You are on page 1of 76

MODULE

LEGENDS
BANG BANG
JESSA MAE C. PANOY,
RCRIM

0086

CRI 327/L

INTRO. TO CYBERCRIME
DIGITAL DEVICES

What is Digital device?

- It is a piece of physical equipment that uses digital data, such as by sending,


receiving, storing or processing it.

- We rely on them in our personal and work lives for all sorts of reasons. This
could be for getting directions, doing our shopping, entertaining ourselves,
managing our business stock and finances, or a great many other reasons.
DIGITAL DEVICES

DIGITAL DEVICE COMPONENTS

Basic components used in any


digital system:
DIGITAL DEVICES

DIGITAL DEVICE COMPONENTS

• Datapath – The core - all other


components are support units that store
either the results of the data path or
determine what happens in the next
cycle.

• Memory - most essential component for


the normal functioning of any system –
to store data, to perform calculations, to
do complex operations, etc.
DIGITAL DEVICES

DIGITAL DEVICE COMPONENTS


• Control - accepts physical inputs from
external source and pairs this
information with computer controlled
instructions to perform specific
functions.

• Input – Output - hardware that sends or


receives these digital signals. DIO
devices are usually built around simple
relays such as reed relays. These relays
are normally open but close when
power is sent to them.
DIGITAL DEVICES

COMMON TYPES OF DIGITAL DEVICES:

1. Personal Computers - These types of digital devices are capable of performing


most common computing tasks. Personal computers contain individual processors,
ram & hard disk components, along with expansion ports. Examples of personal
computers include desktops & laptops.
DIGITAL DEVICES

COMMON TYPES OF DIGITAL DEVICES:

2. Servers – refers to a computer that manages access to different resources and


services over a network. As a device, servers are actually very similar to personal
computers. However, they commonly contain a larger storage capacity, higher
processing power and larger amount of memory. Though not necessarily always.
Examples of servers include web servers, mail servers, file servers and print
servers.
DIGITAL DEVICES

COMMON TYPES OF DIGITAL DEVICES:

3. Mobile Devices - A computing device that is designed to be portable by being


compact, light-weight and capable of running for extended periods on battery
power. They’re also almost always capable of connecting to the internet wirelessly,
either through mobile broadband or Wi-Fi. Examples of mobile devices include
tablets and smartphones.
DIGITAL DEVICES

COMMON TYPES OF DIGITAL DEVICES:

4. Entertainment System - Computing devices that are designed to entertain,


such as watching television, listening to music and playing video games. Examples
of entertainment systems include digital media players, mp3 players & video
game consoles.
DIGITAL DEVICES

COMMON TYPES OF DIGITAL DEVICES:

5. Navigation System - This is a digital device that uses GPS (Global Positioning
System) to provide a real-time map of our current location, as well as including
route planning tools to give us directions to a chosen destination. An example of a
navigation system is an in-car satnav.
COMPUTER SYSTEM AND ITS FUNCTIONS

COMPUTER SYSTEM

The investigation of cybercrime entails the examination of the digital device,


more importantly the computer. The computer contains of the information needed
by the digital investigative analysts to determine how the act of cybercrime was
committed.
COMPUTER SYSTEM AND ITS FUNCTIONS

BASIC PARTS OF COMPUTER

1. CASE - Computers would not last long without a


case because it protects the internal components from
damage, dirt, and moisture. But beyond holding the guts
of the computer, the case is an important facet of the
device. The case provides the interface between the
device, the user, and the outside world. For example, a
case might include a view-only screen, touch screen,
keyboard, microphone, as well as physical ports for a
keyboard, monitor, mouse, power supply, and data
exchange
COMPUTER SYSTEM AND ITS FUNCTIONS

BASIC PARTS OF COMPUTER

2. Power source
Computers need electricity to operate, and that means
they need power from an internal battery, from an
electrical outlet, or both. Portable devices like laptops,
tablets, and smartphones rely upon battery power, with
periodic charging. Desktop computers need to be
plugged into an electrical outlet, but also have a small
battery to retain a tiny amount of data, such as the time
and date, and to keep the internal clock running
COMPUTER SYSTEM AND ITS FUNCTIONS

BASIC PARTS OF COMPUTER


3. Motherboard
- The motherboard is an important computer component
because it is where everything else connects to. The
motherboard is a decently sized circuit board that lets
other components communicate. A motherboard has
ports that face outside a PC’s case, so you can charge your
computer, plug in a monitor, or connect a mouse. A
computer’s motherboard also contains slots for
expansions, so you can add additional accessory ports if
you wish.
COMPUTER SYSTEM AND ITS FUNCTIONS

BASIC PARTS OF COMPUTER


3. Processors (Central Processing Unit)
The work of a computer is done through computer
processors, also known as central processing units (CPUs).
These are computer chips, or groups of chips, that do the
thinking (the massive number of binary calculations) of the
computer necessary to run all programs. The CPU is attached
to the computer’s motherboard, the central piece of circuitry
that connects the device’s many chips and electronic
components
COMPUTER SYSTEM AND ITS FUNCTIONS

BASIC PARTS OF COMPUTER

5. Memory (ROM and RAM)

a. Read-Only Memory (ROM)

Read-only memory computer chips store firmware


programs that holds the instructions to power up or
boot, the computer to control the DVD drives, hard disk
drives and graphic cards. ROM also known as flash
memory and is considered non-volatile memory.
COMPUTER SYSTEM AND ITS FUNCTIONS

BASIC PARTS OF COMPUTER

5. Memory (ROM and RAM)

b. Random Access Memory (RAM)

A computer relies on a type of memory – known as


temporary or volatile storage – to perform most
functions. This volatile storage is also called Random
Access Memory (RAM). Typically, RAM is found within
computer chips that store the data as electrical charges.
COMPUTER SYSTEM AND ITS FUNCTIONS

BASIC PARTS OF COMPUTER

5. Memory (ROM and RAM)

b. Random Access Memory (RAM)

RAM chips are connected to the motherboard of the


computer, along with the CPU. RAM is volatile and
temporary because, when the power is turned off, RAM
is discharged, and the contents are lost. RAM is fast and
is used by computers to load both
the programs the user runs, as well as the data those
programs access
COMPUTER SYSTEM AND ITS FUNCTIONS

BASIC PARTS OF COMPUTER

6. Persistent storage (HDD/SSD)

Persistent (long-term) storage holds data stored in the


computer even after the power is disconnected.
Persistent storage mechanisms include hard disk drives
(HDD) and solid-state drives (SSD). HDDs were the
standard method for persistent data storage for many
years. These drives have spinning disks or platters
divided into smaller sectors, then ultimately into bit-
sized storage units, each of which holds a magnetic
charge holding the bit value
COMPUTER SYSTEM AND ITS FUNCTIONS

BASIC PARTS OF COMPUTER

6. Persistent storage (HDD/SSD)

SSDs are a newer type of storage drive. These drives do


not have any moving parts, but rather are computer
chips that store the data as electrical charges. Due to
massive speed and reliability improvements, SSDs are
fast becoming the standard for commercial use
COMPUTER SYSTEM AND ITS FUNCTIONS

BASIC PARTS OF COMPUTER

7. Interfaces for input and output with user

Users (whether a victim, evidence gatherer, or cybercriminal) must be able to


communicate with computers. Users send and receive information to
computers through mechanisms like the keyboard, mouse, monitor,
microphone, and speakers.
COMPUTER SYSTEM AND ITS FUNCTIONS

BASIC PARTS OF COMPUTER

8. Network interface controller (NIC) for communicating


with other computers

Computers also need to be able to communicate with one


another, and this communication is principally accomplished
through a network interface controller (NIC). This controller
used to be called a network interface card, because it was a
separate card plugged into the computer’s motherboard, but
today this function typically is integrated with the computer
motherboard
COMPUTER SYSTEM AND ITS FUNCTIONS

BASIC PARTS OF COMPUTER

9. External Storage and servers.

Beyond a computer’s internal storage, a user might store


data by connecting to external storage devices and other
computers. Some common external storage devices are
external hard drives, flash drives (thumb drives), or more
complicated storage devices, such as network-attached
storage, servers like google drive, Microsoft, and iCloud for
Macintosh
COMPUTER SYSTEM AND ITS FUNCTIONS

BASIC PARTS OF COMPUTER


10. Computer software

Refers to a series of instructions that performs a particular task. More specifically,


software is the interpretation of binary byte sequences represented by a listing of
instructions to the processors. Computer hardware is useless without software as it
cannot move, manipulate data, or receive input. Without instructions, hardware is
just an oversized paperweight—having no known tasks, functions, or capabilities.
Software is not only necessary to tell the components within a system what to do
and how to act, it is also necessary to tell it how to interact with user
COMPUTER SYSTEM AND ITS FUNCTIONS

BASIC PARTS OF COMPUTER


There are main types of software or instruction sets.
 
a. Boot sequence instructions - refers to the series of
steps taken by a computer immediately upon powering on
which are necessary before it is usable. Receiving its name
from “pulling itself up by its bootstraps,” the boot
sequence is contained in low-level data stored in a small
memory chip on the motherboard, known as the CMOs.
This set of instructions tells the computer in which order
to access drives and provides basic hardware information.
COMPUTER SYSTEM AND ITS FUNCTIONS

BASIC PARTS OF COMPUTER


There are main types of software or instruction sets.
 
b. Operating System (OS) - is a piece of software that runs user
applications and provides an interface to the hardware.
Traditionally, almost all personal computers except for
Macintosh products contained some version of DOS. The
original DOS predated hard drives and was contained on a
floppy disk. Users would place the floppy in the drive and load
the instructions manually. As there were no graphics available at
that time, DOS was simply a series of text-based instruction.
Because the process was manual, users had to enter the
commands exactly. Some of the known OS are Microsoft
Windows, Macintosh (Mac) and Linux
COMPUTER SYSTEM AND ITS FUNCTIONS

BASIC PARTS OF COMPUTER


There are main types of software or instruction sets.
 
c. Application software - application software is
prepackaged instructions which allow users to perform a
variety of functions, including but not limited to word
processing, statistical analysis, and the like. In fact, existing
software packages are all but limited to a user’s
imagination. Among other things, individual users can play
games, create masterpieces, file taxes, and develop house
plans. Some commonly used applications (or “apps”) are
Microsoft’s outlook, Word, PowerPoint, and Excel, and
Apple’s Mail, Pages, and numbers.
Cybercrime offenses (sec 4,5, and 6 R.A. 10175) and duties of Law
Enforcement Agencies

Cybercrime offenses and Cybercrime


warrants

• Republic Act no. 10175 known as the “The Cybercrime Prevention Act of 2012” is the
one of the first law in the Philippines which specifically criminalizes computer crime,
which prior to the passage of the law had no strong legal precedent in Philippine
jurisprudence

• While laws such as the Electronic Commerce Act of 2000 Republic Act No. 8792
regulated certain computer-related activities, these laws did not provide a legal basis for
criminalizing crimes committed on a computer in general: for example, Onel de Guzman,
the computer programmer charged with purportedly writing the ILOVEYOU computer
worm, was ultimately not prosecuted by Philippine authorities due to a lack of legal
basis for him to be charged under existing Philippine laws at the time of his arrest.
Cybercrime offenses (sec 4,5, and 6 R.A. 10175) and duties of Law
Enforcement Agencies

REPUBLIC ACT NO. 10175 PUNISHABLE


ACTS:
Punishable Acts Penalty
SECTION 4. CYBERCRIME OFFENSES
A. Offenses Against the Confidentiality, Integrity and Availability (CIA)
of computer data and systems

1. ILLEGAL ACCESS – the access to the whole or any part


of a computer system without right. 1. Imprisonment of six years
and 1 day up to 12 years) or
Example: 2. Fine of at least Two hundred
a. Hacking: thousand pesos (P200,000)
• unauthorized access to up to a maximum amount
computer system commensurate to the
• Access that exceeds a person damage incurred or both
authorized limit
Cybercrime offenses (sec 4,5, and 6 R.A. 10175) and duties of Law
Enforcement Agencies
REPUBLIC ACT NO. 10175 PUNISHABLE
ACTS:
Punishable Acts Penalty
SECTION 4. CYBERCRIME OFFENSES
A. Offenses Against the Confidentiality, Integrity and Availability (CIA)
of computer data and systems
If committed against critical
2. ILLEGAL INTERCEPTION – the interception made by technical infrastructure:
means without right of any non-public transmission of 1. Imprisonment for twelve
computer data to, from, or within a computer system including years and one day up to
electromagnetic emissions from a computer system carrying twenty years) or
such computer data. 2. fine of at least Five hundred
  thousand pesos (P500,000)
up to a maximum amount
commensurate to the
damage incurred, or BOTH
Cybercrime offenses (sec 4,5, and 6 R.A. 10175) and duties of Law
Enforcement Agencies

REPUBLIC ACT NO. 10175 PUNISHABLE ACTS:


Punishable Acts Penalty
SECTION 4. CYBERCRIME OFFENSES
A. Offenses Against the Confidentiality, Integrity and Availability (CIA)
of computer data and systems
2. ILLEGAL INTERCEPTION – If committed against critical
Provided, however, That it shall not be unlawful for an officer, infrastructure:
employee, or agent of a service provider, whose facilities are used in 1. Imprisonment for twelve
the transmission of communications, to intercept, disclose or use that years and one day up to
communication in the normal course of employment, while engaged in
any activity that is necessary to the rendition of services or to the twenty years) or
protection of the rights or property of the service provider, except that 2. fine of at least Five hundred
the latter shall not utilized service observing or random monitoring thousand pesos (P500,000)
other than for purposes of mechanical or transmission of virus. up to a maximum amount
commensurate to the
damage incurred, or BOTH
Cybercrime offenses (sec 4,5, and 6 R.A. 10175) and duties of Law
Enforcement Agencies

REPUBLIC ACT NO. 10175 PUNISHABLE ACTS:


Punishable Acts Penalty
SECTION 4. CYBERCRIME OFFENSES
A. Offenses Against the Confidentiality, Integrity and Availability (CIA)
of computer data and systems
2. ILLEGAL INTERCEPTION –
If committed against critical
Example: infrastructure:
c. use packet sniffing software and 1. Imprisonment for twelve
hardware to monitor network years and one day up to
traffic and intercept those packets twenty years) or
someone is interested in. 2. fine of at least Five hundred
thousand pesos (P500,000)
d. “man-in-the-middle attack - which up to a maximum amount
enables an offender to eavesdrop commensurate to the
on communications between the damage incurred, or BOTH
sender and receiver
Cybercrime offenses (sec 4,5, and 6 R.A. 10175) and duties of Law
Enforcement Agencies

REPUBLIC ACT NO. 10175 PUNISHABLE ACTS:


Punishable Acts Penalty
SECTION 4. CYBERCRIME OFFENSES
A. Offenses Against the Confidentiality, Integrity and Availability (CIA)
of computer data and systems
2. ILLEGAL INTERCEPTION –

“Man-in-the middle” attack - is a type of eavesdropping


attack that occurs when a malicious actor inserts himself as a
relay/proxy into a communication session between people or
systems.
Cybercrime offenses (sec 4,5, and 6 R.A. 10175) and duties of Law
Enforcement Agencies

REPUBLIC ACT NO. 10175 PUNISHABLE ACTS:


Punishable Acts Penalty
SECTION 4. CYBERCRIME OFFENSES
A. Offenses Against the Confidentiality, Integrity and Availability (CIA)
of computer data and systems
1. Imprisonment of six
years and 1 day up to
12 years) or
3. DATA INTERFERENCE – the intentional or reckless
alteration, damaging, deletion or deterioration of 2. Fine of at least Two
hundred thousand
computer data, electronic document, or electronic
pesos (P200,000) up
data message, without right, including the to a maximum amount
introduction or transmission of viruses. commensurate to the
damage incurred or
both
Cybercrime offenses (sec 4,5, and 6 R.A. 10175) and duties of Law
Enforcement Agencies

REPUBLIC ACT NO. 10175 PUNISHABLE ACTS:


Punishable Acts Penalty
SECTION 4. CYBERCRIME OFFENSES
A. Offenses Against the Confidentiality, Integrity and Availability (CIA)
of computer data and systems
4. SYSTEM INTERFERENCE – the intentional 1. imprisonment for
twelve years and one
alteration, or reckless hindering or interference with day up to twenty years)
the functioning of a computer or computer network or
by inputting, transmitting, damaging, deleting, 2. fine of at least Five
hundred thousand
deteriorating, altering or suppressing computer data pesos (P500,000) up
or program, electronic document or electronic data to a maximum amount
message, without right or authority, including the commensurate to the
introduction or transmission of viruses. damage incurred, or
BOTH
Cybercrime offenses (sec 4,5, and 6 R.A. 10175) and duties of Law
Enforcement Agencies

REPUBLIC ACT NO. 10175 PUNISHABLE ACTS:


Punishable Acts Penalty
SECTION 4. CYBERCRIME OFFENSES
A. Offenses Against the Confidentiality, Integrity and Availability (CIA)
of computer data and systems
1. imprisonment for
4. SYSTEM INTERFERENCE – twelve years and one
day up to twenty years)
or
Example: 2. fine of at least Five
hundred thousand
a. an example of system interference is a pesos (P500,000) up
to a maximum amount
denial of service attack (or Dos attack). commensurate to the
damage incurred, or
b. upload of malware like ransomware. BOTH
Cybercrime offenses (sec 4,5, and 6 R.A. 10175) and duties of Law
Enforcement Agencies

REPUBLIC ACT NO. 10175 PUNISHABLE ACTS:


Punishable Acts Penalty
SECTION 4. CYBERCRIME OFFENSES
A. Offenses Against the Confidentiality, Integrity and Availability (CIA)
of computer data and systems

5. MISUSE OF DEVICES – committed through any of 1. Imprisonment of six


years and 1 day up to
the following acts: 12 years) or

(i) The use, production, sale, procurement, 2. a fine, not more than
importation, distribution or otherwise Five Hundred Thousand
making available, intentionally and without Pesos (P500,000.00),
or both
right, of any of the following:
Cybercrime offenses (sec 4,5, and 6 R.A. 10175) and duties of Law
Enforcement Agencies

REPUBLIC ACT NO. 10175 PUNISHABLE ACTS:


Punishable Acts Penalty
SECTION 4. CYBERCRIME OFFENSES
A. Offenses Against the Confidentiality, Integrity and Availability (CIA)
of computer data and systems
If committed against
5. MISUSE OF DEVICES – committed through any of critical infrastructure:
the following acts:
1. imprisonment for twelve years and one
day up to twenty years)or
aa. device, including a computer program, designed
2. fine of at least Five hundred thousand
or adapted primarily for the purpose of pesos (P500,000) up to a maximum amount
committing any of the offenses commensurate to the damage incurred, or
under this rule; or both
Cybercrime offenses (sec 4,5, and 6 R.A. 10175) and duties of Law
Enforcement Agencies

REPUBLIC ACT NO. 10175 PUNISHABLE ACTS:


Punishable Acts Penalty
SECTION 4. CYBERCRIME OFFENSES
A. Offenses Against the Confidentiality, Integrity and Availability (CIA)
of computer data and systems
If committed against
5. MISUSE OF DEVICES – committed through any of critical infrastructure:
the following acts:
1. imprisonment for twelve years and one
day up to twenty years)or
bb. a computer password, access code, or similar data by which
the whole or any part of a computer system is capable of 2. fine of at least Five hundred thousand
being accessed with the intent that it be used for the purpose pesos (P500,000) up to a maximum amount
commensurate to the damage incurred, or
of both
committing any of the offenses under this rules.
Cybercrime offenses (sec 4,5, and 6 R.A. 10175) and duties of Law
Enforcement Agencies

REPUBLIC ACT NO. 10175 PUNISHABLE ACTS:


Punishable Acts Penalty
SECTION 4. CYBERCRIME OFFENSES
A. Offenses Against the Confidentiality, Integrity and Availability (CIA)
of computer data and systems
If committed against
5. MISUSE OF DEVICES – committed through any of critical infrastructure:
the following acts:
1. imprisonment for twelve years and one
day up to twenty years)or
(ii)
The possession of an item referred to in
2. fine of at least Five hundred thousand
subparagraphs 5(i)(aa) or (bb) above, with the intent pesos (P500,000) up to a maximum amount
to use said devices for the purpose of committing any commensurate to the damage incurred, or
of the offenses under this section. both
Cybercrime offenses (sec 4,5, and 6 R.A. 10175) and duties of Law
Enforcement Agencies

REPUBLIC ACT NO. 10175 PUNISHABLE ACTS:


Punishable Acts Penalty
SECTION 4. CYBERCRIME OFFENSES
A. Offenses Against the Confidentiality, Integrity and Availability (CIA)
of computer data and systems

5. MISUSE OF DEVICES – committed through any of


the following acts: Example:

a. selling of hacking program like low orbit


Provided, that no criminal liability shall attach when the use, ion cannon (LOIC)
production, sale, procurement, importation, distribution,
otherwise making available, or possession of computer devices b. Buying a password of computer system of
or data referred to in this section is for the authorized testing of banks
a computer system
Cybercrime offenses (sec 4,5, and 6 R.A. 10175) and duties of Law
Enforcement Agencies

REPUBLIC ACT NO. 10175 PUNISHABLE ACTS:


Punishable Acts Penalty
SECTION 4. CYBERCRIME OFFENSES
A. Offenses Against the Confidentiality, Integrity and Availability (CIA)
of computer data and systems

6. CYBERSQUATTING - the acquisition of a domain name over


1. Imprisonment of 6 years and 1 day up to
the internet in bad faith to profit, mislead, destroy reputation,
12 years) or
and deprive others from registering the same, if
such a domain name is: 2. Fine of at least Two hundred thousand
pesos (P200,000) up to a maximum
(i) similar, identical, or confusingly similar to an existing amount commensurate to the
trademark registered with the appropriate government agency damage incurred
at the time of the domain name registration
Cybercrime offenses (sec 4,5, and 6 R.A. 10175) and duties of Law
Enforcement Agencies

REPUBLIC ACT NO. 10175 PUNISHABLE ACTS:


Punishable Acts Penalty
SECTION 4. CYBERCRIME OFFENSES
A. Offenses Against the Confidentiality, Integrity and Availability (CIA)
of computer data and systems

6. CYBERSQUATTING –
1. Imprisonment of 6 years and 1 day up to
12 years) or
(ii) identical or in any way similar with the name of a
person other than the registrant, in case of a 2. Fine of at least Two hundred thousand
personal name pesos (P200,000) up to a maximum
amount commensurate to the
damage incurred
(iii) acquired without right or with intellectual
property interests in it.
Cybercrime offenses (sec 4,5, and 6 R.A. 10175) and duties of Law
Enforcement Agencies

REPUBLIC ACT NO. 10175 PUNISHABLE ACTS:


Punishable Acts Penalty
SECTION 4. CYBERCRIME OFFENSES
B. COMPUTER RELATED OFFENSES

1. COMPUTER RELATED FORGERY


1. Imprisonment of 6 years and 1 day up to
12 years) or
a. the input, alteration or deletion of any computer data
without right, resulting in inauthentic data, with the intent 2. Fine of at least Two hundred thousand
that it be considered or acted upon for legal purposes as if pesos (P200,000) up to a maximum
it were authentic, regardless whether or not the data is amount commensurate to the
directly readable and intelligible; or damage incurred or both.
Cybercrime offenses (sec 4,5, and 6 R.A. 10175) and duties of Law
Enforcement Agencies

REPUBLIC ACT NO. 10175 PUNISHABLE ACTS:


Punishable Acts Penalty
SECTION 4. CYBERCRIME OFFENSES
B. COMPUTER RELATED OFFENSES

1. COMPUTER RELATED FORGERY


1. Imprisonment of 6 years and 1 day up to
12 years) or
b. the act of knowingly using computer data, which is
the product of computer-related forgery as defined 2. Fine of at least Two hundred thousand
pesos (P200,000) up to a maximum
herein, for amount commensurate to the
the purpose of perpetuating a fraudulent or damage incurred or both.
dishonest design.
 
Cybercrime offenses (sec 4,5, and 6 R.A. 10175) and duties of Law
Enforcement Agencies

REPUBLIC ACT NO. 10175 PUNISHABLE ACTS:


Punishable Acts Penalty
SECTION 4. CYBERCRIME OFFENSES
B. COMPUTER RELATED OFFENSES

1. COMPUTER RELATED FORGERY


1. Imprisonment of 6 years and 1 day up to
Example: 12 years) or
a. sending of an email to targets with a website link for
users to click on, which might either download malware 2. Fine of at least Two hundred thousand
onto the users’ digital devices. pesos (P200,000) up to a maximum
amount commensurate to the
damage incurred or both.
b. sends users to a malicious website that is designed to
steal users’ credentials (phishing)
Cybercrime offenses (sec 4,5, and 6 R.A. 10175) and duties of Law
Enforcement Agencies

REPUBLIC ACT NO. 10175 PUNISHABLE ACTS:


Punishable Acts Penalty
SECTION 4. CYBERCRIME OFFENSES
B. COMPUTER RELATED OFFENSES

2. COMPUTER FRAUD - the unauthorized “Input,


alteration or deletion of computer data or program, or 1. imprisonment of 6 years and 1 day up to 12
years) or
interference in the functioning of a computer system,  
causing damage thereby with fraudulent intent:
2. Fine of at least Two hundred thousand pesos
(P200,000) up to a maximum amount
Example: commensurate to the damage incurred or both
a. online romance scam
b. Broiler room (share/stocks fraud)
Cybercrime offenses (sec 4,5, and 6 R.A. 10175) and duties of Law
Enforcement Agencies

REPUBLIC ACT NO. 10175 PUNISHABLE ACTS:


Punishable Acts Penalty
SECTION 4. CYBERCRIME OFFENSES
B. COMPUTER RELATED OFFENSES

1. imprisonment of 6 years and 1 day up to 12


  years) or
 

2. Fine of at least Two hundred thousand pesos


(P200,000) up to a maximum amount
commensurate to the damage incurred or both
Cybercrime offenses (sec 4,5, and 6 R.A. 10175) and duties of Law
Enforcement Agencies

REPUBLIC ACT NO. 10175 PUNISHABLE ACTS:


Punishable Acts Penalty
SECTION 4. CYBERCRIME OFFENSES
B. COMPUTER RELATED OFFENSES

3. COMPUTER – RELATED IDENTITY THEFT- the


1 1. imprisonment of 6 years and 1 day up to 12
intentional acquisition, use, misuse, transfer, years) or
possession, alteration or deletion of identifying  
information belonging to another, whether natural or 2. Fine of at least Two hundred thousand pesos
juridical, without right: (P200,000) up to a maximum amount
commensurate to the damage incurred or both
Cybercrime offenses (sec 4,5, and 6 R.A. 10175) and duties of Law
Enforcement Agencies

REPUBLIC ACT NO. 10175 PUNISHABLE ACTS:


Punishable Acts Penalty
SECTION 4. CYBERCRIME OFFENSES
C. CONTENT – RELATED OFFENSES
1. Imprisonment of 6 years and 1 day
1. CYBERSEX- up to 12 years) or

The willful engagement, maintenance, control, or 2. Fine of at least Two hundred


operation, directly or indirectly, of any lascivious thousand
exhibition of sexual organs or sexual activity, with the pesos (P200,000) up to a maximum
amount
aid of a computer system, for favor or consideration commensurate to the damage incurred
Cybercrime offenses (sec 4,5, and 6 R.A. 10175) and duties of Law
Enforcement Agencies

REPUBLIC ACT NO. 10175 PUNISHABLE ACTS:


Punishable Acts Penalty
SECTION 4. CYBERCRIME OFFENSES
C. CONTENT – RELATED OFFENSES

2. CHILD PORNOGRAPHY-
1. Punished in accordance with the penalties
set forth in Republic Act no. 9775 or the “Anti-
The unlawful or prohibited acts defined and Child Pornography Act of 2009”: provided, That
punishable by Republic Act no. 9775 or the Anti-Child the penalty to be imposed shall be one (1)
degree higher than that provided if committed
Pornography Act of 2009, committed through a with the use of ICT.
computer system.
Cybercrime offenses (sec 4,5, and 6 R.A. 10175) and duties of Law
Enforcement Agencies

REPUBLIC ACT NO. 10175 PUNISHABLE ACTS:


Punishable Acts Penalty
SECTION 4. CYBERCRIME OFFENSES
C. CONTENT – RELATED OFFENSES

2. CHILD PORNOGRAPHY-
1. Maximum period of prision
correctional (6month, 1day to 6year) to
The unlawful or prohibited acts defined and its prision
punishable by Republic Act no. 9775 or the Anti-Child mayor maximum period to prision
Pornography Act of 2009, committed through a mayor minimum period.
computer system.
Cybercrime offenses (sec 4,5, and 6 R.A. 10175) and duties of Law
Enforcement Agencies

REPUBLIC ACT NO. 10175 PUNISHABLE ACTS:


Punishable Acts Penalty
SECTION 4. CYBERCRIME OFFENSES
C. CONTENT – RELATED OFFENSES

3. LIBEL –
The unlawful or prohibited acts of libel, as defined in 1. Maximum period of prision
correctional (6month, 1day to 6year) to
Article 355 of the Revised Penal Code, as amended, its prision mayor maximum period to
committed through a computer system or any other prision mayor minimum
similar means which may be devised in the future period.
Cybercrime offenses (sec 4,5, and 6 R.A. 10175) and duties of Law
Enforcement Agencies

REPUBLIC ACT NO. 10175 PUNISHABLE ACTS:


Punishable Acts Penalty
SECTION 4. CYBERCRIME OFFENSES
C. CONTENT – RELATED OFFENSES

3. LIBEL – 2. Fine ranging from six Thousand


Pesos (P6,000.00) up to the maximum
Provided, that this provision applies only to the amount determined by Court, or both,
original author of the post or online libel, and not to in addition to the civil action which may
others who simply receive the post and react to it. be brought by the offended
party.
Cybercrime offenses (sec 4,5, and 6 R.A. 10175) and duties of Law
Enforcement Agencies

REPUBLIC ACT NO. 10175 PUNISHABLE ACTS:


Punishable Acts Penalty
SECTION 4. CYBERCRIME OFFENSES
C. CONTENT – RELATED OFFENSES

3. LIBEL –
Provided, that this provision applies
Provided, that this provision applies only to the only to the original author of the post
original author of the post or online libel, and not to or online libel, and not to others who
simply receive the post and
others who simply receive the post and react to it. react to it.
Cybercrime offenses (sec 4,5, and 6 R.A. 10175) and duties of Law
Enforcement Agencies

REPUBLIC ACT NO. 10175 PUNISHABLE ACTS:


Punishable Acts Penalty
SECTION 5. OTHER CYBERCRIME OFFENSES
OTHER OFFENSES:

a. Aiding or Abetting in the Commission of


Cybercrime. – 1. Imprisonment of one (1) degree lower than
that of the prescribed penalty for the offense,
Any person who willfully abets, aids, or financially or a fine of at least One Hundred Thousand
benefits in the commission of any of the offenses Pesos (P100,000.00) but not exceeding Five
enumerated in the Act shall be held liable, except Hundred Thousand Pesos (P500,000.00), or
both:
with respect to sections 4(c) (2) on Child Pornography
and 4(c)(4) on online libel.
Cybercrime offenses (sec 4,5, and 6 R.A. 10175) and duties of Law
Enforcement Agencies

REPUBLIC ACT NO. 10175 PUNISHABLE ACTS:


Punishable Acts Penalty
SECTION 5. OTHER CYBERCRIME OFFENSES
OTHER OFFENSES:

b. Attempt to Commit Cybercrime. – Any person


who willfully attempts to commit any of the offenses 1. Imprisonment of one (1) degree lower than
that of the prescribed penalty for the offense,
enumerated in the Act shall be held liable, except or a fine of at least One Hundred Thousand
with respect to sections 4(c) (2) on Child Pornography Pesos (P100,000.00) but not exceeding Five
and 4(c) (4) on online libel. Hundred Thousand Pesos (P500,000.00), or
both:
Cybercrime offenses (sec 4,5, and 6 R.A. 10175) and duties of Law
Enforcement Agencies

REPUBLIC ACT NO. 10175 PUNISHABLE ACTS:

SECTION 6. All crimes defined and penalized by the Revised Penal Code, as amended, and special laws, if
committed by, through and with the use of information and communications technologies shall be covered
by the relevant provisions of this Act:
 
Provided, That the penalty to be imposed shall be one (1) degree higher than that provided for by the
Revised Penal Code, as amended, and special laws, as the case may be.

 
SECTION 9. LAW ENFORCEMENT AUTHORITIES. – The National Bureau of Investigation (NBI) and the
Philippine National Police (PNP) shall be responsible for the efficient and effective law enforcement of the
provisions of the Act. The NBI and the PNP shall organize a cybercrime division or unit to be manned by
special Investigators to EXCLUSIVELY HANDLE CASES INVOLVING VIOLATIONS OF THE ACT.
Cybercrime offenses (sec 4,5, and 6 R.A. 10175) and duties of Law
Enforcement Agencies

REPUBLIC ACT NO. 10175 PUNISHABLE ACTS:


SECTION 10. POWERS AND FUNCTIONS OF LAW ENFORCEMENT AUTHORITIES. – The NBI and PNP cybercrime
unit or division shall have the following powers and functions:

1. Investigate all cybercrimes where computer systems are involved.

2. Conduct data recovery and forensic analysis on computer systems and other electronic evidence seized.

3. Formulate guidelines in investigation, forensic evidence recovery, and forensic data analysis consistent with
industry standard practices.

4. Provide technological support to investigating units within the PNP and NBI including the search, seizure,
evidence preservation and forensic recovery of data from crime scenes and systems used in crimes and provide
testimonies.
Cybercrime offenses (sec 4,5, and 6 R.A. 10175) and duties of Law
Enforcement Agencies

REPUBLIC ACT NO. 10175 PUNISHABLE ACTS:


SECTION 10. POWERS AND FUNCTIONS OF LAW ENFORCEMENT AUTHORITIES. – The NBI and PNP cybercrime
unit or division shall have the following powers and functions:

5. Develop public, private sector, and law enforcement agency relations in addressing cybercrimes.
 
6. Maintain necessary and relevant databases for statistical and/or monitoring purposes.

7. Develop capacity within their organizations in order to perform such duties necessary for the enforcement of
the Act.

8. Support the formulation and enforcement of the national cybersecurity plan; and

9. Perform other functions as may be required by the Act.


Cybercrime offenses (sec 4,5, and 6 R.A. 10175) and duties of Law
Enforcement Agencies

REPUBLIC ACT NO. 10175 PUNISHABLE ACTS:

SECTION 12. PRESERVATION AND RETENTION OF COMPUTER DATA. –

The integrity of traffic data and subscriber information shall be kept, retained and preserved by a
service provider for a minimum period of six (6) months from the date of the transaction. Content data
shall be similarly preserved for six (6) months from the date of receipt of the order from law
enforcement authorities requiring its preservation. law enforcement authorities may order a one-time
extension for another six (6) months.
Cybercrime offenses (sec 4,5, and 6 R.A. 10175) and duties of Law
Enforcement Agencies

REPUBLIC ACT NO. 10175 PUNISHABLE ACTS:


SECTION 13. COLLECTION OF COMPUTER DATA.

Law enforcement authorities, upon the issuance of a court warrant, shall be authorized to
collect or record by technical or electronic means, and the service providers are required to
collect or record by technical or electronic means and/or to cooperate and assist in the
collection or recording of computer data that are associated with specified communications
transmitted by means of a computer system.

The court warrant required under this section shall be issued or granted upon written
application, after the examination under oath or affirmation of the applicant and the
witnesses he may produce, and the showing that:
Cybercrime offenses (sec 4,5, and 6 R.A. 10175) and duties of Law
Enforcement Agencies

REPUBLIC ACT NO. 10175 PUNISHABLE ACTS:

SECTION 13. COLLECTION OF COMPUTER DATA.

1. There are reasonable grounds to believe that any of the crimes enumerated hereinabove
has been committed, is being committed or is about to be committed.

2. There are reasonable grounds to believe that the evidence that will be obtained is essential
to the conviction of any person for, or to the solution of, or to the prevention of any such
crimes.

3. There are no other means readily available for obtaining such evidence.
Cybercrime offenses (sec 4,5, and 6 R.A. 10175) and duties of Law
Enforcement Agencies

REPUBLIC ACT NO. 10175 PUNISHABLE ACTS:


SECTION 14. DISCLOSURE OF COMPUTER DATA –

Law enforcement authorities, upon securing a court warrant, shall issue an order requiring
any person or service provider to disclose or submit, within seventy-two (72) hours from
receipt of such order, subscriber’s information, traffic data or relevant data in his/its
possession or control, in relation to a valid complaint officially docketed and assigned for
investigation by law enforcement authorities, and the disclosure of which is necessary and
relevant for the purpose of investigation.

Law enforcement authorities shall record all sworn complaints in


their official docketing system for investigation.
Cybercrime offenses (sec 4,5, and 6 R.A. 10175) and duties of Law
Enforcement Agencies

REPUBLIC ACT NO. 10175 PUNISHABLE ACTS:

SECTION 16. CUSTODY OF COMPUTER DATA. –

All computer data, including content and traffic data, that are examined under a proper
warrant shall, within forty-eight (48) hours after the expiration of the period fixed therein, be
deposited with the court in a sealed package, and shall be accompanied by an affidavit of the
law enforcement authority executing it, stating the dates and times covered by the
examination, and the law enforcement authority who may have access to the deposit, among
other relevant data.
Cybercrime offenses (sec 4,5, and 6 R.A. 10175) and duties of Law
Enforcement Agencies

REPUBLIC ACT NO. 10175 PUNISHABLE ACTS:

SECTION 16. CUSTODY OF COMPUTER DATA. –

The law enforcement authority shall also certify that no duplicates or copies of the whole or
any part thereof have been made or, if made, that all such duplicates or copies are included in
the package deposited with the court. The package so deposited shall not be opened, or the
recordings replayed, or used in evidence, or their contents revealed, except upon order of the
court, which shall not be granted except upon motion, with due notice and opportunity to be
heard to the person or persons whose conversation or communications have been recorded
Cybercrime offenses (sec 4,5, and 6 R.A. 10175) and duties of Law
Enforcement Agencies

REPUBLIC ACT NO. 10175 PUNISHABLE ACTS:


SECTION 17. DESTRUCTION OF COMPUTER DATA. – upon expiration of the periods as
provided in Sections 12 and 15 hereof, or until the final termination of the case and/or as
ordered by the Court, as the case may be, service providers and law enforcement authorities,
as the case may be, shall immediately and completely destroy the computer data that are the
subject of a preservation and examination order or warrant.

SECTION 18. EXCLUSIONARY RULE - Any evidence procured without a valid warrant or beyond
the authority of the same shall be inadmissible for any proceeding before any court or
tribunal
Cybercrime offenses (sec 4,5, and 6 R.A. 10175) and duties of Law
Enforcement Agencies

REPUBLIC ACT NO. 10175 PUNISHABLE ACTS:


SECTION 21. JURISDICTION –

The Regional Trial Court shall have jurisdiction over any violation of the provisions of this Act
including any violation committed by a Filipino national regardless of_ the place of
commission. Jurisdiction shall lie if any of the elements was committed within the Philippines
or committed with the use of any computer system wholly or partly situated in the country, or
when by such commission any damage is caused to a natural or juridical person who, at the
time the offense was committed, was in the Philippines. There shall be designated special
cybercrime courts manned by specially trained judges to handle cybercrime cases.
Cybercrime offenses (sec 4,5, and 6 R.A. 10175) and duties of Law
Enforcement Agencies

REPUBLIC ACT NO. 10175 PUNISHABLE ACTS:

SECTION 23. DEPARTMENT OF JUSTICE (DOJ). - There is hereby created an Office of


Cybercrime within the DOJ designated as the central authority in all matters related to
international mutual assistance and extradition
CYBERCRIME WARRANTS

4 CATEGORIES OF CYBER WARRANTS:

1. Warrant to Disclose Computer Data (WDCD)

- is an order in writing issued in the name of the People of the Philippines, signed by
a judge, upon application of law enforcement authorities, authorizing the latter to issue
an order to disclose and accordingly, require any person or service provider to disclose
or submit subscriber’s information, traffic data, or relevant data in his/her or its
possession or control.
CYBERCRIME WARRANTS

4 CATEGORIES OF CYBER WARRANTS:

2. Warrant to Intercept Computer Data (WICD) - is an order in writing issued in the name of the People of
the Philippines, signed by a judge, upon application of law enforcement authorities, authorizing the latter
to carry out any or all of the following activities:
 
a. listening to;
 
b. recording;
 
c. monitoring;
 
d. surveillance of the content of communications, including procuring of the content of computer data,
either directly, through access and use of a computer system or indirectly, through the use of electronic
eavesdropping or tapping devices, at the same time that the communication is occurring.
CYBERCRIME WARRANTS

4 CATEGORIES OF CYBER WARRANTS:

3. Warrant to Search, Seizure and Examination of Computer data. (WSSECD) - is an


order in writing issued in the name of the People of the Philippines, signed by a judge,
upon application of law enforcement authorities, authorizing the latter to search the
particular place for items to be seized and/or examined.

-WSSECD is like a search warrant, except the subject matter of a WSSECD is computer
data. The request for a WSSECD must also state the relevance and necessity of the data
sought and describe particularly the information sought to be seized and examined. Also,
the request must state the likely offense involved. In addition, the request must contain
an explanation of the search and seizure strategy to be implemented

 
CYBERCRIME WARRANTS

4 CATEGORIES OF CYBER WARRANTS:

 
4. Warrant to Examine Computer Data (WECD)

- is a warrant issued when a computer device or system is previously seized by another


lawful method, such as a warrantless arrest. Before searching any device seized, law
enforcement must apply for a WECD. The request for a WECD must also state the
relevance and necessity of the data sought and describe particularly the information
sought to be disclosed. Also, the request must state the likely offense involved.

You might also like