Professional Documents
Culture Documents
Introduction to cybercrime and Environmental Laws and Protection – Bimboy C. Cueno, Dean,
Foundation University-Review Lecturer-Author
Cyber – refers to a computer or a computer network, the electronic medium in which online
communication takes place.
Cybercrime
Historical Events
• 1834 – first cyberattack in the world. – A couple of robbers hack the French Telegraph
System and steal information from the stock market.
• 1878 – Early Mobile Calls – young boys repeatedly and purposely misdirecting and
disconnecting customer calls of Bell Telephone Company two years after Alexander
Graham Bell invented the machine.
• 1969 – RABBITS Virus – the University of Washington Data Center downloads a program
on a computer from an unknown user. The inconspicuous machine creates copies of
itself before the machine overloads and ceases running (breeding like a rabbit). It is
known to be the first virus on a computer.
• 1981 – first Cybercrime Conviction – Ian Murphy, aka “Captain Zap”, breaks into the
network of AT&T and alterations the internal clock at peak hours to charge off-hour
prices.
• 1982 – The Logic Bomb – The CIA blows up a Siberian gas pipeline by injecting a code
into the network and the operating system to monitor the gas pipeline without using a
bomb or a missile.
• 1988 – the Morris Worm – Robert Morris releases what on the Internet will be
considered the first worm. To show that the author is a student there, the worm is
released from a computer at MIT.
• 1999 – The Melissa Virus – a virus infects Microsoft Word records, transmitting itself via
email as an attachment automatically. It mails out to the first 50 names mentioned in
the Outlook email address box of an infected device.
• 2010 – The Stuxnet Worm – The world’s first software bomb is a destructive computer
virus that can attack control system used for controlling manufacturing facilities.
• 2016 – DNC Email Leaks – Emails from the Democratic National Committee were leaked
to and released by WikiLeaks prior to the 2016 US presidential election.
• I Love You Virus – sometimes referred to as Love Bug or Love Letter for you, is a
computer worm that infected over ten million Windows personal computers on and
after 5 May 2000. It started spreading as an email message with the subject line
“ILOVEYOU” and the attachment “LOVE-LETTER-FOR-YOU.TXT.vbs.” created by Onel De
Guzman.
1. Input Function – the process of entering any type of data and instructions into a
computer system. Uses the input devices such as Keyboard, Mouse, Scanner,
Microphone, etc., in order to receive user signals to the computer.
2. Central Processing Unit – it processes data of the computer. It takes data and
instructions from the input devices and performs all types of calculations based on the
instructions given. Called “the brain of computer” as it controls operation of all parts of
computer.
Random Access Memory (RAM) – is a computer’s short-term memory, where the data
that the processor is currently using is stored. A volatile memory used to hold
instructions and data of currently running programs.
Read Only Memory (ROM) – a non-volatile memory type. This means it receives data
and permanently writes it on a chip and it lasts even after you turn off your
computer. The data that remains on the ROM cannot be changed and remains
forever.
Other Storage
Hard Disk Drive (HDD) – a re-writable permanent memory.
Solid State Drive (SDD) – is a new generation of storage device used in computers. It
stores data using flash-based memory, which is much faster than the traditional
hard disks they’ve come to replace.
Pen Drives – a plug-and-play portable storage device that uses flash memory that is
lightweight.
4. Output Function – means the results generated by the computer once the processing of
CPU is completed, based on the instruction given by the user.
- The output is in the form of documents, videos, audio, graphs, images, etc. Results
are displayed on your computer screen.
1 Byte 8 Bits
1 Kilobyte 1,024 Bytes
1 Megabyte 1, 024 Kilobytes
1 Gigabyte 1, 024 Megabytes
1 Terrabyte 1, 024 Gigabytes
1 Petabyte 1, 024 Terabytes
1 Exabyte 1, 024 Petabytes
1 Zettabyte 1, 024 Exabytes
1 Yottabyte 1, 024 Zettabytes
Cybercrime Offenses
Republic Act 10175 – Cybercrime Prevention Act of 2012
Categories
A. Offenses against the confidentiality, integrity and availability of computer data and
systems
B. Computer-related Offenses
C. Content-related Offenses
D. Other Cybercrime Offenses
A. Offenses against the confidentiality, integrity and availability of computer data and
systems
1. Illegal Access – the access to the whole or any part of a computer system without
right.
2. Illegal Interception – the interception made by technique means without right of
any non-public transmission of computer data to, from, or within a computer system
including electromagnetic emissions from a computer system carrying such
computer data.
3. Data Interference – the intentional or reckless alteration, damaging, deletion or
deterioration of computer data, electronic document, or electronic data message,
without right, including the introduction or transmission of viruses.
4. System Interference – the intentional alteration or reckless hindering or
interference with the functioning of a computer or computer network by inputting,
transmitting, damaging, deleting, or suppressing computer data or program,
electronic document or electronic data message, without right or authority,
including the introduction or transmission of viruses.
5. Misuse of Devices – the use, production, sale, procurement, importation,
distribution, or otherwise making available, without right, a device, including a
computer program, designed or adapted primarily for the purposes of committing
any of the offenses under this Act; or computer password, access code, or similar
data to be used for the purpose of committing any of the offenses under this Act.
6. Cyber-squatting – the acquisition of a domain name over the internet in bad faith to
profit, mislead, destroy reputation, and deprive others from registering the same, if
such a domain name is similar, identical, or confusingly similar to an existing
trademark registered with the appropriate government agency.
B. Computer-related Offenses
1. Computer-related Forgery – The input, alteration, or deletion of any computer data
without right resulting in inauthentic data with the intent that it be considered or
acted upon for legal purposes as if it were authentic, or the act of knowingly using
computer data which is the product of computer-related forgery as defined herein,
for the purposes of perpetuating a fraudulent or dishonest design.
2. Computer-related Fraud – the unauthorized input, alteration, or deletion of
computer data or program or interference in the functioning of a computer system,
causing damage thereby with fraudulent intent.
3. Computer-related Identity Theft – The intentional acquisition, use, misuse, transfer,
possession, alteration or deletion of identifying information belonging to another,
whether natural or juridical, without right.
C. Content-related Offenses
1. Cybersex – The willful engagement, maintenance, control, or operation, directly or
indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid
of a computer system, for favor or consideration.
2. Child Pornography – The unlawful or prohibited acts defined and punishable by
Republic Act No. 9775 or the Anti-Child Pornography Act of 2009, committed
through a computer system.
3. Unsolicited Commercial Communications – The transmission of commercial
electronic communication with the use of computer system which seek to advertise,
sell, or offer for sale products and services are prohibited unless. Also known as
spam.
4. Libel – the unlawful or prohibited acts of libel as defined in Article 355 of the Revised
Penal Code, as amended, committed through a computer system.
Note:
The National Bureau of Investigation (NBI) and the Philippine National Police (PNP) shall
be responsible for the efficient and effective law enforcement of the provisions of Republic Act
10175.
Cybercrime Warrants
1. The Warrant to Disclose Computer Data (WDCD) – authorizes law enforcers to disclose
or submit subscriber’s information, traffic data, or relevant in the possession or control
of a person or service provider.
3. The Warrant to Search, Seize, and Examine Computer Data (WSSECD) – authorizes law
enforcers to search the particular place for items to be seized and /or examined.
-The Rule allows the authorized law enforcer to initially make a forensic image of the
computer on-site, as well as limit their search to the place specified in the warrant.
Otherwise, an off-site search, where the law enforcer searches the computer outside
the place to be searched, may be conducted.
4. The Warrant to Examine Computer Data (WECD) – authorizes law enforcers to search a
computer device or computer seized during a lawful warrantless arrest or by any other
lawful method.
The warrants shall only be effective within 10days from its issuance.
The court upon motion, extend its effectivity based only on justifiable reasons for a
period not exceeding 10days from the expiration of the original period.
Failure to timely file returns of warrants or to duly turn over to the court’s custody any
of the items disclosed, intercepted, search, seized, and/or examined shall subject for
contempt.
Moreover, failure to comply with the orders from law enforcement authorities shall be
punished for obstruction of justice.
Cybercrime consists of illegal activity conducted on a computer. Traditional crimes may be
committed while using a computer, but cybercrime consists of more specific types of crimes,
such as phishing schemes and viruses.
Cybercrime, or computer oriented crime, is crime that involves a computer and a network. The
computer may have been used in the commission of a crime, or it may be the target.
Cybercrimes can be defined as: “Offenses that are committed against individuals or groups of
individuals with a criminal motive to intentionally harm the reputation of the victim or cause
physical or mental harm, or loss, to the victim directly or indirectly, using modern
telecommunication networks such as Internet (networks including but not limited to Chat
rooms, emails, notice boards and groups) and mobile phones (Bluetooth/SMS/ MMS)”.
At the Tenth United Nations Congress on the Prevention of Crime and Treatment of Offenders, in a
workshop devoted to the issues of crimes related to computer networks, cybercrime was broken into
two categories and defined thus: 1. Cybercrime in a narrow sense (computer crime): Any illegal behavior
directed by means of electronic operations that targets the security of computer systems and the data
processed by them. 2. Cybercrime in a broader sense (computer-related crime): Any illegal behavior
committed by means of, or in relation to, a computer system or network, including such crimes as illegal
possession and offering or distributing information by means of a computer system or network.