You are on page 1of 20

Unit II- STS Human Condition

Chapter 2:
Filipinos & Cyberspace
The Top Ten Cybercrimes Reported to the PNP?

01 02 03 04 05
Online Scams Illegal Access Computer Related ATM/ Credit Threats
Identity Theft Card Fraud

06 07 08 09 10
Data Interference Anti-photo Computer Unjust Vexation Phishing
& Video Voyeurism Related Fraud
The Top Ten Cybercrimes Reported to the PNP?
1. Online Romance 2. Online Shopping
Scams: Scams:
01 Fraudsters create fake online
personas to establish
Fake online stores or
sellers deceive buyers
romantic relationships with by offering products
victims and then exploit that don't exist or
Online Scams, them financially. misrepresenting the
also known as internet quality of the items.
scams. The term generally
refers to someone using
internet services or software
to defraud or take
advantage of victims,
typically for FINANCIAL
GAIN.
The Top Ten Cybercrimes Reported to the PNP?
Example : Hacking:

02 Infiltrating and manipulating computer


systems to GAIN CONTROL OR
EXTRACT SENSITIVE
INFORMATION.
Illegal
Access/Unauthorized
access is when a person
gains entry to a computer
network, system,
application software, data,
or other resources without
permission.
The Top Ten Cybercrimes Reported to the PNP?
1. Fake Profiles and Social 2. Spoofing:
Media Impersonation: Faking the identity of a
Creating fake social media legitimate website, email, or
03 profiles or impersonating
someone online to gather
communication to trick
individuals into providing
personal information or personal information.
carry out scams.
Computer Related
Identity Theft
The Top Ten Cybercrimes Reported to the PNP?

Skimming Devices: Criminals Withdrawals from ATMs:


04 use skimming devices to
capture the information stored
•Perpetrators may use stolen
or cloned ATM cards to
on the magnetic stripe of an make unauthorized cash
ATM card. withdrawals from ATMs.
ATM/ Credit
Card Fraud

credit card skimming devices


The Top Ten Cybercrimes Reported to the PNP?
1. Cyberbullying: 2. Online Extortion:
Harassment, •Threats and demands for
intimidation, or payment, often accompanied
threats carried out by the release or threat of
online, often through releasing compromising or
05 social media
platforms.
sensitive information.

Threats
The Top Ten Cybercrimes Reported to the PNP?
Malware Attacks: The
deployment of malicious
software (malware), such as
06 viruses, trojans, or
ransomware, that can
interfere with data integrity
and functionality.
Data interference
When committed intentionally, the
damaging, deleting,
deterioration, alteration, or
suppression of computer data
without right; includes inputting of
malicious codes
07
Anti-photo and video voyeurism

is a form of cybercrime that involves


the unauthorized capturing,
recording, or sharing of intimate
images or videos of individuals
without their consent.
Job Scams: Investment Scams:

08 Fraudulent job offers or Deceptive schemes


schemes that require payment promising high returns on
for fake employment investments to defraud
opportunities. individuals of their money.
Computer Related Fraud
09

Unjust Vexation
if someone is causing annoyance,
harassment, or distress through
Cyberbullying:
digital means,
Online Harassment:
Cyberstalking:
Defamation:
10
Phishing
- Phishing is a type of cyber
attack where attackers use
deceptive emails, messages, or
websites to trick individuals into
revealing sensitive information,
such as usernames, passwords,
credit card numbers, or other
personal details.
Cybercrimes are likely to occur in areas involving:
National security Crimes against people or property
Financial motivations Crimes that violate public morals
Main types of cyber threats that organizations, individuals, &
governments face:
1. Espionage
2. Sabotage
is the crime of spying or
is defined as deliberate and
secretly watching a person, malicious acts that result in
company, government, etc. the disruption of the normal
for the purpose of gathering processes and functions or
secret information or the destruction or damage of
detecting wrongdoing, and equipment or information.
to transfer such information
to another organization or
state.

•A. Corporate Espionage


•B. Government Espionage-
for Counterterrorism
Main types cyber threats that organizations, individuals, & governments face:

3. Disruption
of
system functionality
Ransomware Attacks: IoT (Internet of Things)
Malicious software that encrypts Attacks:
a user's data, demanding Compromising the functionality
payment (a ransom) for its of connected devices, such as
release. This can lead to smart appliances, industrial
significant disruptions in machinery, or critical
business operations if critical infrastructure, to disrupt normal
data is affected. operations.
.
Botnets and DDoS Attacks:
Main types cyber threats that organizations, individuals, & governments
face:
The NotPetya cyber attack
Attributed to: Russia
Target: Primarily Ukraine, but
affected companies worldwide
Unauthorized access.
Attackers often aim to gain
access to certain systems or to
modify communications that
control military systems or
other critical technology.

Sabotage and Destruction:


Cyber Espionage:
In some cases, politically
motivated attacks involve the Nation-states may conduct
deliberate destruction or cyber espionage to gather
disruption of digital infrastructure intelligence on the political
to undermine the political stability
Politically motivated activities, strategies, and
or functioning of a targeted attacks decision-making processes
organization or government. of other countries.
The “I LOVE YOU” Computer Virus Incident

• In May 2000, the world was hit by the “I LOVE YOU” virus, a
piece of malware created by Onel de Guzman, a resident of
Manila, Philippines.
• This virus sent via email with an enticing subject line, infected
over 10 million Windows personal computers, causing
disruption.
• The virus overwrote random files and replicated itself to all the
Windows Address Book used by Microsoft outlook. The damage
was substantial, with estimates ranging from $5.5 billion to as
high as $10 billion.
Reaction of the Lawmakers
• The Philippine Congress passed Republic Act (RA) 8792, often known as Electronic Commerce Act of 2000, to combat
the threat that cybercrime poses. Regulation 8792 (RA 8772) establishes the acceptance and
legal recognition of electronic data transmissions, documents and signatures. The legislative was
approved on June 14th 2000.
The following are the key elements of the act:
1. Ensures that electronic documents are admissible in court proceedings;
2. Limits the types of online crimes that can be punished, as hacking, the spread of viruses, and
infringement of copyright, and imposes fines at least Php100,000 and prison terms of between
six months and 3 years.
3. Encourage e-commerce throughout the nation, especially in business-to-business and business-
to-consumer transactions that improve and facilitate company relationships and allow
consumers to find and buy things online.
4. Aims to limit personal contact between government officials and the general public, hence
reducing graft and corruption in the government
What is the significance of RA 8792?
Cyber defense in the Philippines
• The Department of Science and Technology (DOST) and the Department of Information and Communications
Technology (DICT) have been implementing various science, technology and innovation (STI) initiatives.
• These initiatives include: an AI-powered thermal scanner system, online portals for remote work and COVID-19
information, free internet access at COVID-19 facilities and webinars on cybersecurity awareness.
• The Philippines is also discussing cooperation with Japan on the construction for cyber defense and security.

The Department of National Defense (DND) is responsible for protecting the nation from cyberattacks, particularly those
targeting the military network. It also secures national security and military networks. The DND’s role in the Inter-Agency
task Force for the Management of Emerging Infectious Diseases further strengthens its response to the cyber crisis
surrounding COVID-19.

The DND has been focusing on three main areas:


1. Phishing:
2. False information
3. Hacking:

You might also like