SP1
SP1
AUDIT
SUBJECTS: SPECIALIZED CRIME INVESTIGATION 1 AND 2, & INTRODUCTION TO
CYBERCRIME AND ENVIRONMENTAL LAWS AND PROTECTION
SPECIALIZED CRIME
01 INVESTIGATION 1
What is Criminal Investigation?
It is a LEGAL INQUIRY, by CAREFUL EVALUATION of all available evidences to the end that violators
of law be brought to the bar of justice, and the innocent be relieved therefrom.
01 02 03
to identify the to locate the to provide evidence
suspect suspect; of his guilt.
PROTOCOLS IN INVESTIGATION
Protocol #1 Jurisdictional Investigation
When the FR arrived at the crime scene. Any police officer who have responded to concern and
arrived first at the crime scene.
WHO DECIDES IN RELEASING THE CRIME SCENE? TO WHOM ARE WE RELEASING THE CRIME SCENE?
Triangulation method
Rectangular Method
Baseline/Coordinate method
THE GOLDEN RULE IN INTERVIEW - Never conduct or let anyone conduct an interview if the interviewer has
not gone to the crime scene.
a. CONFESSION – it is the direct acknowledgement of guilt arising from the commission of crime.
KINDS OF CONFESSION
Judicial Confession
Extra – judicial Confession
It is a structured group of three or more persons, existing for a period of time and acting
in concert with the aim of committing one or more serious crimes or offenses, in order to obtain,
directly or indirectly, financial or other material benefit.
1. Loan sharking - the action or practice of lending money at unreasonably high rates of interest.
2. Assassination - is the murder of a prominent or important person, such as a head of state, head of
government, politician, member of a royal family, or CEO. An assassination may be prompted by
political and military motives, or done for financial gain.
3. Blackmail is an act of coercion using the threat of revealing or publicizing either substantially true or
false information about a person or people unless certain demands are met.
4. Counterfeit products are fakes or unauthorized replicas of the real product. Counterfeit products are
often produced with the intent to take advantage of the superior value of the imitated product.
5. Kidnapping - is the unlawful confinement of a person against their will, often including
transportation/asportation.
6. Prostitution is the business or practice of engaging in sexual activity in exchange for
payment.
7. Smuggling is the illegal transportation of objects, substances, information or people, such
as out of a house or buildings, into a prison, or across an international border, in violation of
applicable laws or other regulations.
8. The Illegal drug trade or drug trafficking is a global black market dedicated to the
cultivation, manufacture, distribution and sale of prohibited drugs.
9. Arms trafficking or gunrunning is the illicit trade of contraband small arms and
ammunition, which constitutes part of a broad range of illegal activities often associated with
transnational criminal organizations.
10. Organ trade (also known as Red market) is the trading of human organs, tissues, or other
body products, usually for transplantation
11. Contract killing is a form of murder or assassination in which one party hires another
party to kill a targeted person or persons. It involves an illegal agreement which includes
some form of payment, monetary or otherwise. Either party may be a person, group, or
organization.
12. Money laundering is the process of changing large amounts of money obtained from
crimes, such as drug trafficking, into origination from a legitimate source. It is a crime in many
jurisdictions with varying definitions. It is a key operation of the underground economy.
13. Bribery is defined as the offering, giving, receiving, or soliciting of any item of value to
influence the actions of an official, or other person, in charge of a public or legal duty
14. Electoral fraud, sometimes referred to as election manipulation, voter fraud or vote
rigging, involves illegal interference with the process of an election, either by increasing the
vote share of a favored candidate, depressing the vote share of rival candidates, or both.
REPUBLIC ACT NO. 9208 & REPUBLIC ACT NO. 10364
Entity Responsible for the implementation of law Anti-Trafficking in Person act of 2003….
INTER – AGENCY COUNCIL AGAINST TRAFFICKING
Entity Responsible for the implementation of law The Anti-Terrorism Act of 2020 ….
ANTI TERRORISM COUNCIL
CONSPIRACY TO COMMIT
AGREEMENT
TERRORISM
CONSPIRACY AS A CRIME
THREAT TO COMMIT
TERRORISM
INCITING TO COMMIT
TERRORISM
Introduction of commission
of Terrorism
HOW?
THREAT TO COMMIT
TERRORISM CLAIMING/ANNOUNCEMENT TO
COMMIT TERRORISM.
THREE WAYS:
ORAL
WRITTEN
ELECTRONIC MAIL
Introduction of commission
of Terrorism. HOW?
PERSUASION
PROPOSAL TO COMMIT
DIRECT PARTICIPATION
TERRORISM
INCITING TO COMMIT
INDIRECT PARTICIPATION
TERRORISM
“Morte Alla Francia Italia Anela”
“Death to France, Italy Cry”
Biography
“Death to France, long live Italy”
Here youagainst
“acting as a protector can explain who you are.
the arrogance of the powerful”
Talk about yourself in the “3rd person,” that is; pretend someone else is writing the bio about you
SOCIO-ECONOMIC COMPONENTS
What is Environmental
Law?
A collective term encompassing aspects of the law
that provide protection to the environment.
PRINCIPLES AND FUNCTIONS OF ENVIRONMENTAL LAW
1 POLLUTER-PAYS PRINCIPLE
2 PRINCIPLE OF COOPERATION
3 PRINCIPLE OF PREVENTION
PRINCIPLES AND FUNCTIONS OF ENVIRONMENTAL LAW
1 POLLUTER-PAYS PRINCIPLE
2 PRINCIPLE OF COOPERATION
3 PRINCIPLE OF PREVENTION
Categories of Environmental Laws
2 CONVENTION (Broadest)
3 PROTOCOL (MODIFICATION)
WHAT DO ENVIRONMENTAL LAWS REGULATE?
WHAT ACT IS CONSIDERED TO BE ILLEGAL UNDER Revised Guidelines Governing the Issuance of Certificate of Origin
for Logs, Timber, Lumber and on-timber Forest Products?
IF FOUND GUILTY, THE OFFENDER MUST COMPENSATE THE VICTIMS OF THE CASE, IN-LINE WITH THE CONTINUING
MANDAMUS.
Continuing mandamus - is a writ issued by a court in an environmental case directing any agency or instrumentality
of the government or officer thereof to perform an act or series of acts decreed by final judgment which shall
remain effective until judgment is fully satisfied.
TYPES OF HACKERS
1. WHITE HAT HACKER – They are the hackers referred to as security professionals.
2. BLACK HAT HACKER – They are one type of hackers who use the knowledge for malicious purposes.
3. GREY HAT HACKER – They are the type of hacker who acts as both the white Hat & the Black Hat Hacker
4. SCRIPT KIDDIE – They are someone who doesn’t have the experience or lack knowledge.
5. ELITE HACKER – They are someone who has sufficient knowledge of how the exploit takes place.
6. GREEN HAT HACKERS - Green hat hackers are types of hackers who’re learning the ropes of hacking.
7. BLUE HAT HACKERS - blue hat hackers are types of hackers who are similar to script kiddies. The intent to learn is
missing.
8. RED HAT HACKERS- The red hat hackers intend to stop the attack of black hat hackers. Red hat hackers are quite
ruthless while dealing with black hat hackers or counteracting with malware.
9. STATE/NATION SPONSORED HACKERS - Government appoints hackers to gain information about other countries.
These types of hackers are known as State/Nation sponsored hackers.
10. HACKTIVIST - These types of hackers intend to hack government websites.
11. MALICIOUS INSIDER OR WHISTLEBLOWER - These types of hackers include individuals working in an organization
who can expose confidential information.
12. ETHICAL HACKER – Ethical hackers are those who are hired & are given permission to attack the system.
Thanks!
Do you have any questions?
[email protected]
+91 620 421 838
yourwebsite.com
Slidesgo