You are on page 1of 41

CYBERCRIME:

CRIME OF THE MILLENNIUM

Dr. Rhona A. Alog


TOPICS:
Historical Development of Computers​
History of Cybercrime
The computer and crimes attributed

Cybercrime: Crime of the Millennium 3

INTRODUCTION
The computer age introduces a new perspective of
human existence, I may say that it lessens the sense
of morality and increases opportunities of virtual
crimes.
HISTORICAL DEVELOPMENT OF COMPUTER
BRIEF HISTORY OF INTERNET
BRIEF HISTORY OF INTERNET
BRIEF HISTORY OF INTERNET
8

“ THE COMPUTER AND


CRIMES ATTRIBUTED
9
10

Computer refers to an electronic, magnetic, optical,


electrochemical, or other data processing or
communications device, or grouping of such devices,
capable of performing logical, arithmetic, routing, or
storage functions and which includes any storage facility or
equipment or communications facility or equipment directly
related to or operating in conjunction with such device. It
covers any type of computer device including devices with
data processing capabilities like mobile phones, smart
phones, computer networks and other devices connected
to the internet. (RA NO. 10175)
MODE AND MANNER OF 11

COMMITTING CYBERCRIME
• Hacking • Logic Bombs
• Theft of information • Trojan Attack
• E-mail Bombing • Internet Time Theft
• Data Diddling • Web Jacking
• Salami Attack
• Denial of Service
Attack
• Virus or Worm Attack
Presentation title 12
CYBERCRIME 13

• Cybercrime is any criminal activity


that involves a computer, network
or networked device.

• Computer may either be a target


and/or means of criminal activity
Presentation title 14
Presentation title 15
Presentation title 16
Presentation title 17
Presentation title 18
Presentation title 19
Presentation title 20
Presentation title 21

BRIEF HISTORY OF THE


DEVELOPMENT OF
CYBERCRIME LEGISLATION IN
THE PHILIPPINES 2000-2015

Sourced from: https://doj.gov.ph/files/cybercrime_office/Short%20History%20of%20the%20Dvlpt%20of


%20Cybercrime.pdf
• “I love you” virus was unleashed globally in 2000, thus putting the Philippines on the
global cybermap. This event lead to RA 8792 or the Electronic Commerce (E-
commerce) Act of 2000 the first cybercrime law
• Sec 33 of E-Commerce Act penalized:
• In 2001 the first cybercrime forensic laboratories were established by
DOJ, NBI, and the PNP-CIDG
• In July 17, 2001 the SC issued the Rules on Electronic Evidence in
recognition of the emerging crime set, this was amended on Sep 24,
2002 to include its application on criminal cases.
• The 1st conviction of cybercrime in the Philippines was in September
2005, when an employee of a leading university in the south pleaded
guilty to hacking the government portal.
• The 2nd conviction was obtained in May 2006 against a 22 yr-old-
former call center agent who broke into computer system of a credit
card company
• In 2008, the DOJ created a Taskforce on E-Government, Cybersecurity
and Cybercrime to address cybersecurity issues and to pursue e-
government agenda
• The taskforce began collaborating with the Council of Europe, drafted
and pushed the adaptation of the first international Convention of
Cybercrime, known as the BUDAPEST CONVENTION
• The convention aims to protect society against cybercrime “by
providing for the criminalization of such conduct and the adoption of
powers sufficient for effectively combating such criminal offenses, by
facilitating their detection, investigation and prosecution at both
domestic and international levels and by providing arrangements for
fast and reliable international cooperation.
• The CYBERCRIME PREVENTION ACT (CPA) OF 2012 is the first
piece of legislation comprehensively dealing with cybercrimes..
• The CPA criminalizes several types of offenses such as illegal access,
data interference, device misuse, cybersquatting, computer fraud,
cybersex, among others
• It also reaffirms existing laws against child pornography punishable
under RA 9775 (Anti-Child Pornography Act of 2009) and libel
punishable under Article 355 of the Revised Penal Code
• This was signed on Aug 15, 2012 and took effect on Sep 12, 2012,
however on Oct 9, 2012 the SC issued a TRO suspending the
application of legislative measure in view of several petitions assailing
the CPA’s constitutionality
• On Feb 18, 2014 the SC declared the validity and constitutionality of
some provisions of the CPA (see source for details)
• Sc also declared some of the CPA’s provision as unconstitutional (see
source for details)

• On April 22, 2014 the law was declared valid and enforceable
27

“ THE COMPUTER AND


CRIMES ATTRIBUTED
28
29

Computer refers to an electronic, magnetic, optical,


electrochemical, or other data processing or
communications device, or grouping of such devices,
capable of performing logical, arithmetic, routing, or
storage functions and which includes any storage facility or
equipment or communications facility or equipment directly
related to or operating in conjunction with such device. It
covers any type of computer device including devices with
data processing capabilities like mobile phones, smart
phones, computer networks and other devices connected
to the internet. (RA NO. 10175)
MODE AND MANNER OF 30

COMMITTING CYBERCRIME
• Hacking • Logic Bombs
• Theft of information • Trojan Attack
• E-mail Bombing • Internet Time Theft
• Data Diddling • Web Jacking
• Salami Attack
• Denial of Service
Attack
• Virus or Worm Attack
Presentation title 31

HACKING

the act of identifying and then exploiting


weaknesses in a computer system or
network, usually to gain unauthorized
access to personal or organizational
data.
Presentation title 32

THEFT OF INFORMATION
Data theft – also known as information
theft – is the illegal transfer or storage
of personal, confidential, or financial
information. This could include
passwords, software code or
algorithms, and proprietary processes
or technologies.
EM 33

AI
L
BO
MB
IN
G
Presentation title 34
Presentation title 35
36

VIRUS OR WORM ATTACK


Presentation title 37
Presentation title 38
Presentation title 39
Presentation title 40
THANK YOU

You might also like