Professional Documents
Culture Documents
Your use of this material constitutes acceptance of that license and the
conditions of use of materials.
Credits
AUTHORS AND CONTRIBUTORS
A. CYBERCRIMES
Cybercrime, also known as Internet Crime, refers to illegal online activity committed using the
Internet. Because Internet crimes usually engage people from various geographic areas and
countries, finding and penalizing guilty participants is difficult.
d. Impersonation
e. excluding someone from an online
group.
f. sexual remarks
g. making the person the subject of
ridicule in online forums
h. hacking into or vandalizing sites
about a person
Persons who are bullied online may exhibit the following behaviors: (1) lower self-
esteem, (2) increased suicidal ideation, (3) retaliating, (4) being scared, (5) frustrated,
(6) angry, and (7) depressed.
others in order to elicit a reaction. A troll may do this for his own amusement or
just because he is a combative
person.
3. Cyberextortion.
Cyberextortion occurs when a
person uses the Internet to
demand money, goods or sex,
from another person by
threatening to inflict harm to his
person, his reputation, or his
property if he refuses.
Example of Cyberextortion:
The most common way criminal hackers succeed in pulling off their crimes is by tricking
the victim into clicking a link inside an e-mail or opening the e-mail’s attachment. These
can lead to all kinds of viruses and security issues such as infecting the computer with
ransomware, which blocks you from accessing your files, and you must then pay the
extortionist in bitcoins to unlock the files. Here are the following tips on how to prevent
cyberextortion:
3. When disposing your mobile device. Completely clear all data and settings
on your mobile device before disposal.
4. Learn how to prevent data loss from IT outsourcing. Data theft sometimes
happens when you hire services of IT persons for repair services, application
development and maintenance, network management, desktop management
and others where you allow such person to gain access to your data files.
5. Encrypt your data. Encryption is a process for scrambling and transforming
data from an easily readable format (such as Plain Text) into an unreadable
format (known as Cipher Text) so that it will appear useless and not
understandable. Encryption techniques are used to protect confidentiality of
data and hide it from curious
individuals.
4. Password Trafficking. This is the act of
hacking, sharing, selling or buying stolen
passwords so that criminals can then use the
password to gain access to the victim's bank
account with the purpose to steal their identity, extort
money for a ransom, by threatening not to
release that information unless the victim pay a huge amount of money.
EULA states that you can install the original copy of software on one computer and make
a backup copy in case the original is lost or damaged but not to copy, reproduce, use or
manufacture the said software for consumption of others.
There is no best solution to this problem and no publisher can fully stop software piracy,
but at the very least, one can reduce the harm. Below are quick and easy steps to address
the problem:
3. Join Forces With Other Publishers. If pirates are illegally copying your
software you can be sure they are pirating the softwares of others as well.
Joining forces with like-minded publishers will help you to combat piracy
problems because they will share tips on strategies and solutions that works
best.
4. Monitor The Internet. Using an online monitoring service such as
MarkMonitor or Attributor can be useful to collect intelligence about the extent
of your piracy problem.
5. Develop A Working Relationship With Government Agencies And
Intermediaries. Because pirates are continuously creating new ways to avoid
detection, it is important to develop a working relation with the national and
local government responsible for enforcement such as the NBI (National
Bureau of Investigation) and PNP (Philippine National Police).
6. Learn Technological Protections. Technological protections method such as
watermarking can be used to prevent piracy. A digital watermark is a marker
covertly embedded in an audio, video or image data used to identify ownership
of the copyright. Watermarking will give warning to pirates that your software
is marked and are not to be copied without your permission.
7. Create Alternative Access and Price of the Software. Customers may be
pirating your work because they are not accessible to them, or maybe your
product is so expensive. So to prevent piracy, create an alternative access or
lower their price. This will make piracy a less attractive option to them.
one who took pictures or videos, the one who received and the one who distributed
them.
7. Credit card fraud. This refers to acts of theft and fraud committed using credit or debit
card in order to obtain goods or free or obtain funds from the victim’s account.
keypad overlay that records or wirelessly transmits the keylog of the PIN
entered.
that the manager needs to click a link and install special software to view the
subpoena, complaint or memorandum.
10. Domain hijacking. This is
the act of changing the
registration of a domain
name without the permission
of its original registrant by
acquiring personal
information of the domain
owner and then
impersonating him and
persuading the domain
registrar to modify the
registration information or transfer the domain to another registrar. The hijacker in turn can
use the domain name to (1) facilitate illegal activity such as phishing, where a website is
replaced by an identical website that records private information such as log-in passwords,
(2) distribute malware, (3) derive commercial income from a website hosted at the domain
or (4) conduct business through the domain's e-mail accounts.
The following are the suggested tips for prevent domain hijacking:
a. Use strong email passwords and enable two-factor authentication if available.
b. Disable POP if your email provider is able to use a different protocol.
c. Tick the setting "always use https" under email options.
d. Frequently check the "unusual activity" flag if provided by your email service.
e. Make sure to renew your domain registration in a timely manner with timely
payments and register them for at least five (5) years.
f. Use a domain-name registrar that offers enhanced transfer protection such as
domain locking.
g. Makes sure your WHOIS information is up-to-date and really points to you and you
only. WHOIS is a query and response protocol for databases that store domain
name, an IP address block, or an autonomous system.
This module is created under the Department of Natural Science of University of Makati. Your use of this material constitutes acceptance of that license and the
conditions of use of materials.
h. If you more than 2000 domain names consider buying your own registrar.
Example of cybersquatting.
On June 5, 2009, Tony La Russa, the manager of the St. Louis Cardinals, filed a complaint
against Twitter, accusing Twitter of cybersquatting where Twitter created a profile of La
Russa's with a headline that said "Hey there! Tony La Russa is now using Twitter."
According to La Russa, Twitter is in bad faith because it wanted to divert Internet traffic
away from La Russa's website and make a profit from it.
Today social networking websites have attempted to curb cybersquatting. For instance,
Twitter suspends members who attempts to sell or extort payments in exchange of
divulging one’s usernames or impersonates other account. An account may be guilty of
impersonation if it confuses or misleads others. On the same manner, Facebook reclaim
usernames on the website if they infringe on a trademark and require mobile phone
verification to check one’s account.
This module is created under the Department of Natural Science of University of Makati. Your use of this material constitutes acceptance of that license and the
conditions of use of materials.
Here are 10 tips on how to prevent malware from infecting your computer:
1. Back Up Your Files. The best thing you can do is back up your files in at least three
(3) places: on your computer, external hard drive such as USB or email inbox, and in
a different location.
2. Disable Autorun. Many viruses work by attaching themselves to a drive and
automatically installing themselves on any other media connected to the system such
as network drives, external hard disks, or even thumb drives to a system can result in
the automatic propagation of such threats. Computer users can disable the Windows
autorun feature by following Microsoft's recommendations.
3. Do not Use Open Wi-Fi. When you are in MRT or LRT stations, at the local coffee
shop, library, and especially the airport, do not use free Wi-Fi that requires no
password or encryption. This means that free Wi-Fi is not protected or secured.
4. Install Quality Antivirus. Many computer users believe free antivirus applications
are sufficient to protect a computer from virus or spyware infection. However, such
free anti-malware programs typically do not provide adequate protection from the
ever-growing list of threats.
5. Install real-time anti-spyware protection. Real-time anti-spyware provides active,
protection from adware, Trojan, and other spyware infections.
This module is created under the Department of Natural Science of University of Makati. Your use of this material constitutes acceptance of that license and the
conditions of use of materials.
upper case, numbers, and symbols. Keep it easy to remember but difficult to guess.
13. Intellectual Property Infringement. Infringement refers to the violation of intellectual
property rights, with respect to patents, copyright, and trademarks. Intellectual property
(IP) refers to creations of the intellect for which a monopoly of use is assigned to the owners
of the property, creations or inventions. Intellectual property rights (IPRs) are the rights
granted to the creators of IP, and include trademarks, copyright, patents, industrial design
rights, and trade secrets and other artistic works such as music, literature, inventions,
words, phrases, symbols, and designs.
2. Pursue Foreign Registration. If you plan to market your invention in other countries,
you need to register patents and trademarks in multiple countries.
3. Do not tell anyone, if possible. If your work is not patentable and you want to protect
it using the trade secrets law, limit the number of people you tell about it. When
possible, have potential partners or investors sign non-disclosure agreements. A non-
disclosure agreement (NDA) is a legal contract between you and the potential partners
or investors not to divulge information to other people who are not part of the
agreement indicating clearly how long it must be kept secret.
4. Monitor Your Marketplace. There are some
people may not be aware that they are already
infringing, so you need to monitor the
marketplace. For example, you can do the
following:
a. Pay attention to new products and companies, and
note the images and words in their marks.
b. Set up Internet search alerts, such as Google alerts, to receive emails when words or
phrases similar to your work are mentioned online.
c. If your trademark is particularly valuable, consider using a trademark search firm to
police your mark. A company like Thomson CompuMark will search domestic and
international trademark and domain registrations.
d. Investigate products that appear similar to yours and their patent filings to determine if
they infringe your patent.
5. Defend Your Rights if Infringed. If you find instances of infringement in the market,
then hire an experienced IP attorney to help you defend your rights. You can do the
following:
a. Send a cease-and-desist letter telling the infringer to stop using your work. You can
send it yourself, but for the most impact, have your lawyer send it.
b. Send a Digital Millennium Copyright Act (DMCA) takedown notice for copyright
infringement on the Internet.
c. Request a court injunction to stop a patent infringer from continuing to make or sell
the product.
d. File a lawsuit if the infringer did not stop of refused to negotiate.
Few internet crimes make headlines in media. But we all know that we sometimes did it. We know
the downloading of music, images, and movies without consent is illegal and people all over the
world use the Internet to commit a host of crimes, some of which the public does not even know.
The following are the ten (10) most common Internet crimes:
1. Phishing or Spoofing. This refers to unlawfully access to a computer without authorization
and send multiple e-mails or resend multiple commercial email messages with the intent to
deceive recipients, or falsify header information in multiple email messages.
2. Blackmail or Extortion. This refers to the use of the Internet to threaten to cause damage
with the intent to extort from any person any money or other thing of value by threatening
to expose damaging or embarrassing information in exchange for money.
3. Accessing Stored Communications. This is intentionally accessing, without
authorization, a facility through which an electronic communication service is provided for
the purposes of commercial advantage, malicious destruction, or in furtherance of other
crime.
4. Sports Betting. This is engaging in the business of betting or wagering on any sporting
event or contest over the Internet.
5. Non-Delivery of Merchandise. This is the devising any scheme to defraud money or
property by means of false or fraudulent promises using the Internet such as not receiving
what you won or paid for in an online auction.
6. Electronic Harassment. This is anonymously using the Internet to annoy, abuse, threaten,
or harass the person who receives the communication.
7. Child Pornography. This is using the Internet to
transmit child pornography.
8. Prostitution. This is persuading, inducing,
enticing, or coercing any individual to travel in
interstate commerce to engage in prostitution.
9. Internet Drug Trafficking. This is delivering,
distributing, or dispensing a controlled substance
by means of the Internet.
10. Criminal Copyright Infringement. This is
infringing a copyright for financial gain or
distributing a work for commercial purpose on a computer network.
a. Illegal access – The access to the whole or any part of a computer system without
right.
b. Illegal interception – The interception made by technical means without right of
any non-public transmission of computer data to, from, or within a computer system
including electromagnetic emissions from a computer system carrying such
computer data.
c. Data Interference – The intentional or reckless alteration, damaging, deletion or
deterioration of computer data, electronic document, or electronic data message,
without right, including the introduction or transmission of viruses.
d. System Interference – The intentional alteration or reckless hindering or
interference with the functioning of a computer or computer network by inputting,
transmitting, damaging, deleting, deteriorating, altering or suppressing computer
data or program, electronic document, or electronic data messages, without right or
authority, including the introduction or transmission of viruses.
e. Misuse of devices which includes the use, possession or production, sale,
procurement, importation, distribution, or otherwise making available, without
right, of:
a. a device, including a computer program, designed or adapted primarily for the
purpose of committing any of the offenses under this Act; or
b. A computer password, access code, or similar data by which the whole or any
part of a computer system is capable of being accessed with intent that it be
used for the purpose of committing offenses.
f. Cyber-squatting. The acquisition of domain name over the Internet in bad faith to
profit, mislead, destroy reputation, and deprive others from the registering the same,
if such a domain name is:
a. Similar, identical, or confusingly similar to an existing trademark registered
with the appropriate government agency at the time of the domain name
registration;
b. Identical or in any way similar with the name of a person other than the
registrant, in case of a personal name, and
c. Acquired without right or with intellectual property interests in it.
2. Computer-related Offenses. This includes the following:
a. Computer-related Forgery. This refers to the following:
• The input, alteration, or deletion of computer data without right resulting in
inauthentic data with the intent that it be considered or acted upon for legal
purposes as if it were authentic, regardless whether or not the data is directly
readable and intelligible; or
• The act of knowingly using computer data which is the product of computer-
related forgery as defined here, for the purpose of perpetuating a fraudulent
or dishonest design.
This module is created under the Department of Natural Science of University of Makati. Your use of this material constitutes acceptance of that license and the
conditions of use of materials.
Penalty
Any person found guilty of any of the punishable acts enumerated shall be punished with
imprisonment of arresto mayor (1 month and 1 day to 6 months imprisonment) or a fine of at least
Fifty thousand pesos (P50,000) but not exceeding Two hundred fifty thousand pesos (P250,000)
or both.
Cybercrimes
Learning Activity No.
1. Cybercrime
This module is created under the Department of Natural Science of University of Makati. Your use of this material constitutes acceptance of that license and the
conditions of use of materials.
2. Softlifting
3. Cyberextortion
4. Phishing
5. Virus
E. CONCEPT MAPPING. On the space below, draw, create a concept map on cybercrimes
using circle and squares or rectangles. Use back page if necessary.