Está en la página 1de 38

PREPARED BY:

LAYNES SUSIE CASTILLO LORNA RODRIGUEZ NORMAN MOOG JOMAR

TERRORISTS ACTIVITIES INVESTIGATION

Both

carry a strong negative connotation. These terms often used as a political labels to condemn violence by certain actors, are also described immoral, indiscriminate or unjustified. terrorist rarely identified themselves as such, and typically, use other generic terms or terms specific to their situation.

Can

be identified as use of force or the fear of force to achieve a political end. It is the unlawful use of the threat of violence against persons or property to political or social objectives. A person is guilty of the crime terrorism if he threatens to commit any crime of violence with a purpose to terrorize another

To

cause evacuation of building, place of assembly or facility of public transportation or, otherwise, to cause a serious public inconvenience or, in reckless disregard of the risk, causing such terror or inconvenience These definitions encompass a general consensus that terrorism itself is not a crime but, rather a phenomenon that a companies a more traditional crime that is used to create a climate of terror with in a community or a particular group.

1.

REVOLUTIONARY TERRORIST Use violence to frighten those in power and their supporters. In order to replace the existing government with a regime that holds acceptable political or religious group.

2. Political Terrorists Political terrorism is directed at people or groups who opposed the terrorists; political ideology or whom the terrorists define as outsiders who must be destroyed. They may not want to replaced the existing government but they do want to shape it so that it accepts its view.

3. National Terrorists
National terrorist promotes the interests of a minority ethnic or religious group that believes it has been persecuted, under majority rule, and wishes to carve out its independent homeland.

4. Caused- Based Terrorists


Such as Bin Ladens Al Qaeda organization direct their terrorists activities against individuals and or governments to whom they object. They espouse a particular social or religious cause and use violence to attract followers to their standards

5. Environment terrorists Members have conducted arsons attacks on property ranging from sport utility vehicle sales lots to shopping malls and residential homes. 6. State Sponsored Exists when a repressive government regime forces its citizens into obedience, oppresses minorities and stifles political dissent. Comes from the efgorts of human rights group.

7. Criminal Terrorists Terrorists involved in common law crimes such as drug trafficking even selling nuclear materials.

Terrorisms itself is generally not a crime, although Republic Act No. 9372. which is entitled as An Act To Secure and Protect the people From Terrorism,. It involved to a tool of a relatively few misguided political activities who believed that it is morally right to used illegal means to promote their own ends.

Terrorist acts were frequently identified with anti- war activists those opposed to the civil rights movements and those protesting military activities. Terrorists tactics were frequently employed by radical groups, by organized labor in its attempts to unionize employees, and by businesses who employed individuals to carry out terrorist act against union leaders and strikers.

The initial response to combating modern-day terrorism, by law enforcement, was to compile massive data bases on legitimate protests groups. The Bill of Rights as provided for the new Philippine Constitution 1987) is designed to provide individual a means of recourse against illegal invasion of privacy by government. Terrorist act has a low probability of occurrence and has a major impact when it does occur, it is incumbent upon investigators to be familiar with this phenomenon.

1.

BOMBING

The tactics common to most terror groups, is a popular weapon as it is cheap to produce, easy to make, has variable uses and is difficult to detect and trace after the event.

2.Hoaxes Whatever the type IED (Improvised Explosive Device) will often use it merely to establish credibility and to show that they mean business. They continue to disrupt, though not to destroy, by using well-made and place hoax bomb. The right proportions of hoaxes, with live IED, can keep security forces tied up guessing for a long time.

3. Arson Although not a popular tactic among terrorists, it has been used to destroy and disrupt such targets as public utilities, political headquarters and more commonly economic industrial targets such as shops, factories and hotels.

4. Hijacking the high jacking of vehicles can and should be associated with and often gives, indications of some future atrocities. 5. Ambush the terrorist can choose their own time and place of operation and, if his intended victim continually uses the same route, the terrorist can conduct countless dry rehearsals before actually moving in for the kill.

6. KIDNAPPING Kidnap for ransom accounts for about 8% of the terrorists incidents and must still be viewed as a serious option open to terrorists groups. 7. HOSTAGE TAKING kidnapper would normally regarded as someone who confines his victim in secret hide away and makes materials demand, whereas the hostage taker will confront authorities and openly holds his victim for ransom or some other reasons

8. ASSASSINATION Perhaps the oldest of all terrorist tactics in the book it still widely used today ACT OF TERRORISM 1.ARTICLE 122 2.ARTICLE 134 3.ARTICLE 134-A 4.ARTICLE 248 5.ARTICLE 267

6. ARTICLE 324 7. P.D NO. 1613 8. R.A NO. 6969 9. R.A NO. 5207 10. R.A NO. 6235 11. P.D NO. 532 10. P.D NO. 1866

1.

ACCOMPLICES Any person who not being a principal under Article 17 of the RPC or a conspirator as defined in section 4 hereof., cooperates in the execution of either the crime of terrorism or conspiracy to commit terrorism, by previous or simultaneous act, shall suffer the penalty of from seventeen years., four months and one day to twenty years of imprisonment.

2. ACCESSORIES Any person who, having knowledge for the commission of the crime of terrorism or conspiracy to commit terrorism and without having participated therein, either as principal or accomplice under Articles 17 and 18 of the Revised Penal Code

Individuals involved in terrorist acts are likely to be part of a large group and their activities are more likely to range over large geographical areas. There is a strong need for communication and coordination between organizations and government. It becomes important to know about this group stated goal its organizational structure, its tactical approach its means of communication and its propensity for violence

In order to develop a file on a individual or a group it is generally necessary to established a prima facie case establishing the probability that a crime has occurred or its about to occur. Successful investigation of terrorist groups requires patient, skill and cooperation. A creation of a task force offers the highest probability. If a group has been identified as a criminal organization, every effort should be made to collect as much information about the group and its member as possible. However a fine line must be ob served.

Investigation of foreign nationals ,ay prove more difficult because the background of foreign subject is more difficult to determine, they may be trained to avoid detection. Most foreign nationals have no desires to support terrorists. They have may fear of cooperating with law enforcement because of negative experiences with the police of their country. Although informants are helpful investigators should be aware that such individual may have their own motives for cooperating.

The investigations of foreign nationals may also suffers because of language differences. Another potential source of information are the patrol officers that work in the community everyday. Even when terrorism has taken place, the preliminary investigations should make every effort to identify potentials witnesses.

1.
2. 3.

4.

The name, description of the detained person. The date and exact time of his admission for custodial arrest and detention The name or address of the physician or physicians who examined him physically or medically The state of his health or physical condition at he time of his initial admission for custodial detention.

5. The date and time of each removal of the detained person from his cell for interrogation or for any purpose. 6. The date and time of his return to his cell. 7. The name and addressed of the physician or physicians who physically and medically examined him after interrogation. 8. A summary of physical and medical findings on the detained person after each interrogation. 9. The names and addresses of his family members and nearest relatives, if any and if available.

10. The names and addresses of persons who visit the detained persons. 11. The date and time of each visit. 12. The date and time of each request of detained person to communicate and confer of his legal counsel or counsels. 13.The date and time of each visit, and date and time of each departure of his legal counsel or counsels. 14. All other important events bearing on and all relevant regarding the treatment of the detained persons under custodial arrest and detention

In cases where evidence of guilt is not strong and the persons charged with the crime of terrorism or conspiracy to commit terrorism is entitled to bail and is granted the same, the court, upon application by the prosecutor, shall limit the right of travel the accused to within the municipality where hw resides.

The police or law enforcement officers, to whom the name of a suspect in the crime of terrorism was first revealed shall record the real name and the specific address of the informant. It shall be considered confidential and shall not be unnecessarily revealed until after the proceedings against the suspect shall have been terminated.

One of the most important components of terrorist related investigations is the , collection and preservation of physical evidence. These painstaking efforts, overtime make it possible to track the movement identify the habits and established the presents of individual. Each of these acts provides different form of physical evidence.

Surveillance and stakeouts are important components of terrorist investigations. These activities may require various form of electronics surveillance, including wiretapping eavesdropping, automobile locator system , video tapping and photography. The investigator should be familiar , not only with the use of such equipment, but also with the laws surrounding their application. The investigator must know when a court order is necessary for the use of electronic surveillance. In no case should an investigator use extra legal means to secure information. The lesson of the past should not be forgotten.

También podría gustarte