2. MODULE OUTCOMES:
• At the end of each topic, the student must have:
– explained the difference between computer crime and
cybercrime;
– discussed the different types of computer crime and
cybercrime;
– explained how a computer is used as a tool to commit
a crime;
– explained how the computer becomes an object of
the crime.
3. COMPUTER CRIME
• Computer Crime
– Computer crime pertains to a criminal act
committed through the use of a
computer (salzmanattorney.com , n.d.)
– Computer crime covers or describes
several offenses and that also covers non-
computer offenses such as larceny and
fraud, except that a computer or the
Internet is used in committing the crime
(criminal.findlaw.com, 2019)
4. COMPUTER CRIME
• Examples of Computer Crime include the following:
– Improperly accessing a computer, system, or network;
– Modifying, damaging, using, disclosing, copying, or
taking programs or data;
– Introducing a virus or other contaminant into a
computer system;
– Using a computer in a scheme to defraud;
– Interfering with someone else's computer access or
use;
– Using encryption in aid of a crime;
– Falsifying email source information; and
– Stealing an information service from a provider.
criminal.findlaw.com, 2019
5. COMPUTER CRIME
• Improperly Accessing a Computer, System, or Network
– Improper access can also mean unauthorized
access. Computer users and network
administrators have passwords to access the
system for security reasons.
– Unauthorized or improper access to a computer,
system, or network includes access to a personal
computer or a network of computers without
acquiring permission or knowledge from the user
or administrator.
– Unauthorized access may also refers to as
Hacking. Since hacking is an act of gaining access
to a system without permission or authorization.
criminal.findlaw.com, 2019
6. COMPUTER CRIME
• Modifying, damaging, using, disclosing, copying, or taking
programs or data
– Data or information stored in computers or networks,
especially by hospitals, business firms, schools, government
agencies, and even by private individuals are treated with the
utmost confidentiality and are considered private. This simply
means that these data and/or information must be protected
from all kinds of abuses. This is the main reason for having the
Data Privacy Law.
– Information Theft on the other hand is defined as the stealing
of data and/or information while Software Theft is defined as
copying of programs without the permission of the authorized
owner. Information and Software Theft are considered as
computer crimes and it violates the Data Privacy Law.
criminal.findlaw.com, 2019
7. COMPUTER CRIME
• Using a computer in a scheme to defraud
– Computer Fraud. Computer fraud is defined as an
act of deceiving a victim to gain information,
money, and other important information through
the use of a computer.
criminal.findlaw.com, 2019
www.abc2c.com.au
8. COMPUTER CRIME
• Interfering with someone else’s computer access or use
– Denial of Service Attack or Distributed Denial of
Service Attack (DDoS) can interfere with one’s access
to Internet services through the client’s computer.
DDoS makes an online service unavailable to users by
simply interrupting the service temporarily and by
doing this, the perpetrator can prevent the user to
process and accomplished tasks properly.
– The first recorded DoS attack occurred in February
2000, when a 15-year-old Canadian hacker hit
Amazon and eBay web servers with this attack. Since
then, more and more people have used DoS attacks to
disrupt targets.
criminal.findlaw.com, 2019
lifars.com, 2020
10. COMPUTER CRIME
– Hardware Vandalism and
Hardware Theft also
interferes with someone
else’s access and/or use of
a computer.
• Hardware Vandalism is an act
of defacing or destroying a
computer and/or digital
equipment.
• Hardware Theft refers to
stealing the physical part of the
computer system and/or the
digital equipment.
criminal.findlaw.com, 2019
texomashomepage.com
Olney schools (TEXAS) were
closed for a day in 2015 after
vandals struck two schools there
overnight (Foy, M.2015)
11. COMPUTER CRIME
• Using encryption in aid of a crime
– Encryption is a process of converting data known as
Data Encryption to an unreadable form. This is usually
done to secure and protect data and/or information
against unauthorized access and use. To make the
data readable again it must be decrypted. The sending
party uses an algorithm to encrypt the data and the
receiving party should have access to what they called
a key or password to decrypt the data.
– Although encryption is usually used to protect highly
classified data against illegal or unauthorized access
and use, computer and cybercriminals also use this
technique to cover their illegal activities, making them
undetectable or at least giving the authority a hard
time detecting them, thus, giving them enough time
to accomplish their plan.
criminal.findlaw.com, 2019
lifars.com, 2020
12. COMPUTER CRIME
• Falsifying email source information
– Falsification of email source information can refer
to Email Spoofing and Phishing.
• Email spoofing is an act of making email messages
with fake sender addresses, pretending to be legit to
gain access to the victim’s information, computer,
etc. to carry out a cyber-attack.
• Phishing is a deceitful or fraudulent act of getting
important information such as user accounts, bank
accounts, and credit card numbers from a victim
through online messages or websites pretending to
be legit. Phishing may lead to Information Theft and
Identity Theft.
criminal.findlaw.com, 2019
lifars.com, 2020
15. COMPUTER CRIME
• Stealing an information service from a provider
– Internet Theft of Service is the stealing of the
Internet service itself as stated by Hollingsworth
(2018) and this may be accomplished by physically
rerouting Internet cables or by hacking into a wireless
Internet wi-fi connection account.
– An example of this is when a certain person uses
another person’s Internet connection without
authorization from the Internet Service Provider even
the person subscribing to the Internet allows it.
• Mooching or Piggybacking is another common example
of Internet Theft of Service, and is also considered as a
crime. This happens when the person or the “moocher”
can gain access to wi-fi by breaking a subscriber’s
Internet password.
criminal.findlaw.com, 2019
lifars.com, 2020
16. Common Types of Computer Crime
• Hacking/ Cracking
– Hacking is an act or practice of gaining unauthorized access
to a computer system and the person doing this is called a
hacker. But the hacker community disagree with this kind of
definition since some of them are Ethical Hacker which
means that this group of hackers use their knowledge and
skills for good reasons. Hackers are knowledgeable and
skilled in getting access to secured and protected computer
systems.
– Cracking on the hand is a term that is more fitting to
describe unauthorized access which is done for personal
motives. Cracking is a malicious act of gaining unauthorized
access or accessing the computer systems without
permission with intentions of stealing information, damage
or corrupt data, etc. for financial or personal gains.
jsberrylaw.com, (2020)
17. Common Types of Computer Crime
• Classification of Hackers
– White Hat Hackers: These hackers do not exploit the
systems’ vulnerability. White Hackers test and/or assess the
capability of the system to secure its data from malicious
hackers. These hackers are also called “Ethical Hackers” and
are paid or hired to test a company’s security system to find
its weakness or loophole. With this, the company can
improve the security of the system.
– Gray Hat Hackers: This group of hackers falls between white
and black hat hackers. Gray hat hackers look for the systems’
weakness and gain unauthorized access. If problems are
found, they may notify the owner of the system and ask for
a small fee for them to fix the problem, however, if the
owner disagrees then they may exploit the systems’
weakness.
jsberrylaw.com, (2020)
18. Common Types of Computer Crime
• Classification of Hackers
– Black Hat Hackers: These are malicious hackers that
may be considered responsible for creating viruses
and other malware, and other illegal activities like
information theft, cyber espionage, and another
internet-related crime for money or just to prove their
intelligence.
– Green Hat Hackers: These are newbie hackers, usually
they do not yet possess the skills and knowledge of
hackers mentioned above. These hackers dedicate
their time studying and passionately improving their
knowledge and skills in hacking.
jsberrylaw.com, (2020)
19. Common Types of Computer Crime
• Classification of Hackers
– Hacktivists: They use their knowledge and skills,
and cyberspace to inform people of their cause or
to spread information about corruption, injustices,
and abuses. They sometimes hack websites of
government agencies involved in some political
issues.
– Script Kiddies: These are wannabe expert hackers
but lack the knowledge and skills, discipline, and
dedication to train or educate themselves in the art
of hacking. They just use the scripts or codes and
other tools created by expert hackers.
jsberrylaw.com, (2020)
20. Common Types of Computer Crime
• Hacking and Cracking are terms that are used
interchangeably because people are confused
which is which.
• But if we are talking about illegal access,
unauthorized access, improper access,
backdoor access, etc., the most fitting word is
cracking.
jsberrylaw.com, (2020)
21. Common Types of Computer Crime
(Rouse, M, 2020)
(legal-dictionary.thefreedictionary.com, 2020)
Piracy
In computing, the word
piracy usually refers to
Software Piracy. This is an
illegal distribution or
selling of copyrighted
materials and
copyrighted software.
This includes but not
limited to video and audio
such as movies, music,
application software,
graphical images, and
even e-books
Selling and/or
distribution, sharing,
and copying of
copyrighted works are
considered as a crime.
Criminal charges and
penalties are applied
for those caught
selling pirated
materials.
Copyright protects the
rightful owner or the
author’s creative
works as mentioned
above.
A copyright protects
and grants the owner
the exclusive right to
display, distribute,
reproduce copies of
his original work
legally
22. Common Types of Computer Crime
• Cyberstalking and Harassment
–
jsberrylaw.com, (2020)
nordvpn.com
www.vice.com
patch.com
Cyberstalking is an act of monitoring the victim’s social media
activities and other computer or Internet-related activities. It
may include invasion of privacy, online harassment, and identity
theft. Other perpetrators infect malware the digital equipment
like the computer just to monitor the victim’s computer
activities such as their emails or posts in social media.
Harassment or Online Harassment is an act of harassing,
threatening, and bullying a person over the internet. These
actions would make the victim feel uncomfortable which
may lead to emotional distress such as emotional and/or
psychological stress and depression.
Invasion of Privacy usually happens when the
perpetrator is intruding into the victim’s personal life.
23. Common Types of Computer Crime
• Cyberstalking and Harassment
– Identity Theft is stealing someone’s identity or pretending to be
someone else which may also lead to online harassment.
Identity theft commonly happens when, for example:
jsberrylaw.com, (2020)
www.duocircle.com
www.thenewfederalist.eu
• A perpetrator or a cyber
crook happened to get
hold of a victim’s credit
card and use it to purchase
goods. The cyber crook
gets the goods and the
victim tends to pay for the
purchases made by the
cyber crook.
•A cyber crook can also use
someone else’s social media
account or create a duplicate
account to post some anti-
government memes, issues,
comments, or doing
something illegal online.
•Furthermore, the perpetrator
may use the victim’s identity
to post and spread fake news.
•Phishing and/or
hacking may result in
identity theft.
24. Common Types of Computer Crime
• Child Pornography/Abuse
– Child pornography and Child Abuse are very much related. In
fact, in the definition of Child Abuse, one can find out that
engaging a minor or a child in pornography is another way of
abusing a child.
– As stated in justice.gov (2020) child pornography is a form of
child sexual exploitation.
– United States Federal law defines child pornography as any
visual depiction of sexually explicit conduct involving a minor, a
person less than 18 years old.
– Images of child pornography are also referred to as child
sexual abuse images. Federal law in the U.S. prohibits the
production, distribution, importation, reception, or possession
of any image of child pornography.
jsberrylaw.com, (2020)
25. Common Types of Computer Crime
• Child Pornography/Abuse
– The production of child pornography materials
creates a permanent record of the abuse done to
that child hence when these images are placed
over the Internet and disseminated online, the
victimization of the child continues as long as the
images are posted online.
– Note : Once an image is on the Internet, it is
irretrievable and can continue to circulate
forever.
26. Common Types of Computer Crime
• Child Pornography/Abuse
– This also leads to lasting psychological damage to the
child, including disruptions in sexual development, self-
image, and developing trusting relationships with others
in the future.
– In a research study conducted by Meng, X., and D’Arcy, C (2016)
it was discussed that there was a significant difference between
the form of childhood experience by men and women. The
study shows that most men experienced physical abuse and
interpersonal violence while women were usually abused
sexually. The study also shows that there is a relationship
between mental disorders and child abuse moderated by
gender. It was found out that significant interactions were found
between being female and sexual abuse for alcohol abuse and
dependence but these may not be true to men.
28. Computer Crime VS Cybercrime
salzmanattorney.com (n.d.)
• was defined as a criminal act
committed through the use
of a computer
• can be accomplished without
the Internet
Computer
Crime
•usually involves the use of a computer
and the Internet or cyberspace to
commit crime
•cannot be completed without using a
“computer” or any computer-based
technology to access the Internet.
Cybercrime
29. Common Types of Computer Crime
• Bisson (2019), listed the Five (5) Types of Cybercrimes
and it is listed as follows:
metacompliance.com (2019)
securityintelligence.com
www.cisco.com
i-sight.com
www.inquirer.com/
Phishing
This cybercrime
intends to deceive the
victim using malicious
email attachment,
fake URL, or malicious
website pretending to
be legit to induce the
victim to provide
information the
attacker wants.
Ransomware
Ransomware is a
subset of crimeware
that infects the
computer via
phishing attacks or
an exploit kit
campaign.
Once the infection is
successful, it will
encrypt the victim’s
data then demands
a ransom payment
for the return of
that data.
Malware
Malware can be a
spyware, ransomware,
worm, Trojan horse,
virus, keyloggers, etc.
Malware may destroy
data, disrupt a
computer’s operation,
hack the system,
monitor the Internet
activities, steal
important
information, and can
even remotely control
the computer’s
activities.
Identity Theft
This is the stealing
someone’s identity
or pretending to
be someone else,
and this can lead
to information
theft, online
harassment, and
other crimes the
attacker may want
to commit using
the victim’s
identity.
Scams
Scams always
involve money.
These are
fraudulent
schemes designed
to deceive a victim
so that the
attacker can get
the desired
amount of money
from the victim
31. Introduction
• Before discussing the topic, we should understand that the
computer was invented to be used as a tool for faster complex
computation not to become a tool to commit a crime.
• If you can still recall, the first programmable general-purpose
digital computer was called ENIAC, short for Electronic Numerical
Integrator and Computing. It was built during World War II to be
used as a tool for obtaining faster computation results and
accurate values for the artillery range table.
• Computer technology has evolved since then and became very
powerful. Until now, computers continue to evolve and become
more powerful compare to their previous versions.
32. The Computer as a Tool to Commit
Crime -Example
• Social Engineering
– This is defined as a “term used to describe a broad range of malicious
activities through human interaction.” Other definitions discussed that
social engineering may also be done through emails, chats or any means
wherein the attacker could manipulate the victim to commit security
errors.
– It uses “psychological manipulation to trick users into making security
mistakes or giving away sensitive information.”
– Social engineering is defined as “a manipulation technique that exploits
human error to gain private information, access, or valuables. In
cybercrime, these “human hacking” scams tend to lure unsuspecting
users into exposing data, spreading malware infections, or giving access
to restricted systems.
– If you will notice, the two definitions may sound like the definition of
Phishing that is because Phishing s a type of Social Engineering Attack
Emperva.com (2020)
Kaspersky.com (2020),
33. The Computer as a Tool to Commit
Crime -Example
• According to Teranova.com (2019), social engineering uses
the victim’s heightened emotions to commit the attack. These
heightened emotions are:
Fear Greed
Curiosity Helpfulness
Urgency
34. The Computer as a Tool to Commit
Crime -Example
• Kaspersky. com (n.d.) further discusses how social engineering works
and listed the steps of the social engineering attack cycle. Here are
the steps as stated in Kaspersky.com.
Prepare by gathering background information
on you or a larger group you are a part of.
Infiltrate by establishing a relationship or
initiating an interaction, started by building
trust.
Exploit the victim’s trust and weakness are
established to advance the attack.
Disengage once the user has taken the
desired action.
35. The Computer as a Tool to Commit
Crime -Example
• Dumpster Diving
– Based on yourdictionary.com (2020), Dumpster diving is defined
as looking for important electronic information like passwords,
security codes, sensitive documents, etc. in the computer’s
electronic trash can or recycle bins.
– Dumpster diving can also happen in physical trash cans where
important documents or hard copies of important information
has been thrown away.
en.wikipedia.org/wiki/Kevin_Mitnick
Example: At age 12, Mitnick used social engineering and
dumpster diving to bypass the punch card system used in
the Los Angeles bus system. After he convinced a bus
driver to tell him where he could buy his own ticket
punch for "a school project", he was able to ride any bus
in the greater LA area using unused transfer slips he
found in a dumpster next to the bus company garage.
36. The Computer as a Tool to Commit
Crime -Example
• Cyberterrorism
– Lexico.com (2020), stated that Cyberterrorism is the politically
motivated use of computers and information technology to
cause severe disruption or widespread fear in society.
– Another definition from yourdictionary.com (2020) stated that
Cyberterrorism is the act of inflicting terror through large scale
disruption of networks and computers through cyberspace for
personal gain.
Example: Check out the movie Live
Free or Die Hard staring Bruce Willis.
It perfectly depicts cyberterrorism.
Trailer:
https://www.youtube.com/watch?v=Sv8Uh2Usl
do
www.fernbyfilms.com/2008/08/19/movie-
review-die-hard-40/
37. The Computer as a Tool to Commit
Crime -Example
• Identity Theft
– Identity Theft is stealing someone’s identity or pretending to be someone
else, and this can lead to online harassment and other cybercrimes.
• Internet Gambling
– Others call this as Online Gambling or Internet Gambling. This form of
gambling is illegal for it has no permit/license and therefore the owners do
not pay corresponding taxes.
– Here in the Philippines, we have the Philippine Offshore Gambling
Operators or what they called POGOs. According to esquiremag.ph (2019),
POGOs should be registered and should be issued a license by the Philippine
Amusement Gaming Corporation, without it, POGOs are considered illegal
as well as its workers. Esquiremag.com stated that as of June 9, 2019, there
are 56 licensed POGOs in the country that employ an estimated 100,000 to
250,000 Chinese nationals. Yet the number of illegal POGOs is estimated to
be at around 30.
www.fernbyfilms.com/2008/08/19/movie-
review-die-hard-40/
38. References:
• Berry Law Firm (2020). Common Types of Computer Crimes. Retrieved from https://jsberrylaw.com/blog/common-types-of-computer-
crimes/
• Bisson D. (2019). 5 Types of Cybercrime and How to Protect Against Them. Retrieved from https://www.metacompliance.com/blog/5-
types-of-cybercrime-and-how-to-protect-against-them/
• britannica.com .(2020). Cybercrime. Retrieved from britannica.com/topic/cybercrime
• criminal.findlaw.com .(2019). Computer Crime. Retrieved from https://criminal.findlaw.com/criminal-charges/computer-crime.html
• emperva.com. (2020). Social Engineering. Retrieved from https://www.imperva.com/learn/application-security/social-engineering-attack/
• Ichimura, A. (2019). Are We Playing Our Cards Right? Breaking Down Philippine Offshore Gaming Operators. Retrieved from
https://www.esquiremag.ph/money/industry/philippine-offshore-gaming-operators-what-you-need-to-know-a1926-20190719-lfrm
• Hollingsworth (2018). What Is Internet Theft?. Retrieved from https://www.legalmatch.com/law-library/article/internet-theft.html
• justice.gov (2020). Child Pornography. Retrieved from https://www.justice.gov/criminal-ceos/child-pornography
• kaspersky.com (2020). What is Social Engineering?. Retrieved from https://www.kaspersky.com/resource-center/definitions/what-is-
social-engineering
• legal-dictionary.thefreedictionary.com. (2020). Copyright. Retrieved from https://legal-dictionary.thefreedictionary.com/copyright
• lexico.com (2020). Cyberterrorism. Retrieved from https://www.lexico.com/definition/cyberterrorism
• Meng, X., and D’Arcy, C (2016). Gender moderates the relationship between childhood abuse and internalizing and substance use
disorders later in life: a cross-sectoral analysis. Retrieved from bmcpsychiatry.biomedcentral.com/articles/10.1186/s12888-016-1071-7
• Rouse, M. (2020). Piracy. Retrieved from https://whatis.techtarget.com/definition/piracy
• salzmanattorney.com (n.d). Computer Crimes/Cyber Crimes. Retrieved from https://www.salzmanattorney.com/federal-crimes/computer-
crimescyber-crimes/
• teranova.com ( 2019). 9 Examples of Social Engineering Attacks. Retrieved from https://terranovasecurity.com/examples-of-social-
engineering-attacks/
• yourdictionary.com (2020). Dumpster-diving. Retrieved from https://www.yourdictionary.com/dumpster-diving
• yourdictionary.com (2020). Cyberterrorism. Retrieved from https://www.yourdictionary.com/cyberterrorism
•
www.fernbyfilms.com/2008/08/19/movie-
review-die-hard-40/
40. Assignment
• Enumeration: Visit www.kaspersky.com/resource-center/definitions/what-is-social-engineering, and
enumerate the following.
– What are the different kinds of Phishing?
– What are the two goals of a Social Engineering attacker?
– Give the four examples of Social Engineering attacks listed in Kaspersky.com.
• Discussion/ Explanation: Discuss or explain briefly what is being required. Make sure that your
discussion or explanation is direct to the point (contains the main idea, difference, etc.) and is clear.
Write legibly.
– In a maximum of two sentences, what is the difference between a computer crime and a
cybercrime? ( 2 points)
– In one sentence, explain when a computer crime becomes a cybercrime. (5 points)
– Give at least two types of computer crime and explain how it happens in 6 sentences. (3 points)
– Give at least two types of cybercrime and explain how it happens in 6 sentences. (3 points)
– In two sentences, differentiate hacking from cracking. (2 points)
QUIZ NEXT MEETING
www.fernbyfilms.com/2008/08/19/movie-
review-die-hard-40/