organized crime group (OCG) Flashcards Preview

Law Enforcement Administration (LEA) > organized crime group (OCG) > Flashcards

Flashcards in organized crime group (OCG) Deck (15):
1

aka "the sword bearer"

abu sayyaf group (ASG)

2

founder of abu sayyaf

Abdurajak Abubakar Janjalani 1989

3

some form of payment obtained from a person to prevent disclosure of information that would bring disgrace or ruin if made public

blackmail

4

price paid for causing a persons death

blood money

5

a type of gambling that usually involves taking bets on sporting events

bookmaking

6

the giving, taking or offering anything, especially money, as an inducement to do something illegal or wrong

bribery

7

establishment that commonly functions as a house or prostitution

brothel

8

mafia traditional terminology forthe boss of all bosses

capo di tutti capi

9

a method of operation in which several checking accountsbased upon non-existent funds are opened in the attempt to withdraw funds

check kiting

10

refers to any representation, wheter visual or audio or written or combination thereof, by electronic, mechanical, digital, magnetic or other means of child engaged in or involved in real or simulated explicit sexual activities

child pornography

11

it is engaging in sexual intercourse or acts of lasciviousness with a chile, who for money or profit or due to coercion is exploited to indulge in such activities. the victim maybe male or female. if the victim is under 12 years of age the offender shall not be prosecuted under the RA 7610 but shall be prosecuted for statutory rape or acts of lasciviousness as the case maybe

child prostitution

12

it is the act of buying and selling a child for money, or for any other consideration, or better

child trafficking

13

chinese basic concept of heaven, earth and man

equilateral triangle

14

chinese mafia is called

chinese triad (triads)

15

the input, alteration or deletion of any computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless whether or not the data is directly readable and intelligible

computer-related forgery