Beruflich Dokumente
Kultur Dokumente
PART
HISTORICAL DEVELOPMENT
Introduction
Years, decades and centuries have passed organized crimes continuously exists
without the exact and clear explanation of its existence, but its presence is felt though they
are intangible, they are ghost co existing with human, they have a government much
organized and powerful than ours. For an organized crime group, money is everything and
to have money they’ll need power and in order to achieve power they must show an
uncontested display of strength and superiority, through this they slowly evolved and one
by one achieved their main goal, “to acquire dirty monies and power.”
The pirates who plundered and looked merchant vessels in the seventeenth century
and who undertook large-scale trade in stolen goods may be considered among the
earliest organized crime groups. However, most observers locate the origins of the
distinctly American style of organized crime in the urban centers of the late nineteenth and
early twentieth century. In a fundamental way, urban conditions provided the kind of
environment in which organized crime could flourish.
The large population sizes provided a “critical mass” of offenders, customers, and
victims and thereby facilitated the development of profitable markets in illicit goods and
services. Moreover, the size and density of urban networks allowed criminal forms of
organization to become diversified and encouraged the growth of essential support
services, such as those offered by corrupt politicians or police.
These early forms of criminal organization were typically tied to local areas and
because of the highly segregated character of the city, they had important ethnic
dimensions. During the first two decades of the 20th century, residents of the “Little
Italies” of many eastern industrialized urban areas had to contend with a crude form of
protection racket known as “La Mano Negra” or “the Black Hand.” Those members of the
local community who were better off financially might receive an anonymous note
demanding that a sum of money be paid to the writer.
Organized crime groups may be small, but they typically involved a sizeable number
in the planning and execution of illegal acts. They requires a continuous commitment by its
members although there may be some non-members participating for short periods of
time. A major factor that distinguishes them from others is their elaborate planning and
lack of impulsiveness in committing crimes.
Organized crime groups have as their fundamental goal is the economic gain.
Economic gain may be achieved through many means—both legitimate and illegitimate.
Group members use a wide variety of tactics to accomplish the criminal enterprise—
violence and intimidation, inspired by corruption and greed are common working tools.
Enumerated and briefly discussed hereunder are the traditional organized crime
groups, as follows:
1. Italian-American Mafia
2. Japan’s Yakuza
Despite their notoriety in modern Japan, the precise origin of the Yakuza is still
somewhat the subject of debate. The first historical interpretation of their derivation is
from the Hatamoto-Yakko or Kabuki-Mono of the 17th century Genroku Era, who were
derivative classes of the low-rank hatamoto, lower salaried samurai who constituted a
quarter of the shogun’s retainers. Other theories, suggested by the Yakuza members
themselves claim their origins are from the Machi-Yokko, who policed villages by
protecting them from the Hatamoto-Yakko that tried to steal from them, despite their
being outmatched by the Hatamoto-Yakko in training and strength.
3. Chinese Triad
The Triads were started as a resistance to the Manchu Emperor of the Qing Dynasty
- the ethnic Manchus were regarded as a foreign occupation at the time. In the 1760s, a
society called the Tian Di Hui, “The Society of Heaven and Earth,” was formed in China. Its
purpose was to overthrow the Manchu-led Qing Dynasty and restore Han Chinese rule. AS
the Tian Di Hus spread through different parts of China, it branched off into many groups
and became known by many names, one of which was “Sanhehui”, literally “Three
Harmonies Society”, referring to the unity between Heaven, Earth and Man.
The following will present the current crime situation on four of the more prevalent
activities, as follows:
1. Drugs Trafficking
Shabu in the Philippines mainly comes from Southern China particularly from
Guandong and Fujian. Previously, “ephedra” or “ephedrine” is processed in China and
smuggled in the Philippine as shabu. However, the discovery of a big clandestine shabu
laboratory in Cagayan Province at Northern Luzon in 1999 showed that the drug syndicates
have also started processing ephedrine and shabu right in the Philippines. Intensified
campaign against illegal drugs resulted in more discoveries of shabu laboratories even in
the National Capital Region.
2. Kidnap-for-Ransom
3. Robbery-Hold-Up
Bank robbery groups are considered as the most organized among the crime
groups. They are usually composed of hardened criminals and/or personalities of tested
daring capabilities. Members are trained to follow and executed minute details of a well-
planned operation. Usually, all members are heavily armed and ready to forcibly douse any
opposition. The robbery group initially places the target bank under a thorough casing and
surveillance, week or even months in advance.
4. Carnapping
Most of the vehicles were carnapped in parking lots, residential areas and middle
class subdivisions. Car theft usually occurred between 2 o'clock and 4 o'clock in the
morning due to following reasons: inadequate police visibility, street parking opportunity,
natural advantage during nighttime for criminal elements, and lack of appropriate security
measures in residential areas. These vehicles were later either sold after acquiring falsified
documents or dismantled and sold as used parts.
It has been said the common denominator among OCGs is the objective to acquire
“dirty money” through their illicit activities. Thus, denying the OCGs to enjoy the fruits of
their criminal act can serve as effective deterrence to these groups. Along this line of
argument, the Anti-Money Laundering Act (AMLA) or RA 9160 was enacted in 2001, and
amended by RA 9194. Among others, the AMLA criminalizes money laundering and
provides for the penalties therefore, and the freezing and forfeiture of assets.
PART
ORGANIZATIONAL STRUCTURE
To many people, the term organized crime is one that conjures up the image of a
single, large-scale, secret criminal organization. Although the term is usually associated
with the well-known crime syndicate, it also describes many other crime organizations with
similar criminal characteristics.
There are two (2) types of organizational structures of organized crime group, as
follows:
Briefly discussed and enumerated are some of the prominent features of organized
crimes, as follows:
The criminals who fill the rosters of organized crimes are ranked according to the
importance of their positions. Each member either serves within the management
structure or contributes to the operation of a particular enterprise. Several roles can be
identified within their general structure, i.e., money mover—assists in the flow of cash from
illegal to legal, corrupter—a defense attorney or lobbyist, money maker—members whose
rackets brings a lot of profit, enforcers—members skilled in violence, and associates
members—those who works on a contractual basis.
An organized crime, regardless of its size, has one of more of three types of relationships
with individual criminal enterprise or racket within its territory. First is the syndicate-run operation,
such as numbers bank, where the syndicate’s own employees and capital are used; second is the
syndicate franchise, whereby a distinct geographical area, is ceded to an independent operator for
the purpose of running an illegal business; and third may be termed as a joint venture, involves two
criminal groups of comparable size and ability to employ violence at any given moment.
3. Leadership Styles
Whatever the organizational attributes of a given organized crime, the leaders choose their
own styles of handling outside competition, internal disputes, and relationships with public officials.
Some leaders consciously choose a low profile that is consistent with the claim—usually traceable
directly to them—that there is no organized crime in their community because no racketeers can be
identified. Others seem to enjoy the public spotlight and the influence and prestige that go with a
position for the cold, calculating exercise of power.
The business of organized crime group has been described as providing goods and
services that happens to be illegal. The core of organized crime activity is the supplying of
illegal goods and services-gambling, loan sharking, narcotics, and other forms of vice.
As in any business, the better organized are usually the more successful, and
organized crime is basically a business enterprise. Organized crime group has three forms:
1. Parasitic
Members of criminal organization extort money from illegal entrepreneurs under a threat of
violence.
2. Reciprocal
3. Entrepreneurship
1. Vertical Integration
The organized groups whore having sources of supply which are complicated and
varied, and are typically more able to avoid detection and investigation by the law
enforcement.
3. Exploitation of Social and Political Condition
Many organized crime groups that focus on the drug trade have learned to
capitalize on vulnerable social and political conditions of certain third world countries and
the social inequities suffered by many inner-city residents, more particularly those living in
depressed urban or squatters areas.
4. Insulation of Leaders
As with all large and successful organized crime groups, organizational structure
tends to insulate the upper echelon from those at the lower rung of the organizational
structure. Direct contact with drug users or buyers is usually avoided to prevent detection
from outsiders, or more commonly from becoming easily established positive identity.
The following two sections address “the pyramid effect” and “corruption of public
institution” and how organized crime produces genuine harm to individual citizens and the
community at large.
1. Pyramid Effect
The crime pyramid begins with a large-grossing enterprise such as a numbers bank.
To run the bank, its managers and employees must violate lottery and perhaps other
gambling laws, as well as conspiracy laws, and income tax laws. If communication’s
facilities are use to lay off heavy bets or if the bank’s personnel travel to and from work,
anti-racketeering laws are violated each day the banks operates.
PART
INVESTIGATIVE PROCEDURES
Despite the gains achieved in the area of law enforcement, the problem on
organized crime has persisted. This is mainly because of the fact the while our law
enforcement agencies have taken strides in advancing their techniques in crime
investigation and detection, criminals have likewise skillfully organized themselves to keep
up with the pace.
Strategies in Investigation
These crimes are often referred to as “victimless crimes,” because victims are
unlikely to report the crime to the police or law enforcement agencies. To seek out criminal
activity in the most efficient manner possible, proactive law enforcement officers must
conceal their identities and otherwise deceive the criminals they are stalking. Authorities in
the field pointed out that both reactive and proactive law enforcement officers are exposed
to opportunities for graft, but the latter are more severely tested.
The reactive law enforcement officer, “were he has to accept money or favors to act
other than as his duty requires, would have to conceal or alter information about a crime
already known to his organization.” The proactive enforcement agents, however, “can
easily agree to overlook offenses know to him but to no one else or to participate in illegal
transactions for his own rather than for the organization’s advantage.” Undercover officers
pretending to be criminals are difficult to supervise; the agency for which they work often
knows about their activities only to the extent that the agents inform it.
At the outset, one must recognize that not all investigations can be handled in the
same manner, and that prosecution may require greater knowledge that currently exists
within most investigative units. Where a group is working trans-nationally, it is imperative
that there is positive working relationship with investigators representing the other
countries involved.
Today it is not uncommon for organized crime to plan a crime in one country, carry
it out in another, escape to third country, and keep the proceeds in the fourth country.
Organized crime, however, is not necessarily an international activity; most organized
criminal activity of interest in a particular country will occur within its borders. In some
cases it will be necessary to pass new laws and done without a full understanding of the
problems.
Not all groups are organized in the same way. Most groups are hierarchical, with
individuals serving in the roles of leader, supervisors or managers, and workers. This is
common in virtually all traditional organized crime groups. In some of the newer groups,
however, investigators are finding shared leadership, sometimes involving a loose
confederation of groups working together to commit crimes where particular expertise or
contacts are necessary.
2. Groups Membership
In the more traditional groups, membership is strictly controlled; it may take years
before an individual is fully trusted. Groups tend to develop elaborate recruiting
procedures, including using young children as runners who “graduate” slowly to more
difficult and challenging assignments. At the center or core of the leadership, one usually
finds old friends, and frequently family members. Many of the newer groups are built
around family relationships, which make control easier for the group and infiltration
difficult for law enforcement.
3. Sphere of Influence
Most active enterprise crime groups could not survive without corrupting
government officials. Corruption practices range from minor bribery or law enforcement
agents to “look the other way,” to paying off judges and high-ranking officials. The
investigation must have some idea of the dimensions of this type of activity.
The means by which a group attains its goals represent its modus operandi.
Knowing how the group works provides the basis for building a criminal case. Enterprise
criminals are likely to be very sophisticated. Generally, they would not have attained this
level of criminal activity without some knowledge of how to avoid detection and
prosecution.
1. Asset Forfeiture
Forfeiture can be defined as government seizure of property derived from or used in
criminal activity. It is designed to strip criminals of their financial rewards and is widely
used because the threat of imprisonment and fines has been inadequate to deter or
punish crimes netting huge profits. The practice of forfeiture is not a new sanction. In fact,
during the middle Ages, forfeiture of one’s estate was a common punishment for most
felony convictions.
2. Electronic Surveillance
3. CCE Provision
It is the “kingpin” provision of the law that enables the prosecution of the principal
management or organizes of drug-trafficking networks to be charged with operating
Continuing Crime Enterprises (CCE). Convicted defendants may receive substantial prison
sentences that include, in some cases mandatory life imprisonment with not possibility of
parole.
5. Conspiracy Law
Conspiracy law has proved to be one of the most useful types of law in combating
organized crime. Simply defined, conspiracy is an agreement between two or more persons
to commit a criminal act accompanied by the commission of at least one overt act in
furtherance of the conspiracy. The use of the conspiracy statute can have many benefits
for the criminal investigator.
Inter-Agency Cooperation
PART
FINANCIAL INVESTIGATION
An organized crime, no matter the size, still functions the same way as any other
business operation. The difference is in the legality of the financial gain or income derived.
When the investigator can prove that proceeds from illegal activities go directly into the
pocket of a suspect, conviction for the illegal activity is certain to follow.
Financial investigation, as you already know, is a toll that causes devastating loss to
the criminal. One specific aspect of that technique is known as concealed income analysis
or the net worth method. The purpose of the net worth analysis is to determine the extent
to which a person, group, of organization receives and benefits from money obtained from
other than legitimate sources.
In this particular investigative undertakings, the net worth principle has been
commonly used by government tax authorities for the purpose of determining taxpayer’s
income tax liabilities, primarily in those instances where no books or record of income and
expenses have been maintained by taxpayers from which a determination of tax liability
could be made.
From the presumption, the courts also recognize the forfeiture of assets which are
the product of that unexplained source of income. It is constructive to now define some of
the terms and concepts common to the net worth analysis procedure. Some of the factors
in net-worth principles are as follows:
1. Assets
2. Liability
3. Net Worth
At a specified point in time, total assets minus total liabilities or what a person
owns, less what he owes.
4. Income
These are money or goods receive in return for services or goods over a period of
time, i.e., salary, profits, and interest.
5. Expense
Are payments for consumables as part of living or doing business, over a period of
time, i.e., food, gasoline, taxes, medical care, entertainments, and travels, etc?
What are the legally accepted standard methods of proof in financial investigation?
There are three methods of proof that have been accepted to prove financial investigation
in criminal case. These are the specific item, the bank deposits and cash expenditures, and
the net worth and expenditures methods of proof. Each method relies on a thorough
investigation of the facts, deductive and inductive reasoning in the analysis of
circumstantial evidence, and establishing “proof beyond a reasonable doubt” thorough
negative proof of potential defenses.
The three basic methods of proof will apply these requirements and incorporate the
judicial modifications to insure accuracy and a high level o9f success in the presentations.
The case of Holland vs. U.S. is considered a landmark decision specifically addresses the
use of the net worth and expenditures method, the court’s explanation of their decision
outline several specific needs that have to be met for the use of the financial investigation
applications to be used and deemed valid in litigation.
Specific Items of the Standard Methods of Proof
This method of proof is the simplest way to conduct a financial investigation, and
the easiest to present to a prosecutor or court. The investigation focuses on specific illegal
or unreported transactions and shows the financial gain received by the perpetrator from
the alleged illegal activity. The specific item method is used primarily in cases where the
financial crime involves a single type of fraud, or when the evidence of financial gains from
the crime is sufficiently complete for presentation to court.
Specific items are just that, specific documentary evidence that proves financial
gain from a pattern of illegal acts. When a thief is found selling a stolen item, the
transaction corroborates his commission of the crime. Similarly, when an organized crime
builds a criminal enterprise to gain financially from a series of illegal acts, the profits he
receives be attributable to the specific illegal acts committed.
The second phase in the investigation will be to follow the “money trail.” Once the
evidence obtained show the fraudulent activity, the investigator must focus on identifying
all the people involved in the scheme, the illegal benefits that each received, and the
location or use that was made of the illegal proceeds. Two possible scenarios were
presented that the company could use to conceal the funds derived from the scheme.
Following the money trail to its final destination provides the circumstantial
evidence necessary to identify all of the people involved and convince the court of their
culpability in the crime. The money trail also provides evidence toward motive, knowledge,
and intent, which are inclusive in the elements of financial investigation.
This method of proof is the most comprehensive and, therefore, the most difficult to
present for the prosecution and to prove to a judge. This method began early in the
criminal prosecutions of tax evasion cases. This method was acceptable for criminal
prosecution was able to negate all other possible sources of income. The trial and
prosecution of the members of organized crimes led law enforcement to pursue any and
all avenues of criminal prosecution to break up and disburse organized criminal activities.
The net worth is complete listing of assets and liabilities, or what you own less what
you owe. Because it tries to determine monies earned, all assets are listed at cost—value
appreciation cannot be included, and all liabilities at net received—loan fees and cost and
interests expenses are treated in the expenditures analysis. These items are included at
the full amount regardless of when during the time period—usually the calendar year, they
were acquired.
The bank deposits and cash expenditures method of proof in many criminal
financial investigations, most often when the investigators believe that they have obtained
all of the bank records of the subject, and when the subject makes regular and periodic
deposits to those accounts.
Several methods and techniques are used to obtain evidence in all types of
investigative work. These methods and their applications vary at the discretion of the
investigator. For successful financial investigations, interviewing, documentation, and
observation are three critical elements in gathering evidence.
The investigator needs to apply patience, diligence, and constant analysis of the
pieces of evidence to be able to see and understand the financial activities of the subject,
so as to determine whether or not a financial crime has occurred, and whether or not
others are involved.
PART
INTELLIGENCE OPERATIONS
Purposes of Intelligence
Intelligence data are collected for three main purposes, i.e., tactical, operational
and strategic. At times, these three categories overlap. Tactical intelligence is information
that contributes directly to the achievement of an immediate law enforcement objective,
such as arrest and prosecution. Operational intelligence as the name implies, is geared
towards, and contributes to enforcement objectives. Strategic intelligence is information
that contributes to producing sound judgment with respect to long-range law enforcement
objectives and goals.
Heart of Intelligence
Analysis of Intelligence
1. Association Analysis
Using data received through surveillance or informants, a link chart is produced showing
the links between known and suspected members of the organized crime group. The chart should
look like a family tree. It can list people, places, tings, entities or organizations.
2. Telephone Analysis
3. Conversation Analysis
Using eavesdropping information, testimony of snitches, or other "wires", the analyst can
often put together a content analysis chart, showing that certain phrases always precede an act of
violence against somebody. This is especially important if the members of the organization speak
in code words.
The kind of information collected and evaluated in this manner cover a broad range
of subjects, including most of the following: the nature of organized criminal activity and
degree of organization and monopolization; the kinds and degrees of violence, threat, and
corruption; recruitment and career patterns among local organized criminals and groups;
and the competitive or complementary nature of criminal networks in the community.
Categories of Intelligence
1. Knowledge
2. Organization
The organization category refers to the units within an organization, bureau, agency,
etc. whose function is to collect, analyze and disseminate intelligence information.
3. Activity
The activity category refers to the physical performance of collecting, analyzing and
disseminating intelligence information.
4. Product
The product category refers to the intelligence information produced. This category
of intelligence is the result of the collection, presentation, analysis, and interpretation of
information.
Safeguarding of Intelligence
The tools of the intelligence trade are similar or identical to those utilized by any
investigator. Casing is the first tool. This consists of the investigator viewing, investigating
and evaluating every facet of intelligence collection effort prior to taking any concrete
action. For example, if a site is proposed a convenient contact point, the investigator will
first case it or check it out thoroughly. This process helps those errors caused by impulsive
actions.
Electronic viewing devices, such a video camera and night scopes, can also be used.
Centralized records are generally an indication of an intelligence collection agencies’ level
of sophistication and provide another tool.
Concealment Principles
When sources are involved in the actual process of the collection of information, it
will be necessary for them to store that information in some form until it can be passed to
the intelligence collection agencies. In some cases, sources are located at some distance
from the intelligence operatives. Some are inside the organized crimes group’s
organization where frequent communication with the intelligence operatives is extremely
difficult.
Security Precautions
PART
6
CASE MANAGEMENT
The ultimate goal of the case management system is to allow the presentation of
the information collected to a court in a criminal case. The case management system
involves all the facts related to the incident under investigation and all investigatory steps
and facts uncovered in investigating the case.
It involves maintaining and up-to-date, accurate case folder that contains the
incident report and all follow-up reports on the investigation. It also contains all official
records, including the case index sheet, the investigative plan, and the assignment sheet.
Activities of Case Management
1. Taking notes on the facts observed at the scene of a crime or incident and
taking notes in canvasses and interviews of victims, witnesses, and other persons involved
in the investigation and the interrogation of suspects;
3. Maintaining a separate case folder that contains all the report, documents,
tapes, and other information documenting the investigation.
Law enforcement or police agencies had to establish a system of case file management for
the criminal investigation function, to include: types of records to be maintained, accessibility to
the files, and purging of files. Case files will be maintained on all cases in which investigative
activities are ongoing. The case files provide an immediate information resource to investigators.
Law enforcement or police agencies had to use a case status control system for managing
cases receiving follow-up investigation. At a minimum, the system will contain the date of
complaint, type of complaint, assigned investigator and date assigned, case number, report due
date, and case disposition.
Law enforcement or police agencies had to screen each case individually to determine
whether or not the case will be assigned to an investigator for further investigation. The objective of
case screening is to apply available manpower to those investigations that have the best chance of
being successful. Written criteria should specify how such screening is to be conducted, by whom,
and what criteria--solvability factors should be used.
The criteria will include the continued application of solvability factors and degree-of-
seriousness factors to the investigative workload. Continuation of follow-up investigation will
include a review of periodic reports of investigators on the progress of assigned cases.
In addition to solvability factors, the criteria used to assign cases for follow-up investigation
will be based on one of the following: documented experiences of the police organization,
documented experiences of other law enforcement agencies, research conducted within the police
organization, research conducted in other law enforcement agencies, and other criteria to be sued
in case assignment.
7. Designation of Investigator
Once assigned, the investigator receiving the assignment will be considered both the
investigator and case coordinator, and therefore, will be accountable for the follow-up investigation.
8. Criteria for Suspending Investigations
Law enforcement or police agencies had to establish the criteria for suspending
investigations. The criteria may include, i.e., lack of further leads or solvability factors, unavailability
of investigative resources, and/or insufficient degree of seriousness.
9. On-Call List
The investigation section of any law enforcement or police agencies has to maintain
a 24 hour on-call list of investigators. A copy of the said list will be made available to the
complaint desk officer and radio operator for easy access and references.
1. First, it keeps track of what has been done and what remains to be done on
a case. The investigator working the case can review the case management folder to
refresh his or her memory or to reflect on facts that have been uncovered.
3. Third, the case management system serves as the basis for the adjudication
of the case for the prosecution or other appropriate counsel. It also serves as the basis of
the report in the conduct of investigation.
Definition of Discovery
Essentials of Discovery
In a criminal case, the prosecution is obliged to share information with the defense
counsel and defendant during discovery. Specific types of information are made available
before trial, including results of any test conducted, and transcripts of statement made by
the defendant, and any evidence favorable to the accused either because it is exculpatory
or because it is impeaching.