Professional Documents
Culture Documents
CONCEPT OF
TERRORISM
1 Republic Act 9372
Cyber or Technology
AGENDA
2
Crimes (Cyber Crimes)
03
“Anti-Terror Law” or “Anti-Terrorism
Law“.
properly known as the “Human
Security Act of 2007.” This law took
effect 15 of July 2007
03
WHY R.A. 9372
EXISTED?
03
(Piracy in General and Mutiny in
Article 122 the High Seas or in the
Philippine Waters);
Republic Act No. 5207, (Atomic Energy Regulatory and Liability Act of 1968);
Back to Agenda 04
ARTICLE 324 (CRIMES INVOLVING
DESTRUCTION),
Back to Agenda 04
ARTICLE 324 (CRIMES INVOLVING
DESTRUCTION),
Back to Agenda 04
CYBER OR
TECHNOLOGY
CRIMES (CYBER
CRIMES)
03
INTRODUCTION
Computer crime, or cybercrime, refers to any crime that involves a computer
and a network, where the computers may or may not have played an
instrumental part in the commission of a crime. Netcrime refers, more
precisely, to criminal exploitation of the Internet. Issues surrounding this
type of crime have become high-profile, particularly those surrounding:
Back to Agenda 05
METHODOLOGY
There are also problems of privacy when confidential information is lost or
intercepted, lawfully or otherwise. On the global level, both governments
and non-state actors continue to grow in importance, with the ability to
engage in such activities as espionage, financial theft, and other cross-
border crimes sometimes referred to as cyber warfare. The international
legal system is attempting to hold actors accountable for their actions, with
the International Criminal Court among the few addressing this threat.
06
According to Dreyfus, Suelette (1997), cybercrime is a term used
broadly to describe activity in which computers or computer
networks are the tool, target, or place of criminal activity.
Cybercrime takes a number of forms including:
a. internet fraud,
b. violation of copyright laws through file sharing,
c. computer viruses,
d. denial of service attacks, and
e. spam- unwanted emails and messages
f. phishing: using fake email messages to get personal information from internet users;
g. misusing personal information (identity theft);
h. hacking: shutting down or misusing websites or computer networks;
i. spreading hate and inciting terrorism;
j. distributing child pornography;
k. grooming: making sexual advances to minors
07
TYPOLOGY OF
CYBER CRIME
1. SPAM
. FRAUD
a. altering computer input in an unauthorized way. This requires little technical expertise
and is not an uncommon form of theft by employees altering the data before entry or
entering false data, or by entering unauthorized instructions or using unauthorized
processes;
b. altering, destroying, suppressing, or stealing output, usually to conceal unauthorized
transactions: this is difficult to detect;
c. altering or deleting stored data;
d. altering or misusing existing system tools or software packages, or altering or writing
code for fraudulent purposes. This requires real programming skills and is not common.
Other forms of fraud may be facilitated using computer systems, including bank fraud,
identity theft, extortion, and theft of classified information.
3. OBSCENE OR
OFFENSIVE
CONTENT
Drug traffickers are increasingly taking advantage of the Internet to sell their
illegal substances through encrypted e-mail and other Internet Technology.
6.
CYBERTERRORISM
7. CYBER WARFARE
09
Republic Act No. 10175
SECTION 1. Title the “Cybercrime
Prevention Act of 2012”.
09
THANK YOU!
Back to Agenda 08