You are on page 1of 29

PHILIPPINE

CONCEPT OF
TERRORISM
1 Republic Act 9372

Cyber or Technology
AGENDA
2
Crimes (Cyber Crimes)

3 Republic Act No. 10175


REPUBLIC ACT
9372

03
“Anti-Terror Law” or “Anti-Terrorism
Law“.
properly known as the “Human
Security Act of 2007.” This law took
effect 15 of July 2007

03
WHY R.A. 9372
EXISTED?

03
(Piracy in General and Mutiny in
Article 122 the High Seas or in the
Philippine Waters);

Article 134 (Rebellion or Insurrection);

SEC. 3 Article 134


(Coup de Etat), including acts
committed by private persons;

Article 248 (Murder)

(Kidnapping and Serious Illegal


Article 267 Detention);
ARTICLE 324 (CRIMES INVOLVING
DESTRUCTION),
Presidential Decree No.
(The Law on Arson)
1613

(Toxic Substances and Hazardous and Nuclear Waste


Republic Act No. 6969
Control Act of 1990);

Republic Act No. 5207, (Atomic Energy Regulatory and Liability Act of 1968);

Republic Act No. 6235 (Anti-Hijacking Law);

Presidential Decree No.


Anti-piracy and Anti-highway Robbery Law of 1974)
532

Back to Agenda 04
ARTICLE 324 (CRIMES INVOLVING
DESTRUCTION),

amended (Decree Codifying the Laws on Illegal and


Presidential Decree No. Unlawful Possession, Manufacture, Dealing in,
1613 Presidential Acquisition or Disposition of Firearms, Ammunitions
Decree No. 1866 or Explosives)

Back to Agenda 04
ARTICLE 324 (CRIMES INVOLVING
DESTRUCTION),

Thereby sowing and creating a condition of widespread


and extraordinary fear and panic among the populace, in
order to coerce the government to give in to an unlawful
demand shall be guilty of the crime of terrorism and shall
suffer the penalty of forty (40) years of imprisonment,
without the benefit of parole as provided for under Act No.
4103, otherwise known as the Indeterminate Sentence
Law, as amended.

Back to Agenda 04
CYBER OR
TECHNOLOGY
CRIMES (CYBER
CRIMES)

03
INTRODUCTION
Computer crime, or cybercrime, refers to any crime that involves a computer
and a network, where the computers may or may not have played an
instrumental part in the commission of a crime. Netcrime refers, more
precisely, to criminal exploitation of the Internet. Issues surrounding this
type of crime have become high-profile, particularly those surrounding:

a. hacking b. copyright infringement, c. child pornography d. child grooming

Back to Agenda 05
METHODOLOGY
There are also problems of privacy when confidential information is lost or
intercepted, lawfully or otherwise. On the global level, both governments
and non-state actors continue to grow in importance, with the ability to
engage in such activities as espionage, financial theft, and other cross-
border crimes sometimes referred to as cyber warfare. The international
legal system is attempting to hold actors accountable for their actions, with
the International Criminal Court among the few addressing this threat.

06
According to Dreyfus, Suelette (1997), cybercrime is a term used
broadly to describe activity in which computers or computer
networks are the tool, target, or place of criminal activity.
Cybercrime takes a number of forms including:

a. internet fraud,
b. violation of copyright laws through file sharing,
c. computer viruses,
d. denial of service attacks, and
e. spam- unwanted emails and messages
f. phishing: using fake email messages to get personal information from internet users;
g. misusing personal information (identity theft);
h. hacking: shutting down or misusing websites or computer networks;
i. spreading hate and inciting terrorism;
j. distributing child pornography;
k. grooming: making sexual advances to minors

07
TYPOLOGY OF
CYBER CRIME
1. SPAM

Spam, or the unsolicited sending of bulk email for commercial purposes, is


unlawful to varying degrees. As applied to email, specific anti-spam laws are
relatively new, however limits on unsolicited electronic communications have
existed in some forms for some time.
2. FRAUD

Computer fraud is any dishonest misrepresentation of fact intended to let


another to do or refrain from doing something which causes loss. In this
context, the fraud will result in obtaining a benefit by:

. FRAUD

a. altering computer input in an unauthorized way. This requires little technical expertise
and is not an uncommon form of theft by employees altering the data before entry or
entering false data, or by entering unauthorized instructions or using unauthorized
processes;
b. altering, destroying, suppressing, or stealing output, usually to conceal unauthorized
transactions: this is difficult to detect;
c. altering or deleting stored data;
d. altering or misusing existing system tools or software packages, or altering or writing
code for fraudulent purposes. This requires real programming skills and is not common.
Other forms of fraud may be facilitated using computer systems, including bank fraud,
identity theft, extortion, and theft of classified information.
3. OBSCENE OR
OFFENSIVE
CONTENT

The content of websites and other electronic communications may be


distasteful, obscene or offensive for a variety of reasons
4. HARASSMENT

Whereas content may be offensive in a non-specific way, harassment directs


obscenities and derogatory comments at specific individuals focusing for
example on gender, race, religion, nationality, sexual orientation
4. HARASSMENT
5. DRUG
TRAFFICKING

Drug traffickers are increasingly taking advantage of the Internet to sell their
illegal substances through encrypted e-mail and other Internet Technology.
6.
CYBERTERRORISM

Cyberterrorism in general, can be defined as an act of terrorism committed


through the use of cyberspace or computer resources (Parker 1983).
7. CYBER WARFARE

The U.S. Department of Defense (DoD) notes that cyberspace has


emerged as a national-level concern through several recent events of geo-
strategic significance.
What is Cyberspace?
Cyberspace is a term coined by sci-fi novelist William Gibson (1999). It is
used to refer to the spaces within computers and the spaces between
computers (across networks) when people interact with information and with
each other.

7. CYBER WARFARE

The U.S. Department of Defense (DoD) notes that cyberspace has


emerged as a national-level concern through several recent
events of geo-strategic significance.
What is Cyberspace?
Cyberspace is a term coined by sci-fi novelist William
Gibson (1999). It is used to refer to the spaces within computers
and the spaces between computers (across networks) when
people interact with information and with each other.
CYBER
PORNOGRAPHY

Among those are included the attack on Estonia's infrastructure in 2007,


allegedly by Russian hackers. "In August 2008, Russia again allegedly
conducted cyber attacks, this time in a coordinated and synchronized kinetic
and non-kinetic campaign against the country of Georgia.
Afraid that such attacks will become the norm in future warfare among
nation-states, the concept of cyberspace operations will be adapted by war
fighting military commanders in the future.
8. COPYRIGHT
INFRINGEMENT

Copyright infringement is also known as copyright violation


Republic Act No. 10175
SECTION 1. Title the “Cybercrime
Prevention Act of 2012”.

09
Republic Act No. 10175
SECTION 1. Title the “Cybercrime
Prevention Act of 2012”.

09
THANK YOU!

Back to Agenda 08

You might also like