CDI3
CDI3
1. If the entrance has been effected through any opening not intended for entrance or
egress.
2. If any wall, roof, flour or outside door or window has been broken.
3. If the entrance has been effected through the use of false keys, picklocks or other
similar tools.
4. If any dorm, wardrobe, chest or by sealed or closed furniture or receptacle has
been broken.
5. If any closed or sealed receptacle, as mentioned in the preceding paragraph, has
been removed even if the same is broken open elsewhere.
The term “false keys" includes (RA 3815, 1930, ART 305):
1. The tools mentioned in the preceding articles like picklocks.
2. Genuine keys stolen from the owner.
3. Any keys other than those intended by the owner for use in the
lock forcibly opened by the offender.
Brigandage
Brigands
also known as Highway Robbers, are a group of more than
three armed persons forming a band of robbers for the purpose of
committing robbery in the highway, or kidnapping persons for the
purpose of extortion or to obtain ransom or for any other purpose
to be attained by means of force and violence (RA 3815, 1930, ART
306).
According to the Anti-Piracy and Anti-Highway Robbery
Law of 1974, Brigandage is the seizure of any person for ransom,
extortion or other unlawful purposes, or the taking away of the
property of another by means of violence against or intimidation
of person or force upon things of other unlawful means,
committed by any person on any Philippine Highway."
Theft
Theft
Larceny Is the trespassory taking and carrying away personal goods from the
possession of another with intent to steal.
2. Lost Property- The perpetrator finds a lost item/ Property and failed or did not
intend to deliver the lost property to its rightful owner (Del Puerto, 2021).
Culpable Insolvency
-is the fraudulent disposal or concealment and or disposal of properties
of a debtor to defraud his creditors.
Swindling
Swindling also known as Estafa, it is an act of defrauding another
person by any of the following means:
3. Fraudulent means:
a. Inducing another, through deceit, to sign any document;
b. Resorting to fraudulent practice to ensure success in a gambling game;
c. Removing, concealing or destroying (in whole or in part) any court record, office
files, document, or any other papers.
According to the Revised PNP Criminal Investigation Manual (2010)
the elements of Estafa are:
1. There is deceit.
2. There is damage or prejudice to the offended party.
3. The deceit is through unfaithfulness or abuse of confidence.
4. Some by means of false pretenses or fraudulent acts or means.
5. Other analogous acts
Syndicated Estafa
Syndicated Estafa
-is a swindling (estafa) that is committed by a syndicate consisting of
five or more persons formed with the intention of carrying out the
unlawful or illegal act, transaction, enterprise or scheme, and the
defraudation results in the misappropriation of money contributed by
stockholders, or members of rural banks, cooperative, "samahang
nayon(s)", or farmers association, or of funds solicited by
corporations/associations from the general public.
The following standards by which a group of purported swindlers may
be considered as a syndicate under PD No. 1689;
-They formed or managed such associations with the intention of carrying out an
unlawful or illegal act, transaction, enterprise or scheme i.e., they used the very
association that they formed or managed as the means to defraud its own
stockholders, members and depositors.
Chattel Mortgage
Chattel mortgage
is a conditional sale of personal property as security for the payment
of a debt, or the performance of some other obligation specified therein,
the condition being that the sale shall be void upon the seller paying to the
purchaser a sum of money or doing some other act named.
If the condition is performed according to its terms the mortgage and sale
immediately become void, and the mortgagee is thereby divested of his
title.
Offenses Involving Chattel
Mortgage
According to the Revised Penal code of the Philippines (1930), the
following are considered offenses involving Chattel mortgage (RA
3815, 1930, ART 319):
1. Knowingly removing personal property mortgaged to any province or city
other than the one in which it was located at the time of the execution of the
mortgage without the written consent
2. Selling or pledging personal property already mortgaged or any part thereof,
under the terms of the Chattel Mortgage Law without the consent of the
mortgage written on the back of the mortgage and duly recorded in the CM
Register
Malicious Mischief
Malicious mischief
are attempts against another's property inspired
sometimes by hatred or a desire for revenge and sometimes by
the mere pleasure of destroying."
According to the Revised Penal Code of the Philippines,
Any person who shall deliberately cause the property of another
any damage not falling within the terms of the next preceding
chapter shall be guilty of malicious mischief (RA 3815, 1930,
Section 327).
The elements of the crime of malicious mischief are:
-That the offender deliberately caused damage to the property of another;
-That such act does not constitute arson or other crimes involving destruction;
-That the act of damaging another's property be committed merely for the sake
of damaging it.
Types of Malicious Mischiefs
Types of Malicious mischiefs are (RA 3815, 1930, ART 328):
5. Any building where evidence is kept for use in any legislative, judicial, administrative or other official proceedings.
6. Any hospital, hotel, dormitory, lodging house, housing tenement, shopping center, public or private market, theater or movie house or any similar place or building.
7. Any building, whether used as a dwelling or not, situated in a populated or congested area.
Other Cases of Arson
The following are other cases of Arson (PD 1613,1979, Section 3):
The Suspect begins the commission of the felony directly by overt acts but does not
fulfill all the acts of execution necessary to produce the felony by reason of the
timely arrival of the policeman.
According to the PNP Revised Criminal Investigation Manual (2011)
here are the level of offense for the crime of Arson:
2. Frustrated Arson
The Suspect, with intent to burn, puts the rag soaked with kerosene in the
combustible part of the victim's house. A lights the rag and while it is burning,
Suspect runs away. Before the fire from the rag consumes any part of the
house, the victim discovers it and extinguishes the fire.
Suspect had already performed all the acts of execution necessary to produce
the felony but the felony was not produced by the reason of the timely arrival
of the victim, which is independent of the will of Suspect.
3. Consummated Arson
The Suspect, with intent to burn, lights a rag soaked with kerosene in the combustible
part of the victim's house. But before the fire was extinguished by the victim, it had
already burned a small portion of the house.
The Suspect had already performed all the acts of execution necessary to
produce the felony. The consummation of the crime does not depend upon the extent
of damage caused. Any charring of the wood or any structure, whereby the fiber of
the wood is destroyed, is already sufficient. It is not necessary that the wood or
structure should be ablaze. Setting fire to the contents inside the building can
constitute a consummated crime of arson, regardless if no part of the building was
Exceptions from Criminal Liability in
Crimes against Property
According to the Revised Penal code of the Philippines (1930), No criminal,
but only civil liability, shall result from the commission of the crime of
theft, swindling or malicious mischief committed or caused mutually by
the following persons (RA 3815, 1930, Section 332):
1. Robbery, 6. Swindling/Estafa,
2. Brigandage, 7. Chattel Mortgage,
3. Theft, 8. Malicious Mischief, and
4. Usurpation, 9. Arson and other Crimes involving
5. Culpable Insolvency, Destruction
Special Penal Code
Special Penal Code
It is also a decree amending the Law on Arson, It was enacted last March 7, 1979
and signed by then President Ferdinand E. Marcos. It also imposes capital
punishment for Arsonist, while stressing the involvement of criminal syndicates
as perpetrators of Arson in the county (PD 1613, 1979).
It is an act penalizing the making or drawing and issuance of a check without sufficient
funds or credits. It was approved last April 1979.
It was enacted to afford protection to business and the public in general, and prevent
the circulation of worthless checks, It punishes the acts of making and issuing a check
with knowledge by the issuer that at the time the check is issued, he does not have
sufficient funds, and the failure to keep sufficient funds to cover the full amount of the
check if presented within a period of 90 days from the date appearing on the check (BP
22, 1979, Section 1).
Presidential Decree No. 532
It is a decree that increases the penalty for certain forms of Estafa, specifically
Syndicated Estafa.
It was enacted last April 6, 1980 and signed by then President Ferdinand E.
Marcos. It states that, any person or persons who shall commit estafa or other
forms of swindling shall be punished by life imprisonment to death if the
swindling (estafa) is committed by a syndicate consisting of five or more persons
formed with the intention of carrying out the unlawful or illegal act, transaction,
enterprise or scheme, and the defraudation results in the misappropriation of
money contributed by stockholders, or members of rural banks, cooperative,
"samahang nayon(s)", or farmers association, or of funds solicited by
corporations/associations from the general public (PD. 1689, 1980, Section 1).
CYBER CRIME
What is Cyber Crime?
Cybercrime,
1. To hire, employ, use, persuade, induce or coerce a child to perform in the creation or
production of any form of child pornography;
3. To publish offer, transmit, sell, distribute, broadcast, advertise, promote, export or import
any form of child pornography;
4. To possess any form of child pornography with the intent to sell, distribute, publish, or
broadcast: Provided. That possession of three (3) or more articles of child pornography of the
same form shall be prima facie evidence of the intent to sell, distribute, publish or broadcast;
5. To knowingly, willfully and intentionally provide a venue for the commission of prohibited
acts as, but not limited to, dens, private rooms, cubicles, cinemas, houses or in establishments
purporting to be a legitimate business;
6. For film distributors, theaters and telecommunication companies, by themselves or
in cooperation with other entities, to distribute any form of child pornography;
7. For a parent, legal guardian or person having custody or control of a child to
knowingly permit the child to engage, participate or assist in any form of child
pornography;
8. To engage in the luring or grooming of a child;
9. To engage in pandering of any form of child pornography;
10. To willfully access any form of child pornography;
11. To conspire to commit any of the prohibited acts stated in this section. Conspiracy
to commit any form of child pornography shall be committed when two (2) or more
persons come to an agreement concerning the commission of any of the said
prohibited acts and decide to commit it; and
12. To possess any form of child pornography.
Republic Act No. 7610
The Republic Act No. 7610 also known as Special Protection of Children
Against Abuse, Exploitation and Discrimination Act, was enacted June 17,
1992. It is an act providing for stronger deterrence and special protection
against child abuse, exploitation and discrimination, The comprehensive
program against child abuse, exploitation and discrimination refers to the
coordinated program of services and facilities to protected children against
(RA 7610, 1992, Section 3):
Child Prostitution and Other Sexual Abuse
-Children, whether male or female, who for money, profit, or any other
consideration or due to the coercion or influence of any adult,
syndicate or group, indulge in sexual intercourse or lascivious conduct,
are deemed to be children exploited in prostitution and other sexual
abuse (RA 7610, 1992, Section 5).
Child Trafficking
-It is the act of trading and dealing with children including, but
not limited to, the act of buying and selling of a child for
money, or for any other consideration, or barter (RA 7610,
1992, Section 7). It also includes the following (RA 7610, 1992,
Section 8):
When a child travels alone to a foreign country without valid reason therefore
and without clearance issued by the Department of Social Welfare and
Development or written permit or justification from the child's parents or legal
guardian;
When a person, agency, establishment or child-caring institution recruits
women or couples to bear children for the purpose of child trafficking; or
When a doctor, hospital or clinic official or employee, nurse, midwife, local civil
registrar or any other person simulates birth for the purpose of child trafficking;
or
When a person engages in the act of finding children among low-income
families, hospitals, clinics, nurseries, day-care centers, or other child-during
institutions who can be offered for the purpose of child trafficking.
Obscene Publications and Indecent Shows
-This refers to the acts of hiring, employing, using, persuading, inducing or
coercing a child to perform in obscene exhibitions and indecent shows, whether
live or in video, or model in obscene publications or pornographic materials or
to sell or distribute the said materials (RA 7610, 1992, Section 9).
Republic Act No. 9995
The Republic Act No. 9995 also known as the Anti-Photo and Video Voyeurism
Act of 2009, it was enacted February 15 2010 and was signed by the then
President Gloria Macapagal-Arroyo* It is an act defining and penalizing the
crime of photo and video voyeurism.
According to RA 9995 (2010), Photo or video voyeurism refers to the act of
taking photo or video coverage of a person or group of persons performing
sexual act or any similar activity or of capturing an image of the private area of
a person or persons without the latter's consent, under circumstances in which
such person/s has/have a reasonable expectation of privacy, or the act of
selling, copying, reproducing, broadcasting, sharing, showing or exhibiting the
photo or video coverage or recordings of such sexual act or similar activity
through VCD/DVD, internet, cellular phones and similar means or device
without the written consent of the person/s involved, notwithstanding that
consent to record or take photo or video coverage of same was given by such
person's (RA 9995, 2010, Section 3).
Under this act the following acts are considered prohibited (RA 9995,
2010, Section 4):
1. To take photo or video coverage of a person or group of persons
performing sexual act or any similar activity or to capture an image
of the private area of a person/s such as the naked or undergarment
clad genitals, public area, buttocks or female breast without the
consent of the person/s involved and under circumstances in which
the person/s has/have a reasonable expectation of privacy;
2. To copy or reproduce, or to cause to be copied or reproduced, such
photo or video or recording of sexual act or any similar activity with
or without consideration;
3. To sell or distribute, or cause to be sold or distributed, such photo or
video or recording of sexual act, whether it be the original copy or
reproduction thereof; or
4. To publish or broadcast, or cause to be published or broadcast,
whether in print or broadcast media, or show or exhibit the photo or
video coverage or recordings of such sexual act or any similar activity
through VCD/DVD, internet, cellular phones and other similar means or
device.
Republic Act No. 8484
The Republic Act No. 8484 also known as the Access Devices
Regulation Act of 1998, it was enacted February 11, 1998,39 It
is an act regulating the issuance and use of access devices and
prohibiting, and penalizing fraudulent acts committed in
relation to access devices.
According to the RA 8484 (1998), Access Device refers to any card,
plate, code, account number, electronic serial number, personal
identification number, or other telecommunications service.
equipment, or instrumental identifier, or other means of account
access that can be used to obtain money, good, services, or any
other thing of value or to initiate a transfer of funds (other than a
transfer originated solely by paper instrument) (RA 8484, 1998,
Section 3). Access Device Fraudulently Applied for refers to any
access device that was applied for or issued on account of the use of
falsified documents, false information, fictitious identities and
addresses, or any form of false pretense or misrepresentation (RA
8484, 1998, Section 3).
The following acts constitute access device fraud (RA 8484, 1998, Section 9):
1. Producing, using, trafficking in one or more counterfeit access devices;
2. Trafficking in one or more unauthorized access devices or access devices
fraudulently applied for;
3. Using, with intent to defraud, an unauthorized access device;
4. Using an access device fraudulently applied for;
5. Possessing one or more counterfeit access devices or access devices
fraudulently applied for;
6. Producing, trafficking in, having control or custody of, or possessing
device-making or altering equipment without being in the business or
employment, which lawfully deals with the manufacture, issuance, or
distribution of such equipment;
7. Inducing, enticing, permitting or in any manner allowing another, for consideration
or otherwise to produce, use, traffic in counterfeit access devices, unauthorized access
devices or access devices fraudulently applied for;
8. Multiple imprinting on more than one transaction record, sales slip or similar
document, thereby making it appear that the device holder has entered into a
transaction other than those which said device holder had lawfully contracted for;
9. Disclosing any information imprinted on the access device, such as, but not limited
to, the account number or name or address of the device holder, without the latter's
authority or permission;
10. Obtaining money or anything of value through the use of an access device, with
intent to defraud or with intent to gain and fleeing thereafter;
11. Having in one's possession, unauthorized access device or the access device
company, an access device, or any material, such as slips, carbon paper, or any other
medium, on which the access device is written, printed, embossed, or otherwise
12. Writing or causing to be written on sales slips, approval numbers from the issuer of
the access device of the fact of approval, where in fact no such approval was given, or
where, if given, what is written is deliberately different from the approval actually given;
13. Making any alteration, without the access device holder's authority, of any amount
or other information written on the sales slip;
l4. Affecting transaction, with one or more access devices issued to another person or
persons, to receive payment or any other thing of value;
15. Without the authorization of the issuer of the access device, soliciting a person for
the purpose of:
a. offering an access device; or
b. selling information regarding or an application to obtain an access device; or
16. Without the authorization of the credit card system member or its agent, causing or
arranging for another person to present to the member or its agent, for payment, one or
more evidence or records of transactions made by credit card.
Republic Act No.11449
The Republic Act No. 11449 was enacted August 28, 2019, and
signed by President Rodrigo Duterte. It is an act that provides
additional prohibitions and increases penalties for violation of
the RA 8484, or the Access Devices Regulation Act of 1998,40
The additional crimes relating to access device are (RA 11449, 2019, Section
3):
1. Skimming, copying or counterfeiting any credit card, payment card or debit
card, and obtaining any information therein with the intent of accessing the
account and operating the same whether or not cash is withdrawn or
monetary injury is caused by a perpetrator against the account holder or the
depositary bank;
Card skimming- refers to a type of fraud which involves illegal copying of
information from the magnetic stripe of a payment card to gain access to
customers’ accounts.
2. Production or possession of any software component such as programs,
application, or malware, or any hardware component such as skimming
device or any electronic gadget or equipment that is used to perpetrate any
crimes relating to access device;
3. Unauthorized access to any application, online banking account, credit card
account, ATM account, debit card account, in a fraudulent manner, regardless of
whether or not it will result in monetary loss to the account holder; and
4. Hacking refers to the unauthorized access into or interference in a computer
system/server, or information and communication system, or any access in
order to corrupt, alter, steal, or destroy using a computer or other similar
information and communication devices without the knowledge and consent of
the owner of the computer or information and communication system, including
the introduction of computer viruses and the like resulting in the corruption,
destruction, alteration, theft, or loss of electronic data messages or electronic
documents.
Republic Act No. 8792
The Republic Act No. 8792 also known as the Electronic Commerce Act, was enacted
June 14, 2000. It is an act that recognizes the use of electronic commercial and non-
commercial transactions. It also penalizes activities that involve illegal use of
electronic transactions. It aims to facilitate domestic and international dealings,
transactions, arrangements, agreements, contracts and exchanges and storage of
information through the utilization of electronic, optical and similar medium, mode,
instrumentality and technology to recognize the authenticity and reliability of
electronic data messages or electronic documents related to such activities and to
promote the universal use of electronic transactions in the government and by the
general public (RA 8792, 2000, Section 3).
Information and Communication System refers to a system for generating, sending,
receiving, storing or otherwise processing electronic data messages or electronic
documents and includes the computer system or other similar device by or in which
data is recorded or stored and any procedures related to the recording or storage of
electronic data message or electronic document (RA 8792, 2000, Section 5).
Following acts are penalized under this act (RA 8792, 2000, Section 33):
1. Hacking or cracking which refers to unauthorized access into or interference in a
computer system/server or information and communication system; or any access
in order to corrupt, alter, steal, or destroy using a computer or other similar
information and communication devices, without the knowledge and consent of
the owner of the computer or information and communication system, including
the introduction of computer viruses and the like, resulting in the corruption,
destruction, alteration, theft or loss of electronic data messages or electronic
documents.
2. Piracy which refers to the unauthorized copying, reproduction, dissemination,
distribution, importation, use, removal, alteration, substitution, modification,
storage, uploading, downloading, communication, making available to the public,
or broadcasting of protected material, electronic signature or copyrighted works
including legally protected sound recordings or phonograms or information
material on protected works, through the use of telecommunication networks,
such as, but not limited to, the internet, in a manner that infringes intellectual
property rights.
3. Violations of the Consumer Act or Republic Act No. 7394 and other relevant or
pertinent laws through transactions covered by or using electronic data messages
or electronic documents.
The Republic Act No. 10173, also known as Data Privacy Act of
2012, was enacted last August 15, 2012, and signed by the then
President Benigno S. Aquino III. It is an act protecting individual
personal information in Information and Communications
Systems in the government and the private sector, creating a
National Privacy Commission,
General Data Privacy
Principles
According to the Data Privacy Act of 2012, personal information must, be (RA
10173, 2000, Section 11):
1. Collected for specified and legitimate purposes determined and declared
before, or as soon as reasonably practicable after collection, and later
processed in a way compatible with such declared, specified and legitimate
purposes only:
2. Processed fairly and lawfully;
3. Accurate, relevant and, where necessary for purposes for which it is to be
used the processing of personal information, kept up to date; inaccurate or
incomplete data must be rectified, supplemented, destroyed or their further
processing restricted;
4. Adequate and not excessive in relation to the purposes for which they are
collected and processed;
5. Retained only for as long as necessary for the fulfillment of the purposes
for which the data was obtained or for the establishment, exercise or
defense of legal claims, or for legitimate business purposes, or as provided
by law; and
6. Kept in a form which permits identification of data subjects for no longer
than is necessary for the purposes for which the data were collected and
processed.
Criteria for Lawful Processing of Personal Information
1. The data subject has given his or her consent;
2. The processing of personal information is necessary and is related to the fulfillment of a
contract with the data subject or in order to take steps at the request of the data subject prior to
entering into a contract;
3. The processing is necessary for compliance with a legal obligation to which the personal
information controller is subject;
4. The processing is necessary to protect vitally important interests of the data subject, including
life and health;
5. The processing is necessary in order to respond to national emergency, to comply with the
requirements of public order and safety, or to fulfill functions of public authority which
necessarily includes the processing of personal data for the fulfillment of its mandate; or
6. The processing is necessary for the purposes of the legitimate interests pursued by the
personal information controller or by a third party or parties to whom the data is disclosed,
except where such interests are overridden by fundamental rights and freedoms of the data
subject which require protection under the Philippine Constitution.
Criminal Acts in Relation to
Data Privacy
The following are acts penalized under the Data Privacy Act of 2012:
1. Unauthorized Processing of Personal Information and Sensitive Personal
Information
2. Accessing Personal Information and Sensitive Personal Information Due to
Negligence
3. Improper Disposal of Personal Information and Sensitive Personal Information
4. Processing of Personal Information and Sensitive Personal Information for
Unauthorized Purposes
5. Unauthorized Access or Intentional Breach
-This refers to persons who knowingly and unlawfully, or violating data
confidentiality and security data systems, breaks in any way into any system where
personal and sensitive personal information is stored.
6. Concealment of Security Breaches Involving Sensitive Personal Information
-This pertains to persons who, after having knowledge of a security breach and of the
obligation to notify the National Privacy Commission, intentionally or by omission
conceals the fact of such security breach.
7. Malicious Disclosure
-This refers to any personal information controller or personal information processor or
any of its officials, employees or agents, who, with malice or in bad faith, discloses
unwarranted or false information relative to any personal information or personal
sensitive information obtained by him or her.
8. Unauthorized Disclosure
-It pertains to any personal information controller or personal information processor or
any of its officials, employees or agents, who discloses to a third-party personal
information not covered by the immediately preceding section without the consent of
the data subject.
MIDTERMS
RULE OF EVIDENCE
What Is Evidence?
Evidence - is the means sanctioned by the Rules of Court, of
ascertaining in a judicial proceeding the truth respecting a
matter of fact. These include but are not limited to
documentary, testimonial, electronic and object evidence,
gathered in the course of the investigation (PNP, 2010).
The court decisions are to be based on truth founded on
evidence, a primary duty of courts is to conduct proper
proceedings so as to hear and consider evidence, The so-called
law of evidence is made up largely of procedural regulations
concerning the proof and presentation of facts, whether
involving the testimony of witnesses, the presentation of
documents or physical objects, or the assertion of a foreign law
(Norton, 2020)
Aside from identifying the guilty party and locating the guilty
party; one of the three-fold aims of Criminal Investigation is to
provide evidence of his (suspect) guilt (PNP, 2010).
Evidence is valuable because it has great potential to verify that
a crime has been committed, identify the person who did it,
and exonerate all other persons who may be under suspicion
(Galero-Müftüoğlu, 2017, p.101).
TYPES OF EVIDENCE
1. Object/ Real Evidence also known as Physical Evidence
it is any type of evidence that is real or has an objective
existence. It has dimension, size or shape; it can be seen,
touched, smelled or tasted; it is solid, semisolid or liquid
(Galero-Müftüoğlu, 2017, p.102).
These are evidence that are addressed to the senses of the
court. When an object is relevant to the fact in issue, it may be
exhibited to, examined or viewed by the court (Rule 130, 1989,
Section 1).
Main Sources of Physical
Evidence
1. The Crime Scene- It is the focus of the preliminary
investigation and also the primary source of physical evidence
(Galero-Müftüoğlu, 2o17, p.105).
2. The Victim- it is a potential source of physical evidence,
particularly in the case of sex crimes. Hairs, fibers and biological
fluids are all potential evidence and need to be collected
following established protocol (Galero-Müftüoğlu, 2017, p.1o5).
3. The Suspect- It can be prime sources of physical evidence.
Transfers of evidence readily occur and must be sought out on
both the suspect and his or her environment, such as the
suspect's vehicle or home (Galero-Müftüoğlu, 2017, p.105).
Demonstrative evidence, usually in the form of charts and
diagrams, demonstrate or illustrate the testimony of a witness,
It's admissible when it fairly and accurately reflects the
witness's testimony and is more probative than prejudicial.
Maps, diagrams of a crime scene, charts and graphs that
illustrate physical or financial injury to a plaintiff are examples
of demonstrative evidence.
2. Documentary Evidence
Documentary Evidence consists of writings or any material
containing letters, words, numbers, figures, symbols or other
modes of written expressions offered as a proof of their
contents (Galero-Müftüoğlu, 2017, p.102).
Best Evidence Rule
It requires that the original document be produced whenever
its contents are the subject of inquiry. As such, mere
photocopies of documents are inadmissible pursuant to the
best evidence rules, No evidence shall be admissible other than
the original document itself
except in the following cases (Rule 130, 1989, Section 3):
When the original has been lost or destroyed, or cannot be produced in
court, without bad faith on the part of the offeror;
When the original is in the custody or under the control of the party
against whom the evidence is offered, and the latter fails to produce it
after reasonable notice;
When the original consists of numerous accounts or other documents
which cannot be examined in court without great loss of time and the
fact sought to be established from them is only the general result of the
whole; and
When the original is a public record in the custody of a public officer or is
recorded in a public office.
Rules on Secondary Evidence (Documentary)
According to the Revised Rules on Evidence (1989), documents
other than the its original copy can be admissible in court if it
follows following criteria:
A. When the original document is unavailable (Rule 130, 1989,
Section 5).
Unavailable meaning the original document has been lost or
destroyed, or cannot be produced in court.
The offeror needs to present a proof of its execution or
existence and the cause of its unavailability.
Proof of the document existence is the copy of its contents, or
by a recital of its contents in some authentic document, or by
the testimony of witnesses in the order stated.
B. When the original document is in the adverse party's custody
or control (Rule 130, 1989, Section 6).
A reasonable notice to produce the document shall be offered
to the owner or holder of the document.
After such notice and after satisfactory proof of its existence,
the owner or holder of the document fails to produce the
document, secondary evidence may be presented as in the case
of its loss.
C. When the original document is in the custody of a public officer or
is recorded in a public office (Rule 130, 1989, Section 7).
The existence of the document's contents may be proved by a
certified copy issued by the public officer in custody of the said
document.
D. When the party who calls for a document is not bound to offer it
(Rule 130, 1989, Section 8)
A party who calls for the production of a document and inspects the
same is not obliged to offer it as evidence.
Interpretation of Documents
The following are the guiding principles on the interpretation of
Documentary Evidence as indicated on the Revised Rules on Evidence
(1989):
A. Interpretation of a writing according to its legal meaning
Document is to be interpreted according to the legal meaning it bears in
the place of its execution, unless the parties intended otherwise (Rule
130, 1989, Section 10).
B. Instrument construed so as to give effect to all provisions
In the construction of an instrument, where there are several provisions
or particulars, such a construction is, if possible, to be adopted as will
give effect to all the provisions (Rule 130, 1989, Section 11).
C. Interpretation according to intention
In the construction of an instrument, the intention of the parties is to be pursued.
When a general and a particular provision are inconsistent, the latter is
paramount to the former. A particular intent will control a general one that is
inconsistent with it (Rule 130, 1989, Section 12).
D. Interpretation according to circumstances
The proper construction of an instrument, the circumstances under which it was
made, including the situation of the subject thereof and of the parties to it, may
be presented (Rule 130, 1989, Section 13).
E. Peculiar signification of terms
Evidence is admissible to show that they have a local, technical, or otherwise
peculiar signification, and were so used and understood in the particular instance,
in which case the agreement must be construed accordingly (Rule 130, 1989,
Section 14).
F. Written words control printed.
If the document or instrument consists partly of written words and partly of a
printed form, and the two are inconsistent, the former controls the latter (Rule
13o, 1989, Section 15).
G. Experts and interpreters to be used in explaining certain writings
If the characters in which the document is written are difficult to be deciphered, or
the language is not understood by the court, the evidence of persons skilled in
deciphering the characters, or who understand the language, is admissible to
declare the characters or the meaning of the language (Rule 130, 1989, Section 16).
H. Of two constructions, which preferred
If the terms of an agreement have been intended in a different sense by the
different parties to it, the most favorable to the party shall prevail (Rule 130, 1989,
Section 17).
I. Construction in favor of natural right
If an instrument is equally susceptible to two interpretations, one in
favor of natural right and the other against it. The one who favors
natural right is to be adopted (Rule 130, 1989, Section 18).
J. Interpretation according to usage
An instrument may be construed according to usage, in order to
determine its true character (Rule 130, 1989, Section 19).
Parol Evidence Rule that when the parties to a contract have
made and signed a completely integrated written contract,
evidence of antecedent negotiations (called "parol evidence")
will not be admissible for the purpose of varying or
contradicting what is written into the contract, It bars evidence
of any agreements made before or at the same time as the
actual written agreement, which were not included in the final
written agreement.
However, a party may present evidence to modify, explain or add to
the terms of written agreement if he puts in issue in his pleading
(Rule 130, 1989, Section 9):
An intrinsic ambiguity, mistake or imperfection in the written
agreement;
The failure of the written agreement to express the true intent and
agreement of the parties thereto;
The validity of the written agreement; or
The existence of other terms agreed to by the parties or their
successors in interest after the execution of the written agreement.
3. Testimonial Evidence
Testimonial evidence is where a person takes the stand and answers
questions about a case It is information obtained through
interviewing and interrogating individuals about what they saw
(Eyewitness evidence), heard (hearsay evidence) or know (character
evidence).
A testimony or confession can add considerable value to physical
evidence when presented in court. It can help in understanding
motives or explaining those things found at the crime scene (Galero-
Müftüoğlu, 2017, p.102).
Qualification of Witnesses
All persons who can perceive, and perceiving, can make their
known perception to others, hence can be a witness (Rule 130,
1989, Section 20). A person may be disqualified as being a
witness based on the following:
Mental Incapacity or Immaturity
-The following persons cannot be witnesses (Rule 130, 1989, Section 21):
Those whose mental condition, at the time of their production for examination, is such
that they are incapable of intelligently making known their perception to others;
Children whose mental maturity is such as to render them incapable of perceiving the
facts respecting which they are examined and of relating them truthfully.
Marriage
-During their marriage, neither the husband nor the wife may testify for or against the
other without the consent of the affected spouse, except in (Rule 130, 1989, Section
22):
A civil case by one against the other, or
In a criminal case for a crime committed by one against the other or the latter's direct
descendants or ascendants.
Death or Insanity of Adverse Party
-Also known as the Dead Man's Statute, it states that if one party to the alleged
transaction is precluded from testifying by death, insanity, or other mental
disabilities, the surviving party is not entitled to the undue advantage of giving
his own uncontradicted and unexplained account of the transaction.
Privileged Communication
-The following persons cannot testify as to matters learned in confidence in the
following cases (Rule 130, 1989, Section 24):
The husband or the wife, during or after the marriage, cannot be examined
without the consent of the other as to any communication received in
confidence by one from the other during the marriage.
An attorney cannot, without the consent of his client, be examined as to
any communication made by the client to him, or his advice given
thereon in the course of, or with a view to, professional employment, nor
can an attorney's secretary, stenographer, or clerk be examined, without
the consent of the client and his employer.
A person authorized to practice medicine, surgery or obstetrics cannot in
a civil case, without the consent of the patient. A minister or priest
cannot, without the consent of the person making the confession, be
examined as to any confession made to or any advice given by him in his
professional character.
A public officer cannot be examined during his term of office or
afterwards, as to communications made to him in official confidence.
Admissions and Confessions
Admission is the act, declaration or omission of a party as to a relevant fact
may be given in evidence against him (Rule 130, 1989, Section 26). Confession
is the declaration of an accused acknowledging his guilt of the offense
charged, or of any offense necessarily included therein, may be given in
evidence against him (Rule 130, 1989, Section 33).
The Hearsay Rule
Hearsay Rule is an exclusionary rule, prohibiting hearsay or out of court
statements offered as proof of that statement, from being admitted as
evidence because of the inability of the other party to cross-examine the
maker of the statement. According to the Section 36 of the Revised Rules of
Evidence (1989), a witness can testify only to those facts which he knows of
his personal knowledge; that is, which are derived from his own perception.
Exceptions to the Hearsay Rule
Although, testimony is generally confined to personal
knowledge; there are exceptions where out of court statements
can be admitted as evidence. Here are the following exceptions
to the Hearsay Rule (Rule 130, 1989, Section 37- 47):
a. Dying Declaration -refers to the declaration of a dying
person.
b. Declaration Against Interest - Statements against interest,
sometimes called admissions or confessions4, are statements
or actions which in some way adversely affect the divulging
party. The confession doesn't need to be formal admission,
such as a statement given to the police. Formal admissions are
admissible as part of the public record.
c. Act or Declaration about Pedigree - The act or declaration of a person deceased,
or unable to testify, in respect to the pedigree of another person related to him by
birth or marriage, may be received in evidence. Pedigree includes relationship,
family genealogy, birth, marriage, death, the dates when and the places where these
fast occurred, and the names of the relatives.
d. Family Reputation or Tradition Regarding Pedigree The reputation or tradition
existing in a family previous to the controversy, in respect to the pedigree of any one
of its members, may be received in evidence if the witness testifying thereon be also
a member of the family, either by consanguinity or affinity. Entries in family bibles or
other family books or charts, engravings on rings, family portraits and the like, may
be received as evidence of pedigree.
e. Common Reputation - Common reputation existing previous to the controversy,
respecting facts of public or general interest more than thirty years old, or
respecting marriage or moral character, may be given in evidence. Monuments and
inscriptions in public places may be received as evidence of common reputation.
f. Part of res gestae - A declaration made by a person immediately after being
wounded, pointing out or naming his assailant, may be considered as part of
the res gestae and is admissible in evidence. Res gestae is used to refer to a
declaration that is made at an event that proves the event happened because
the words were uttered upon witnessing the event,
g. Entries in the Course of Business - Entries made at, or near the time of
transactions to which they refer, by a person deceased, or unable to testify,
who was in a position to know the facts therein stated, may be received as
prima facie evidence
h. Entries in Official Records - Any properly-kept official government records
are admissible, such as income tax returns and employment information.
Private business records are also admissible, so long as a qualified witness can
identify them and explain their maintenance or clarify their meaning
(Wodjacz, 2020).
i. Commercial Lists and the Like - Evidence of statements of matters of
interest to persons engaged in an occupation contained in a list, register,
periodical, or other published compilation.
j. Learned Treatises - This refers to the published treatise, periodical or
pamphlet on a subject of history, law, science, or art is admissible as
tending to prove the truth of a matter stated therein if the court takes
judicial notice, or a witness expert in the subject testifies, that the writer
of the statement in the treatise, periodical or pamphlet is recognized in
his profession or calling as expert in the subject.
k. Testimony or Deposition at a Former Proceeding – The testimony or
deposition of a witness deceased or unable to testify, given in a former
case or proceeding, judicial or administrative, involving the same parties
and subject matter, may be given in evidence against the adverse party
who had the opportunity to cross-examine him.
Types of Witness
There are three types of witnesses:
1. A lay witness - this is the most common type. It is a person who
watched certain events and describes what they saw.
2. An expert witness or a specialist - It is someone who is educated in a
certain area. They testify with respect to their specialty area only.
3. A character witness - It is someone who knows the victim, the
defendant, or other people involved in the case. Character witnesses
usually don't see the crime take place but they can be very helpful in a
case because they know the personality of the defendant or victim, or
what type of person the defendant or victim was before the crime.
Character evidence is used to describe a character trait of a
person, such as a tendency to commit crimes. Character
evidence could also include a witness testifying that a party in
the case has a reputation in the community of being a violent
person, or a witness opinion that the defendant is very honest
and truthful (Walton, 2006).
Character evidence is not generally admissible; however, there are exceptions
(Rule 13o, 1989, Section 51):
1. In Criminal Cases:
a. The accused may prove his good moral character which is pertinent to the
moral trait involved in the offense charged.
b. Unless in rebuttal, the prosecution may not prove his bad moral character
which is pertinent to the moral trait involved in the offense charged.
C. The good or bad moral character of the offended party may be proved if it
tends to establish in any reasonable degree the probability or improbability of the
offense charged.
2. In Civil Cases:
Evidence of the moral character of a party in a civil case is admissible only when
pertinent to the issue of character involved in the case.
Opinion Rule
According to the Revised Rules of Evidence (1989), the opinion of witness is not
admissible (Rule 130, 1989, Section 48), except for the following criteria:
Opinion of Expert Witness - The opinion of a witness on a matter requiring
special knowledge, skill, experience or training which he showed and
possesses, may be received in evidence.
Opinion of Ordinary Witnesses - The opinion of a witness for which proper basis
is given, may be received in evidence regarding:
a. The identity of a person about whom he has adequate knowledge;
b. A handwriting with which he has sufficient familiarity;
C. The mental sanity of a person with whom he is sufficiently acquainted; and
d. The emotion, behavior, condition or appearance of a person.
Procedure in Documentation of Evidence
The following are the procedures and guidelines in the documentation of
evidence based from the PNP Standard Operating Procedures;
1. All evidence recovered in the crime scene must be properly documented,
photographed and properly turned over to the evidence custodian. The
detailed receipt showing the inventory of the evidence must be properly
acknowledged and signed by the evidence custodian. In case of motor
vehicles, there must be Technical Inspection and Inventory Report to be
incorporated in the records (SOP-2012- 004, 2012);
2. The investigator-on-case/duty investigator must exhaust all efforts to
determine the relevance and materiality of the evidence recovered. During
the preparation of the case, the picture/pictures of the evidence must be
incorporated in the case folder. All angles/sides of the seized/recovered
evidence must be photographed (SOP-2012- 004, 2012);
3. Personal properties seized/recovered which were not used as evidence
must be returned to the person from whom the property/properties
was/were taken with proper documentation. If the property is to be used as
evidence, the possessor must be properly apprised on the disposition of the
property (SOP-2012- 004, 2012);
4. The investigator-on-case/duty investigator must prepare a letter request in
standard form for the release of the personal property seized/recovered as
evidence addressed to the prosecutor to be signed by the owner. The investigator
must also move and manifest his acquiesce for the release of the seized evidence
in favor of the owner from whom the property was taken. He must state among
others, that the photographs of the property will be presented as evidence when
same is directed to be presented in court (SOP-2012- 004, 2012);
5. Upon approval of the prosecutor/judge of the motion for the release of
property, the evidence custodian must without delay, release the
property/evidence ordered to be released. The owner must acknowledge in
writing the receipt of the property/evidence as ordered by the prosecutor/judge
under the condition that when the court, in the future, shall demand its
production, he/she shall comply without delay. Further, he/she must state that
he/she does not have any complaint on the status of the property being returned.
If there be any, said complaint must be placed in writing on the space provided
for in the acknowledgment receipt prepared (SOP-2012- O04, 2012);
6. If the evidence sought to be released contain vital information
such as computer records, call logs, messages and other electronic
records wherein the preservation of the original records are
needed during the prosecution of the case, the owner should be
properly apprised on the necessity of the subject evidence to
remain under the control and custody of the evidence custodian or
the prosecutor/court (SOP-2012- 004, 2012); and
7. The turnover of the evidence must be witnessed by any party
accompanying the owner. Photograph the turnover of the property.
Incorporate the photo and the receipt in the records of the case
(SOP-2012- 004, 2012).
CRIMES AGAINST PROPERTY
INVESTIGATION
What is a Crime Investigation?
Investigation is an inquiry, judicial or otherwise, for the discovery and
collection of facts concerning the matter or matters involved.
It is the process of inquiring, eliciting, soliciting and getting vital
information/facts/circumstances in order to establish the truth (PNP,
2011).
Crime Investigation is an ensemble of methods by which crimes are
studied and criminals apprehended. The criminal investigator seeks to
ascertain the methods, motives, and identities of criminals and the
identity of victims and may also search for and interrogate witnesses It is
the lawful, objective, logical search for people and things useful in
reconstructing the circumstances surrounding the commission of a crime
General Principles of
Investigation
Criminal Investigation is the collection of facts to accomplish a
three-fold aim (PNP, 2011):
1. To identify the suspect;
2. To locate the suspect; and
3. To provide evidence of his guilt.
According to the PNP Revised Criminal investigation Manual
(2011), the investigator must seek to establish the six (6)
cardinal points of investigation, namely:
1 What specific offense has been committed;
2. How the offense was committed;
3. Who committed it;
4. Where the offense was committed;
5. When it was committed; and
6. Why it was committed.
What is a Special Crime Investigation
Special Crime Investigation is a special study of modern
techniques in the investigation of serious and specific crimes
including murder, homicide, rape, abortion, robbery, arson
kidnapping, blackmail, carnapping and criminal negligence. Its
emphasis is on physical evidence rather than an extra judicial
confession, and focuses on specific crimes which by their nature
are difficult and complex to investigate.
Robbery Investigation
Under the Revised Penal Code Article 293 - 298, the act of
gaining, taking any personal property belonging to another, by
means of violence or intimidation of any person, or using force
upon anything is guilty of robbery.
The elements of the crime of robbery are (PNP, 2011, p. 171):
The personal property belongs to another.
The unlawful taking of that property.
With intent to gain (animus lucrandi).
Violence against or intimidation of any person or force upon things.
The offense can be committed by a band or with the use of firearms
on a street, road or alley or by attacking a moving train, street car,
motor vehicle or airship or by entering or taking the passenger
conveyance by surprise.
Robbery in an Inhabited House or Edice for Worship and Private
Building
The robbery in an inhabited house or public or edifice devoted for
worship or in an uninhabited place or in a private building is
punishable under the Article 299 to 302 of the Revised Penal Code
of the Philippines (PNP, 2011, p. 161).
The elements of robbery in an inhabited house or public or edifice
devoted for worship or in an uninhabited place or in a private
building are:
The culprit must enter the building where the object to be taken is
found.
The entrance is effected by any of the following means through an
opening not intended for entrance, breaking any wall, roof or floor,
outside door or window, using false keys, picklocks or similar tools.
The entrance is not required when the doors (of furniture),
wardrobes, chest or sealed furniture are broken or taking such
objects away to be broken outside the place of robbery.
The evidence needed to file the crime of robbery are (PNP,
2011, p. 172):
1. Testimonial Evidence - Affidavit of complainant and
witnesses
2. Documentary Evidence - photographs, videos, police reports
and other documents
3. Object Evidence - stolen items, weapons and other devices
4. Other relevant evidence.
Investigation Checklist for Robbery
Here are some of the things that investigators may have to investigate in
case of robberies particularly when it involves serious injuries or the loss
of lives.
1. Find out as much as possible about the crime before going to the scene
and upon arrival.
2. Overview. Take your bearings at the crime scene so that you get a rough
picture of the area and what has happened.
3. Start keeping an action log.
4. Cordon off the area or extend the existing cordon if necessary. The
perpetrator es route to and from the scene may need to be cordoned off
as well.
5. Make sure that a list is made of the people who enter the crime scene.
6. Pause for thought and start planning. This is where the crime scene analysis
starts.
7. Note down your observations continuously. It is a good idea to use a tape
recorder.
8. Take a general photograph of the crime scene. Film the scene with a video
camera.
9. Search for and collect evidence, objects and reference samples etc. outdoors
10. Search for and collect evidence, objects and reference samples etc. indoors.
11. Take photographs continuously. Photograph all the evidence before it is
collected. If possible, engage a photographer for specialized trace evidence
photography.
12. If the robbery was video/filmed (CCTV), view the video to see where evidence
might be found.
14. Draw a sketch. Mark the places where trace evidence and
reference samples are collected.
15. Write a continuous seizure report.
16. Find out whether the proceeds of the robbery included bait
money.
17. Check the crime scene before you leave it. Make sure that
you have not forgotten anything important, such as
interrogation reports, memos, equipment etc.
Entry route
After a robbery, it is important to investigate how the offender
got in. It is important to find the entry route, which is not
necessarily a door. Look at the building from the outside and
try to find traces of a break-in or other damage to doors or
windows. Check the function of the lock and check whether
there are any pick marks (PNP, 2011, p. 41).
Ask the victim
Find out from the victim what has been stolen and where there
are traces of objects being moved by the perpetrator. That is
the place to look for trace evidence (PNP, 2011, p. 41).
Latent footwear prints
Paper on the floor is always of interest since there may be
latent footwear prints on it. Collect all paper and then look for
footwear prints on the paper at your unit or send the papers to
the Crime Laboratory for examination. There may also be latent
footwear prints on desk pads, chair seats, etc (PNP, 2011,p. 42).
Collection of Evidence
According to the PNP's Field Manual on Investigation of Crimes
of Violence and Other Crimes (2011), the illustration shows the
following types of evidence in connection with robberies:
Brigandage Investigation
Article 306-307 of the Revised Penal Code of the Philippines,
and the Anti-Piracy and Anti-Highway Robbery Law of 1974,
criminalized the act of committing robbery in the highway, or
kidnapping persons for the purpose of extortion or to obtain
ransom or for any other purpose to be attained by means of
force and violence by more than three armed persons or a band
of robbers.
The elements of crime of brigandage according to the PNP
Criminal Investigation Manual 2011 are the following:
-The offense is committed by at least four armed persons.
-The offenders formed a band for the purposes of committing
any or all of the following:
Robbery in the highway:
Kidnap persons for ransom;
Attain any other purpose through force and violence.
There is a preconceived or intended victim.
The evidence needed to file a crime of Brigandage are the
following (PNP, 2011, p. 162):
1, Testimonial Evidence- Affidavit of complainant and witnesses
2. Documentary Evidence -photographs, videos, police reports
and other documents
3. Object Evidence -stolen items, weapons and other devices
4. Other relevant evidence.
Theft Investigation
Theft is committed by any person who, with intent to gain but
without violence against or intimidation of persons nor force
upon things, shall take personal property of another without
the latter's consent (RA 3815, 1930, Article 308). It is punishable
under Article 308 of the Revised Penal Code of the Philippines.
The elements of Theft are:
Any personal property belonging to another.
The personal property is taken with intent to gain.
The taking is without the owner’s consent.
Absence of or without violence or intimidation of persons or
force upon things.
According to the PNP Criminal Investigation Manual (2011),
Theft is consummated when the offender is able to take
possession of the thing. Once the thief has full possession of
the thing, even if he did not have a chance to dispose of the
same, theft is consummated.
The evidence needed to file a crime of Theft are (PNP, 2011, p.
163):
1. Testimonial Evidence - Affidavit of complainant and
witnesses
2. Documentary Evidence-photographs, videos, police reports
and other documents
3. Object Evidence - stolen items, weapons and other devices
4. Other relevant evidence
Usurpation Investigation
Usurpation is the occupation of real property belonging to another
person by means of violence or intimidation (RA. 3815, 1930, Article
312). Usurpation is punishable underthe Revised Penal code of the
Philippines, Article 312. The elements of the crime of Usurpation are
(PNP, 2011, p. 163):
The offender takes possession or real property or real right.
The real property belongs to another.
The taking is through violence or by intimidation of persons.
The taking is with intent to gain
The evidence needed to file a crime of Usurpation are as
follows (PNP, 201l, p. 163):
1. Testimonial Evidence - Affidavit of complainant and
witnesses
2. Documentary Evidencephotographs, videos, police reports
and other documents
3. Object Evidence - real property rights, weapons and other
devices
4. Other relevant evidence
Culpable Insolvency Investigation
Culpable Insolvency also known as Fraudulent insolvency is punishable
under Article 312 of the Revised Penal Code of the Philippines.
The elements of Culpable Insolvency are (PNP, 2011, p. 164):
This offense is committed when a debtor absconds with his property, real
or personal, to the prejudice of his creditors.
Insolvency proceedings are not a requirement.
Other analogous acts
The evidence needed to file a crime of Culpable Insolvency are
as follows:
1. Testimonial Evidence - Affidavit of complainant and
witnesses
2. Documentary Evidence-photographs, videos, police reports
and other documents
3. Object Evidence -travel documents and transfer contracts
4. Other relevant evidence
Estafa and Bouncing Checks Investigation
Estafa also known as Swindling is an act of defrauding another
person by unfaithfulness or abuse of confidence; deceit or
fraudulent acts; and fraudulent means (RA.3815, 1930, Article 315).
The elements of Estafa are:
There is deceit.
There is damage or prejudice to the offended party.
The deceit is through unfaithfulness or abuse of confidence.
Some by means of false pretenses or
fraudulent acts or means.
Other analogous acts
The evidence needed to file a crime of Estafa are as follows
(PNP, 2011, p. 165):
1. Testimonial Evidence - Affidavit of complainant and
witnesses
2. Documentary Evidence- photographs, videos, police reports
and other documents
3. Object Evidence - stolen items, weapons and other devices
4. Other relevant evidence
Bouncing Check Law
According to the Bouncing Check Law, the act of making or drawing
and issuance of a check without sufficient funds or credit is unlawful
(BP 22, 1979, Section 1). The acts which constitute the crime of
making or drawing and issuance of a check without sufficient funds
or credit are (PNP, 2011, p. 165):
1. Any person who makes or draws and issues any check to apply on
account or for value, knowing at the time of issue that he does not
have sufficient funds in or credit with the drawee bank for the
payment of such check in full upon its presentment or would have
been dishonored for the same reason had not the drawer, without
any valid reason, ordered the bank to stop payment.
2. Any person who, having sufficient funds in or credit with the drawee
bank when he makes or draws and issues a check, shall fail to keep
sufficient funds or to maintain a credit to cover the full amount of the
check if presented within a period of ninety (90) days from the date
appearing thereon, for which reason it is dishonored by the drawee
bank.
The evidence needed to file the actions for violations of BP 22 are:
1. Testimonial Evidence- affidavit of the complainant and witnesses
2. Documentary Evidence- Notice from the bank for insufficiency of
funds, demand letter, police records and other pertinent documents
3. Object Evidence - the check or any negotiable instruments
4. Other evidence relevant
Three Ways of Committing Estafa
The two indispensable elements of Estafa are Fraud or the
deceit employed to defraud another; and the other one is,
Damage or the injury or damage caused by Estafa (PNP, 2011,
p.166). The three ways of committing Estafa are as follows:
1. By using fictitious name.
2. By falsely pretending to possess: power; influence;
qualification; property; credit; agency; business or imaginary
transaction; and
3. By means of similar deceit
a. Altering the quality, fineness or weight of anything pertaining to his
art or business as when a jeweler to whom is entrusted a diamond-
studded ring changes the gem with lower quality.
b. Pretending to have bribed any government employee when in fact
the offender converted for his use the money taken under the pretext
of a bribe.
C. Estafa by: Obtaining food/accommodation without paying for it, or
obtaining credit by the use of false pretense; or abandoning or
surreptitiously credit and food without paying for it.
d. Estafa by inducing another to sign my document.
e. Estafa by resorting to fraudulent practice to insure success in a
gambling game.
f. Estafa by removing or concealing any court record office files.
Estafa through the Issuance of Postdating a Check without Funds
The elements of estafa through the issuance of post datinga check without funds are as
follows (PNP, 2o11, p. 168):
That the offender has postdated or issued a check in payment of an obligation contracted at
the time of postdating or issuance of such check, not pre-existing at the time of payment.
That at the time of the postdating or issuance of said check, the offender had no funds or
the funds deposited were not sufficient to cover the amount of the check.
The offender has postdated or issued a check in payment of an obligation contracted at the
time of the postdating or issuance of such check;
He postdated or issued such check knowing at the time that he had no funds in the bank or
the funds deposited by him in the bank were not sufficient to cover the amount of the
check;
He did not inform the payee of such circumstances;
The payee had been defrauded.
PRE FINALS
CYBER CRIME
INVESTIGATION
Computer Crime or Cybercrime investigation is the process of
investigating, analyzing, and recovering forensic data for digital
evidence of a crime, just like other criminal investigations; It is a
continuous process of searching for evidence and leads. Examples of
evidence in a cyber-crime investigation include a computer,
cellphone, automobile navigation system, video game console, or
other networked device found at the scene of a crime. This evidence
helps cyber-crime investigators determine the perpetrators of a cyber
crime and their intent.
Anti-Cybercrime Agencies in the Philippines
its first law regulating the internet on June 14, 2000, Republic Act No.
8792 also known as the Philippine Electronic Commerce Act of 2000
September 12, 2012, Republic Act No. 1o175 also known as The
Cybercrime Prevention Act of 2012 was signed
Cybercrime Investigation and Coordinating Center
Republic Act 1o175 or the Cybercrime Prevention Act of 2012
attached agency of the Department of Information and
Communications Technology (DICT
National Computer Emergency Response Team (NCERT)
is a division under the Cybersecurity Bureau of the Department of
Information and Communications Technology
responsible for receiving, reviewing, and responding to computer
security incident reports and activities.
also ensure that a systematic information gathering/dissemination,
coordination and collaboration among stakeholders, especially
computer emergency response teams, are maintained to mitigate
information security threats and cybersecurity risks
The Core Sections of NCERT are
-Security Operations Center Section
-Incident Response Section
-Digital Forensics Section
-Cyber Threat Monitoring Section
Department of Justice - Office of Cybercrime (D0J-00c),
Republic Act No. 10175 or the Cybercrime Prevention Act of 2012
Central Authority in all matters relating to international mutual
assistance and extradition for cybercrime and cyber-related matters
also acts as the focal agency in formulating and implementing law
enforcement investigation and prosecution strategies in curbing
cybercrime and cyber-related offenses nationwide (DOJ-O0C, 2018)
National Bureau of Investigation Cybercrime Division (NBI-CCD)
is tasked to investigate all cyber related crimes punishable under
Cybercrime Prevention Act and related laws
to establish and maintain an Incident Response Team and Digital
Forensic Section that will be responsible for responding to the current
and emerging cyber threats, and conducting digital forensic
examination and analysis
PNP Anti-Cybercrime Group (PNP-ACG),
National Operational Support Unit primarily responsible for the
implementation of pertinent Philippine laws on cybercrimes and
advocating the anti-cybercrime campaign of the PNP
The capabilities of PNP ACG are as follows:
Cyber Response
Cyber Security
Digital Forensic
Republic Act No. 7438
April 27, 1992
The fee for the assisting counsel shall be paid by the city or
municipality where the custodial investigation is conducted,
provided that if the municipality of city cannot pay such fee, the
province comprising such municipality or city shall pay the fee:
Provided, That the Municipal or City Treasurer must certify that no
funds are available to pay the fees of assisting counsel before the
province pays said fees.
1. Motive
2. Instrumentality
3. Opportunity
The Anatomy of Crime:
1. Confession
4. Associate evidence
Phase II – locate and apprehend suspect/s
1. Surveillance
2. Undercover Assignments
3. Informants
Phase III – Gather and provide evidence to
establish the guilt of the accused
2) Forceful Personality
The appearance of the interviewee and other qualities such
as skills of communication techniques and the force of his
language are the mainstays of the strength of his character.
A. Qualities of a Good Interviewer
2) Great Inconvenience
The ordeal of testifying in court is an inconvenience on the
part hands-to-mouth and to the unemployed.
B. Reasons Why Witnesses Refuse to Talk and
Testify
1) Preparation
The investigator should review the facts at the crime scene
and information from other sources in order that he would
be ready for the questioning.
A background data of the subject should be available so
that he could adapt himself to the kind of approach to be
employed.
2) Approach
The investigator must carefully select his kind of approach,
which maybe a single kind, a combination of two or the
application of all the techniques.
D. Stages of Handling the Interview
3) Warming Up
This is being done by preliminary or exploratory questions
to clear the atmosphere, promote a conducive ground for
cordiality, respect, and trust for each other.
4) Cognitive Interview
The subject is now asked to narrate his account without
interruption, intervention or inference.
E. Rules in Questioning
E. Rules in Questioning
4) Saving Faces
Embarrassing questions on the subject on matters of
exaggeration or honest errors about time, distance and
description can be avoided if the investigator will cooperate
with subject to “save his face.”
5) Yes and No Answers
Do not ask questions which could be answered by YES or
NO. It will curtail the complete flow of information and will
lead to inaccuracy.
F. Types of Witnesses According to their Attitude
F. Types of Witnesses According to their Attitude
1) Know-Nothing Type
These are the reluctant types of witnesses. They are
among the uneducated and of low level of intelligence.
2) Disinterested Type
This is the uncooperative and indifferent subject. Their
indifference should be demolished to arouse their interest
or be flattered.
F. Types of Witnesses According to their Attitude
3) The Drunken Type
The style of questioning by the investigator should be adapted
to the psychology of the subject. When the drunken subject
sobered, another interview will be conducted, confronting him
about his disclosures while in the state of drunkenness. Written
statement must be taken during his sobriety.
4) Suspicious Type
These types of witnesses are suspicious about the motive and
actions of the investigator. The barrier of the suspicions may be
removed by sincere explanations or psychological pressure.
5) Talkative Type
These are witnesses who are prone to exaggerate, adding
irrelevant or new matters to their narrations. The skillful
investigator could prune the unnecessary matters from relevant
ones.
F. Types of Witnesses According to their Attitude
6) Honest Witnesses
These are truthful and cooperative witnesses where the
investigator could rely upon, with little or no problem in
handling them.
7) Deceitful Witness
These are liar type of witnesses. Let them lie and order
them to repeat several times their narrations. They will be
enmeshed in contradictions.
8) Timid Witness
They are the shy-type of witnesses. The approach must be
friendly and reassuring confidentiality of their information.
F. Types of Witnesses According to their Attitude
(3) Drama – the weakest link used to fake pain and the
agony by ordering him to shout, accompanied by banging a
chair on the wall to make it appear that a commotion is
going on. The other suspect in separate rooms must hear
the DRAMA before telling them that their partner had
confessed.
(4) Feigning Contact with Family Members – the
suspect could be tricked that the investigator had gone to
the residence and the family members had supplied facts
against the suspect. The suspect’s family will be dragged in
to the investigation if the suspect will not confess.
d) Tricks and Bluffs:
(5) More Tricks and Bluffs – depending upon the
imagination of the investigator in each particular situation.
(6) The Line-up – the complainant, witness or victim is
requested to point positively the suspect who is among
persons in the police line-up. The witnesses, vcitims or
complainant are previously coached about the identity of
the suspect.
(7) Reverse Line-up – the suspect is placed among
other persons in a line up and he is identified by several
complainant and witnesses who will associate the suspect
in other several crimes. This will cause the suspect to
become desperate and confess only to the case under
investigation, to avoid from being charged on false
accusations.
6) The Techniques of Interrogation:
(a) Sweating
(b) Color Change
(c) Dry Mouth
(d) Breathing
(e) Pulse
(f) Avoidance of Direct Eye Contact