You are on page 1of 34

RA 10175 ALSO KNOWN AS

“CYBERCRIME PREVENTION ACT OF 2012”

CHAPTER IV
ENFORCEMENT AND IMPLEMENTATION

Section 10. Law Enforcement Authorities. — The National Bureau


of Investigation (NBI) and the Philippine National Police (PNP)
shall be responsible for the efficient and effective law enforcement
of the provisions of this Act. The NBI and the PNP shall organize a
cybercrime unit or center manned by special investigators to
exclusively handle cases involving violations of this Act.
The PNP Anti-Cybercrime Group
• PNP – ACG was activated on MARCH 20, 2013:

Criminal
Investigation and
Detection Group
(CIDG)

ATCCD

Authority:
NAPOLCOM RESOLUTION NO. 2013-220 dated February 27, 2013; and
GENERAL ORDER NO. DPL-12-09 dated February 27, 2013.
PNP ACG Presence Nationwide

RACU 1
RACU COR RACU 2

RACU 3
ACG HQ
RACU 4A
RACU 5

RACU 8
RACU 6
RACU 7

RACU 10
RACU 11
RACU 9
RACU 12
Limitations/Challenges

Fast Emerging Technology Anonymity on the Internet Cross-border Jurisdiction

Free Data Encryption Sim Cards and Mobile Legal Limitation


Technology Phones
Internet Use in the Philippines

 96% of 12-17 years-old are internet users


 79% go online at least once a day
 Most common barrier to effective internet
access was slow connection or poor signal
 95% of children use smartphones to go online
 72% of caregivers are internet users

Source: ECPAT/INTERPOL/UNICEF
WHY WE GO ONLINE?
Search Shopping Games
Music Movies E-Mails
Uploading Video Calls Chat
Downloading
Cybercrime is an activity done
using computers and internet. We
can say that it is an unlawful act
wherein the computer either as a
tool or target or both.
What is Cybercrime?
A computer or a network of
computers used as a tool in the
commission of cybercrime.

The targets:
* Another computer or network of
computers
* Information
* Another person, natural or juridical
“CYBERCRIME PREVENTON ACT
of 2012”
An act defining cybercrime, providing
for the prevention, investigation,
suppression and the imposition of penalties
therefor and for other purposes
Against the computer
The computer and/or contained data is the
objective
 Using the Computer
The computer and/or contained data is the
method
 Within the Computer
The data (content) is the object
Within the Computer
Child Abuse Materials
Pornography
Cyber- bullying
Child Grooming
Hate crime
ATTRIBUTES OF CYBERCRIME
UNLIMITED NUMBERS OF POTENTIAL
VICTIMS AND
ANONIMITY!!!
Because of :
• Anonymity
• Weakness in Operation System
• Lack of user Awareness
• Negligence of user
CATEGORIES OF CYBERCRIME
1. CYBERCRIME OFFENSES
Is a computer crime that requires the expertise of a highly
skilled and well knowledgeable person or group of person in the
field of Information and Communication Technology (ICT).
 HACKING OR ILLEGAL ACCESS (email, Facebok,
etc) Violation:
 PHISHING Sec. 4 of RA 10175
 IDENTITY THEFT –CYBERCRIME
 ONLINE LIBEL OFFENSES
 CYBER SEX
 Online Sexual Exploitation and abuse of Children
(OSEC)
2. CYBER-RELATED CRIMES

- Is a crime (Traditional) wherein the used


of Information and Communication
Technology is ESSENTIAL for its
commission.
CYBER-RELATED CRIMES
 Theft
 Robbery
INFORMATION AND
 Libel
COMMUNICATION
 Illegal Gambling TECHNOLOGY
(Online Games, e-sabong) (ICT)
 Estafa / Swindling
 Deceit
 Obscene Publication/
Indecent Shows
 Prostitution
 Trespassing
 Threat/ Coercion
Traditional Crime vs Cybercrime

Photo source: The Markle


Paradigm Shift

vs
Traditional Crime Cybercrime
LIBEL Online LIBEL
Deceptive Callers E-mail Phishing
Robbery Extortion Sex Extortion
Estafa Internet/Fraud Scam
Bullying CYBER BULLYING
Vandalism Web Defacement
DIFFERENCE…….
TRADITIONAL CRIME CYBERCRIME
Crime Against Person, Property Committed through the use of ICT

Tangible Pieces of Evidence are intangible


Simple to recognize and collect Hard to collect evidence it has to go
through deeper online investigation
and forensic analysis

Suspect’s location can easily be identified Target Rich Environment

Identifiable Anonymity
Easy if witnesses are available Hard to prosecute
PENALTIES

You might also like