0% found this document useful (0 votes)
5 views

SP1

The document outlines the fundamentals of specialized crime investigation, including definitions, protocols, and ethical considerations. It covers various aspects of criminal investigation, including forensic investigation, interviewing techniques, and the characteristics of organized crime groups. Additionally, it discusses environmental laws and cybercrime, emphasizing the legal frameworks and principles governing these areas.

Uploaded by

gwenolarte04
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

SP1

The document outlines the fundamentals of specialized crime investigation, including definitions, protocols, and ethical considerations. It covers various aspects of criminal investigation, including forensic investigation, interviewing techniques, and the characteristics of organized crime groups. Additionally, it discusses environmental laws and cybercrime, emphasizing the legal frameworks and principles governing these areas.

Uploaded by

gwenolarte04
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 42

PROGRAM OUTCOMES

AUDIT
SUBJECTS: SPECIALIZED CRIME INVESTIGATION 1 AND 2, & INTRODUCTION TO
CYBERCRIME AND ENVIRONMENTAL LAWS AND PROTECTION
SPECIALIZED CRIME
01 INVESTIGATION 1
What is Criminal Investigation?
It is a LEGAL INQUIRY, by CAREFUL EVALUATION of all available evidences to the end that violators
of law be brought to the bar of justice, and the innocent be relieved therefrom.

Definition in Three Aspects:

As an Art: it is done with the use of intuition, felicity/inspiration and chance/luck.


As a Science: it is repetitive; relies on scientific knowledge and skill.
As a Process: it involves identifying, collecting, preserving, evaluating and presentation.
Three fold aim of Criminal Investigation

01 02 03
to identify the to locate the to provide evidence
suspect suspect; of his guilt.
PROTOCOLS IN INVESTIGATION
Protocol #1 Jurisdictional Investigation

Protocol #2 Official Police Blotter

Protocol #3 Investigation Team: Organization and Equipment

Protocol #4 Duties of the First Responder

Duties and responsibilities of the Investigating


Protocol #5 Team

Protocol #6 Investigation of Suspects


Forensic Investigation
Objective #1 To conduct forensic investigations.

To enable the police to identify & arrest the


Objective #2 criminal perpetrators

Objective #3 To establish the facts

Objective #4 To strictly adhere to the protocols.

To progressively acquire new technology and


Objective #5 human skills.
Crime Scene Processing/ Investigation
It refers to post-incident police operational procedures undertaken at the crime scene.

When is the CSI considered to have commenced? Who is a First Responder?

When the FR arrived at the crime scene. Any police officer who have responded to concern and
arrived first at the crime scene.

WHO DECIDES IN RELEASING THE CRIME SCENE? TO WHOM ARE WE RELEASING THE CRIME SCENE?

When the FR arrived at the crime scene. Owner of the property.


Ethical Consideration in the conduct of Crime Scene Investigation
➢ Having jurisdiction over the investigation;
➢ Using only lawful means to collect evidence and information relevant to the investigation;
➢ Exercising careful judgement in deciding on the most appropriate and effective techniques for conducting an
interview, keeping in mind the 'ethical obligations to act with dignity, fairness, moderation, thoroughness and political
impartiality;
➢ Protection of the civil and political rights of the individuals involved in the investigation, including informing these
individuals of their rights;
➢ Interviewing individuals with respect;
➢ Ensuring all personal information collected on individuals is relevant to the investigation;
➢ Assessing the facts objectively to determine whether the alleged offense occurred and making objective
recommendations on what future action, including prosecution, should be taken; and
➢ Protecting the confidentiality of the investigation.
SLIDESMANIA.COM
TYPES OF MEASUREMENTS:

Triangulation method

Rectangular Method

Baseline/Coordinate method

Polar Coordinate/Compass Point method


02
SPECIALIZED CRIME
INVESTIGATION 2
You can enter a subtitle here if you need it
TYPES OF QUESTIONING

INTERVIEW – FRIENDLY QUESTIONING


INTERROGATION – SKILLFUL QUESTIONING

THE GOLDEN RULE IN INTERVIEW - Never conduct or let anyone conduct an interview if the interviewer has
not gone to the crime scene.

QUALITIES OF A GOOD INTERVIEWER: RULES IN INTERVIEW


a. Rapport 1. One question at a time
b. forceful personality
2. Avoid implied answer
c. Knowledge of human behavior
d. Conversational tone of voice 3. Simplicity of questions
e. Common interest 4. Saving faces
f. Acting qualities 5. Yes and no answer
g. Humility
Steps in Conducting an Interview. Types of Witnesses

1. Preparation. 1. Known- nothing type


2. Disinterested type
2. Approach. 3. The drunken type
3. Warming-up. 4. Suspicious type
5. Talkative
4. Recounting. 6. Honest witnesses
5. Questioning for clarification. 7. Deceitful witness
8. Timid witnesses
6. Ending the interview. 9. Boasting, egoistic or egocentric witnesses
10. Type refusal to talk witnesses
INTERROGATION

BEFORE THE CONDUCT OF INTERROGATION RIGHTS OF THE SUSPECT SHOULD BE FIRST


ENUMERATED.
PURPOSE OF INTERROGATION.
1. On the part of the suspect, it is to extract a confession or admission.
2. On the part of the uncooperative or unwilling witness, it is to extract the
information he possessed.

a. CONFESSION – it is the direct acknowledgement of guilt arising from the commission of crime.
KINDS OF CONFESSION
Judicial Confession
Extra – judicial Confession

b. ADMISSION –It is the acknowledgement of fact or circumstance without accepting guilt.


Stages in the Conduct of Interrogation
1. Initial Stage (Introductory Part) –
Preparation – gathering of information
Setting the tone – warming up.
Building rapport
Opening question – warming up, irrelevant question
2. Focusing stage (Main Body)
Transition – From what?
Challenging inconsistencies – involves asking for clarifications.
Eliciting admission – obtaining/gaining
Confrontation – Direct question
3. Concluding Stage (Closing Part)
Wrapping up: Summarization and recap of conversation
Offering an out: Giving of last chance
Obtaining a statement: Obtaining of proof of voluntary participation/verification
Closing and debriefing:
Showing of gratitude
Giving assurance
Organized Criminal Group (OCG)

It is a structured group of three or more persons, existing for a period of time and acting
in concert with the aim of committing one or more serious crimes or offenses, in order to obtain,
directly or indirectly, financial or other material benefit.

TYPICAL ACTIVITIES OF AN ORGANIZED CRIME GROUP:

1. Loan sharking - the action or practice of lending money at unreasonably high rates of interest.
2. Assassination - is the murder of a prominent or important person, such as a head of state, head of
government, politician, member of a royal family, or CEO. An assassination may be prompted by
political and military motives, or done for financial gain.
3. Blackmail is an act of coercion using the threat of revealing or publicizing either substantially true or
false information about a person or people unless certain demands are met.
4. Counterfeit products are fakes or unauthorized replicas of the real product. Counterfeit products are
often produced with the intent to take advantage of the superior value of the imitated product.
5. Kidnapping - is the unlawful confinement of a person against their will, often including
transportation/asportation.
6. Prostitution is the business or practice of engaging in sexual activity in exchange for
payment.
7. Smuggling is the illegal transportation of objects, substances, information or people, such
as out of a house or buildings, into a prison, or across an international border, in violation of
applicable laws or other regulations.
8. The Illegal drug trade or drug trafficking is a global black market dedicated to the
cultivation, manufacture, distribution and sale of prohibited drugs.
9. Arms trafficking or gunrunning is the illicit trade of contraband small arms and
ammunition, which constitutes part of a broad range of illegal activities often associated with
transnational criminal organizations.
10. Organ trade (also known as Red market) is the trading of human organs, tissues, or other
body products, usually for transplantation
11. Contract killing is a form of murder or assassination in which one party hires another
party to kill a targeted person or persons. It involves an illegal agreement which includes
some form of payment, monetary or otherwise. Either party may be a person, group, or
organization.
12. Money laundering is the process of changing large amounts of money obtained from
crimes, such as drug trafficking, into origination from a legitimate source. It is a crime in many
jurisdictions with varying definitions. It is a key operation of the underground economy.
13. Bribery is defined as the offering, giving, receiving, or soliciting of any item of value to
influence the actions of an official, or other person, in charge of a public or legal duty
14. Electoral fraud, sometimes referred to as election manipulation, voter fraud or vote
rigging, involves illegal interference with the process of an election, either by increasing the
vote share of a favored candidate, depressing the vote share of rival candidates, or both.
REPUBLIC ACT NO. 9208 & REPUBLIC ACT NO. 10364

Entity Responsible for the implementation of law Anti-Trafficking in Person act of 2003….
INTER – AGENCY COUNCIL AGAINST TRAFFICKING

Lead Agency, Department of Justice

Who may report Human Trafficking Cases?

ANYONE (UNDER SECTION 8 OF REPUBLIC ACT NO. 9208)

What is the relationship of Republic Act No 10364?

It refers to Expanded-Trafficking in Persons of 2012


REPUBLIC ACT NO. 11479

Entity Responsible for the implementation of law The Anti-Terrorism Act of 2020 ….
ANTI TERRORISM COUNCIL

HEAD, Executive Secretary (To be appointed by the President)


Acts Considered to be Terrorism

CONSPIRACY TO COMMIT
AGREEMENT
TERRORISM

CONSPIRACY AS A CRIME
THREAT TO COMMIT
TERRORISM

PROPOSAL TO COMMIT Introduction of commission


TERRORISM of Terrorism

INCITING TO COMMIT
TERRORISM
Introduction of commission
of Terrorism

HOW?

THREAT TO COMMIT
TERRORISM CLAIMING/ANNOUNCEMENT TO
COMMIT TERRORISM.

THREE WAYS:
ORAL
WRITTEN
ELECTRONIC MAIL
Introduction of commission
of Terrorism. HOW?

PERSUASION

PROPOSAL TO COMMIT
DIRECT PARTICIPATION
TERRORISM

INCITING TO COMMIT
INDIRECT PARTICIPATION
TERRORISM
“Morte Alla Francia Italia Anela”
“Death to France, Italy Cry”
Biography
“Death to France, long live Italy”

Here youagainst
“acting as a protector can explain who you are.
the arrogance of the powerful”
Talk about yourself in the “3rd person,” that is; pretend someone else is writing the bio about you

Sicillian Mafia Ndrangheta Mafia Camorra


First known mafia Horizontal Structured Gang
Introduction to Cybercrime
03 and Environmental Laws
and Protection
What is Environment?
refers to the complex and interconnected
system of physical, biological, social, cultural,
and economic factors that collectively
DEFINITION
constitute the surroundings in which living
organisms, including humans, exist and
interact.
PHYSICAL COMPONENTS

COMPONENTS BIOLOGICAL COMPONENTS

SOCIO-ECONOMIC COMPONENTS
What is Environmental
Law?
A collective term encompassing aspects of the law
that provide protection to the environment.
PRINCIPLES AND FUNCTIONS OF ENVIRONMENTAL LAW

1 POLLUTER-PAYS PRINCIPLE

2 PRINCIPLE OF COOPERATION

3 PRINCIPLE OF PREVENTION
PRINCIPLES AND FUNCTIONS OF ENVIRONMENTAL LAW

1 POLLUTER-PAYS PRINCIPLE

2 PRINCIPLE OF COOPERATION

3 PRINCIPLE OF PREVENTION
Categories of Environmental Laws

Green Laws Blue Laws Brown Laws


It focuses on the flora It focuses on the bodies of It focuses on the land
water forms
TREATIES/CONVENTION/PROTOCOLS
1 TREATIES

2 CONVENTION (Broadest)

3 PROTOCOL (MODIFICATION)
WHAT DO ENVIRONMENTAL LAWS REGULATE?

Environmental laws cover a wide range of topics including the following:


1. Air Quality- Air Quality laws protect the air from pollution & may include measures to protect the air from things
like ozone depletion.
2. Water Quality- Environmental laws may protect water from pollution. They may also determine who can use water
& how to handle potential problems like treat in wastewater & managing surface runoff.
3. Waste Management- Municipal waste, hazardous substances & nuclear waste all fall in the category of waste
management.
4. Chemical Safety- Chemical safety regulations manage things like pesticide use & chemicals in products like plastic
bottles.
5. Hunting & Fishing- Environmental laws may regulate & protect wildlife populations. Lawmakers determine who can
hunt & fish & how these activities are regulated.
6. Contaminant Cleanup- Not all environmental law focuses on preventing pollution. Contaminant cleanup deals with
addressing pollution after it happens. Laws may include protocols for cleanup as well as civil & criminal punishment for
polluters.
DENR ADMINISTRATIVE ORDER NO 7.

WHAT ACT IS CONSIDERED TO BE ILLEGAL UNDER Revised Guidelines Governing the Issuance of Certificate of Origin
for Logs, Timber, Lumber and on-timber Forest Products?

SHIPMENT OF FOREST PRODUCTS WITHOUT CERTIFICATE OF ORIGIN (SECTION 12).

WHAT ARE THE CERTIFICATE OF ORIGIN FORM? (SECTION 17)

CERTIFICATE OF LUMBER ORIGIN


CERTIFICATE OF TIMBER ORIGIN
CERTIFICATE OF NON-TIMBER FOREST PRODUCT ORIGIN

WHAT ARE THE CONTENTS OF CERTIFICATE OF ORIGIN FORMS? (SECTION 8)

8.1 Number of pieces/volume and species of forest products under shipment


8.2 Date of loading/transport
8.3 Point of loading
8.4 Type and plate/registration number of conveyance
8.5 Name and address of consignee
8.6 Point of destination; and
8.7 Expected duration of shipment
Sec. 10 Exemptions for COF

No Certificate of Origin shall be required in the following instances:


10.1 Logs/timber being transported from the licensee’s/permit tee’s cutting area to its wood processing plant or main
log storage area, provided that such facilities are located within the province of source; provided further, that in cases
where the wood processing plant is located outside the province, the transport/shipment thereof may be allowed,
subject to prior approval by the RED(s) concerned. Such approval shall be in the fi of a special authority issued by the
RED for a period not exceeding one (1) year, subject to the following conditions:
10.1.1 The conveyance(s) is/are company-owned;
10.1.2 The delivery route is the normal route in the delivery of logs to the log pond or log yard of the firm’s wood
processing plant; and
10.1.3 Listing of the type and serial/plate number of the vehicle(s) authorized for the purpose.
10.2 Transport/shipment of finished. semi-finished, or knocked-down forest products, provided that these are
accompanied by a delivery receipt or sales invoice, together with the tally sheets;
10.3 Lumber and lumber products transported from source to buyer/end-user within the confines of the province or
within the Greater Manila area, provided, that the same are covered by the corresponding sales invoice and/or
delivery receipt;
10.4 Forest products transshipped from the point of initial unloading to its final point of destination, provided
accompanied by a Certificate of Transshipment (COT) issued by the CENRO concerned indicating therein the kind,
number, volume, and consignee of the shipment as well as the serial number of the Certificate of Origin accompanying
the shipment; and
10.5 Transport of logs/timber/lumber/other forest products derived from planted trees or non-wood forest products
inside private lands, provided accompanied by a Certificate of verification issued by a DENR local official at the CENRO
level.
Rules and special rules of procedures for environmental cases

WHO MAY FILE FOR ENVIRONMENTAL CASE?


ANYONE (RULE 1, SECTION 3)

WHAT IS THE NATURE OF THE CASE?


CITIZEN SUIT (LAWSUIT) (RULE 1, SECTION 5)

JUDGMENT AND EXECUTION

IF FOUND GUILTY, THE OFFENDER MUST COMPENSATE THE VICTIMS OF THE CASE, IN-LINE WITH THE CONTINUING
MANDAMUS.

Continuing mandamus - is a writ issued by a court in an environmental case directing any agency or instrumentality
of the government or officer thereof to perform an act or series of acts decreed by final judgment which shall
remain effective until judgment is fully satisfied.

UPON SATISFACTION, RETURN OF WRIT OF EXECUTION SHALL BE ISSUED.


What is Cybercrime?
It is a non-violent crime, that either targets or
DEFINITION uses a computer, a computer network or a
networked device.
Types of cybercrime
Phishing - is when spam emails, or other forms of communication, are
sent en masse, with the intention of tricking recipients into
doing something that undermines their security or the security
of the organization they work for. Phishing campaign
messages may contain infected attachments or links to
malicious sites. Or they may ask the receiver to respond with
confidential information

Identity fraud - someone uses another person's personal identifying


information, like their name, identifying number, or credit card
number, without their permission, to commit fraud or other
crimes.

Cyber Extortion - the act of cyber-criminals demanding payment through the


use of or threat of some form of malicious activity against a
victim, such as data compromise or denial of service attack.
Types of cybercrime
Ransomware attacks - is a type of malicious software (malware) that threatens to
publish or blocks access to data or a computer system,
usually by encrypting it, until the victim pays a ransom fee to
the attacker.

Cryptojacking - is the malicious use of a person or persons' computing


power to mine cryptocurrencies without consent. Often the
victim has no idea their device is being used. Cryptojacking
has quickly become one the most common forms of malware.

Cyber Espionage - the use of computer networks to gain illicit access to


confidential information, typically that held by a government or
other organization.
Philippine Background in Cybercrime (I LOVE YOU VIRUS)

“I LOVE YOU” & an It made by Onel De Guzman a dropped out


attachment “LOVE-LETTER- from AMA, it became a landmark case for the
FOR-YOU.TXT.vbs.”
formulation of law against cyber crime.
WHAT IS HACKING? Hacking is the activity of identifying weaknesses in a computer system or a network to exploit the
security to gain access to personal data or business data.

TYPES OF HACKERS
1. WHITE HAT HACKER – They are the hackers referred to as security professionals.
2. BLACK HAT HACKER – They are one type of hackers who use the knowledge for malicious purposes.
3. GREY HAT HACKER – They are the type of hacker who acts as both the white Hat & the Black Hat Hacker
4. SCRIPT KIDDIE – They are someone who doesn’t have the experience or lack knowledge.
5. ELITE HACKER – They are someone who has sufficient knowledge of how the exploit takes place.
6. GREEN HAT HACKERS - Green hat hackers are types of hackers who’re learning the ropes of hacking.
7. BLUE HAT HACKERS - blue hat hackers are types of hackers who are similar to script kiddies. The intent to learn is
missing.
8. RED HAT HACKERS- The red hat hackers intend to stop the attack of black hat hackers. Red hat hackers are quite
ruthless while dealing with black hat hackers or counteracting with malware.
9. STATE/NATION SPONSORED HACKERS - Government appoints hackers to gain information about other countries.
These types of hackers are known as State/Nation sponsored hackers.
10. HACKTIVIST - These types of hackers intend to hack government websites.
11. MALICIOUS INSIDER OR WHISTLEBLOWER - These types of hackers include individuals working in an organization
who can expose confidential information.
12. ETHICAL HACKER – Ethical hackers are those who are hired & are given permission to attack the system.
Thanks!
Do you have any questions?

[email protected]
+91 620 421 838
yourwebsite.com

Slidesgo

CREDITS: This presentation template was created by Slidesgo, and


Flaticon Freepik

includes icons by Flaticon and infographics & images by Freepik


Please keep this slide for attribution

You might also like