You are on page 1of 27

CYBERCRIME AND ITS

TYPES

Cybercrime
A cybercrime is a crime committed with or
through the use of information and
communication technologies such as
radio, television, cellular phone, computer
and network, and other communication
device or application.

How is a cybercrime different


from a real-world crime?
The main difference between a cybercrime
and crime committed in the physical world
is that cybercrime is committed with or
through the use of information and
communication technology. Furthermore,
cybercrimes are punishable under special
cybercrime laws and subject to distinct law
enforcement provisions.

What are the types of


cybercrime?
There are various types and kinds of cybercrimes.
The 2001 Budapest Convention on Cybercrime
categorizes cybercrime offenses into four:
(1) offences against the confidentiality, integrity
and availability of computer data and systems;
(2) computer-related offences;
(3) content-related offences; and
(4) offences related to infringements of copyright
and related right

IDENTITY THEFT
knowingly transfers, possesses, or uses,
without lawful authority, a means of
identification of another person with the
intent to commit, or to aid or abet, or in
connection with, any unlawful activity that
constitutes a violation of law, or that
constitutes a felony under any applicable
law

IDENTITY THEFT
identity theft may make possible crimes
such as bank fraud, document fraud, or
immigration fraud, and it may be aided by
crimes such as theft in the form of robbery
or burglary

CYBERBULLYING
Cyberbullying involves the use of
information and communication
technologies such as e-mail, cell
phone and pager text messages,
instant messaging (IM),
defamatory personal Web sites,
and defamatory online personal
polling Web sites, to support
deliberate, repeated, and hostile
behaviour by an individual or
group, that is intended to harm
others.

ONLINE HARASSMENT
It refers to the use of the Internet, e-mail or
other electronic devices to pursue another
person. It involves sending unwanted,
abusive, threatening or obscene e-mails.
Another means involves electronic sabotage
or spamming where the victim is sent
hundreds of junk e-mail messages. A variant
of spamming involves the sending of
computer viruses to the victim. The third
common form arises in live Internet relay chat
sessions, message boards or news groups or
by way of instant messaging.

ONLINE SEXUAL HARASSMENT


It is the unwanted contact of a personal
nature, or other conduct based on sex
affecting the dignity of men and women at
work which include unwelcome physical,
verbal or non-verbal conduct.

ONLINE SEXUAL HARASSMENT


The first is direct, for example, by the use of email in sending harassing messages to the
victim. The second is indirect whereby a hostile
workplace is created from the victims
perspective. This may arise by the circulation,
for example, of sexually harassing e-mails
between employees, or the distribution of
sexually explicit material by computer

CYBERSTALKING
Cyberstalking may arise where an
individual pursues or repeatedly attempts
to contact someone via the Internet. The
Internet provides a number of protocols
by way of which this may happen, such
as e-mail, chat rooms, instant
messaging, bulletin boards, website
discussion forums or user net groups.
The distinction between harassment and
cyberstalking is that cyberstalking is
characterised by pursuit and fear.

SEXUAL PREDATION
Online molesters use the Internet
venues popular with children and
adolescents to lure children into sexual
assaults.
They use information publicly divulged
in online profiles and social networking
sites to identify potential targets.
They contact victims, using deception
to cover up their ages and sexual
intentions.
Then they entice unknowing victims
into meetings or stalk and abduct them

SEXUAL PREDATION
A sex offender who commit a sexually violent
offence online e.g., rape, criminal sexual act,
forcible compulsion, insertion of foreign object or
fingers in anal or urogenital regionsand who
suffers from a mental abnormality or personality
disorder that makes him or her likely to engage
in predatory sexually violent offences.

PHISHING
Phishing is a form of social engineering in which an attacker,
also known as a phisher, attempts to fraudulently retrieve
legitimate users confidential or sensitive credentials by
mimicking electronic communications from a trustworthy or
public organization in an automated fashion.
The word phishing appeared around 1995, when Internet
scammers were using email lures to fish for passwords and
financial information from the sea of Internet users; ph is a
common hacker replacement of f, which comes from the
original form of hacking, phreaking on telephone switches
during 1960s.

PHISHING
A complete phishing attack involves three roles of phishers.
Firstly, mailers send out a large number of fraudulent
emails (usually through botnets), which direct users to
fraudulent websites.
Secondly, collectors set up fraudulent websites (usually
hosted on compromised machines), which actively prompt
users to provide confidential information.
Finally, cashers use the confidential information to achieve
a pay-out. Monetary exchanges often occur between those
phishers.

TYPES OF PHISHING
Clone Phishing
In this type phisher creates a cloned email. He
does this by getting information such as content
and recipient addresses from a legitimate email
which was delivered previously, then he sends the
same email with links replaced by malicious ones.
He also employs address spoofing so that the
email appears to be from the original sender. The
email can claim to be a re-send of the original or
an updated version as a trapping strategy

TYPES OF PHISHING
Spear Phishing
Spear phishing targets at a specific group. So
instead of casting out thousands of emails
randomly, spear phishers target selected groups
of people with something in common, for
example people from the same organization.

TYPES OF PHISHING
Phone Phishing
This type of phishing refers to messages that claim to be
from a bank asking users to dial a phone number regarding
problems with their bank accounts. Traditional phone
equipment has dedicated lines, so Voice over IP, being easy
to manipulate, becomes a good choice for the phisher. Once
the phone number, owned by the phisher and provided by a
VoIP service, is dialed, voice prompts tell the caller to enter
her account numbers and PIN. Caller ID spoofing, which is
not prohibited by law, can be used along with this so that the
call appears to be from a trusted source.

CYBERCRIME IN THE PHIL


In a 2010 report of the security software firm
Symantec, 87% of Filipino internet users were
identified as victims of crimes and malicious
activities committed online.
The following activities were: (1) malware (virus
and Trojan) invasion; (2) online or phishing
scams; (3) sexual predation; and (4) services in
social networking site like Facebook and Twitter.

CYBERCRIME IN THE PHIL


The Anti-Transnational Crime Division (ATCD) of
the Criminal Investigation and Detection Group
(CIDG) of the Philippine National Police (PNP)
has encountered 2,778 referred cases of
computer crimes from government agencies and
private individuals nationwide from 2003 to
2012.

CYBERCRIME IN THE PHIL


(1) RA 10175 Cybercrime Prevention Act of 2012
(2) RA 9995 - Anti-Photo and Voyeurism Act of 2009;
(3) RA 9725 - Anti-Child Pornography Act of 2009;
(4) RA 9208 - Anti-Trafficking in Persons Act of 2003;
(5) RA 8792 - E-Commerce Act of 2000;
(6) RA 8484 - Access Device Regulation Act of 1998;
(7) RA 4200 or AntiWiretapping Law.

You might also like