Professional Documents
Culture Documents
Computer Crimes- this is a general term a crime with the use of computer (for the
purpose this discussion even a cellphone can be considered as computer) or with
internet ( ito yung krimen na gingamit ng computer meron o wlang internet)
Cyber crimes- crimes with the use of computer and with internet. (krimen na gingamitan
ng computer at internet)
Cybercrimes- is the fastest growing crimes in the world. Cybercrime also includes illegal
downloading of music,video and files.
What is the type of crime where you are unconsciously committing it due to a weak
enforcement of the law? (tulad ng pag papaxerox libro violation yan ng Intellectual
Property Rights, pag download ng move, music ,. Files or video)- AVOCATIONAL
CRIMES
Why we shoud learn about Cyber Crime?
The primary answer – Everybody is using Computers.
From White Collar Criminals (White Collar Crimes- committed by person with high status
more on economic crimes like corruption or stealing ) (Kapag ang isang tao tulad ng
manager ay nanakit ng empleyado ito ay hindi White Collar Crime dahil it is not related to
work nor he did not use his influence)
To Terrorist (What is most important component of terrorism?- FEAR- kaya gingamit nila
ang internet para ipalaganap ang takot tulad ng pag pugot ng ulo ng kanilang biktima)
Conventional Crimes (traditional crimes)- Forgery (pamemeke), extortion, kidnapping.
Monetary transactions are moving on to the INTERNET.
Cybercrimes are used by the crminals primarily because?
The answer because of ANONYMITY- (maaring itago ng criminal ang kanyang identity)
Cyber Crimes are vulnerable because
Lack of user awareness (konti lang kaalaman sa computer or internet – (maraming
nabibiktima ng screenshot ng resibo or money transferred sa banko pero di nila alam na
eto ay pedeng maedit)
Easy to Access
Complex (mahirap maintindihan)
Negligence
Loss of evidence
Types of Cybercrimes:
Hacking/Cracking
Software Piracy
Email Bombing
Data Diddling
Salami Attack
DNS (Denial Service Attack)
Virus, Troja, Spamware Dissemination
Internet Theft
Phishing/Pharming
Web Jacking
Cyberstalking
Hacking- under the electronic evidence act – illegal intrusion into a computer system
without the permission of the owner. (lahat ng ebidensya na nakuha thru hacking is
inadmissible as evidence)
Hacking is a colloquial term. The original meaning of hacking refers to COMPUTER
ENTHUSIAST
Ginamit lang ang Hacking to computer intrusion kasi nakasanayan.
The technical term for intrusion of another computer system without permission of the
owner is CRACKING.
Software Piracy
- Theft of software through the illegal copying of authenticated programs.
Distribution of counterfeit copies.
- This mode of cyber crime has been decreasing due to the website offering free
software downloads.
(Ito yung pamimirate ng DVDs or CDs ng kanta , pelikula or computer software
Email Bombing
This kind of activity refers to sending of huge number of electronic mails to the victim
resulting to crashing of email apps (ito yung pagpapadala ng napakamaraming emails sa
isang account na nagreresulta para hindi gumana ng maayos ang Email App)
What is a mode of cyber attack similar to hacking which involves altering raw data (form
ng hacking na kayang baguhin ang data sa computer) ?
The answer is DATA DIDDLING.
Can you change it back to the information which was altered by the hacker?
The ans is Yes (pde natin ibalik sa dati ung computer walang capacity ang hacker para
maging permanent yung changes na ginawa nya)
Salami Attack
- Criminal make such program that deducts like for example 5.00 per month from
the account of the customer (thru bank, gcash, sim card) deducting it from the
savings sometimes with out the consent of the customer. (for example you
received a text deducting 5.00 php per Qoutes even without your subscription)
DNS
Denial of Service Attack- This is an act by the criminal, who floods the bandwidth of the
victim’s network of fills his email box with spam mail.
Usually after the hacker gain access to the computer, in able for him to totally manipulate
the computer program or system, he will use the Denial of Service of attack to reduce the
ability of the owner to counter the hacking. (kapag gumamit ng denial of service attack
hindi magkakaroon ng access ang owner lahat ng program ng computer system).
In simpler sense, depriving the victim or owner of the services or program entitled to
him.
The perfect example of this is the I LOVE YOU virus of the Filipino Programmer.
Logic Bombs- Those are the event dependent of the programs. This implies that these
programs are created only when a certain events triggered or occurs. (in simpler sense,
tulad ng pag schedule ng pag lilinis or scan ng laptop mo for virus )
- It is certain events in the computer will be created either by the hacker or
accidentally the owner (minsan kasi kapag nag click sa internet sa mga unverified
sources or website automatic na naglilikha ng program or event sa computer)
Certain event refers to computer program (katulad ng kapag naabot mo ay storage
ng ram sa ganitong size may isang program na automatically maactivate or kapag
may napindot ka ng file itong program na ito na nakuha mo sa isang website ay
maactivate)
Internet Theft- illegal surfing of internet connection belong to another (maaring nahack
ung password)
Web Jacking- derived by from the term hi-jacking. The hacker gains access and control
over the website. (e.g. ung hacker di nag review sa AMICI bumagsak sa board , hinack
thru WEB JACKING then idinagdag nya ung pangalan nya sa list of passers walang
kasing 1000 stars.
Cyberstalking- follows the victim by sending emails, entering chat rooms frequently.
Another is harassing the victim thru Messenger.
Cyberstalking- it is not a single act or communication to the victim. It is a consolidated
acts of the offender. (kelangan paulit ulit ang actions or messages sa babae)/
Cyberstalking involves Privacy.
Digital Evidence- (specific) refers to digital information use as evidence for a case. For
example is images, videos, files, or softcopies. (tulad picture or video na nagpapatunay
ng pangongotong) (with the use of computers)
This is the Digital finger print or Digital DNA of a file or information in cybercrime?
The ans Hash Value.
Computer related offense (ang penalty nito ay parehas ng penalty ng punishable acts sa
taas)
Computer related Forgery- the input, alteration or deletion of any computer data
resulting to inauthentic data. (ina alter mo or binabago ung information sa computer para
ipresent ito na authentic or original)
e.g. hacking or web jacking)
Computer related Identity Theft- the intentional acquisition, use , misuse, transfer or
possession, alteration, deletion of information regarding the identity of another.
Is the identify theft limited only for individual identity?
The ans is NO because it is also involves Juridical identity (groups or company’s name)
This punishable act is similar to PHARMING (pangogolekta ng info thru fake website)-
Cyber Squatting
Cyber Squatting- The acquisition of domain name in the internet. This is committed with
bad faith
(ito ay gingawa para masira, pagkakitaan, sirain ang pagkatao nung taong may ari ng
website or ng program)
This is done thru the following:
1. Creating a similar or confusing trademark of another (gumawa ka ng site na
katulad ng isang legitimate site)
2. Similarity in identity of the person registered of the target domain- (ginamit kahit
ung pangalan ng taong naka register)
3. Acquired with or without Intellectual property interest. (ginamit sa pansariling
intensyon)
(Cyber Squatting kapareho lang ng penalty ng other punishable acts under RA 10175
subalit mas tataas ng one degree (reclusion temporal) it is committed against Critical
Infrastructure.
What is Critical Infrastructure?
It the computer data, program or system belong to vital department or units in the
government.
Like for example:
- Supreme Court Website
- PNP, NBI PDEA
- Senate and Congree
- All other departments or units of the government.
Cyber Sex- the acts of cyber sex is punishable if it is done with computer, presenting
lascivious exhibition for favor or consideration. (katulad ng cyber sex na may bayad ito
ay punishable ng batas)
Cyber Sex- maintenance, control and operation of cyber sex den. (kapag ikaw ang
gumamit ng ibang tao para sila ay mag sex then vinevideo mo and inupload sa isang
porn website, may karagdagan kang kaso
RA 9208 or Human Trafficking)
For Cyber Crime Cases , the participation of subscriber and Service Providers is
important.
The computer data or digital data under the safekeeping of a subscriber or service
providers can be requested by law enforcement agencies to keep , preserve or retain it
for 6 mos. (for example ang website is under investigation ang mga pulis ay maaring
irequest na ipreserve ang data sa website ng service provider for 6 mos)
How the police will coordinate with the service provider and subscriber regarding the
preservation of data? The ans is thru Order by the law enforcement.
What if the 6 mos already lapse can the police ask for an extention?
Yes for another 6 mos.
All Computer/Digital data must be kept during the hearing of cyber crime case until?
The ans. Final termination of the case.
IF you responded to the cyber crime and processed all electronic evidence with out a
warrant. All evidence that you could collect will be inadmissible.
After a search warrant is already issued, can you immediately go into the place and
conduct search and seizure?
The answer is No. upon securing a warrant, there should be an order requiring a person
to disclose the information or data needed within 72 hours.
What do you call the team which will respond alongside with the PNP or NBI in cases of
Cyber Crime or Computer Related Crimes?
The Computer Emergency Response Team- CERT could enlist personnel from other
government unit.
The CERT is under what government department- Department of Science and
Technology (DOST)
After the search , collection and processes in relation to cyber crime, within how many
hours that the law enforcement agency should present or deposit it before the court?
It should deposited within 48 hours upon examination of data evidence. ( pero my mga
computer data or digital information na mahirap pag aralan kaya maaring mag request
ang law enforcement agency hangang 30 days para matapos ang examination)
CICC- Cyber Crime Investigation and Coordination Center- this is an inter-agency unit
under the Office of the President. There are task to submit reports, plan and programs for
cyber crimes.
Who is the head of CICC- (although this is control by DOJ Office of Cyber Crime there is
a person who is the head of this unit- The answer is Executive Director of DOST-ICT
(Information and Communication Technology)
RA 8484- Access Device Act- regulating the issuance of use of access devices,
prohibiting fraudulent acts committed. (eto yung batas na nagpaparusa sa paggamit ng
access device (eto ung credit card at atm cards).
Access device- means cards, plate, code, account or electronic serial number.
(ang pinaparushan dito ung illegal na pag access at pag gawa ng access device-
Counterfeit Access Device- fake atm or credit cards.
ENVIRONMENTAL LAWS
Environmental Impact Assessment (EIA)- this is process of predicting and evaluation the
likely impact of a project on the environment (pinag aaralan ang epekto ng isang
proyekto sa kalikasan e.g pag puputol ng puno sa isang lugar para sa housing project),
In any case that the project is private- (hind pde na mag assesst ng EIA ang isang
private instution or maglabas ng findings ng EIA unless may permiso sila). They should
first secure an Environment Compliance Certificate.
Who issue Environment Compliance Certificate (ECC) – the ans DENR thru Environment
Management Board (EMB)
How long is the validity of ECC?- it is valid thru the entire lifetime of project (habang
gingawa ang project valid ang ECC pero dapat di lalagpas ng 5 years) – it will came
invalid if the project was implemented 5 years from the date of issuance.
ECC is an example of DENR Permits.
Who are the important person or position established by PD 1586-
Pollution Control Officer (PCO) - he is competent to pollution control and environmental
management.
What is the duties of PCO – conduct an evaluation about establishment discharge
(pagtatapon) solid, liquid or gaseous waste (basura) to environment. (isa pa pinag
aaralan ng PCO ung product ng establishment kung eto ay magbubunga ng pollution sa
hangin, tubig o lupa)
e.g. the pco examined the brandnew motorcycle of Yamaha NMAX XXX if this product
emits pollution to the air.
What intances that the PCO is not required? In examining the pollution emits by small
businesses like small stores or stall.
It is the responsibility of PCO to enforce the all the environmental laws.
General Effluent Standard- This set the parameters (batayan) of water quality.
What is the law provides the guideline for Water Quality and General Effluent Standards
The ans DAO 2016-08 (DENR Administrative Order).
The Philippine Clean Water act provides guidelines with regards to the discharge of
liquid or water by an establishment. (for example magtatapon ka ng tubig galling sa
factory papunta sa water system or water ways kelangan mong mag secure ng permit)
from DENR.
Again ang nagcoconduct ng investigation sa factory about discharge of water is PCO.
Refusal of establishment to the inspection of PCO is a punishable act.
Kaya tayo tuwing magpaparehistro ng motor kelangan ng emission test- Motor Vehicle
Emission test is a Air sampling activities under RA 8749.
What is MC which provides compliance to source emission test?
LTO MC 2016-008
RA 6969- Toxic Substance and Hazardous Waste Control act of 1990 (it includes Nuclear
Waste)
It provides the listing of existing chemicals used or sold, distributed or imported which
can be allowed in the Philippines. (the purpose of this law ay para ma screen lahat ng
chemicals na papasok sa bansa)
Pre screening test for chemicals
The foreign exporter of chemical will be notified for the conduct of this test. This is
called Pre- manufacturing or Pre Importation Notification.
The revised procedures and standards for management hazardous waste- This is under
DAO 2013-22
What is the first procedure under the DAO 2013-22?
The answer is Classification of Hazardous Waste
Procedures:
Classification of Hazardous Waste
- Classification of Hazardous Waste
- Online Manifest System (check thru online the waste is included to the chemical
or substance allowed) (tinatawag din itong verification check)
- Waste Management Proper (Proper Storage, Packaging, labeling- isusulat mo ung
pangalan at description ng chemicals, transport and treatment)
RA 9003- Ecological Solid Waste Management Act- (lahat ng basure except for chemicals
even biodegradable or non biodegrable)
What is the commission created by this law? The ans is National Solid Waste
Management Commission (national or pang buong bansa)
City (panglunsod) –National Ecology Center
Municipal or Provincial- (sa probinsya) Solid Waste Management Board.
Under this law, the commission is task to make Solid Waste Management Framework
which involves 10-year plan.
This law provides incentive or rewards to those cities or municipalities who could
manage their waste properly.
End of Lecture-