You are on page 1of 5

Cybersecurity Addressing Cyberspace Primed

Technology Disruptions in the Philippines: A


Policy Paper
[1]
Samuel Isaac B. Teruel, [2]Ronnie S. Concepcion II, [3]Lorena C. Ilagan
[1]
University of Perpetual Help System DALTA, Las Piñas City, Philippines, [2]De La Salle University,
Manila, Philippines, [3]University of Perpetual Help System DALTA, Las Piñas City, Philippines
[1]
smcore25@gmail.com, [2]ronnie_concepcionii@dlsu.edu.ph, [3]lorena.ilagan@perpetualdalta.edu.ph

Abstract— Internet has become a space for state communication, utilized for control projection of a fundamental structure. This area
has become unstable between nations as a result of its potential for undercover work and disruption. Cybersecurity keeps on being a
strategy issue and the government implementing R.A. 10175 known as the Cybercrime Prevention Act of 2012, the assurance of a digital
upset influences different states to make a guideline avoiding cybersquatting, cybersex, fraud, illegal access to data and libel. This paper
contends the Government of the Philippines ought to consider cybersecurity as an approach need due to three reasons: According to NBI
Cybercrime Division, cybercrime has a financial outcome economically having IP theft makes up at 25% of cybercrime costs and
compromising military technology. Department of Information and Communications Technology expresses that the IP theft and loss of
opportunity are two areas of cybercrime hard to monitor influencing small companies, consequences of digital security that will be
exposed to the infringement of Cybercrime Law and the aftereffects of conflict in the region academically and politically as far as identity
and data theft is concerned. Rest of the paper presents focal ideas improving SAFE, an approach for guardians to make mobile
technology child-safe, extra highlights on mobile smartphones are incorporated that channels content not appropriate for children, the
study looks at specific segments that could affect the headway of cybersecurity, adapts the present program for digital security, offers few
suggestions, concentrating on incorporating cybersecurity inside national security arrangement.

Index Terms— cybercrime, cybersecurity, cyberspace, primed technology disruptions, policy

potential enhancements for the improvement of


Cybersecurity to the Philippines.
I. INTRODUCTION
A center idea in the lead of digital security activities is the II. TRENDS IN CYBERSECURITY
hostile and cautious abilities of a state or its Computer Digital weapons can come in various structures, extending
Network Operations (CNO). These tasks are partitioned into from nonexclusive devices that cause disturbances to top of
three kinds of capacities: Computer Network Attack (CNA), the line devices that can cut down a state's basic framework.
Computer Network Defense (CND), and Computer Network Below are some of the primary sorts of digital weapons just
Exploitation (CNE). CNA is a hostile activity and is as their fundamental definitions are defined.
characterized as the ability to utilize computers to upset,
A. Structure Query Language (SQL) Injection
deny, corrupt, or destroy data in enemies' computers and data
frameworks. CND, then again, includes the insurance of a A strategy that exploits poor secure-application coding
state's computer systems having the capacity to identify, practices to mutilate or destroy sites
break down, and alleviate dangers and vulnerabilities, and B. Distributed Denial of Service Attacks (DDoS)
out move enemies. CNE is an undercover work activity and is
A strategy that includes flooding web destinations, servers,
the capacity to gather knowledge utilizing computer systems
or routers with demands for information for the webpage to
to assemble information about enemies [1-3]. These
react to or process
capacities give a general thought of what states can do in the
internet, in spite of the fact that note that the particular C. Intrusion
operational instrument engaged with executing digital A strategy that include embedding of malicious
assaults are weapons conveyed through a computer. A digital programming, for example, Trojans or Trapdoors to duplicate
weapon, in this sense, is a computer code that is utilized or is programs or sites with the target of destroying of files,
intended to be utilized with the target of compromising or transmitting private information, and opening a secondary
making harm to objects, networks, or living creatures [4-7]. passage for hacking.
The fundamental target of this study is to research the flow
adjustment and structure of Cybersecurity in the Philippines. D. Infiltration
In particular, the investigation aims to: (1) review the digital Strategies that embroil the utilization of vindictive
weapons regularly utilized in compromising Cybersecurity in programming to infiltrate explicit objective systems and
the Philippines; (2) review the applications and the power computers to attempt unapproved undertakings. There
adjustment of the Philippine government in building up a are five significant methodologies of infiltration: Logo
strategy with respect to Cybersecurity; and (3) suggest Bombs, Viruses, Worms, Packet Sniffers, and Keylogging

1
E. Advanced Persistent Threats (APT) websites.
Strategies that contain distinctive hacking exercises, for
example, SQL injections, DDoS, interruptions, and IV. CYBERSECURITY ADOPTION
invasions. APTs are not the same from different strategies The Philippines sanctioned the first digital law Republic
since they are tweaked and move all the more cautiously to Act (RA) 8792, also called the Electronic Commerce Act of
avoid detection 2000. RA 8792 accommodates the lawful acknowledgment
and acceptability of electronic information messages, records
Relatively a combination of these methods results to some and marks. The demonstration was marked into law on June
of the common cybercrime acts committed by offenders. The 14, 2000 by President Joseph Estrada. The Act means to
commonly known cybercrime offenses as per Republic Act encourage residential and global dealings, exchanges, game
(RA) 10175 also known as the Cybercrime Prevention Act of plans understandings, agreements and trades and capacity of
2012 in the Philippines are cybersquatting, cybersex, fraud, data through the usage of electronic, optical and comparative
illegal access to data, and libel. The National Bureau of medium, mode, instrumentality and innovation to perceive
Investigation (NBI) Anti-Cybercrime Division states that the validness and unwavering quality of electronic records
cybercrime has a financial outcome economically having IP identified with such exercises and to advance the widespread
theft makes up at 25% of cybercrime costs and compromising utilization of electronic exchange in the legislature and
military technology. Department of Information and overall population [18].
Communications Technology (DICT) expresses that the IP Followed by the Republic Act (RA) 9775, otherwise
theft and loss of opportunity are two areas of cybercrime hard known as the Anti-Child Pornography Act of 2009, an act
to monitor influencing small companies, consequences of defining the crime of child pornography, prescribing
digital security that will be exposed to the infringement of penalties therefore and for other purposes. The act was signed
Cybercrime Law and the aftereffects of conflict in the region into law on November 17, 2009 by President Gloria
academically and politically as far as identity and data theft is Macapagal Arroyo [19].
concerned [8-12]. A law amending the previous laws above which is
Another crucial idea is the projection of intensity in the Republic Act (RA) 10175, otherwise known as the
internet or digital power. This paper considers digital power Cybercrime Prevention Act of 2012 defining Cybercrime
as an expansion of legislative issues, which is, on a very basic providing for the prevention, investigation, suppression and
level, the legitimate designation of esteemed things [13-16]. the imposition of penalties therefor and for other purposes.
Since control identifies with the distribution of capacities and The act was signed into law on September 12, 2012 by
assets, our comprehension of digital issues is subject to how President Benigno Aquino III. RA 10175 Sections 4 and 8
ideas and on-screen characters are characterized and defines the 16 types of cybercrime covered in the law and the
surrounded. It is important to explain explicit ideas and corresponding penalties for each offense [20]:
distinguish on-screen characters to evade perplexity and
A. Illegal Access
distortion about state capacities and dangers in the internet.
The accompanying segment along these lines examines some Unapproved access (without right) to a PC framework or
center ideas and on-screen characters in region of digital application. Detainment of 6 years and 1 day as long as 12
examinations. Sections of this paper discuss common years or a fine of in any event P200,000 up to a greatest sum,
cybercrime offenses and penalties, existing security measures equivalent to the harm caused or both whenever submitted
for cybercrime acts, and suggestions on improving against basic foundation: detainment for a long time and 1
anti-cybercrime security measures in the Philippines. day as long as 20 years or a fine of at any rate P500,000 up to
a most extreme sum.
III. APPLICATIONS OF CYBERSECURITY B. Illegal Interception
One major concern in the cybersecurity of the Philippines Unapproved capture of any non-open transmission of PC
is that it is still prone to cyber-attacks. While this is still an information to, from, or inside a PC framework. Detainment
ongoing progress, a program from the department of justice is of 6 years and 1 day as long as 12 years or a fine of at any rate
introduced to add restrictions to access from the internet and P200,000 up to a greatest sum, similar to the harm brought
smartphone application for children, the Securing all Filipino about or both whenever submitted against basic framework:
children from Exposure to harmful Online Contents (SAFE). detainment for a long time and 1 day as long as 20 years or a
SAFE is a set of guidelines on how parents or guardians can fine of in any event P500,000 up to a most extreme sum.
set any smartphones or devices to be child safe, by reducing
or limiting the access of children to contents of the internet C. Data Interference
through the applications installed in their smartphones or Unapproved modification, harming, erasure or decay of PC
other devices [17]. Through this guideline, children are safe information, electronic archive, or electronic information
and protected from harmful contents of the internet and it can message, and including the presentation or transmission of
avoid them clicking any harmful or malicious sites that will infections. Approved activity can likewise be secured by this
make them prone to cyberattacks. While this helps children arrangement if the activity of the individual went past
stay away from malicious and harmful sites, monitoring of concurred scope coming about to harms expressed in this
children’s internet activity is still not achieved because these arrangement. Detainment of 6 years and 1 day as long as 12
guidelines are applicable only to the settings of a smartphone years or a fine of in any event P200,000 up to a greatest sum,
or any devices, not to the whole internet access. Children similar to the harm brought about or both whenever
might still find a way out of curiosity to access restricted submitted against basic foundation: detainment for a long

2
time and 1 day as long as 20 years or a fine of in any event I. Computer-related Identity Theft
P500,000 up to a most extreme sum. Unapproved procurement, use, abuse, move, ownership,
D. System Interference modification or cancellation of distinguishing data having a
place with another, regardless of whether regular or juridical.
Unapproved upsetting or impedance with the working of a
Detainment of 6 years and 1 day as long as 12 years or a fine
PC or PC arrange by contributing, transmitting, harming,
of in any event P200,000 up to a greatest sum.
erasing, falling apart, adjusting or smothering PC information
or program, electronic report, or electronic information J. Cybersex
messages, and including the presentation or transmission of Stiff-necked commitment, upkeep, control, or activity,
infections. Approved activity can likewise be secured by this legitimately or in a roundabout way, of any prurient display
arrangement if the activity of the individual went past of sexual organs or sexual action, with the guide of a PC
concurred scope coming about to harms expressed in this framework, for support or thought. There is a discourse on
arrangement. this issue on the off chance that it includes "couples" or
E. Misuse of devices "individuals in relationship" who take part in cybersex. For as
long it isn't accomplished for support or thought, I don't
The unapproved use, ownership, generation, deal,
figure it will be secured. In any case, in the event that one
acquirement, importation, dispersion, or generally making
gathering (in a couple or relationship) sues professing to be
accessible, of gadgets, PC program planned or adjusted to
compelled to do cybersex, at that point it tends to be secured.
submit any of the offenses expressed in Republic Act
Detainment of 6 years and 1 day as long as 12 years or a fine
10175.Unauthorized utilization of PC secret key, get to code,
of at any rate P200,000 yet not surpassing One million pesos
or comparative information by which the entire or any piece
P1,000,000.
of a PC framework is fit for being gotten to with aim that it be
utilized to submit any of the offenses under Republic Act K. Child Pornography
10175. Detainment of 6 years and 1 day as long as 20 years or Unlawful or denied acts characterized and deserving of
a fine of in any event P200,000 up to P500,000. Republic Act No. 9775 or the Anti-Child Pornography Act of
F. Cyber-squatting 2009, submitted through a PC framework. Punishment to be
forced will be 1 degree higher than that accommodated in
Securing of space name over the Internet in dishonesty to
Republic Act 9775, whenever submitted through a PC
benefit, deceive, crush notoriety, and deny others from the
framework. Punishment to be forced will be one degree
enlisting the equivalent. This incorporates those current
higher than that accommodated by the Revised Penal Code,
trademarks at the hour of enrollment; names of people other
as altered, and uncommon laws, by and large.
than the registrant; and gained with licensed innovation
interests in it. The individuals who get space names of L. Libel
conspicuous brands and people which thusly is utilized to Unlawful or precluded demonstrations of defamation as
harm their notoriety – can be sued under this arrangement. characterized in Article 355 of the Revised Penal Code, as
Note that opportunity of articulation and encroachment on altered submitted through a PC framework or whatever other
trademarks or names of individual are normally treated comparable methods which might be formulated later on.
independently. A gathering can practice opportunity of Changed Penal Code Art. 355 states Libel implies by
articulation without fundamentally abusing the trademarks of compositions or comparable methods. A slander submitted
a brand or names of people. Detainment of 6 years and 1 day by methods for composing, printing, lithography, etching,
as long as 20 years or a fine of at any rate P200,000 up to radio, phonograph, painting, showy display, cinematographic
P500,000. presentation, or any comparable methods, will be rebuffed by
G. Computer-related Forgery jail remedial in its base and medium periods or a fine running
from P200 to P6,000 notwithstanding the common activity
Unapproved info, change, or erasure of PC information
which might be brought by the annoyed party. The
coming about to inauthentic information with the aim that it
Cybercrime Prevention Act reinforced criticism as far as
be considered or followed up on for legitimate purposes as
punishment arrangements. The electronic partner of
though it were genuine, in any case whether the information
defamation has been perceived since the year 2000 when the
is straightforwardly lucid and comprehensible; or The
E-Commerce Law was passed. The E-Commerce Law
demonstration of intentionally utilizing PC information
enabled every current law to perceive its electronic partner
which is the result of PC related imitation as characterized
whether business or not in nature.
here, to sustain a false or unscrupulous plan. Detainment of 6
years and 1 day as long as 12 years or a fine of in any event M. Aiding or Abetting in the commission of cybercrime
P200,000 up to a greatest sum. Any individual who resolutely abets or helps in the
H. Computer-related Fraud commission of any of the offenses identified in this Act will
be held at risk. Detainment of one degree lower than that of
Unapproved info, change, or erasure of PC information or
the endorsed punishment for the offense or a fine of at any
program or impedance in the working of a PC framework,
rate P100,000 however not surpassing P500,000.
causing harm subsequently with false purpose. Detainment of
6 years and 1 day as long as 12 years or a fine of at any rate N. Attempt in the commission of cybercrime
P200,000 up to a most extreme sum. Any individual who persistently endeavors to submit any
of the offenses listed in this Act will be held subject.

3
Detainment of one degree lower than that of the comprehension on the dangers included with respect to its
recommended punishment for the offense or a fine of at any abuse.
rate P100,000 however not surpassing P500,000. The topography of the Philippines and its present financial
conditions as it ceaselessly attempts to fortify political
O. All crimes defined and penalized by the Revised Penal
steadiness and national security is an ideal condition wherein
Code
various types of illegal digital exercises prosper. The
As revised, and extraordinary laws, whenever submitted obscurity in the Internet, the legitimate and jurisdictional
by, through and with the utilization of data and issues associated with innovation encouraged violations, and
correspondences advancements will be secured by the the tremendous injured individual and enlistment source and
pertinent arrangements of this Act. Punishment to be forced draw of pain free income, inspires a culture of digital
will be one 1 degree higher than that accommodated by the guiltiness which may later prompt increasingly genuine
Revised Penal Code, as changed, and unique laws, all things composed criminal underground. The danger of transnational
considered. sorted out criminal gatherings working in the nation
P. Corporate Liability represents a genuine worry as it influences the financial and
At the point when any of the culpable demonstrations in political dependability of the nation.
this characterized are purposely dedicated in the interest of or This circumstance, be that as it may, is gradually changing
to support a juridical individual, by a characteristic individual as government and worldwide consideration is expanding
acting either independently or as a feature of an organ of the and the pace of cybercrime or digital assaults on industry and
juridical individual, who has a main situation inside, in view on honest residents additionally starts to rise. Exploited
of: An intensity of portrayal of the juridical individual gave people or concerned residents are presently surfacing to
the demonstration submitted falls inside the extent of such report cybercrime occurrences to the police [22].
power; A position to take choices for the benefit of the C. Society
juridical individual. Given, That the demonstration submitted The Philippines, much the same as its ASEAN neighbors,
falls inside the extent of such power; A position to practice is consistently using innovation in pretty much every
control inside the juridical individual, it likewise incorporates segment in its general public and economy. The nation has an
commission of any of the culpable demonstrations made expected populace of 103,775,002 starting at 2012. An
conceivable because of the absence of supervision or control. expected 31.33% or 33,600,000 of its 2011 populace utilize
For authorized activities, juridical individual will be held at the Internet. Starting at 2011, an expected 84.91% or
risk for a fine proportional to in any event twofold the fines 88,119,840 Filipinos are cell phone supporters while 25.77%
imposable to a limit of P10,000,000. For disregard, for or 26,752,000 have dynamic person to person
example, abuse of PC assets that came about to cybercrime communication profiles. Of the Internet clients in the nation,
carried out in association physical or virtual premises or 75% utilize PCs while 25% utilize their cell phones to get to
assets, juridical individual will be held at risk for a fine the Internet, regardless of whether for individual or business
proportional to at any rate twofold the fines imposable to a purposes. The normal age for Internet clients in the nation is
limit of P5,000,000. Criminal risk may even now apply to the evaluated to be 23 years of age and beneath, and a large
characteristic individual. portion of them go through around 21.5 hours of the week
perusing the Internet and 51% of Internet clients have
V. IMPACTS OF CYBERSECURITY dynamic web-based life profiles. Starting at 2012, the
Philippines positioned sixth in the all-out number of Internet
A. Economy
clients in Asia and third on the planet in the quantity of
An enormous estimated association in the Philippines can Facebook clients where 48% are male and 52% are female
bring about a financial loss of US $7.5 million, in excess of [22].
multiple times the normal monetary misfortune for a medium
sized association cybersecurity assaults have prompted work VI. POLICY RECOMMENDATIONS
misfortunes of 72% in associations in the course of the most
recent year, cybersecurity concerns postpone Digital A. Labor and Employment
Transformation plans. The potential financial misfortune in The proponents recommend more manpower and
the Philippines because of cybersecurity occurrences can hit employment in developing cybersecurity in the Philippines,
a stunning US $3.5 billion. This is 1.1% of the Philippines' since the majority of the government’s focus about
complete GDP of US $305 billion [21]. cybersecurity is the development and amendment of laws
B. Industry punishing cybercrime offenders. The proponents also
The Philippines keeps on confronting the test of viably suggest hiring people whom are professionals in the
tending to the issue of unlawful digital movement and cybernetwork field to gain and make more output in
cybercrime exploitation, a test it shares among creating developing anti-cybercrime measures and on how to prevent
nations in South East Asia and in different pieces of the offenders from committing cybercrime activities rather than
world. amending laws on penalizing these offenders.
The use of innovation as it grows and creates in different B. Human Resource Development and Education
businesses and segments in the nation is required to The proponents suggests on the development of the
increment, because of the absence of fundamental protections manpower enough to educate people especially minors on the
to counteract, and at times as a result of the absence of harm of the internet and the danger of engaging or

4
encountering one cybercrime offender, in this way, not only it [6] G. Weimann, “Cyberterrorism How Real Is The Threat,”
will educate people on the danger of cybercrime to a user Washington DC: United States Peace Institute (2004).
especially children but it will avoid or lessen the most prone [7] J. Healey, “A Fierce Domain in Cyberspace,” 2013.
[8] G. Sosa, “Country Report on Cybercrime: The Philippines,”
victims to such attacks. 2012.
C. Government Policy and Laws [9] G. Sy, “Philippines 2014-2015 Cybercrime Report, The Rule
of Law in Cyberspace,” Manila: Department of Justice, 2015.
The Philippine government have already made several [10] J. Bartolome, “Nearly P400M lost to ATM fraud from 2012 to
amendments on the constitution of penalizing cybercrime 2013,” 2014.
offenders but less measures on the technical basis on how to [11] J. Lewis, “Net Losses: Estimating the Global Cost of
prevent or detect cybercrime offenders more efficiently Cybercrime,” Washington D.C.: Center for Strategic and
[18-20]. The only popular program linked to cybercrime is International Studies, 2014.
[12] Asia Pacific Economic Cooperation, “APEC Strategy to
SAFE with a purpose of limiting a children’s access to Ensure trusted, secure and sustainable online environment,”
harmful content of the internet [17]. This program is still on 2004.
develop because it does not effectively avoid the danger of [13] D. Easton, “The Political System: An Inquiry into the State of
cyberattacking to people especially children. Political Science: Alfred Knopf,” New York, 1953.
[14] Nye, “The Future of Power New,” 123.
D. Research and Development and Innovation [15] T. Stevens, “A cyberwar of ideas? Deterrence and Norms in
The proponents suggest that further research should be Cyberspace Contemporary Security Policy,” 2012.
conducted in order to develop and innovate measures against [16] T. Kane, “Understanding Contemporary Strategy,” 2011.
[17] “Securing all Filipino children from Exposure to harmful
cybercrime. In line of that, manpower of people whom are Online Contents,” Department of Justice: Office of
experts in field that connected to cybernetwork is essentially Cybercrime.
needed, without the knowledge of these professionals, [18] Senate and House of Representatives of the Philippines, “RA
anti-cybercrime programs will remain inferior and less 8792: An act providing for the recognition and use of electronic
efficient against cybercrime offenders. commercial and non-commercial transactions and documents,
penalties for unlawful use thereof, and other purposes,” 2000.
[19] Senate and House of Representatives of the Philippines, “RA
VII. CONCLUSION AND RECOMMENDATION 9775: An act defining the crime of child pornography,
This paper described the cybercrime offenses in the prescribing penalties therefore and for other purposes,” 2009.
Philippines, the measures to prevent the offenses and the [20] Senate and House of Representatives of the Philippines, “RA
recommendations to improve cybersecurity in the 10175: An act defining Cybercrime providing for the
prevention, investigation, suppression and the imposition of
Philippines. Cybersecurity is a measure to prevent penalties therefor and for other purposes,” 2012.
cybercrime in a nation. The trend of cybersecurity is [21] Frost and Sullivan “Understanding the Cybersecurity Threat
continuously accelerating and is being employed to the Landscape in Asia Pacific: Securing the Modern Enterprise in a
country but the maximum potential on what can be Digital World,” 2018.
implemented is not yet obtained. The recommendations [22] D. Augustin, “Cybercrime Threat Landscapes in the
presented in this paper will help in maximizing the available Philippines,” 2013.
methods and resources of Philippines on improving
cybersecurity to avoid or detect cybercrime offenders.
The cybercrime countermeasures in the Philippines are
still on progress, the number of resources for anti-cybercrime
is limited. The government must lend more budget for the
improvement of anti-cybercrime division in the Philippines.
The program for adding restrictions to children’s use of
internet access by restricting some applications installed in
their smartphones or any devices must be modified. Internet
Service Providers must include an option for parents and
guardians for them to be able to control and add restrictions
to the sites that can be access to the whole internet at home so
that, the restrictions will not be limited to the applications
and the smartphones, computers, and other devices.
REFERENCES
[1] J. Cartwright, "Joint Terminology for Cyberspace Operations,"
Washington D.C.: U.S. Department of Defense, 2010.
[2] E. Gartzke, and J. Lindsay, “Weaving Tangled Webs: Offense,
Defense, and Deception in Cyberspace,” Security Studies 24
(2), 346, 2013.
[3] M. Libicki, “Brandishing Cyberattack Capabilities,” Santa
Monica, CA: RAND Corporation, vii-xi, 2013.
[4] T. Rid, and P. McBurney, “Cyber-Weapons,” RUSI Journal
157 (1), 7, 2012.
[5] F. Domingo, “Intelligence as the Philippines’ first line of
defense,” 2015.

You might also like