat rooms, emails, notice boards and groups) and mobile phones
(Bluetooth/SMS/MMS)".[3]

Cybercrime may threaten a person or a nation's security and financial health. .[4]
 “ulawful acts wherein the computer is either a tool or target or both”

Laws relating to cybercrimes

RA 10175 –Cybercrime Prevention Act of 2012


“AN ACT DEFINING CYBERCRIME, PROVIDING FOR THE PREVENTION, INVESTIGATION,
SUPPRESSION AND THE IMPOSITION OF PENALTIES THEREFOR AND FOR OTHER
PURPOSES”
Approved: SEP 12 2012
(Sgd.) BENIGNO S. AQUINO III

RA 8792 – Electronic Commerce Act of 2000


AN ACT PROVIDING FOR THE RECOGNITION AND USE OF ELECTRONIC COMMERCIAL AND NON-
COMMERCIAL TRANSACTIONS AND DOCUMENTS, PENALTIES FOR UNLAWFUL USE THEREOF,
AND FOR OTHER PURPOSES
June 14, 2000
(Sgd.) JOSEPH E. ESTRADA

RA 8484 – "Access Devices Regulation Act of 1998


AN ACT REGULATING THE ISSUANCE AND USE OF ACCESS DEVICES, PROHIBITING FRAUDULENT
ACTS COMMITTED RELATIVE THERETO, PROVIDING PENALTIES AND FOR OTHER PURPOSES
Approved: February 11, 1998

RA 9775 – "Anti-Child Pornography Act of 2009


AN ACT DEFINING THE CRIME OF CHILD PORNOGRAPHY, PRESCRIBING PENALTIES THEREFOR
AND FOR OTHER PURPOSES
Approved: November 17, 2009
Sgd. GLORIA MACAPAGAL-ARROYO

RA 9995- "Anti-Photo and Video Voyeurism Act of 2009"


AN ACT DEFINING AND PENALIZING THE CRIME OF PHOTO AND VIDEO VOYEURISM,
PRESCRIBING PENALTIES THEREFOR, AND FOR OTHER PURPOSES
Approved: FEB 15, 2010
(Sgd.) GLORIA MACAPAGAL-ARROYO
President of the Philippines

S.Y. 2018-2019 SUMMER PERIOD


17

THE DEPARTMENT OF JUSTICE CATEGORIZES COMPUTER CRIME IN THREE WAYS:

 The computer as a target


-the attack seeks to deny the illegitimate users or owners of the system access to their data or
computers
- attacking the computers of others
 The computer as a weapon
-using a computer to commit "traditional crime" that we see in the physical world (such as fraud
or illegal gambling).
-the computer is used to gain some other criminal objective
-Eg. A thief may use a computer to steal information
 The computer as an accessory
(associated with the prevalence of computers)
- using a computer as a "fancy filing cabinet" to store illegal or stolen information.
-Eg. Intellectual Property theft or software piracy

[ Republic Act No. 10175 ]


“Cybercrime Prevention Act of 2012
Section 3. Definition of Terms. – For purposes of this Act, the following terms are hereby defined as
follows:

(a) Access refers to the instruction, communication with, storing data in, retrieving data from, or
otherwise making use of any resources of a computer system of communication network.

(b) Alteration refers to the modification or change, in form or substance, of an existing computer data
or program.

(c) Communication refers to the transmission of information through ICT media, including voice,
video, and other forms of data.

(d) Computer refers to an electronic, magnetic, optical, electromechanical, or other data processing or
communications device, or grouping of such devices, capable of performing logical, arithmetic, routing,
or storage functions and which includes any storage facility, or equipment or communications facility or
equipment directly related to or operating in conjunction with such device. It covers any type of
computer device including devices with data processing capabilities like mobile phones, smart phones,
computer networks and other devices connected to the Internet.

(e) Computer data refers to any representation of facts, information, or concepts in a form suitable for
processing in a computer system including a program suitable for processing in a computer system
including a program suitable to cause on a computer system to perform a function and includes
electronic documents and / or electronic data messages whether stored in local computer systems or
online.

(f) Computer program refers to a set of instructions executed by the computer to achieve intended
results.

(g) Computer system refers to any device or group of interconnected or related devices, one or more
of which pursuant to a program, performs automated processing of data. It covers any type of device
with data processing capabilities including, but not limited to, computers and mobile phones. The
device consisting of hardware and software may include input, output and storage components which
may stand alone or be connected in a network or other similar devices. It also includes computer data
storage devices or media.
S.Y. 2018-2019 SUMMER PERIOD
18

(h) Without right refers to either: (i) conduct undertake without or in excess of authority; or (ii) conduct
not covered by established legal defenses, excuses, court orders, justifications, or relevant principles
under the law.

(i) Cyber refers to a computer or a computer network, the electronic medium in which online
communication takes place.

(j) Critical infrastructure refers to the computer systems, and / or networks, whether physical or
virtual, an / or the computers, computer data and / or traffic data so vital to this country that the
incapacity or destruction of or interference with such system and assets would have debilitating impact
on security, national or economic security, national public health and safety, or any combination of
those matters.

(k) Cybersecurity refers to the collection of tools, policies, risk management approaches, actions,
training, best practices, assurance and technologies that can be used to protect the cyber environment
and organization and user’s assets.

(l) Database refers to a representation of information, knowledge, facts, concepts or instructions which
are being prepared, processed, or stored or have been prepared, processed or stored in a formalized
manner and which are intended for use in a computer system.

(m) Interception refers to listening to, recording, monitoring or surveillance of the content of
communications, including procuring of the content of data, either directly, through access and use of a
computer system or indirectly, through the use of electronic eavesdropping or tapping devices, at the
same time that the communication is occurring.

(n) Service provider refers to:

(1) Any public or private entity that provides to users of its service the ability to communicate by means
of a computer system, and

(2) Any other entity that processes or stores computer data on behalf of such communication service or
users of such service.

(o) Subscriber’s information refers to any information contained in the form of computer data or any
other form that is held by a service provider, relating to subscribers of its services other than traffic or
content data and by which identity can be established:

(1) The type of communication service used, the technical provisions taken thereto and the period of
service;

(2) The subscriber’s identity, postal or geographic address, telephone and other access numbers, any
assigned network address, billing, and payment information, available on the basis of the service
agreement or arrangement, and

(3) Any other available information on the site of the installation of communication equipment, available
on the basis of the service agreement or arrangement.

S.Y. 2018-2019 SUMMER PERIOD


19

(p) Traffic data or non-content data refers to any computer data other than the content of the
communication including, but not limited to, the communication’s origin, destination, route, time, data,
size, duration, or type of underlying service.

PUNISHABLE ACTS

Section 4 Cybercrime Offenses. – The following acts constitute the offense of cybercrime punishable
under this Act:

(a) Offenses against the confidentiality, integrity, and availability of


computer data and systems.

(1) Illegal access – The access to the whole or any part of a computer system without right.

(2) Illegal interception – The interception made by technical means without right of any non-public
transmission of computer data to, from, or within a computer system including electromagnetic
emissions from a computer system carrying such computer data.

(3) Data Interference – The intentional or reckless alteration, damaging, deletion or deterioration of
computer data, electronic document, or electronic data message, without right, including the
introduction or transmission of viruses.

(4) System Interference – The intentional alteration or reckless hindering or interference with the
functioning of a computer or computer network by inputting, transmitting, damaging, deleting,
deteriorating, altering or suppressing computer data or program, electronic document, or electronic data
messages, without right or authority, including the introduction or transmission of viruses.

(5) Misuse of devices

(i) The use, production, sale, procurement, importation, distribution, or otherwise making available,
without right, of:

(aa) a device, including a computer program, designed or adapted primarily for the purpose of
committing any of the offenses under this Act; or

(bb) A computer password, access code, or similar data by which the whole or any part of a computer
system is capable of being accessed with intent that it be used for the purpose of committing any of the
offenses under this Act.

(ii) The possession of an item referred to in paragraphs 5(i)(aa) or (bb) above with the intent to use said
devices for the purpose of committing any of the offenses under this section.

(6) Cyber-squatting. The acquisition of domain name over the Internet in bad faith to profit, mislead,
destroy reputation, and deprive others from the registering the same, if such a domain name is:

(i) Similar, identical, or confusingly similar to an existing trademark registered with the appropriate
government agency at the time of the domain name registration;

S.Y. 2018-2019 SUMMER PERIOD


20

(ii) Identical or in any way similar with the name of a person other than the registrant, in case of a
personal name, and

(iii) Acquired without right or with intellectual property interests in it.

(b) Computer-related Offenses:

(1) Computer-related Forgery:

(i) The input, alteration, or deletion of computer data without right resulting in inauthentic data with the
intent that it be considered or acted upon for legal purposes as if it were authentic, regardless whether
or not the data is directly readable and intelligible; or

(ii) The act of knowingly using computer data which is the product of computer-related forgery as
defined here, for the purpose of perpetuating a fraudulent or dishonest design.

(2) Computer-related Fraud. The unauthorized input, alteration, or deletion of computer data or
program or interference in the functioning of a computer system, causing damage thereby with
fraudulent intent; Provided, That if no damage has yet been caused, the penalty imposed shall be one
(1) degree lower.

(3) Computer-related Identity Theft. The intentional acquisition, use, misuse, transfer, possession,
alteration or deletion of identifying information belonging to another, whether natural or juridical, without
right. Provided, That if no damage has yet been caused, the penalty imposed shall be one (1) degree
lower.

(c) Content-related Offenses:

(1) Cybersex – The willful engagement, maintenance, control, or operation, directly or indirectly, of any
lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or
consideration.

(2) Child Pornography – The unlawful or prohibited acts defined and punishable by Republic Act No.
9775 or the Anti-Child Pornography Act of 2009, committed through a computer system. Provided, That
the penalty to be imposed shall be one (1) degree higher than that provided for in Republic Act No.
9775.

(3) Unsolicited Commercial Communications – The transmission of commercial communication with


the use of computer system which seek to advertise sell, or offer for sale products and services are
prohibited unless:

(1) There is prior affirmative consent from the recipient;

(ii) The primary intent of the communication is for service and / or administrative announcements from
the sender to its existing users, subscribers or customers; or

(iii) The following conditions are present:

S.Y. 2018-2019 SUMMER PERIOD


21

(aa) The commercial electronic communication contains a simple, valid, and reliable way for the
recipient to reject receipt of further commercial electronic messages (opt-out) from the same source;

(bb) The commercial electronic communication does not purposely disguise the source of the electronic
message; and

(cc) The commercial electronic communication does not purposely include misleading information in
any part of the message in order to induce the recipients to read the message.

(4) Libel. – The unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code,
as amended committed through a computer system or any other similar means which may be devised
in the future.

Section 5. Other Offenses – The following acts shall also constitute an offense:

(a) Aiding or Abetting in the Commission of Cybercrime – Any person who willfully abets or aids in
the commission of any of the offenses enumerated in this Act shall be held liable.
(b) Attempt in the Commission of Cybercrime – Any person who willfully attempts to commit any of
the offenses enumerated in this Act shall be held liable.
Penalties

Punishable Acts Imprisonment Fine


(a) prision mayor Two hundred thousand pesos
-Illegal access (P200,000) up to a maximum
-Illegal interception amount commensurate to the
-Data Interference damage incurred or both.
-System Interference
-Misuse of devices
-Cyber-squatting
(b)
-Computer-related Forgery
-Computer-related Fraud
-Computer-related Identity Theft
Misuse of devices prision mayor or a fine of not more than Five
hundred thousand pesos
(P500,000) or both.
Illegal access against critical reclusion temporal or a fine of at least Five hundred
infrastructure thousand pesos (P500,000) up to a
maximum amount commensurate to
the damage incurred or both
Cybersex prision mayor or a fine of at least Two hundred
thousand pesos (P200,000) but not
exceeding One million pesos
(P1,000,000) or both
Child Pornography the penalty to be imposed shall be
one (1) degree higher than that
provided for in Republic Act 9775, if
committed through a computer
system
Unsolicited Commercial arresto mayor or a fine of at least Fifty thousand
Communications pesos (P50,000) but not exceeding
Two hundred fifty thousand pesos
(P250,000) or both.
-Aiding or Abetting in the one (1) degree lower than that of
Commission of Cybercrime the prescribed penalty for the
- Attempt in the Commission of offense or a fine of at least One
Cybercrime hundred thousand pesos
(P100,000) but not exceeding Five
hundred thousand pesos
(P500,000) or both

S.Y. 2018-2019 SUMMER PERIOD


22

Enforcement and Implementation

Law Enforcement Authorities: NBI & PNP

Jurisdiction:

The Regional Trial Court shall have jurisdiction over any violation of the provisions of this Act including
any violation committed by a Filipino national regardless of the place of commission. Jurisdiction shall
lie if any of the elements was committed within the Philippines or committed with the use of any
computer system wholly or partly situation in the country, or when by such commission any damage is
caused to a natural or juridical person who, at the time the offense was committed, was in the
Philippines.

There shall be designated special cybercrime courts manned by specially trained judges to handle
cybercrime cases.

Competent Authorities

Department of Justice (DOJ). There is hereby created an Office of Cybercrime within the DOJ
designated as the central authority in all matters relating to international mutual assistance and
extradition.

Cybercrime Investigation and Coordinating Center (CICC). An inter-agency body under the
administrative supervision of the Office of the President, for policy coordination among concerned
agencies and for the formulation and enforcement of the national cybersecurity plan.

CICC Composition:

Chairman Executive Director of Information and


Communications Technology Office (ICT) under
Department of Science and Technology (DOST)

Vice Director NBI


Chairperson

members  Chief of the PNP


 Head of the DOJ Office of Cybercrime
 one (1) representative from the private
sector and academe

*The CICC shall be manned by a secretariat of selected existing personnel and representatives from
the different participating agencies.

Mode and Manner of Committing Cyber Crime:

Mode/Manner Definition
1. Hacking  The unauthorized access to computer system or network
 Illegal intrusion into computer system without the permission of
the computer owner/user
2. Software Piracy  Theft of information contained in electronic form.
 Information stored in computer hard disks, removable storage
media, theft of software through illegal copying of genuine
S.Y. 2018-2019 SUMMER PERIOD
23

programs/ counterfeiting and distribution of products intended to


pass the original.
3. Email Bombing  Sending large numbers of mail to the victim, which may be an
individual or company or mail server there by ultimately resulting
to crashing.
4. Data Diddling  Altering raw data just before a computer processes it and then
changing it back after the processing is completed.
5. Salami Attack  It is an attacked used for committing financial crimes, the criminal
deducts small amount that would be unnoticed from the account
of all customer of the bank and deposit the same in his account.
6. Denial of Service  The computer of the victim is flooded with more requests that fills
Attack his email box with spam mail depriving him of the services he is
entitled to access.
7. Virus/worm  Malicious software that attach themselves to a computer or a file
attacks/viruses and then circulate themselves to other files and to other
computers on a network.
 It affects the data on computer, either altering or deleting it.

8. Logic Bombs  Programs created to do something only when a certain event


occurs.
9. Trojan Attacks  Originated in the word “TROJAN HORSE”
 An unauthorized program which passively gains control
10. Internet Time  Internet surfing hours of the victim are used up by another
Theft person.
11. Web Jacking  Derived from the word “HI JACKING”
 The hacker gains access and control over the web site of
another.
12. Cyber  Pornographic websites, porn magazine produces using
Pornography computer( to publish and print the material) and internet ( to
download and transmit porn photos/writings etc.)
13. IRC Crime –  Servers have chat rooms in which people from anywhere the
Internet Relay world can come together and chat with each other. Use the chat
Chat room for illicit means of committing cyber crime
14. Cyber Stalking  Criminal follows the victim by sending emails, entering chat
rooms frequently to harass
15. Credit Card Fraud  If electronic transaction are not secured, credit card numbers can
be stolen by the hackers
 Impersonating the credit card owner by using the stolen
information
16. Phishing  Technique of pulling out confidential information from the
bank/financial institutional account holders by deceptive means
17. Pharming  Form of online fraud, cousin of phishing
 Criminals rely upon the same bogus web sited and theft of
confidential information to penetrate online scams, but are
difficult to detect in many ways because they aren’t reliant upon
the victim accepting a “bait” message.
 Instead of relying completely on users clicking on an enticing link
in fake email messages, criminals re-direct victims to the bogus
web site even if they type right web address of their bank.
18. Net Extortion  Copying the company’s confidential data in order to extort said
company for huge amount
19. Cyber defamation  Criminal sends email containing defamatory/matters to all
concerned of the victim or post the defamatory matter on
website.
20. Threatening  The criminal sends threatening email or comes in contact in chat
rooms with victims
21. Internet drug  Sale & purchase of narcotics through net;
trade or sale of
narcotics
22. Steganography-  The production and placing in computers files of secret
infiltration of messages so small as to be detectable only by special software.
hidden messages
into files
S.Y. 2018-2019 SUMMER PERIOD
24

23. Secret writing  The art of secret writing


24. Nigerian 4-1-9  This scam start with a bulk mailing or bulk faxing of a bunch of
Scam identical letter to business, professionals and other persons who
tend to be of greater than average wealth.
25. Cyber bullying  Use of technology to harass, threaten, embarrass or target
another person.
 It occurs young people
 When a child, preteen or teen or otherwise targets other to b
tormented, threatened, harassed, humiliated, embarrassed
using Internet, digital technologies or mobile phones
26. Cyber Sex  Aka computer sex, net sex, mud sex, tiny sex.
 Sex encountered messages describing a sexual experience.
27. Sexting  Sending explicitly sexual messages or images between mobile
devices
28. Sextortion  When someone blackmails the person posing for those pictures
for money or sex.
29. Email Spoofing  Email header is forged so that mail appears to originate from one
source but actually has been sent from another source.
30. Spamming  Sending multiple copies of unsolicited mails or mass emails such
as chain letters
31. Forgery  Currency notes, revenue stamps, mark sheets can be forged
using computer and high quality scanners and printers
32. Cyber Terrorism  Use of compute resources to intimidate or coerce others

POLICE GLOBAL ORGANIZATION


 INTERPOL ( International Criminal Police Organization)
 ASEANAPOL
 EUROPOL
 IACP ( International Association of Chief of Police)
 UNITED NATIONS

INTERPOL
- Facilitates cross-border police cooperation and supports and assists organization , authorities
and services whose mission is to prevent or combat international crime.
- it is not a police force rather it’s a the machinery for international police cooperation and
communication

Some of the important provisions of the Interpol constitution provide for the following:

a. To ensure and promote the widest possible mutual assistance between all criminal police
authorities, within the limits of the laws existing in the different countries and in the spirit of the
Universal Declaration of Human Rights; and
b. To establish and develop all institutions likely to contribute effectively to the prevention and
suppression of ordinary law crimes.
c. “It is strictly forbidden for the Organization to undertake any intervention or activities of a
political, military, religious or racial character”.

Vision and Mission

 The vision – what INTERPOL aspires to achieve


"Connecting police for a safer world"

 The mission – what INTERPOL does to achieve its vision


"Preventing and fighting crime through enhanced cooperation and innovation on police and security
matters"

NAME AND LOGO


S.Y. 2018-2019 SUMMER PERIOD
25

*Official name and abbreviations*

1. The Organization's official name?


- "ICPO–INTERPOL"

2. Official Abbreviation?
-ICPO “International Criminal Police Organization”
In French – OIPC “Organization Internationale De Police Criminelle”

THE EMBLEM
Used in 1950

Symbolism

6 Elements Meaning
 GLOBE WORLDWIDE ACTIVITIES
 OLIVE BRANCHES SYMBOLIZE PEACE;
 "INTERPOL" BELOW THE GLOBE IN THE CENTER OF THE OLIVE
BRANCHES
 A VERTICAL SWORD BEHIND SYMBOLIZING POLICE ACTION.
THE GLOBE
 THE ABBREVIATIONS "OIPC" ABOVE THE GLOBE EITHER SIDE OF THE SWORD
AND "ICPO"
 THE SCALES BELOW THE SYMBOLIZE JUSTICE.
OLIVE BRANCHES

The Flag
Used in 1950

Parts
• It has a light-blue background
• The emblem is in the center
• The four lightning flashes arranged
symmetrically around the emblem symbolize
telecommunications and speed in police
action.

HISTORY OF INTERPOL
YEAR EVENT
First International Criminal Police Congress held in Monaco. Police officers, lawyers and
1914 magistrates from 24 countries meet to discuss arrest procedures, identification
techniques, centralized international criminal records and extradition proceedings.
Creation of the International Criminal Police Commission (ICPC) with headquarters in
1923 Vienna, Austria, on the initiative of Dr Johannes Schober, president of the Vienna Police.
Wanted persons notices first published in INTERPOL’s International Public Safety
Journal.

S.Y. 2018-2019 SUMMER PERIOD


26

The General Assembly, held in Berlin, proposes that each country establish a central
1926 point of contact within its police structure: the forerunner of the National Central Bureau
(NCB).
1927 Resolution to establish NCBs adopted.
1930 Specialized departments established to deal with currency counterfeiting, criminal
records and passport forgery.

1932 Following the death of Dr Schober, new statutes put in place creating the post of
Secretary General. The first was Austrian Police Commissioner Oskar Dressler.

1935 The Organization's international radio network is launched, providing an independent


telecommunications system solely for the use of the criminal police authorities at
national level.
The Nazis assume control after deposing of President Michael Skubl. Most countries
1938 stop participating and ICPC effectively ceases to exist as an international organization.
1942 ICPC falls completely under German control and is relocated to Berlin.
1946 Belgium leads the rebuilding of the organization after the end of World War II. A new
headquarters set up in Paris, and ‘INTERPOL’ chosen as the organization’s telegraphic
address. Democratic process to elect the President and Executive Committee instituted.
Present INTERPOL colour-coded notice system initiated and first Red Notices for
persons wanted internationally issued.

1949 The United Nations grants INTERPOL consultative status as a non-governmental


organization.
1956 Following the adoption of a modernized constitution, the ICPC becomes the International
Criminal Police Organization-INTERPOL, abbreviated to ICPO–INTERPOL or just
INTERPOL. The Organization becomes autonomous by collecting dues from member
countries and relying on investments as the main means of support.
1958 Contributions of member countries revised and financial regulations adopted.
1963 First regional conference held, in Monrovia, Liberia.
1965 The General Assembly sets out formal responsibilities and operating policies for NCBs.

1971 The United Nations recognizes INTERPOL as an intergovernmental organization.

1972 A Headquarters Agreement with France recognizes INTERPOL as an international


organization.

1982 An independent body created to monitor the implementation of INTERPOL’s internal


rules in relation to data protection. This will become the Commission for the Control of
INTERPOL Files in 2003.

1989 INTERPOL moves its General Secretariat to Lyon, France.


1990 The X.400 communication system launched, enabling NCBs to send electronic
messages to each other and to the General Secretariat directly.

1992 An automated search facility for remote searches of INTERPOL databases introduced.

1995 As part of a programme of regionalization the General Assembly adopts guidelines for
the establishment and operation of Regional Bureaus.

1998 INTERPOL Criminal Information System (ICIS) database created


2002 The I-24/7 web-based communication system launched, significantly improving NCBs’
access to INTERPOL’s databases and services. Canada is the first country to connect to
the system.
Database of stolen and lost travel documents launched.

2003 Official inauguration of the Command and Coordination Centre at the General
Secretariat, enabling the organization to operate 24 hours a day, seven days a week.
2004 INTERPOL liaison office inaugurated at the United Nations in New York and first Special
Representative appointed.

S.Y. 2018-2019 SUMMER PERIOD


27

2005 First INTERPOL-United Nations Special Notices issued for individuals subject to UN
sanctions against Al Qaeda and the Taliban.
Technology known as MIND/FIND allows frontline officers to connect directly to
INTERPOL's systems.

2009 Official opening of the Office of the Special Representative to the European Union in
Brussels.

2015 Official inauguration of the INTERPOL Global Complex for Innovation in Singapore. It
works to combat cybercrime and help police around the world address emerging threats
through innovation and training.

Structure and Governance

1. Strategy : a. General Assembly


b. Executive Committee
2. Implementation: a. General Secretariat
b. National Central Bureaus
3. Oversight: a. Advisers
b. Commission for the Control of INTERPOL’s Files (CCF)

1. STRATEGY
A. GENERAL ASSEMBLY

 It is the INTERPOL’s supreme governing body


 Composed of delegates appointed by each member country.
 It meets annually (once a year) to take all important decisions related to policy, resources,
working methods, finances, activities and programs
 Generally speaking, the Assembly takes decisions by a simple majority in the forms
of Resolutions. Each member country represented has one vote

B. EXECUTIVE COMMITTEE

 Meets three times a year and sets organizational policy and direction.

13 member committee DELIBERATE ORGANS comprises:


-1 President – 4 years tenure
-4 Vice President – 3 years tenure
-8 delegates

The former Filipino President of INTERPOL


-Jolly R. Bugarin (1980-1984)

FUNCTION OF EXECUTIVE COMMITTEE


- Supervise the execution of the decisions of the General Assembly
- Prepare the Agenda for sessions of the General Assembly
- Submit to the General Assembly any program of work or project which it considers useful
- Supervise the administration and work of the Secretary General
S.Y. 2018-2019 SUMMER PERIOD
28

- Exercise all powers delegated to it by the Assembly

2. IMPLEMENTATION

A. GENERAL SECRETARIAT
 Located in Lyon, France
 Operates 24 hours a day, 365 days a year.
• Run by SECRETARY GENERAL
• Officials from more than 80 countries works side any side in any of the organization’s four
official language; SPANISH, ARABIC, FRENCH & ENGLISH (SAFE)

The Secretariat has seven regional bureaus around the world:


The secretariat has 7 regional offices
• Argentina (Buenos Aires)
• Cameroon (Yaoundé)
• Côte d’Ivoire (Abidjan)
• El Salvador (San Salvador)
• Kenya (Nairobi)
• Thailand (Bangkok)
• Zimbabwe (Harare)

FUNCTION OF GENERAL SECRETARIAT


- Put into application the decisions of the General Assembly and Executive Committee
- Serve as an international center in the fight against ordinary crime
- Serve as a technical and information center
- Ensure the efficient administration of the Organization
- Maintain contact with national and international authorities, whereas questions relative to the
search for criminals shall be dealt with through National Central Bureaus
- Produce any publications which may be considered useful
- Organize and perform secretariat work at the sessions of the General Assembly, the Executive
Committee and any other body of the Organization
- Draw up a draft program of work for the coming year for the consideration and approval of the
General Assembly and the Executive Committee
- Maintain as far as possible direct and constant contact with the President of the organization

B. National Center Bureau (NCB)


- the heart of every INTERPOL member country
- linkage to have a global law enforcement network.
- It is typically a division of the national police agency or investigation service and serves as the
CONTACT POINT for all INTERPOL activities in the field.
- Staffed by highly trained police officers
- The lifeblood of INTERPOL (contributing to our criminal databases and cooperating together on
cross-border investigations, operations and arrests).

The NCBs activities can be summarized as follows:

a. Collects documents and criminal intelligence, which have a direct bearing on international police
co-operation from sources in that own countries, and pass this material on to the other NCBs
and the General Secretariat.
b. Ensures that police action or operations requested by another country’s NCBs are carried out
on their territory;
c. Receives requests for information, checks, etc. from another NCBs and reply to such request.
d. Transmits request for international co-operation made by their own courts or police departments
to the NCBs of other countries; and
e. The Heads of the NCBs attend Interpol General Assembly sessions as members of their
countries delegations, and subsequently ensure that the Assembly’s resolution are
implemented.

The NCBs communicate directly among themselves. However, they keep the General Secretariat
informed of their investigations so that the latter can perform its task of centralizing information and
coordinating cooperation.

S.Y. 2018-2019 SUMMER PERIOD


29

3. OVERSIGHT
A. Advisers
- these are the experts in a purely advisory capacity, who may be appointed by the Executive Committee and
confirmed by the General Assembly.

B. Commission for the Control of INTERPOL’s Files (CCF)

- It ensures that the processing of personal data – such as names and fingerprints – is in line with
INTERPOL's rules, in order to protect both the fundamental rights of individuals and the cooperation among
police internationally.

Interpol expertise
1. TECHNICAL TOOLS (Secure global police communication services)

Data Base: I-24/7 & I-link

All INTERPOL member countries are connected through a secure communications system known as
I-24/7.
I – stands for INTERPOL
24 – 24 hours a day
7 – 7 days a week
- a secure global police network or global police communications system to connect law
enforcement officers in all our member countries
- is the foundation of information exchange between the world's police
- installed at all National Central Bureaus
- This gives police real-time access to criminal databases containing millions of records
- A unique system of Notices is used to alert member countries to fugitives, dangerous criminals,
missing persons or weapons threats
- It enables authorized users to share sensitive and urgent police information with their
counterparts around the globe, 24 hours a day, 365 days a year
- It enables investigators to access INTERPOL's range of criminal databases. Authorized users
can search and cross-check data in a matter of seconds, with direct access to databases on
suspected criminals or wanted persons, stolen and lost travel documents, stolen motor vehicles,
fingerprints, DNA profiles, stolen administrative documents and stolen works of art

I-Link
- a unique and dynamic operational system that centralizes and continually enhances database
features.
- It helps make connections between seemingly unrelated investigation, by identifying common
threads.

2. 24-HOUR RESPONSE (Operational Police Services)


Our Command and Coordination Centre (CCC) is operational around the clock and serves as the first
point of contact for any member country faced with a crisis situation. We can deploy
specialized response teams to the scene of a serious crime or disaster or to assist with security
preparations for a major international event.

Command & Coordination Centre


-it’s the operations room at INTERPOL, offering a point of contact for any member country seeking
urgent police information or facing a crisis situation.
- manned 24 hours a day, 365 days a year by staff members of various backgrounds and nationalities
who are fluent in several different languages.
-the original operations room based is at the General Secretariat in Lyon, France,
-the CCC has reinforced its global response with the opening of additional sites at the INTERPOL
Regional Bureau in :
S.Y. 2018-2019 SUMMER PERIOD
30

a. Buenos Aires, Argentina (2011);


b. INTERPOL Global Complex for Innovation in Singapore (2015)
-it provides better provide 24/7 operational support across time zones while delivering more direct
assistance and communications on a regional basis.

Services and activities


The CCC strengthens the reactivity and operational effectiveness of the world's police through the
following functions:
1. Assessing all incoming communications and determining the priority level of each
message received by the General Secretariat.
2. Conducting instant checks on all INTERPOL databases; distributing and assigning
information; and replying to all urgent queries immediately.
3. Monitoring open sources in order to assess threats and to ensure the full resources of the
Organization are ready and available whenever and wherever they may be needed.
4. Coordinating the exchange of intelligence and information for important operations, and
involving specialist units, regional offices and external partners as necessary.
5. Issuing alerts and publishing Notices where threats pose an imminent danger. These
include Orange Notices to warn police and/or the public about potential threats, and
Purple Notices, used to seek or provide information on modi operandi.
6. Assuming a crisis-management role during serious incidents, such as terrorist attacks,
and coordinating specialized assistance in the form of an Incident Response Team. This
brings together experts in various fields, such as forensic science, DNA, drugs, and so
on.
7. Deploying support teams at major events with an international implication in order to
support national police with security arrangements.

3. INVESTIGATIVE SKILLS (Operational Data Services and databases for police)


Forensic experts provide targeted support to member countries in the areas of fingerprint, DNA analysis
and Disaster Victim Identification. Criminal intelligence analysts monitor and analyse information related
to specific areas of crime and criminal organizations, and inform member countries about evolving
trends and patterns.

4. POLICE TRAINING (Training & Development)


We are committed to building the capacity of police around the world through training sessions and our
online learning centre. Our training portfolio ranges from practical courses in specific crime areas and
investigative techniques for frontline officers, to high-level management programmes for senior police
staff.

INTERPOL’s Core Functions


1. Secure global police communication services
2. Operational Data Services and databases for police
3. Operational Police Services
4. Police Training and development

INTERPOL Notices
- International requests for cooperation or alerts allowing police in member countries to share
critical crime-related information.
- It is published by INTERPOL’s General Secretariat at the request of National Central
Bureaus(NCBs) and authorized entities
- published in any of the Organization’s official languages:
(SAFE : Spanish, Arabic, French & English)

Types of INTERPOL Notice

S.Y. 2018-2019 SUMMER PERIOD


31

Red Notice Yellow Notice


To seek the location and arrest of To help locate missing persons, often
wanted persons with a view to minors, or to help identify persons
extradition or similar lawful action. who are unable to identify
themselves.

Blue Notice Black Notice


To collect additional information To seek information on unidentified
about a person’s identity, location or bodies.
activities in relation to a crime.

Green Notice Orange Notice


To provide warnings and intelligence To warn of an event, a person, an
about persons who have committed object or a process representing a
criminal offences and are likely to serious and imminent threat to public
repeat these crimes in other safety.
countries.

INTERPOL–United Nations Security Purple Notice


Council Special Notice To seek or provide information on
Issued for groups and individuals modus operandi, objects, devices and
who are the targets of UN Security concealment methods used by
Council Sanctions Committees. criminals.

DIFFUSION
- Another request for cooperation or alert mechanism similar to notice
- Less formal than a notice but is also used to request :
a. the arrest or location of an individual
b. additional information in relation to a police investigation
- Circulated directly by an NCB to the member countries of their choice, or to the entire
INTERPOL membership and is simultaneously recorded in INTERPOL’s Information System.

PRIOTITIES (STRATEGIC FRAMEWORK)

1: Serve as the worldwide information hub for law enforcement cooperation


S.Y. 2018-2019 SUMMER PERIOD
32

The exchange of police information lies at the core of INTERPOL’s mandate. We manage secure
communication channels that connect National Central Bureaus in all our member countries, along with
other authorized law enforcement agencies and partners, and which give access to a range of criminal
databases
.
We are working to reinforce this technical infrastructure, expand access to our services and enable
interoperability with other relevant information systems. We also support member countries in
improving the quality of data exchanged and producing analysis, in order to enable the law enforcement
community to make well-informed tactical, operational or strategic decisions.

2: Deliver state-of-the-art policing capabilities that support member countries to fight and
prevent transnational crimes
A large number of policing capabilities – such as forensics and training – underpin our three Global
Programmes to fight crime (Counter-terrorism, Cybercrime, and Organized and emerging crime). We
seek to serve as the catalyst for efforts in global, regional and national law enforcement.
In particular, we will work directly with National Central Bureaus and specialized agencies, but also
through multidisciplinary groups, to become a recognized hub for providing expertise, facilitating the
exchange of best practices, and hosting training facilities. Ultimately, these capabilities will combine to
deliver the best operational outcome.

3: Lead globally innovative approaches to policing


We are committed to enhancing the tools and services we provide, and to act as an incubator for the
research and development into solutions and standards for international policing.
We strive to ensure that innovation becomes part of our working culture, upheld at every level of the
Organization. We will also reinforce our role as the global police think tank and a forum for exchange at
expert level, with an emphasis on future trends and strategic foresight.

4: Maximize INTERPOL’s role within the Global Security Architecture


This goal aims to bridge information gaps in the Global Security Architecture, strengthening cooperation
between relevant sectors and entities, and raising political awareness and support for INTERPOL’s
Programmes.

We will seek to federate the international community around common goals on security, and to
strengthen the regional and ground-level delivery of programmes and capabilities to meet those goals.
This could also require strengthening the legal foundations of the Organization for more effective
service delivery.

5: Consolidate resources and governance structures for enhanced operational performance


In order to keep up with the evolving law enforcement landscape, we will continue to modernize the
Organization’s structures and processes to ensure efficient delivery of our capabilities and services.
INTERPOL will focus its efforts on implementing a sustainable funding model for the Organization,
addressing risks at the organizational level, fostering change management, promoting a sustainable
human resources strategy, and re-assessing our governance framework.

Crime Areas:
1. Corruption 11. Pharmaceutical Crime
2. Crimes against children 12. Terrorism
3. Cyber Crime 13. Trafficking in Human Beings
4. Drugs 14. Trafficking in illicit goods
5. Environmental crime 15. Vehicle Crime
6. Financial crime
7. Firearms
8. Fugitive Investigation
9. Maritime piracy
10. Organized crimes

S.Y. 2018-2019 SUMMER PERIOD


33

Philippines

The Philippine Center on Transnational Crime (PCTC)


- It houses INTERPOL Manila by virtue of E.O 62
- The national law enforcement agency which carries investigations beyond the borders of the
Philippines.
- INTERPOL Manila is an integral part of the PCTC. Its mission is to serve as the liaison office
and main coordinating body for international police cooperation on behalf of all law enforcement
agencies in the Philippines. Its main duties include:
1. Monitoring and coordinating law enforcement activities relating to transnational
crimes affecting the Philippines;
2. Operating and maintaining an operations centre to serve as the focal point for
international cooperation on transnational crime for all law enforcement agencies in
the Philippines;
3. Acting as a NALECC Sub Committee in the monitoring of crime and activities which
threaten national security and the economy.
4. INTERPOL Manila works around the clock and uses English as its main working
language.

Its priority crime areas include:


• Illicit trafficking of narcotic drugs and psychotropic substances;
• Money laundering;
• Terrorism;
• Arms smuggling;
• Trafficking in persons;
• Piracy;
• Any crime which impacts the stability and security of the Philippines.

The PCTC is being assisted by 22 Philippine law enforcement agencies:

Philippine National Police; Department of Tourism;


National Bureau of Investigation; Philippine Center on Transnational Crime;
Department of Justice; Philippine Drug Enforcement Agency;
Anti-Money Laundering Council; Optical Media Board;
Bangko Sentral ng Pilipinas Philippine Coast Guard
(Philippine Central Bank);
Bureau of Customs; Philippine Overseas Employment Administration;
Bureau of Immigration; Philippine Ports Authority;
Bureau of Internal Revenue; Philippine Postal Corporation;
Dangerous Drugs Board; Presidential Anti-Organized Crime Commission;
Department of Finance; Securities and Exchange Commission;

HISTORY of National Central Bureau- Interpol Manila

- The NCB-Interpol Manila traces its beginnings in 1961 when the Philippines became a member of the
ICPO – INTERPOL, with the National Bureau of Investigation (NBI) as its focal point. Since then, the
NCB-Interpol Manila has undergone changes, which enable it to confront the challenges of the times.
- In one of the General Assembly meetings of the ICPO-INTERPOL, its has been decided and adopted
that the National Central Bureau shall be handled by the controlling body or Headquarters of the
Criminal Police Organization of a member State to be able to do its undertakings with authority.
- In compliance thereto the President of the Philippines issued Memorandum Order Nr. 92 on
February 15, 1993 designating the Philippine National Police as the INTERPOL National Central
Bureau for the Philippines, with the Chief, Philippine National Police (PNP) as its concurrent
Chairman.

The Interpol National Central Bureau was originally composed of the following members:
Director General Philippine National Police ——- Chairman
Director, National Bureau of Investigation ——– Member
Commissioner, Bureau of Customs ———Member
Commissioner, Bureau of Internal Revenue ———Member
Commissioner, Bureau of Immigration ———Member
Governor, Bangko Sentral ng Pilipinas ———Member
Executive Director, Dangerous Drug Board ———Member
Commissioner, Economic Intelligence and Investigation Bureau (EIIB) ———Member

S.Y. 2018-2019 SUMMER PERIOD


34

NCB-Manila

- is an inter-ministerial entity which is not part of the Philippine National Police but instead is
directly attached to the Office of the President. As such it benefits from direct access to the
services of all law enforcement agencies in the Philippines.
- The NCB is referred to as “NALECC-SCILEC” (National Law Enforcement Coordinating
Committee - Sub Committee on International Law Enforcement Cooperation)

Mission and Function of Interpol NCB-Manila

NCB-INTERPOL Manila serves as the office and main coordinating body for international police cooperation
against transnational crimes representing all law enforcement agencies in the Philippines. In the
accomplishment of its mission, NCB-INTERPOL Manila has the following functions.

1. Monitor and coordinate all activities of all law enforcement agencies relative to transnational crime
committed against or affecting the Philippines;
2. Maintain records and minutes of all meetings of NCB-INTERPOL Manila.
3. Operate and maintain the operation center of NCB-INTERPOL Manila as the focal point for
international cooperation against transnational crimes for all law enforcement agencies in the
Philippines; and
4. The NCB-INTERPOL Manila also functions as a sub-committee of the NALECC for the monitoring of the
sensitive activities of the latter.

Roles and Function of NCB Sub-Bureaus

1. Receives request for information and record checks of local and foreign nationals and reply to such
request.
2. Conduct investigation of cases brought to their attention involving Filipino’s and foreign nationals as
requested by other Interpol member countries.
3. Monitor result of investigation for cases referred by Interpol for compliance and feedback.
4. Ensures that cases referred for action are acted upon and reports are rendered promptly.
5. Informs Interpol Manila on any case being handled by their agency involving foreign nationals or
seek assistance for verification or any coordination needed with other Interpol member countries
based on the Standard Message Format.
6. Maintain a list of wanted persons (local/foreign) circulated by Interpol and inform Interpol Manila of
any arrest.
7. Gives summaries of the most important international cases in which their agency was involved; and
8. Submits periodic activity report of accomplishments to Interpol Manila based on the Standard
Message Format.

Benefits that the Philippines Derive as Member of the INTERPOL

1. As member of the ICPO-INTERPOL we can have access to police information on international


Criminal Cases.
2. Access to International Summaries of Criminal Cases.
3. Attend meetings and symposiums on case of special topics.

S.Y. 2018-2019 SUMMER PERIOD


35

4. Request information about criminal intelligence in an international perspective through the


criminal intelligence subdivision.
5. Access to information dealing with economic and financial crime in an international level.
6. Access to information dealing with illicit drug trafficking in an international level.
7. Recipient of reference materials on criminology, crime prevention, criminal law and procedures,
techniques used by the police etc.
8. Participate in I.C.P.O – Interpol organized trainings.
9. Receives technical assistance and support on telecommunication and computerization.
10. Use of the IPSG to circulate information intended for International Circulation:a. Individual
notices
b. Stolen property notices
c. Modus operandi sheets
d. Facilitating identification
e. Criminal information on intelligence
11. Receives cooperation from other NCB’s in Combating International Crimes such as:a. Crimes
against person
b. Crime against property
c. Organized crime and terrorism
d. Firearms and explosives used for criminal purposes
e. Human trafficking, exploitation of prostitution, child abuse
f. Unlawful interference with international civil aviation
g. Trafficking of precious substance (gold, diamond, etc.)
h. Currency counterfeiting and forgery
i. Identification, tracing, seizure and forfeiture of assets derived from criminal activities
j. Illicit drug trafficking
k. Drug related activities
12. Receives cooperation on matters involving extradition from other NCB’s.
13. Receives technical assistance granted by the more advanced countries to less advanced
countries especially in connection with training and specialization of police personnel.

ASEANAPOL

The tenure of services are:


Executive Director - 2 years
Directors - 2 to 3 years

VISION
S.Y. 2018-2019 SUMMER PERIOD
36

" TOGETHER WE KEEP THIS REGION SAFE "


In essence embodies our reason for existence and aspiration to enhance cooperation in the realm of
regional policing towards ensuring the safety of the region.

MISSION
" PREVENTING AND COMABTING TRANSNATIONAL CRIME THROUGH A GREATER NEXUS AND
CREATIVE POLICING COLLABORATION "
To mutually contribute and synergize policing resources and expertise to effectively thwart organised
and emerging international criminal enterprises for a safer ASEAN Community.

ASEANAPOL CONFERENCE

The Conference shall be held annually on a rotational basis amongst member countries. The
Conference will be attended by the Chiefs of Police.

ASEANAPOL EXECUTIVE COMMITTEE

- The Executive Committee shall comprise of Deputy Heads of delegation attending the annual
Conference.
- The Executive Committee shall meet annually, immediately before the Conference.
- The Executive Director of the ASEANAPOL Secretariat shall present a report of its activities, including
amongst others, issues on financial performance, procurement of works, supplies and services and
control and management of contracts, to the Executive Committee.
-The Executive Committee shall provide a summary report of the activities of the Secretariat to the
Heads of Delegation at the Conference and at the Closing Plenary Session of the Conference.

EXECUTIVE DIRECTOR
The Executive Director of the Secretariat shall be appointed by the ASEANAPOL Conference upon
nomination on a rotational basis in alphabetical order for a term of two years. The Executive Director of
the Secretariat shall be a Senior Police Officer of the rank of Colonel and above or its equivalent. The
Executive Director will be assisted by Director for Police Services and Director for Plans and
Programmes shall be a Senior Police Officer of the rank of Major and above or its equivalent.

OBJECTIVE OF ASEANAPOL
 Enhance police professionalism
 Forge stronger regional cooperation in policing
 Promote lasting friendship amongst police officers of member countries

OBJECTIVES AND FUNCTIONS OF THE SECRETARIAT

OBJECTIVES

 Ensure the effective implementation of all resolutions adopted at the ASEANAPOL


Conferences;
 Serve as a coordination and communication mechanism to allow members to establish and to
maintain all channels of interaction amongst members;
 Foster mutual assistance and cooperation amongst members; and
 Endeavour to increase regional cooperation efforts against transnational crime.

FUNCTIONS

 Prepare and implement work plans for effective implementation of all the resolutions adopted in
the annual Joint Communiqués signed at the ASEANAPOL Conferences;
 Facilitate and coordinate cross-border cooperation on intelligence and information sharing and
exchange;
 Facilitate and coordinate joint operations and activities involving criminal investigations, the
building and maintenance of the ASEANAPOL database, training, capacity building, the
development of scientific investigative tools, technical support and forensic science;
 Provide support and necessary assistance in organising the ASEANAPOL Conferences;
 Submit on a quarterly basis to the Chiefs of ASEAN Police Forces proposals on all planned
programmed and activities to be carried out;

S.Y. 2018-2019 SUMMER PERIOD


37

 Prepare an annual report on its activities and expenditure to be presented to the ASEANAPOL
Executive Committee immediately before the ASEANAPOL Conference, and distributed to all
members and to the ASEANAPOL Conference; and;
 Act as a custodian of all documents and records of ASEANAPOL

PREFACE

The first formal meeting of the Chiefs of ASEAN Police was held in Manila, Philippines on the 21 to 23
October 1981.

 To discuss matters of law enforcement and crime control.


 This annual meeting was called ASEANAPOL Conference.
 The basic requirement for a country to become a member of ASEANAPOL is that the country
shall first be a member of ASEAN and the application shall be tabled at the conference for
approval.
 The members of ASEANAPOL were originally Malaysia, Singapore, Thailand, Indonesia and the
Philippines.
 1984, Royal Brunei Police joined the conference for the 1st time.
 1996, The Republic of Vietnam National Police joined the conference
 1998, Laos General Department of Police and Myanmar police force joined the conference
 2000, Cambodia National Police joined the conference
 The current members of ASEANAPOL are Brunei, Cambodia, Indonesia, Lao People
Democratic Republic, Malaysia, Myanmar, The Philippines, Singapore, Thailand and Vietnam.

ASEANAPOL Flag

Symbolism

1.1. The ASEANAPOL Flag is a symbol of the organization of the ASEAN Chiefs of National Police (ASEANAPOL) on the
regional cooperation in the prevention and combating transnational crime.

1.2. The ASEANAPOL Flag represents a firmed, determined, honest and protected ASEAN National Police organization
denoted by the colors of the flag which are (black, white, blue, yellow and brown)

 Black represents firm determination


 Yellow for honesty
 Blue represents peace and stability
 White depicts purity
S.Y. 2018-2019 SUMMER PERIOD
38

 Brown symbolizes prosperity.

1.3. The spray of rice and cotton represent prosperity, friendship and solidarity of the ASEAN National Police.

1.4. The shield represents community protection.

1.5. The three steps on the top of pillars symbolises the police motto on the fight against crime, love of humanity and helping
of delinquents while the ten steps at the bottom of pillar represent the ten ASEAN countries.

GUIDELINES ON THE ROLES AND FUNCTIONS OF ASEANAPOL CONTACT PERSONS


(ASEANAPOL SECRETARIAT)
1. INTRODUCTION

One of the important objectives of the Secretariat is to serve as a communication mechanism to allow Member
Countries to establish and to maintain all channels of interaction amongst Member Countries and Dialogue Partners. It also
includes the effective implementation of the adopted resolutions of the Conference and any issues at hand regarding
ASEANAPOL. In this regard, it is deemed necessary for the appointment of Contact Persons from the respective Member
Countries and Dialogue Partners as critical focal points amongst ASEANAPOL Member Countries, Dialogue Partners and the
Secretariat.

2. REFERENCE

Para 8 of Article 5 ofASEANAPOL Secretariat’s Terms of Reference (TOR) which states:


“Member Countries and Dialogue Partners shall name one or more officers/civilian staff as their contact persons to the
Secretariat and these Contact Persons shall report all implementations of the resolutions derived from the Conference or any
issues at hand upon request or at the annual Contact Persons meeting as the case may be.”

3. DEFINITION OF CONTACT PERSON

A person given the authority by the respective Chief of Police of Member Countries or Head of the
respective ministry or other relevant agencies/ organisations concerned for Dialogue Partners to provide information
and to act as an intermediary between ASEANAPOL Member Countries/Dialogue Partners and ASEANAPOL Secretariat.

4. CRITERIA IN THE SELECTION AND APPOINTMENT OF A CONTACT PERSON

4.1 A senior police officer/ civilian staff working for the respective Police Forces for Member Countries or asenior police officer/
civilian staff working with the relevant ministries/organisations/ agencies of the Dialogue Partners.

4.2 Preferably is a senior police officer not below the rank of Lt. Colonel (or equivalent) or a senior civilian staff with leadership
and managerial experience.

4.3 Good communication in English, both written and oral, as the official language for ASEANAPOL is English as well as
knowledgeable in Information Technology.

4.4 Able to relay information and reply enquiries promptly.

4.5 Sound understanding of ASEANAPOL related matters of mutual interest.

5. PROCEDURES TO BE A CONTACT PERSON

5.1 Shall be appointed in writing by the respective Chiefs of Police for Member Countries or Head of the respective ministries
or other relevant agencies/organisations concerned for Dialogue Partners.

5.2 The tenure of these Contact Persons shall be the prerogative of the respective Chiefs of ASEAN Police, Heads of
ministries/ organisations/ agencies.

5.3. Any new replacement shall revert to procedure as at Para 5.1.

6. RESPONSIBILITY OF A CONTACT PERSON

6.1 Shall be the link of information between his/her respective country with other ASEANAPOL Member Countries/Dialogue
Partners through all means of communication including email, telephone or facsimile for any issue which needs timely
approval by all Chiefs of ASEAN Police by way of circulation.

6.2. Shall acknowledge all correspondences from ASEANAPOL Secretariat and act on it promptly.

6.3 Shall be the link with the person in charge of each mandated areas of crimes subjects/issues discussed at the
ASEANAPOL Conference i.e. Illicit Drugs Trafficking, Terrorism, Arms Smuggling, Human Trafficking, Maritime Fraud, Wildlife
Crime, Commercial Crime, Bank Offences and Credit Card Fraud,Cyber Crime, Fraudulent Travel Documents, Transnational
Fraud, Progress on Electronic ASEANAPOL Database System (e-ADS), Mutual Assistance in Criminal Matters, and Exchange
of Personnel and Training Programmes amongst ASEAN Police Forces and any other matters stipulated in the Joint
Communique.

S.Y. 2018-2019 SUMMER PERIOD


39

6.4 Shall be the person representing the respective Member Countries/ Dialogue Partners at the annual ASEANAPOL Contact
Persons Meeting (ACPM).

6.5 Shall report on the progress of implementation of all adopted resolutions promulgated and issued during previous
ASEANAPOL Conferences and shall send updated reports to ASEANAPOL Secretariat, two months prior to the annual
ASEANAPOL Conference.

6.6 To be at liberty to cooperate, exchange ideas/opinions with other Member Countries/ Dialogue Partners and ASEANAPOL
Secretariat and to a certain extent be able to obtain and convey decisions on behalf of the respective Member Countries/
Dialogue Partners.

Europol
- is a high-security operational centre that operates non-stop: 24 hours a day, seven days a week and was
fully operational on July 1, 1999
- Europol officers are always ready to travel at short notice and provide support through mobile office.
- Its presence was also in demand in the fight against illicit drugs, and fully operational team to help
dismantle synthetic drugs laboratories on the spot.
- focuses on different areas of criminal and terrorist activity from one year to the next, depending on
requirements.
- Europol is the central European office for combatting euro counterfeiting
- Headquartered in The Hague, the Netherlands
- -Supports the 28 EU Member States in their fight against terrorism, cybercrime and other serious and
organized forms of crime and also work with many non-EU partner states and international
organizations.

Large-scale criminal and terrorist networks pose a significant threat to the internal security of the EU and to the
safety and livelihood of its people.

The biggest security threats come from:


 terrorism;
 international drug trafficking and money laundering;
 organized fraud;
 the counterfeiting of euros;
 trafficking in human beings

UNIQUE SERVICES

Our position at the heart of the European security architecture allows us to offer a unique range of services and
to serve as a:
 support centre for law enforcement operations;
 hub for information on criminal activities;
 centre for law enforcement expertise.

EUROPOL IN NUMBERS
 More than 1000 staff
 220 Europol Liaison Officers
 Around 100 crime analysts
 Supporting over 40 000 international investigations each year

Analysis is at the core of its activities


It has a criminal analysts are among the best trained in Europe used as state-of-the-art tools to support
investigations by law enforcement in Member States on a daily basis.
To give partners deeper insights into the crimes they are tackling, it produce regulars assessments that offer
comprehensive, forward-looking analyses of crime and terrorism in the EU, including the:

1. EU Serious and Organised Crime Threat Assessment (SOCTA), which updates Europe’s law enforcement
community and decision-makers on developments in serious and organised crime and the threats it
poses;
2. EU Terrorism Situation and Trend Report (TE-SAT), which gives a detailed account of the state of
terrorism in the EU;
3. Internet Organised Crime Threat Assessment (iOCTA), which reports on key findings and emerging
threats and developments in cybercrime;

S.Y. 2018-2019 SUMMER PERIOD


40

4. Europol Review, an annual publication that details the progress that the we and our partners has made
in fighting crime.

Through these reports and in other ways, Europol serves as an EU centre of expertise, providing a
central platform for law enforcement experts from the Member States.

International crime and terrorist groups operate worldwide and make use of the latest technology. To
ensure an effective and coordinated response, Europol needs to be equally flexible and innovative, and
to make sure its methods and tools are up to date.

Specialized bodies and bespoke systems

The bodies are:


1. Europol’s operational centre, the 24/7 hub for data exchange among Europol, Member States
and third parties;
2. the European Cybercrime Centre (EC3), which strengthens the law enforcement response to
cybercrime in the EU and thus help protect European citizens, businesses and governments
from online crime;
3. the Joint Cybercrime Action Taskforce (J-CAT), which drives intelligence-led, coordinated action
against key cybercrime threats and top targets by stimulating and facilitating the joint
identification, prioritisation, preparation and initiation of investigations;
4. the European Counter Terrorism Centre (ECTC), an operations centre and hub of expertise that
is a central part of the EU’s efforts to enhance its response to terror;
5. the European Migrant Smuggling Centre (EMSC), which supports Member States in targeting
and dismantling the complex and sophisticated criminal networks involved in migrant smuggling;
6. the Intellectual Property Crime Coordinated Coalition (IPC3), which is central to the EU’s efforts
to stem the tide of intellectual property crime within and outside the EU.

Europol's specialised systems, which offer fast and secure capabilities for storing, searching,
visualising and linking information, thus comprise a sophisticated crime-fighting toolbox, which include:

1. FIU.net, a decentralised and sophisticated computer network supporting the financial


intelligence units (FIUs) in the EU in their fight against money laundering and the financing of
terrorism;
2. The Secure Information Exchange Network Application (SIENA), a state-of-the-art platform that
meets the communication needs of EU law enforcement;
3. the Europol Platform for Experts (EPE), a secure, collaborative web platform for specialists
working in a variety of law enforcement areas;
4. the European Information System, the reference system for offences, the individuals involved in
them, and other related data.

S.Y. 2018-2019 SUMMER PERIOD


41

MANDATE
Europol supports law enforcement authorities throughout the EU on crime fighting activities in all its
mandated areas.

Operational activities
These activities focus on:
 illicit drugs
 trafficking in human beings
 facilitated illegal immigration
 cybercrime
 intellectual property crime
 cigarette smuggling
 euro counterfeiting
 VAT fraud
 money laundering and asset tracing
 mobile organized-crime groups
 outlawing motorcycle gangs
 terrorism

Organizational Structure
Europol is headed by an Executive Director, who is Europol’s legal representative and is appointed by
the Council of the European Union.

She is assisted by three Deputy Executive Directors:


 Operations Directorate
 Governance Directorate
 Capabilities Directorate

S.Y. 2018-2019 SUMMER PERIOD


42

Mission
The International Association of Chiefs of Police is dedicated to advancing the policing
profession through advocacy, research, outreach, and education in order to provide for safer
communities worldwide

Vision
Shaping the future of the policing profession

The International Association of Chiefs of Police (IACP)

 as the world’s largest and most influential professional association for police leaders
 The world's oldest and largest nonprofit membership organization of police executives, with over
20,000 members in over 89 different countries. IACP's leadership consists of the operating chief
executives of international, federal, state and local agencies of all sizes.
 is committed to advancing the safety of communities worldwide
 With more than 30,000 members in 150 countries
 Recognized leader in global policing, committed to advancing safer communities through
thoughtful, progressive police leadership
 Since 1893, the association has been serving communities worldwide by speaking out on behalf
of law enforcement and advancing leadership and professionalism in policing worldwide.
 Known for its commitment to enhancing community safety by shaping the future of the police
profession
 Preparing current and emerging police leaders—and the agencies and communities they
serve—to succeed in addressing the most pressing issues, threats, and challenges of the day.
 is a not-for-profit organization headquartered in Alexandria, Virginia.
 It is the publisher of The Police Chief magazine
 IACP membership is open to law enforcement professionals of all ranks, as well as non-sworn
leaders across the criminal justice system.

The Police Chief magazine


the leading periodical for law enforcement executives, and the host of the IACP Annual Conference, the
largest police educational and technology exposition in the world.

S.Y. 2018-2019 SUMMER PERIOD


43

UNITED NATION

- The name "United Nations", coined by United States President Franklin D. Roosevelt was first
used in the Declaration by United Nations of 1 January 1942, during Second World War.
- It is an international organization founded in 1945
- Currently made up of 193 Member States.The mission and work of the United Nations are
guided by the purposes and principles contained in its founding Charter.

- An international organization whose stated aims are facilitating cooperation in international law,
international security, economic development, Social progress, Human rights and achievement of world
peace.

- The UN provides a forum for its members to express their views in the General Assembly, the Security
Council, the Economic and Social Council, and other bodies and committees. By enabling dialogue
between its members, and by hosting negotiations, the Organization has become a mechanism for
governments to find areas of agreement and solve problems together.

- The UN's Chief Administrative Officer is the Secretary-General.

UN Main Organs

1. the General Assembly


2. the Security Council
3. the Economic and Social Council
4. the Trusteeship Council
5. the International Court of Justice
6. the UN Secretariat

1. General Assembly
The General Assembly is the main deliberative, policymaking and representative organ of the UN. All 193
Member States of the UN are represented in the General Assembly, making it the only UN body with universal
representation. Each year, in September, the full UN membership meets in the General Assembly Hall in New
York for the annual General Assembly session, and general debate, which many heads of state attend and
address. Decisions on important questions, such as those on peace and security, admission of new members and
budgetary matters, require a two-thirds majority of the General Assembly. Decisions on other questions are by
simple majority. The General Assembly, each year, elects a GA President to serve a one-year term of office.

S.Y. 2018-2019 SUMMER PERIOD


44

Security Council
The Security Council has primary responsibility, under the UN Charter, for the maintenance of international peace
and security. It has 15 Members (5 permanent and 10 non-permanent members). Each Member has one vote.
Under the Charter, all Member States are obligated to comply with Council decisions. The Security Council takes
the lead in determining the existence of a threat to the peace or act of aggression. It calls upon the parties to a
dispute to settle it by peaceful means and recommends methods of adjustment or terms of settlement. In some
cases, the Security Council can resort to imposing sanctions or even authorize the use of force to maintain or
restore international peace and security. The Security Council has a Presidency, which rotates, and changes,
every month.

 Daily programme of work of the Security Council


 Subsidiary organs of the Security Council

Economic and Social Council


The Economic and Social Council is the principal body for coordination, policy review, policy dialogue and
recommendations on economic, social and environmental issues, as well as implementation of internationally
agreed development goals. It serves as the central mechanism for activities of the UN system and its specialized
agencies in the economic, social and environmental fields, supervising subsidiary and expert bodies. It has 54
Members, elected by the General Assembly for overlapping three-year terms. It is the United Nations’ central
platform for reflection, debate, and innovative thinking on sustainable development.

Trusteeship Council
The Trusteeship Council was established in 1945 by the UN Charter, under Chapter XIII, to provide international
supervision for 11 Trust Territories that had been placed under the administration of seven Member States, and
ensure that adequate steps were taken to prepare the Territories for self-government and independence. By
1994, all Trust Territories had attained self-government or independence. The Trusteeship Council suspended
operation on 1 November 1994. By a resolution adopted on 25 May 1994, the Council amended its rules of
procedure to drop the obligation to meet annually and agreed to meet as occasion required -- by its decision or
the decision of its President, or at the request of a majority of its members or the General Assembly or the
Security Council.

International Court of Justice


The International Court of Justice is the principal judicial organ of the United Nations. Its seat is at the Peace
Palace in the Hague (Netherlands). It is the only one of the six principal organs of the United Nations not located
in New York (United States of America). The Court’s role is to settle, in accordance with international law, legal
disputes submitted to it by States and to give advisory opinions on legal questions referred to it by authorized
United Nations organs and specialized agencies.

Secretariat
The Secretariat comprises the Secretary-General and tens of thousands of international UN staff members who
carry out the day-to-day work of the UN as mandated by the General Assembly and the Organization's other
principal organs. The Secretary-General is chief administrative officer of the Organization, appointed by the
General Assembly on the recommendation of the Security Council for a five-year, renewable term. UN staff
members are recruited internationally and locally, and work in duty stations and on peacekeeping missions all
around the world. But serving the cause of peace in a violent world is a dangerous occupation. Since the
founding of the United Nations, hundreds of brave men and women have given their lives in its service.

What UN DO?
MAINTAIN INTERNATIONAL PEACE AND SECURITY

The United Nations came into being in 1945, following the devastation of the Second World War, with
one central mission: the maintenance of international peace and security. The UN does this by working
to prevent conflict; helping parties in conflict make peace; peacekeeping; and creating the conditions to
allow peace to hold and flourish. These activities often overlap and should reinforce one another, to be
effective. The UN Security Council has the primary responsibility for international peace and security.
S.Y. 2018-2019 SUMMER PERIOD
45

The General Assembly and the Secretary-General play major, important, and complementary roles,
along with other UN offices and bodies.

PROTECT HUMAN RIGHTS

The term “human rights” was mentioned seven times in the UN's founding Charter, making the
promotion and protection of human rights a key purpose and guiding principle of the Organization. In
1948, the Universal Declaration of Human Rights brought human rights into the realm of international
law. Since then, the Organization has diligently protected human rights through legal instruments and
on-the-ground activities.

DELIVER HUMANITARIAN AID

One of the purposes of the United Nations, as stated in its Charter, is "to achieve international co-
operation in solving international problems of an economic, social, cultural, or humanitarian
character." The UN first did this in the aftermath of the Second World War on the devastated continent
of Europe, which it helped to rebuild. The Organization is now relied upon by the international
community to coordinate humanitarian relief operations due to natural and man-made disasters in
areas beyond the relief capacity of national authorities alone.

Promote Sustainable Development


From the start in 1945, one of the main priorities of the United Nations was to “achieve international co-
operation in solving international problems of an economic, social, cultural, or humanitarian character
and in promoting and encouraging respect for human rights and for fundamental freedoms for all
without distinction as to race, sex, language, or religion.” Improving people’s well-being continues to be
one of the main focuses of the UN. The global understanding of development has changed over the
years, and countries now have agreed that sustainable development – development that promotes
prosperity and economic opportunity, greater social well-being, and protection of the environment –
offers the best path forward for improving the lives of people everywhere.

UPHOLD INTERNATIONAL LAW

The UN Charter, in its Preamble, set an objective: "to establish conditions under which justice and
respect for the obligations arising from treaties and other sources of international law can be
maintained". Ever since, the development of, and respect for international law has been a key part of
the work of the Organization. This work is carried out in many ways - by courts, tribunals, multilateral
treaties - and by the Security Council, which can approve peacekeeping missions, impose sanctions, or
authorize the use of force when there is a threat to international peace and security, if it deems this
necessary. These powers are given to it by the UN Charter, which is considered an international
treaty. As such, it is an instrument of international law, and UN Member States are bound by it. The
UN Charter codifies the major principles of international relations, from sovereign equality of States to
the prohibition of the use of force in international relations

Flag & it’s Emblem

The Design
S.Y. 2018-2019 SUMMER PERIOD
46

The original UN logo was created by a team of designers during the United Nations Conference on
International Organization in 1945. The design team was led by Oliver Lincoln Lundquist.

The United Nations Emblem


The design is "a map of the world representing an azimuthal equidistant projection centred on the North
Pole, inscribed in a wreath consisting of crossed conventionalized branches of the olive tree, in gold on
a field of smoke-blue with all water areas in white. The projection of the map extends to 60 degrees
south latitude, and includes five concentric circles" (original description of the emblem).

The United Nations Flag


The official emblem of the United Nations in white,centered on a light blue background.

Approval
The UN logo was approved on 7 December 1946.

Its Use
The UN logo has been incorporated into the logos of several UN Family members. The logo is also
used on United Nations stamps.

OFFICIAL LANGUANGE

(SCAFER)

There are six official languages of the UN. These are Arabic, Chinese, English, French, Russian and
Spanish. The correct interpretation and translation of these six languages, in both spoken and written
form, is very important to the work of the Organization, because this enables clear and concise
communication on issues of global importance.

“Knowing Is Not Enough; We Must Apply. Wishing Is Not Enough; We Must Do.” –
Johann Wolfgang Von Goethe

Apply what we learn and take action toward success, rather than waiting and hoping.

GOD BLESS!!!

S.Y. 2018-2019 SUMMER PERIOD

Das könnte Ihnen auch gefallen