LEA2

LEA2
45問 • 2年前
  • Dotty Tanguilig
  • 通報

    問題一覧

  • 1

    defined the illegal trade of human beings for the purposes of commercial sexual exploit or force labor. This is considered a form of modern-day slavery. It is the fastest growing criminal industry in the world and tied with ths illegal arms industry as the second largest, after the drug-trade.

    Human Trafficking

  • 2

    Refers to the recruitment, transportation, transfer, harbor or receipt of persons

    The Act

  • 3

    Refers to the threat or use of force, coercion, abduction, fraud, deception abuse of power of vulnerability, or giving payments or benefits to a person in control of the victim.

    The Means

  • 4

    With the purpose of exploitation, which include sexual exploitation, forced labor, slavery or similar practices and the removal of organs.

    The Purpose

  • 5

    Initial victimization of the trafficked person is usually by a member of a person's ethnic group. There are many reasons why recruitment occurs within one's own group. Proximity, access, and trust are important factors. Trust is essential as it serves as a basis for a person to with traffickers, and smugglers to move them to a particular locale. to pay a certain amount of money, or to keep them in bondage for a particular period.

    The Recruitment

  • 6

    Tourist and student visas may be used to enable illegal entry. illegal entry may mean journeys by road, sea, and air to cross borders without anyone's knowledge or with the help of corrupt officials. Once the journey is completed, people who have been smuggled will generally be abandoned and left to look after themselves. Those who are being trafficked will be taken to wherever they are put to

    Transfer

  • 7

    There are several well-established routes, including the Ball route which is in Asia, Traffickers pass through Baltic States ending in Scandinavia. In addition, there is the East Mediterranean route which traverses from Turkey to Italy, sometimes stopping in Greece or Albania.

    Entrance

  • 8

    The recruitment, transportation, transfer, harboring or receipt of person through fraud deception, of the abuse of power

    Trafficking

  • 9

    It include the sexual exploitation or the prostitution of others, forced labor or services, slavery, or practices similar to slavery or servitude of the removal of organs

    Exploitation

  • 10

    Refers to the direct or indirect procurement of the illegal entry of a person into a state where he or she is not a residen of for, to financial or other material benefit.

    Smuggling

  • 11

    It is marked out by legal ownership of one human being by temporary ownership, debt bondage, forced labor, and hyper-exploitative contractual arrangement in the global economy.

    Slavery

  • 12

    Trafficking women for commercial exploitation can be traced back towards the end of the 19" century. It started during the "white slave trade of woment and young girls into it.

    Prostitution

  • 13

    The trafficking-as-transnational has been promised on two contrasting views of the relationship between the state and the trafficking problem.

    Organized Crime

  • 14

    Forced migratory movements in various regions, which is driven economic crisis, lack of sustainable livelihoods, political conflict, civil war, ethnic persecution. social inequalities, gender-based macroeconomic policies, and wider processes of global social transformation

    Migration

  • 15

    Trafficking has been seen as a violation of basic human rights of a person under the 1948 Universal Declaration of this. This includes the right to be free from slavery or servitude right to freedom of movement, right to life, liberty, and security, right to health, and right to free choice of employment.

    Human Rights

  • 16

    It is the transporting, transforming, harboring, or selling illegal drugs and drug paraphernalia

    Drug Trafficking

  • 17

    It is a collection of individuals, entities, and commercial operations formed in the hopes of conducting communal business activity regarding a specific product or service:

    Cartel

  • 18

    An individual employed to secretly transport and traffic drugs in a clandestine manner. These are promised payment upon the completion of the drug trafficking endeavor.

    Drug Mule

  • 19

    A substance or item that is legal to possess, use, or administer because of expressed permission granted by the Federal Government

    Controlled Substance

  • 20

    These are forms of illegal activities which makes use of the internet, private or public network, or an in-house computer system.

    Cybercrimes

  • 21

    The attack seeks to deny the legitimate users or owners of the system access to their data or computers. A Denial-of-Service (DOS) attack or virus that renders the computer inoperable.

    The computer as a target

  • 22

    The computer is used to gain criminal objectives. For example, a thief may use a computer to steal personal information

    The computer as an instrument of the crime

  • 23

    The computer is not the primary instrument of the crime, it simply facilitates it. Money laundering and the trading of child pornography would be example of this category

    The computer as incidental to a crime

  • 24

    This includes crimes against industries, such as intellectual property theft and software piracy.

    Crimes associated with the prevalence of computers

  • 25

    It Is a computer program that can replicate itself and spread from one computer to another.

    Virus

  • 26

    It is an attempt to make a machine or network resource unavailable to its intended users.

    Denial of Service Attack

  • 27

    It is software used or created to disrupt computer operation, gather sensitive information, or gain access to private computer systems.

    Malware

  • 28

    Is the use of the internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. It includes the making of false accusations or statements of fact (defamation), monitoring, making threats, identity theft. damage to data or equipment, the solicitation of minors for sex, or gathering information that may be used to harass an individual, a group of individuals, or an organization.

    Cyberstalking

  • 29

    It is committed when a person harasses another individual, a group of individuals, or an organization with the use of emails. Harassments may be in the form of threats, stalking or bothering.

    Email Stalking

  • 30

    It is the act of using achat room to monitor or get information about an individual, a group of individuals or an organization and using the information without their consent.

    Chat Stalking

  • 31

    The cyber stalker exploits the internet and the windows operating system to assume control over the computer of the targeted victim

    Computer Stalking

  • 32

    It is a form of stealing using another person's identity to access resources or obtain credit and benefits using a false Identity

    Fraud or Identity Theft

  • 33

    It involves the use and management of information technology in pursuit of a competitive advantage over an opponent.

    Information Warfare

  • 34

    It is the act of acquiring the usernames. passwords, and credit card details (and sometimes, indirectly money) by masquerading as a trustworthy entity in an electronic communication. Phishing is carried out by e-mail spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.

    Phishing Scams

  • 35

    It is an act of terrorism using cyberspace or computer resources.

    Cyber Terrorism

  • 36

    It is a form of cyber-terrorism where hackers access and attack the websites or computer systems of an individual or an organization. These hackers demand money in exchange for the stoppage of the attacks.

    Cyber Extortion

  • 37

    It is the use of the intemet and related technologies to harm other people, in a deliberate, repeated, and hostile manner.

    Cyber Bullying

  • 38

    It refers to images or films (also known as child abuse images) and writings depicting sexually explicit activities involving a child.

    Child Pornography

  • 39

    It is the process whereby proceeds, reasonably believed to have been derived from criminal activity, are transported, transferred, transformed, converted, or intermingled with legitimate funds, for the purpose of concealing or disguising the true source, disposition, movement, or ownership of those proceeds

    Money Laundering

  • 40

    It involves changing the bulk cash derived from criminal activities into a more portable and less suspicious form, then getting those proceeds into the mainstream financial system. Among the three steps, this is the most difficult and vulnerable

    Placement

  • 41

    It involves the movement of illegal funds, often mixed with funds of legitimate origins, through the world's financial systems in numerous accounts through a financial or banking system to hide the funds origin.

    Layering

  • 42

    It is the process of reintroducing the layered funds Into the mainstream economy, where it can be invested and spent freely

    Integration

  • 43

    It refers to the actof, through the use of any fraudulent machinations, import or export from the Philippines any firearm or parts thereof. It also includes the importing or exporting of explosive or ammunition or machine, implements, and equipment or tools for the manufacture of firearms.

    Firearms Trafficking

  • 44

    It is a term to describe the use of violence, intimidation or the threat of violence to create fear and achieve political, religious or ideological goals

    Terrorism

  • 45

    9/11

    Al Qaeda

  • CJS1

    CJS1

    Dotty Tanguilig · 22問 · 3年前

    CJS1

    CJS1

    22問 • 3年前
    Dotty Tanguilig

    Pre Final CJS

    Pre Final CJS

    Dotty Tanguilig · 52問 · 2年前

    Pre Final CJS

    Pre Final CJS

    52問 • 2年前
    Dotty Tanguilig

    CJS

    CJS

    Dotty Tanguilig · 63問 · 2年前

    CJS

    CJS

    63問 • 2年前
    Dotty Tanguilig

    CJS finals

    CJS finals

    Dotty Tanguilig · 28問 · 2年前

    CJS finals

    CJS finals

    28問 • 2年前
    Dotty Tanguilig

    INTRO TO CRIM

    INTRO TO CRIM

    Dotty Tanguilig · 13問 · 2年前

    INTRO TO CRIM

    INTRO TO CRIM

    13問 • 2年前
    Dotty Tanguilig

    CDI1

    CDI1

    Dotty Tanguilig · 76問 · 2年前

    CDI1

    CDI1

    76問 • 2年前
    Dotty Tanguilig

    LEA1

    LEA1

    Dotty Tanguilig · 19問 · 2年前

    LEA1

    LEA1

    19問 • 2年前
    Dotty Tanguilig

    CDI1 TAO TAO

    CDI1 TAO TAO

    Dotty Tanguilig · 24問 · 2年前

    CDI1 TAO TAO

    CDI1 TAO TAO

    24問 • 2年前
    Dotty Tanguilig

    THEORIES

    THEORIES

    Dotty Tanguilig · 24問 · 2年前

    THEORIES

    THEORIES

    24問 • 2年前
    Dotty Tanguilig

    GenChem

    GenChem

    Dotty Tanguilig · 16問 · 2年前

    GenChem

    GenChem

    16問 • 2年前
    Dotty Tanguilig

    Rizal

    Rizal

    Dotty Tanguilig · 16問 · 2年前

    Rizal

    Rizal

    16問 • 2年前
    Dotty Tanguilig

    GENCHEM

    GENCHEM

    Dotty Tanguilig · 7問 · 2年前

    GENCHEM

    GENCHEM

    7問 • 2年前
    Dotty Tanguilig

    Filipino

    Filipino

    Dotty Tanguilig · 11問 · 2年前

    Filipino

    Filipino

    11問 • 2年前
    Dotty Tanguilig

    Ang retorika bilang sining

    Ang retorika bilang sining

    Dotty Tanguilig · 6問 · 2年前

    Ang retorika bilang sining

    Ang retorika bilang sining

    6問 • 2年前
    Dotty Tanguilig

    Saklaw ng Retorika

    Saklaw ng Retorika

    Dotty Tanguilig · 5問 · 2年前

    Saklaw ng Retorika

    Saklaw ng Retorika

    5問 • 2年前
    Dotty Tanguilig

    Tungkulin ng Retorika

    Tungkulin ng Retorika

    Dotty Tanguilig · 5問 · 2年前

    Tungkulin ng Retorika

    Tungkulin ng Retorika

    5問 • 2年前
    Dotty Tanguilig

    Roles of Police

    Roles of Police

    Dotty Tanguilig · 9問 · 2年前

    Roles of Police

    Roles of Police

    9問 • 2年前
    Dotty Tanguilig

    Theories

    Theories

    Dotty Tanguilig · 12問 · 2年前

    Theories

    Theories

    12問 • 2年前
    Dotty Tanguilig

    Global History of Police

    Global History of Police

    Dotty Tanguilig · 12問 · 2年前

    Global History of Police

    Global History of Police

    12問 • 2年前
    Dotty Tanguilig

    CDI2

    CDI2

    Dotty Tanguilig · 44問 · 2年前

    CDI2

    CDI2

    44問 • 2年前
    Dotty Tanguilig

    CDI1(PREFINAL)

    CDI1(PREFINAL)

    Dotty Tanguilig · 71問 · 2年前

    CDI1(PREFINAL)

    CDI1(PREFINAL)

    71問 • 2年前
    Dotty Tanguilig

    ADGE (PREFINAL)

    ADGE (PREFINAL)

    Dotty Tanguilig · 38問 · 2年前

    ADGE (PREFINAL)

    ADGE (PREFINAL)

    38問 • 2年前
    Dotty Tanguilig

    MASINING (PREFINAL)

    MASINING (PREFINAL)

    Dotty Tanguilig · 21問 · 2年前

    MASINING (PREFINAL)

    MASINING (PREFINAL)

    21問 • 2年前
    Dotty Tanguilig

    CDI1(PREFINAL)2

    CDI1(PREFINAL)2

    Dotty Tanguilig · 79問 · 2年前

    CDI1(PREFINAL)2

    CDI1(PREFINAL)2

    79問 • 2年前
    Dotty Tanguilig

    CDI1(FINAL)3

    CDI1(FINAL)3

    Dotty Tanguilig · 91問 · 2年前

    CDI1(FINAL)3

    CDI1(FINAL)3

    91問 • 2年前
    Dotty Tanguilig

    LEA1

    LEA1

    Dotty Tanguilig · 71問 · 2年前

    LEA1

    LEA1

    71問 • 2年前
    Dotty Tanguilig

    CA (Q1)

    CA (Q1)

    Dotty Tanguilig · 22問 · 2年前

    CA (Q1)

    CA (Q1)

    22問 • 2年前
    Dotty Tanguilig

    HBV (Q2)

    HBV (Q2)

    Dotty Tanguilig · 30問 · 2年前

    HBV (Q2)

    HBV (Q2)

    30問 • 2年前
    Dotty Tanguilig

    FP

    FP

    Dotty Tanguilig · 19問 · 2年前

    FP

    FP

    19問 • 2年前
    Dotty Tanguilig

    Front

    Front

    Dotty Tanguilig · 21問 · 2年前

    Front

    Front

    21問 • 2年前
    Dotty Tanguilig

    REAR

    REAR

    Dotty Tanguilig · 15問 · 2年前

    REAR

    REAR

    15問 • 2年前
    Dotty Tanguilig

    TOP

    TOP

    Dotty Tanguilig · 10問 · 2年前

    TOP

    TOP

    10問 • 2年前
    Dotty Tanguilig

    Settings

    Settings

    Dotty Tanguilig · 7問 · 2年前

    Settings

    Settings

    7問 • 2年前
    Dotty Tanguilig

    CFLM

    CFLM

    Dotty Tanguilig · 25問 · 2年前

    CFLM

    CFLM

    25問 • 2年前
    Dotty Tanguilig

    CA

    CA

    Dotty Tanguilig · 45問 · 2年前

    CA

    CA

    45問 • 2年前
    Dotty Tanguilig

    CA1

    CA1

    Dotty Tanguilig · 6問 · 2年前

    CA1

    CA1

    6問 • 2年前
    Dotty Tanguilig

    CA2

    CA2

    Dotty Tanguilig · 6問 · 2年前

    CA2

    CA2

    6問 • 2年前
    Dotty Tanguilig

    CA3

    CA3

    Dotty Tanguilig · 5問 · 2年前

    CA3

    CA3

    5問 • 2年前
    Dotty Tanguilig

    HBV2

    HBV2

    Dotty Tanguilig · 33問 · 2年前

    HBV2

    HBV2

    33問 • 2年前
    Dotty Tanguilig

    INDUSTRIAL

    INDUSTRIAL

    Dotty Tanguilig · 38問 · 2年前

    INDUSTRIAL

    INDUSTRIAL

    38問 • 2年前
    Dotty Tanguilig

    PI

    PI

    Dotty Tanguilig · 23問 · 2年前

    PI

    PI

    23問 • 2年前
    Dotty Tanguilig

    MARKSMANSHIP

    MARKSMANSHIP

    Dotty Tanguilig · 30問 · 2年前

    MARKSMANSHIP

    MARKSMANSHIP

    30問 • 2年前
    Dotty Tanguilig

    CDI2

    CDI2

    Dotty Tanguilig · 24問 · 2年前

    CDI2

    CDI2

    24問 • 2年前
    Dotty Tanguilig

    CFLM

    CFLM

    Dotty Tanguilig · 10問 · 2年前

    CFLM

    CFLM

    10問 • 2年前
    Dotty Tanguilig

    CA

    CA

    Dotty Tanguilig · 6問 · 2年前

    CA

    CA

    6問 • 2年前
    Dotty Tanguilig

    PI2

    PI2

    Dotty Tanguilig · 23問 · 2年前

    PI2

    PI2

    23問 • 2年前
    Dotty Tanguilig

    Marksmanship2

    Marksmanship2

    Dotty Tanguilig · 14問 · 2年前

    Marksmanship2

    Marksmanship2

    14問 • 2年前
    Dotty Tanguilig

    CVE3

    CVE3

    Dotty Tanguilig · 5問 · 2年前

    CVE3

    CVE3

    5問 • 2年前
    Dotty Tanguilig

    HBV3

    HBV3

    Dotty Tanguilig · 19問 · 2年前

    HBV3

    HBV3

    19問 • 2年前
    Dotty Tanguilig

    HBV

    HBV

    Dotty Tanguilig · 24問 · 2年前

    HBV

    HBV

    24問 • 2年前
    Dotty Tanguilig

    Personality Disorder

    Personality Disorder

    Dotty Tanguilig · 11問 · 2年前

    Personality Disorder

    Personality Disorder

    11問 • 2年前
    Dotty Tanguilig

    CFLM

    CFLM

    Dotty Tanguilig · 16問 · 2年前

    CFLM

    CFLM

    16問 • 2年前
    Dotty Tanguilig

    (2)

    (2)

    Dotty Tanguilig · 24問 · 1年前

    (2)

    (2)

    24問 • 1年前
    Dotty Tanguilig

    (3)

    (3)

    Dotty Tanguilig · 5問 · 1年前

    (3)

    (3)

    5問 • 1年前
    Dotty Tanguilig

    CDI3

    CDI3

    Dotty Tanguilig · 24問 · 1年前

    CDI3

    CDI3

    24問 • 1年前
    Dotty Tanguilig

    Inherent Powers of the State

    Inherent Powers of the State

    Dotty Tanguilig · 20問 · 1年前

    Inherent Powers of the State

    Inherent Powers of the State

    20問 • 1年前
    Dotty Tanguilig

    Three Branches of the Government

    Three Branches of the Government

    Dotty Tanguilig · 11問 · 1年前

    Three Branches of the Government

    Three Branches of the Government

    11問 • 1年前
    Dotty Tanguilig

    Executive Department

    Executive Department

    Dotty Tanguilig · 40問 · 1年前

    Executive Department

    Executive Department

    40問 • 1年前
    Dotty Tanguilig

    Q1

    Q1

    Dotty Tanguilig · 20問 · 1年前

    Q1

    Q1

    20問 • 1年前
    Dotty Tanguilig

    RA 9514

    RA 9514

    Dotty Tanguilig · 53問 · 1年前

    RA 9514

    RA 9514

    53問 • 1年前
    Dotty Tanguilig

    問題一覧

  • 1

    defined the illegal trade of human beings for the purposes of commercial sexual exploit or force labor. This is considered a form of modern-day slavery. It is the fastest growing criminal industry in the world and tied with ths illegal arms industry as the second largest, after the drug-trade.

    Human Trafficking

  • 2

    Refers to the recruitment, transportation, transfer, harbor or receipt of persons

    The Act

  • 3

    Refers to the threat or use of force, coercion, abduction, fraud, deception abuse of power of vulnerability, or giving payments or benefits to a person in control of the victim.

    The Means

  • 4

    With the purpose of exploitation, which include sexual exploitation, forced labor, slavery or similar practices and the removal of organs.

    The Purpose

  • 5

    Initial victimization of the trafficked person is usually by a member of a person's ethnic group. There are many reasons why recruitment occurs within one's own group. Proximity, access, and trust are important factors. Trust is essential as it serves as a basis for a person to with traffickers, and smugglers to move them to a particular locale. to pay a certain amount of money, or to keep them in bondage for a particular period.

    The Recruitment

  • 6

    Tourist and student visas may be used to enable illegal entry. illegal entry may mean journeys by road, sea, and air to cross borders without anyone's knowledge or with the help of corrupt officials. Once the journey is completed, people who have been smuggled will generally be abandoned and left to look after themselves. Those who are being trafficked will be taken to wherever they are put to

    Transfer

  • 7

    There are several well-established routes, including the Ball route which is in Asia, Traffickers pass through Baltic States ending in Scandinavia. In addition, there is the East Mediterranean route which traverses from Turkey to Italy, sometimes stopping in Greece or Albania.

    Entrance

  • 8

    The recruitment, transportation, transfer, harboring or receipt of person through fraud deception, of the abuse of power

    Trafficking

  • 9

    It include the sexual exploitation or the prostitution of others, forced labor or services, slavery, or practices similar to slavery or servitude of the removal of organs

    Exploitation

  • 10

    Refers to the direct or indirect procurement of the illegal entry of a person into a state where he or she is not a residen of for, to financial or other material benefit.

    Smuggling

  • 11

    It is marked out by legal ownership of one human being by temporary ownership, debt bondage, forced labor, and hyper-exploitative contractual arrangement in the global economy.

    Slavery

  • 12

    Trafficking women for commercial exploitation can be traced back towards the end of the 19" century. It started during the "white slave trade of woment and young girls into it.

    Prostitution

  • 13

    The trafficking-as-transnational has been promised on two contrasting views of the relationship between the state and the trafficking problem.

    Organized Crime

  • 14

    Forced migratory movements in various regions, which is driven economic crisis, lack of sustainable livelihoods, political conflict, civil war, ethnic persecution. social inequalities, gender-based macroeconomic policies, and wider processes of global social transformation

    Migration

  • 15

    Trafficking has been seen as a violation of basic human rights of a person under the 1948 Universal Declaration of this. This includes the right to be free from slavery or servitude right to freedom of movement, right to life, liberty, and security, right to health, and right to free choice of employment.

    Human Rights

  • 16

    It is the transporting, transforming, harboring, or selling illegal drugs and drug paraphernalia

    Drug Trafficking

  • 17

    It is a collection of individuals, entities, and commercial operations formed in the hopes of conducting communal business activity regarding a specific product or service:

    Cartel

  • 18

    An individual employed to secretly transport and traffic drugs in a clandestine manner. These are promised payment upon the completion of the drug trafficking endeavor.

    Drug Mule

  • 19

    A substance or item that is legal to possess, use, or administer because of expressed permission granted by the Federal Government

    Controlled Substance

  • 20

    These are forms of illegal activities which makes use of the internet, private or public network, or an in-house computer system.

    Cybercrimes

  • 21

    The attack seeks to deny the legitimate users or owners of the system access to their data or computers. A Denial-of-Service (DOS) attack or virus that renders the computer inoperable.

    The computer as a target

  • 22

    The computer is used to gain criminal objectives. For example, a thief may use a computer to steal personal information

    The computer as an instrument of the crime

  • 23

    The computer is not the primary instrument of the crime, it simply facilitates it. Money laundering and the trading of child pornography would be example of this category

    The computer as incidental to a crime

  • 24

    This includes crimes against industries, such as intellectual property theft and software piracy.

    Crimes associated with the prevalence of computers

  • 25

    It Is a computer program that can replicate itself and spread from one computer to another.

    Virus

  • 26

    It is an attempt to make a machine or network resource unavailable to its intended users.

    Denial of Service Attack

  • 27

    It is software used or created to disrupt computer operation, gather sensitive information, or gain access to private computer systems.

    Malware

  • 28

    Is the use of the internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. It includes the making of false accusations or statements of fact (defamation), monitoring, making threats, identity theft. damage to data or equipment, the solicitation of minors for sex, or gathering information that may be used to harass an individual, a group of individuals, or an organization.

    Cyberstalking

  • 29

    It is committed when a person harasses another individual, a group of individuals, or an organization with the use of emails. Harassments may be in the form of threats, stalking or bothering.

    Email Stalking

  • 30

    It is the act of using achat room to monitor or get information about an individual, a group of individuals or an organization and using the information without their consent.

    Chat Stalking

  • 31

    The cyber stalker exploits the internet and the windows operating system to assume control over the computer of the targeted victim

    Computer Stalking

  • 32

    It is a form of stealing using another person's identity to access resources or obtain credit and benefits using a false Identity

    Fraud or Identity Theft

  • 33

    It involves the use and management of information technology in pursuit of a competitive advantage over an opponent.

    Information Warfare

  • 34

    It is the act of acquiring the usernames. passwords, and credit card details (and sometimes, indirectly money) by masquerading as a trustworthy entity in an electronic communication. Phishing is carried out by e-mail spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.

    Phishing Scams

  • 35

    It is an act of terrorism using cyberspace or computer resources.

    Cyber Terrorism

  • 36

    It is a form of cyber-terrorism where hackers access and attack the websites or computer systems of an individual or an organization. These hackers demand money in exchange for the stoppage of the attacks.

    Cyber Extortion

  • 37

    It is the use of the intemet and related technologies to harm other people, in a deliberate, repeated, and hostile manner.

    Cyber Bullying

  • 38

    It refers to images or films (also known as child abuse images) and writings depicting sexually explicit activities involving a child.

    Child Pornography

  • 39

    It is the process whereby proceeds, reasonably believed to have been derived from criminal activity, are transported, transferred, transformed, converted, or intermingled with legitimate funds, for the purpose of concealing or disguising the true source, disposition, movement, or ownership of those proceeds

    Money Laundering

  • 40

    It involves changing the bulk cash derived from criminal activities into a more portable and less suspicious form, then getting those proceeds into the mainstream financial system. Among the three steps, this is the most difficult and vulnerable

    Placement

  • 41

    It involves the movement of illegal funds, often mixed with funds of legitimate origins, through the world's financial systems in numerous accounts through a financial or banking system to hide the funds origin.

    Layering

  • 42

    It is the process of reintroducing the layered funds Into the mainstream economy, where it can be invested and spent freely

    Integration

  • 43

    It refers to the actof, through the use of any fraudulent machinations, import or export from the Philippines any firearm or parts thereof. It also includes the importing or exporting of explosive or ammunition or machine, implements, and equipment or tools for the manufacture of firearms.

    Firearms Trafficking

  • 44

    It is a term to describe the use of violence, intimidation or the threat of violence to create fear and achieve political, religious or ideological goals

    Terrorism

  • 45

    9/11

    Al Qaeda