Professional Documents
Culture Documents
Cybercrime and Other Digital Crimes and Emerging Crime
Cybercrime and Other Digital Crimes and Emerging Crime
TYPOLOGIES
WHAT IS CYBERCRIME?
Cybercrime is a criminal activity which uses electronic device with a connection to
the internet
Cyber crimes are criminal offenses committed via the Internet or otherwise aided by
various forms of computer technology, such as the use of online social networks to
bully others or sending sexually explica digital photos with a smart phone
Cybercrime, also called computer crime, the use of a computer as an instrument to
further illegal ends such as committing fraud, trafficking in child pornography and
tellectual property, stealing identities, or violating privacy
Need to know
49% of adults were victims of cybercrime on 2014
TYPES OF CYBERCRIME
THREE GENERIC TYPES OF CYBERCRIME:
TOP CYBERCRIME/CYBER-ATTACK
1. RANSOMWARE
This is a type of malware that encrypts a victim's files and demands a ransom
payment in exchange for the decryption key. Ransomware attacks have become
increasingly common and have impacted individuals. businesses, and government
organizations
2. PHISHING
This is a type of social engineering attack that involves sending fraudulent emails
or messages to trick victims nto providing sensitive information such as login credentials
or financial data Phishing attacks have become more sophisticated and difficult to detect
in recent years.
3. IDENTITY THEFT
The theft of someone's personal information, such as their name, address, Social
Security number, and cred card details, to commit fraud or other crimes.
4. ONLINE SCAMS
Various types of fraudulent activities conducted over the internet, such as fake lottery or
charity
Scams
5. SCAREWARE
A malicious software that defrauds victims by scaring them into paying for fake anti-
virus packages that purport to fix their computer Incidents have risen by as much as
seven-fold this year
HISTORY OF THE LOVE BUG "I LOVE YOU VIRUS" May 4, 2000
The First Recorded Cybercrime in the Philippines
ILOVEYOU, sometimes referred to as Love Bug or Love Letter for you or fake love
letter, is a computer worm that infected over ten million Windows personal computers
on and after 4 May 2000 when it started spreading as an email message with the
subject line "ILOVEYOU" and the attachment "LOVE-LETTER-FOR-YOU txt vbs"
The worm inflicts damage on the local machine. overwriting random types of files
and sends a copy of itself to all addresses in the Windows Address Book used by
Microsoft Outlook This made it spread much faster than any other previous email
worm
CREATION
LOVEYOU was created by Onel de Guzman, who was a college student in
Manila, Philippines and was 24 years old at the time. De Guzman created the worm alone
and had no accomplices He was poor and struggled to pay for internet access at the time.
His purpose for creating the computer worm was to steal passwords that he could use to
log in to other users' internet accounts without needing to pay for the service. He justified
his actions on his belief that internet access is a human right, and his belief that he wasn't
actually stealing
The worm used the same principles that de Guzman had described in his
undergraduate thesis at AMA Computer College He stated that the worm was very easy to
create, thanks to a bug in Windows 95 that would un code in email attachments when the
user clicked on them Originally designing the worm to only work in Manila, out of
curiosity, he removed this geographic restriction which allowed the worm to spread
worldwide De Guzman did not expect this worldwide spread
On 14 June 2000, RA 8792 or the Electronic Commerce Act was signed into law
RA 8792 positioned the Philippines as the third country to enact an e-commerce law, next
to Singapore and Malaysia
4. RATIONAL CHOICE THEORY - This theory assumes that offenders seek to benefit
themselves by their criminal behavior, that this involves the making of decisions and of
choice, however rudimentary on occasion these processes might be, and that these
processes exhibit a measure of rationality, albeit constrained by limits of time and ability
and the availability of relevant information. Everyone is capable of crime depending on
whether circumstances align to make crime seem the most reasonable choice at the time
For Harris and Lee (2019), digital evidence refers to the information and data of valise
to investigation that is stored on, received, or sent by a digital device or attachment
Accordingly digital evidence has the following features
1. it is latent (hidden)
2. It crosses jurisdictional boarders quickly and easily
3. it can be altered, damaged, or deleted with little effort
4 it can be time sensitive
Digital Forensic Investigator are the one performing digital investigative analysis.
Digital forensic investigator re also called as digital forensic examiner
DEFINITION OF TERMS
ACCESS - refers to the instruction, communication with, storing data in, retrieving
data from or otherwise making use of any resources of a computer system or
communication network .
SERVICE PROVIDER - refers to Any public or private entity that provides to users
of its service the ability to communicate by means of a computer system, and Any
other entity that processes or stores computer data on behalf of such barnst
of such service.
TRAFFIC DATA (NON-CONTENT DATA - relets to any computer data other than
the content of the communication including, but not limited to the communication's
origin, destination route time, date, size, duration, or type of underlying service.
ORIGINAL AUTHOR - refers to the person who created or is the origin of the
assailed electronic statement or post using a computer system,
PRESERVATION - refers to the keeping of data that already exists in a stored form,
protected from anything. that would cause its current quality or condition to change or
deteriorate. It is the activity that keeps that stored data secure and safe,