|
Post by crimson on Jun 5, 2009 9:13:31 GMT 8
Crime Prevention Tips
Get to know your neighbors and all those residing in your street. They will be your partners in watching the activities in your block. Organize a Street Watch composed of neighbors as members. Be concerned and cooperate in watching activities on the block and reporting unusual or suspicious behavior to the police and the Street Watch Officer. Exchange names, home and work telephone numbers among members. Prepare diagram of the block or neighborhood where you belong for easy identification of households in case an emergency or crime incident occurs. The diagram should contain the house number, telephone numbers and occupants' names. The emergency and police department telephone numbers should be included in the diagram. Look after you neighbor’s house when he is away and ask him to look after yours. This includes collecting your mail, newspapers and other deliveries which would indicate at a glance that no one is home. Attend meetings called by your Street Watch Officer. Find out about the crime situation in your area and what you can do about them. Share information and experiences with your neighbors. Get to know your police chief and members of the police station in your area. Write down the station’s emergency hotline number in a place you can easily see in case you will need police advise or assistance. Use your police force – they are ready, willing and able to keep you, your family and your neighborhood safe and sound.
|
|
|
Post by crimson on Jun 5, 2009 9:15:15 GMT 8
Keeping the family Safe
Make sure you and members of your family know the whereabouts of everyone for the day. Place a “whereabouts” board in the kitchen or family room where family members can post their schedules or destinations for the day. Instruct all family members and household help not to entertain strangers at the gate or on the phone. Children should be especially trained not to converse with strangers on the phone. Transactions, if any, should be done outside the gate. This will prevent closer observation of your premises or the household layout. Teach your family and household helps to verify the identity of phone callers before identifying themselves. Never give out information on the whereabouts of family members to just anyone on the phone. Friends or relatives should be politely asked to call again so they can personally talk to the person they are looking for. Should the unknown caller insist on asking to speak to each and every family member, ask for his name and politely say the message will be relayed and that he should call back again. Call the police for assistance if you repeatedly receive anonymous phone calls. Instruct family members and your house help that designated family member must be contacted in an emergency or if there are dubious characters at your door or on your phone. List the important phone numbers in the front or back page of your directory for easy access. Be aware of phone swindlers who call in and report that one family member has been in an accident and is asking for the family member or household help to bring cash or other valuable to a certain place. Verify with another family member before acting on this. Verify the identity of callers at your gate before opening the door. Use peepholes provided on gates and doors for this purpose. Should the stranger be a repairman, electrician or the like, verify his identity by calling the service office. Advise your children to refrain from playing/loitering on streets outside your residence where they are highly vulnerable to abduction. Advice your children never to leave home without telling you of their destination and expected time of arrival.
|
|
|
Post by crimson on Jun 5, 2009 9:18:46 GMT 8
INTERNET CRIME PREVENTION :: TIPS FOR PARENTS TO PROTECT THEIR CHILDREN WHEN USING INTERNET
The Internet places a vast amount of information and exciting experiences at your command. With the click of the mouse, the Internet allows you to buy an airline ticket, book a hotel, send flowers to a friend, or purchase your favorite stock. However, as the legitimate use of the Internet increases throughout our nation and the world, the wrongful use of the Internet to commit crime and victimize people also increases. The following Internet crime prevention information is meant to help you protect yourself, your loved ones, your friends, your neighbors and your community, and to make your journey on the Internet as safe, secure and crime free as possible.
Common Internet Crimes :
Child Exploitation
Children can be sexually exploited, kidnapped, molested and solicited by individuals using online service. One reason is the anonymous nature of the Internet. Another reason is the large number of people using the Internet. Pedophiles will make contact with victims by having children call collect so the pedophile's telephone number will not show up on their parent's telephone bill. Pedophiles will also purchase a prepaid telephone card and give children a toll free access number enabling children to call from anywhere they choose. Pedophiles will often convince children to send them a photograph. Pedophiles will offer children money for their photograph and/or pose as professional photographers to obtain nude, graphic or sexually explicit photographs of children. Pedophiles commonly attempt to lower the inhibitions of children through deception in an attempt to lead children into their sexual conversations or acts. There are a number of ways parents can protect their children from becoming victims of pedophiles on the Internet.
The following are some examples:
Choose an online service that offers parental control features; Purchase blocking software and design your own safety system; Monitor children that are online and monitor the time they spend online; Ensure children never reveal identifying information about themselves on the Internet in a public chat room, on an electronicbulletin board or in their E-mail messages; Ensure children do not give out personal information about themselves such as their age; Consider using a pseudonym or unlisting your child' s name; Get to know the services your child uses; Block out objectionable material through your Internet service provider; Never allow a child to arrange a face-to-face meeting with another computer user without parental permission; Ensure children never respond to messages or bulletin board items that are suggestive, obscene, belligerent or threatening; Encourage children to tell you whenever they encounter such messages; If you or your children receives a message that is harassing, sexual in nature, or threatening, forward a copy of the message to your service provider and ask for their assistance; If you become aware of the transmission, use, or viewing of child pornography while online, report it to the National Center for Missing and Exploited Children; Teach children that people online may not be who they seem; Teach children online service providers never ask for passwords and they should never give their password out; Teach children that everything they read or see on the Internet may not be true; Teach children to never let anyone pressure them into doing something they feel uncomfortable doing; Teach children to never enter an area on the Internet that charges for services without asking permission from a responsible adult first; Some children have access to the Internet at school. Check with the school authorities to ensure your children are properly supervised and monitored by a responsible adult; Know your children' s friends and their parents. The Pump And Dump
This is a stock scam. Messages are posted on the Internet urging readers to buy stock quickly that is poised for rapid growth. The message writer often claims to have inside information about an impending development. The reality is that the writer stands to gain by selling or buying stock shares after the price goes up or down. This ploy is normally used with unregistered, little known, thinly traded stocks.
The Hijack
The Hijack is relatively new form of fraud unique to the Internet. Consumers are prompted to download a purported �viewer program� to see computer images for free. Once downloaded, the consumer's computer is �hijacked� by the viewer program which turns off the consumer's modem speakers, disconnects the from local Internet provider, dials an international number and connects the consumer to a remote site. The expensive international costs are charged to the consumer's telephone bill until the telephone us turned off.
Pyramid Schemes
Pyramid schemes are similar to multi-level marketing. Pyramid schemes provide financial incentives to recruit new distributors. They are generally prohibited because it is a mathematical certainty that the pyramids will collapse when no new distributors can be recruited. When that happens, most people lost their money. The Internet offers a fast lane for pyramid builders by facilitating a large-scale recruitment pool in little or no time. Be extremely cautious if a promoter offers you an extremely large short-term return on any investment, particularly if there is a disclaimer that the investment is �high-risk and you could lose all of you money�. Additionally, if there are no written claims delineating the return on other's investments, you are quite possibly looking at a pyramid scheme. Beware of all get rich quick schemes. If a deal seems too good to be true, it probably is.
Gambling
One of the greatest potential dangers for fraudulent loss posed for people using the Internet is gambling. There are as many as 200 gambling sites on the Internet. Consumers can gamble on sports, blackjack, keno, roulette, etc. Gambling on the Internet is especially risky because gambling is an unregulated industry and currently, there is no effective way to control it. Companies based in foreign countries using foreign bank accounts are able to easily bilk consumers out of their money. Many times Internet �gamblers� are unable to contact the companies with whom they placed their bets to collect their winnings. Gambling on the Internet exposes consumers to fraud, civil liability and possible criminal liability.
Online Auctions
Online auctions are popular to many people who use the Internet. Generally, online auctions are person-to-person sales where individuals bid for various types of merchandise. The highest bidder then pays in advance of receiving the merchandise. A growing priblem is sellers failing to deliver merchandise that consumers have purchased.
Fraud
Internet fraud takes many forms. The Internet' s promise of substantial consumer benefits is coupled with the potential for fraud and deception. Fraud operators are opportunists who are among the first to appreciate the potential of a new technology. There is nothing new about Internet fraud, however, the size and potential market, relative ease, low cost, and speed with which a scam can be perpetrated has increased tremendously.
Unsolicited Commercial E-Mail
Internet service providers report handling 60 million electronic messages per day. Estimates of Unsolicited Commercial E-mail (UCE) indicate it comprises as much as one-third of the total E-mail traffic. This ever-increasing volume of UCE strains the capacity of online service providers and threatens the development of the Internet as a conduit for commerce. Beyond the sheer volume and potential annoyance of UCE, many UCE messages may also be misleading or deceptive.
Teaser Pages
The Internet is rife with fraud and deception. Some web pages "tease" individuals with promises of easy money for little or nothing. These scams include phony scholarships, travel programs, weight loss programs and others.
High Pressure Sales
A high-pressure sales pitch may sound exciting, however, as a rule, such a pitch should be resisted. Before you invest any money, take your time. Get a second opinion from a financial planner, an attorney, or an accountant you can trust. Finally, research the company's reputation. Call your local consumer protection agency in the city where the company is headquartered for more information.
Following are lines frequently used by scam artists:
"We don't make money unless you make money." "I know you get offers everyday from people who tell you they're going to make you rich. I can make it easy for you to make your decision based on actual facts." "This opportunity is the best chance to make extra money for guys who work for a living; guys like you and me." "I've been in this business for 20 years and I can tell you this; I know of no other program that is legal, easy to afford and can bring in this kind of big money from such a small investment." "I know this can work for you and I personally guarantee your success, right down to the last penny." "Give me one percent of your trust and I'll earn the other 99 percent when you see the return." "Of course there is a risk, there is a risk in everything." "Sure we could finance this venture ourselves, however, we're trying to build a power base for the future for folks like you." "We're talking about a cash cow here, it's going fast and I need your check tomorrow at the latest." "I can't be lying, there are laws against lying." The Risk Free Scam Many times this scam solicits its victims with exotic-sounding investments such as wireless cable projects, prime bank securities or fictitious business ventures overseas. Promoters misrepresent risk to "investors" by comparing their offer to something safe, such as bank security deposits. Many times the investment offer never really exists.
|
|
|
Post by crimson on Jun 5, 2009 9:19:55 GMT 8
MODUS OPERANDI
Kidnapping Paano ginawa ng kriminal ang isang krimen ?
Ireport ninyo sa amin kung paano ginawa ang krimen (MODUS OPERANDI) at makakatulong kayo sa iba pa nating mga kababayan na makaiwas.
Robbery and Theft
Robbery is committed by any person, who with intent to gain, shall take any personal property belonging to another, by means of violence against or intimidation of any person, or using force upon anything shall be guilty of robbery (Art. 293, RPC) Theft is committed by any person who, with intent to gain but without violence or intimidation of persons nor force upon things, shall take personal property of another without the latter's consent (Art. 204, RPC). Through the years, the most common forms of robbery and theft have developed their own unique names that depict the means by which they are committed. Among them are the following:
Akyat Bahay
Ang AKYAT BAHAY ang pinaka-karaniwang pamamaraan ng nakawan sa Pilipinas. Kadalasang isinasagawa ng may tatlo hanggang lima kataong grupo. Ang mga nagiging biktima ay bahayang pansamantalang iniwan ng may-ari upang magbakasyon o kaya naman ay nasa trabaho. May mga pangyayari din na kahit nasa loob ang mga nakatira ay ninanakawan pa rin dahil sa kakulangan ng pisikal na depensa. Dis-oras ng gabi lalo na kung natataong malakas ang ulan o kaya naman ay " brown-out" . Mga alahas at kasangkapang pang-bahay ang karaniwang tinatangay ng mga magnanakaw. May ilang pangyayari na kung saan ang mga mag-nanakaw ay may dala-dalang sasakyan upang paglulanan ng mga ninakaw na kasangkapan.
Salisi
Ang karaniwang nasasalisihan ay mga tindahan, tahanan, maging mga opisina na kung saan ang bantay o nagmamayari ay pansamantalang nabaling sa ibang bagay. Sa pagkakataong ito mabilis na isinasakatuparan ang pagnanakaw at alinmang bagay na may halaga at mabilis na maitatago o madadala ay ninanakaw. "Nasalisihan", ika nga.
Bukas Kotse
Karamihang nagaganap sa mga paradahang walang nagbabantay. May mga insidente ring nangyayari kahit na sa mga "pay parking areas" . Sa mga sanay na sa ganitong krimen, ilang segundo lamang ang kinakailangan para mabuksan ang sasakyan. Lahat na mahahalagang bagay sa loob ay kinukuha. May mga pagkakataon rin na kung saan ang sasakyang pilit nabuksan ay pinapaandar papunta sa ibang lugar upang doon "kahoyan" ng gulong, stereo, mga ilaw, upuan, at iba pang mga bagay na maaring tangalin. Kung minsan, nauwi sa ""carnapping"" ang insidente.
Carnapping
Ang "carnapping" ay mabilisan ang pagsasagawa. Kadalasan, 20 -30 segundo lamang ang kinakailangan para ma-carnap. Maaring marahas ang insidente. May mga driver na sinasaktan o kaya naman ay napapatay habang inaagaw ang sasakyan. Karamihan ng carnappers ay armado ng baril o kaya ay patalim. Ang iba pang mga "modus operandi" ay kinabibilangan ng mga sumusunod: Mga "minor" na "traffic accident", kunwa'y nabungo sa hulihan. Kapag lumabas ang driver upang tingnan, mabilis na tinututukan ng suspek ng baril o kaya ay patalim at sabay kinukuha ang sasakyan. Sa mga "stop lights". Ang suspek ay lalapit sa driver na nakatutok ang baril kasabay ang utos na lumabas. Sa mga parking spaces. Bigla na lang haharangan ang iyong sasakyan at isang suspek ang lalapit na may armas at palalabasi n ka sa sasakyan. O kaya naman, ang mga suspek ay nakatayo lamang sa paligid at inaantay ang iyong pagpasok o paglabas sa iyong sasakyan.
Dugo-dugo
Ito ang tawag sa mga insidente na kung saan ang suspek ay tatawag sa telepono o kaya naman ay personal na pupunta sa bahay at nagpapanggap na kamag-anak o kaibigan ng isang miyembro ng pamilya na ayon sa kanya ay nadisgrasya at kinakailangan ng pera o alahas para maipagamot.. Kadalasan katulong ang nakakatanggap ng tawag na sa takot o pagkalito ay agad ibinibigay ang hiling ng suspek.
Budol-budol
Isang halimbawa ng budol budol ay nangyayari sa mga transaksyon ng bayaran. May perang totoo subalit ang karamihan ay mga per-ang peke na. Isa pang halimbawa ay sa mga bentahan ng ginto. Ang ipapakitang sample ay tunay subalit ang iba o ang karamihan ay pawang mga peke na. Madalas ding mangyari sa transakyong pera.
Ipit-Taxi
Kadalasang mga nabibiktima ay mga kababaihan. Pagkasakay ng taxi sa hindi kalayuan, may mga suspek na bigla na lang sasakay at pagigitnaan ang biktima. Hold-up na at ang pera, alahas, at iba pang mahahalagang dala ay kinukuha ng mga suspek.
|
|
xtrim
New Member
Posts: 11
|
Post by xtrim on Feb 17, 2010 7:47:57 GMT 8
stay safe, be safe...
simple as that...hehe
|
|