Table of ContentI.Cyber Crime Law
II.What is Cyber Crime
III.Why we learn about Cyber Crime?
IV.Cyber Crime Victims
V. Types of Cyber Crime
B) Denial of service attack
C) Virus Dessimanition
D) Software piracy
F) Credit card Fraud
G)NIRC CrimeInternet Chat(IRC)
N)Sale of narcotics
V.Cyber Crime Punishment
VI.Cyber Crime Penalty
VII.Protecting your self from Cyber Crime
VIII.Top 10 Cyber Crime prevention tips
IX.The 10 Commandments of the Cyber crime law
Cyber Crime law
(republiC aCt No. 10175)
Isa in the Philippinesapproved on 12 September 2012.It aimsto
addresslegal issuesconcerning onlineinteractionsand theinternet
In thephilippines. Among theCyber crimeoffensesincluded in the
Bill are cybersquatting, cybersex, child pornography, identity theft,
Illegal accessto dataand libel. Whilehailed for penalizing illegal
doneviatheinternet that werenot covered by old laws, theact
hasbeen criticized for itsprovision on criminalizing libel, which
isperceived to beacurtailment in freedom of expression.
TheCyber crimePreventionAct of 2012 isthefirst law in the
Philippines which specifically criminalizes computer crime,which
prior to thepassageof thelaw had no strong legal precedent in
Philippinesjurisprudence. Whilelawssuch astheElectronic
CommerceAct of 2000(RepublicAct 8792) regulated certain
computer-related activities, theselawsdid not providealegal basis
for criminalizing crimescommitted on acomputer in general :
for example, Onel deGuzman, thecomputer programmer charged
with purportedly writing the I LOVE YOU computer worm, was
ultimately not prosecuted by Philippineauthoritiesdueto alack
of legal basisfor him to becharged under existing Philippines
lawsat thetimeof hisarrest.
Thefirst spam email took placein 1978 when it wassent out over
theARPAnet, theDefenseDepartment'snetwork. It wasused to
flog anew computer. Thefirst viruswasinstalled on an apple
computer in 1982 when ahigh school student, Rich Skrenta,
developed theElk cloner. Hehid it on afloppy disk that we
needed to boot theoperating system on thecomputer. For every
fifty bootsthat weremade, abad poem appeared on thecomputer
Cyber crimesareillegal activitiesthat occur over thecomputer,
usually over theInternet. Thisisarelatively new crimedueto
thefact that theInternet and advancesin technology arepretty
recent. With theadvent of smartphonesand tablets, cyber crimes
now hit thoseaswell aslaptops, computers, and gaming systems.
All crimesperformed or resorted to by abuseof electronic
mediaor otherwise, with thepurposeof influencing the
functioning of computer or computer system.
COMPUTER CRIME isany crime
whereComputer isatarget. – Computer isatool of
crime– Computer isincidental to crime
wHy we learN about
ecause everybody is using COMPUTERS. From white collar
riminals to terrorist organizations And from Teenagers to Adults
onventional crimes like Forgery, extortions, kidnapping etc. bein
ommitted with the help off computers. New generation is growin
p with computer. Most important,Monetary transaction are
moving on to the INTERNET.
CYBER CRIME VICTIMS
Desperados and greedy
Professional hackers people
Ex boy friend orEx girl friend
TYPES OF CYBER CRIME
Hacking in simpletermsmeansillegal intrusioninto acomputer
System without thepermissionof thecomputer owner/user.
Thisisan act by thecriminal, who floodstheband width of the
victim’sNetwork or fillshise-mail box with spaam mail depriving
him of theservicesheisentitled to accessor provide.
Thisisan act by the• Malicioussoftwarecriminal, who floods
that attachesitself to thebandwidth of theother software.
victim‘snetwork or (virus, worms, Trojan fillshise-mail box Horse,
Timewith spam mail bomb, ETC.)
Theft of softwarethrough theillegal copying of genuineprograms
or thecounterfeiting and distribution of productsintended to pass
for theoriginal. Retail revenuelossesworldwideareever Increasing
dueto thiscrime. Can bedonein variousways. End user copying,
Hard disk loading, Counterfeiting, Illegal downloadsfrom the
Pornography isthefirst consistently successful ecommerceproduct.
Deceptivemarketing tacticsand mousetrapping technologiesPor
nography encouragecustomersto accesstheir websites. Anybody
including children can log on to theinternet and accesswebsites
with pornographic contentswith aclick of amouse.
You simply haveto typecredit card number into www pageoff
thevendor for onlinetransaction.• If electronic transactionsare
not secured thecredit card numberscan bestolen by thehackers
who can misusethiscard by impersonating thecredit card owner
. Credit card skimmer
A. How thecredit card skimmer isusedCredit card skimmer, is
used to collect thedataof userbeforeit swapped.
B. Additional Slot InATM Machine
C. Falsepamphlet Box Affixed toATM Cubical side
D. InsidetheFalsepamphlet Box Cameraposition at correct angle
to view keypad & monitor.
NIRC CRIMEInternet Relay Chat (IRC)
servershavechat roomsin whichpeoplefrom anywhere. The
world can cometogether andchat with each other. Criminalsuse
it for meeting.– Hackersuseit for discussing their exploits/
sharing thetechniques. Paedophilesusechat roomsto alluresmall
Children. Cyber Stalking - In order to harassawoman her
telephonenumber isgiven to othersasif shewantsto befriend
Copying the• It istechniqueof company’spulling out confidential
datain confidential order to extort said information from the
company for hugebank/financial amount.. institutional account
Getting onecomputer on anetwork to pretend to havetheidentity
of another computer, usually onewith special accessprivileges, so
asto obtain accessto theother computerson thenetwork..
TheCriminal followson anetwork to thevictim by pretend to have
thesending identity off another computer, usually oneemails,
entering thewith special accesschat roomsprivileges, so asto
frequently. obtain accessto theother computerson thenetwork.
TheCriminal sendsemailscontaining defamatory mattersto all
concerned of thevictim or post thedefamatory matterson awebsite.
(disgruntled employeemay do thisagainst boss, ex-boysfriend
Against girl, divorced husband against wifeetc)
TheCriminal sendsemails• TheCriminal sendscontaining
Defamatory threatening email or mattersto all concerned comes
in contact in chat off thevictim or post theroomswith victim.
defamatory matterson awebsite.
In such crimecriminal makesinsignificant changesin such a
manner that such changeswould go unnoticed. Criminal makes
such program that deductssmall amount like2.50 per month
from theaccount of all thecustomer of theBank and deposit the
samein hisaccount. In thiscaseno account holder will approach
thebank for such small amount but criminal gainshugeamount.
In such crimecriminal makes
Sale& Purchasethrough insignificant changesin such anet..
manner that such changeswould
Thereareweb sitewhich go unnoticed. offer saleand•
Criminal makessuch program that
deductssmall amount like
Shipment off contrabandsRs. 2.50 per month from thedrugs..
account of all thecustomer of They may usethetechniques
theBank and deposit thesamein off hisaccount. In this
caseno Stegnography for hiding theaccount holder will
approach thebank for such small amount but messages..
CYBER CRIME PUNISHMENT
Punishment fora variety of cyber-crimes will often depend on
the location and which state the crime took place in.
Each state has theirown set of laws that deal with internet
crime and it's offenders. Child pornography is one of
the harshest internet crimes and most often will be punished
with jail time, and theirname being registered in the
sexual predators list.
A.)Any person found guilty of committing cybercrimeacts
enumerated six yearsand oneday to twelve12 yearsin prison, or a
fineof at least PHP200,000 up to PHP500,000.
B.)A person found guilty of committing punishableactsenumerated
In thefirst group shall bepunished with reclusio n tempo ral, or
Serving of12 yearsand oneday to 20 yearsin prison, or afineof
atleast PHP500,000 up to themaximum amount in proportion
to thedamageincurred, or both.
C.)A person found guilty of committing cybersex shall bepunished
in thefirst two groupsshall bepunished with prisio n mayo r, or
serving with prisio n mayo r, or serving of six yearsand oneday to
12 yearsin prison, or afineof at least PHP200,000 but not
Exceeding PHP1,000,000, or both.
D.)A person found guilty of committing child pornography shall be
punished with thepenaltiesenumerated in theRepublicAct
E.)A person found guilty of committing unsolicited
commercial communicationsshall bepunished with arresto
mayo r, or serving of onemonth and oneday to six months, or
afineof at least PHP50,000 but not exceeding PHP250,000,
F.)A person found guilty of committing other offensesenumerated
in thelast group shall bepunished with imprisonment onedegree
lower than that of theprescribed penalty for theoffense, or afine
of at least PHP100,000 but not exceeding PHP500,000, or both.
Individuals can protect themselves from credit card
fraud by not replying to strange orunusual emails
asking forpersonal financial information. Shoppers
also need to be aware that any shopping website has an
encrypted secure shopping cart when inputting theircredit
card information. Parents can keep a closereye on their
children and install filters to block out unwanted material
on the internet, and keep them away from chatrooms to
prevent Internet harassment and block internet predators.
1.Use Strong Passwords
Usedifferent user ID / password combinationsfor different account
and avoid writing them down. Makethepasswordsmorecomplicated
by combining letters, numbers, special characters(minimum 10 charactersin total)
and changethem on aregular basis.
2. Secure yourcomputer
Firewallsarethefirst lineof cyber defense; they block connections
to unknown or bogussitesand will keep out sometypesof viruses
3. Use anti-virus/malware software
Prevent virusesfrom infecting your computer by installing and
regularly updating anti-virussoftware.
Block spyware attacks
Prevent spywarefrom infiltrating your computer by installing and
4. Be Social-Media Savvy
Makesureyour social networking profiles(e.g.facebook,Twiter,
Youtube, MSN, etc.) areset to private. Check your security
settings. Becareful what information you post online. Onceit
ison theInternet, it isthereforever!
Secure yourMobile Devices
Beawarethat your mobiledeviceisvulnerableto virusesand
hackers. Download applicationsfrom trusted sources.
5.Install the latest operating system updates
Keep your applicationsand operating system (e.g. Windows,
Mac, Linux) current with thelatest system updates. Turn on
automatic updatesto prevent potential attackson older software.
6. Protect yourData
Useencryption for your most sensitivefilessuch astax returns
or financial records, makeregular back-upsof all your important
data, and storeit in another location.
7. Secure yourwireless network
Wi-Fi (wireless) networksat homearevulnerableto intrusion if
they arenot properly secured. Review and modify default settings.
Public Wi-Fi, a.k.a. “Hot Spots”, arealso vulnerable. Avoid conducting
financial or corporatetransactionson thesenetworks.
8. Protect youre-identity
Becautiouswhen giving out personal information such asyour
name, address, phonenumber or financial information on the
Internet. Makesurethat websitesaresecure(e.g. when making
onlinepurchases) or that you’veenabled privacy settings
9. Avoid being scammed
Alwaysthink beforeyou click on alink or fileof unknown origin.
Don’t feel pressured by any emails. Check thesourceof themessage.
When in doubt, verify thesource. Never reply to emailsthat ask you
to verify your information or confirm your user ID or password.
1o. Call the right person forhelp
Don’t panic! If you areavictim, if you encounter illegal Internet
content (e.g. child exploitation) or if you suspect acomputer crime,
identity theft or acommercial scam, report thisto your local police.
If you need help with maintenanceor softwareinstallation on your
computer, consult with your serviceprovider or acertified computer
1.You shall only say nicethingson theInternet.Thisisthemain fault
attributed to thelaw: It'saviolation of theFreedom of Expression
with itscyberlibel provision. Thanksto thisprovision inserted
"without knowledge" by most of thelawmakers, if you say something
bad against certain peopleon theInternet, you can becharged in
2.You cannot tell theTruth, whether joking or seriously, if it hurts
someone--In relation to the1st Commandment, regardlessif
you stateafact or you usesatireor sarcasm or even say something
in ajoking toneon the'net, you can still beheld liablefor cyberlibel
for impugning against another person'ssupposed dignity asper
theanti-libel law of theRevised Penal Code.
3. What you say can beheld against you forever.
According to onlinelegal expert Atty. JJDisini, because
of thenatureof your onlineposts, anything you posted
yearsago that arestill livetoday can bestill held against
you in acourt of law.
4. What you likecan also beheld against you--In relation
to the3rd Commandment, liking aFB post can beconsidered
asabetting libel. Retweeting aprobably libeloustweet might
becovered hereaswell so bewarned.
5. Thegovernment now hasthepower to takedown your
Internet--Thanksto thepower given by thelaw, theDepartment
of Justice, together with itsarmsin theNational Bureau of
Investigation and thePhilippineNational Policehavethepower
to order theshutdown of Web sitesif thereisprimafacieevidence
of violation of thelaw--even without acourt warrant.
6. Your Internet isrequired to compileevidenceagainst you.
In relation to the5th Commandment, Internet serviceproviders
arenow required to keep their datafor six monthsafter which
they can beforced to keep it for six moremonthsif authorities
7. You can bepunished moreharshly for onlinecrimesthan for
real lifecrimes--Thanksto thewording of thelaw, punishment
for thosecharged with thislaw is"onedegreehigher" than that
provided for in theRevised Penal Code. Becauseof this, if you're
charged with onlinelibel, you can befined amillion bucksor spend
12 monthsin jail.
8. You must trust thegovernment to do theright thing
in implementing thelaw--Thegovernment refusesto budge
on thislaw, saying thepublic should trust them to comeup
with theproper Implementing Rulesand Regulation to ensure
that therewon't beabusesof thelaw despitethevaguewording.
Thisafter thesomeof thelawmakerswho signed thelaw admitted
they had no ideawhat had goneinto thelaw.
9. Thelaw shall apply to all Filipinoswherever they are. Just
becauseyou think you'renot in thePhilippines, you can escape
jurisdiction from thisPhilippinelaw. Think again: thislaw has
universal jurisdiction. Even your electronic devicesthat aresituated
(or even partly) in thePhilippinesareunder jurisdiction under this
10. Thelaw doesn't really protect you. Supposedly it
goesafter identity-theft. However, becauseof theheavy
provisionsagainst onlinelibel, ahacker can takeover your
account and post libelousstuff, and then pull out. From
thesafety of distance, hecan watch thefireworksfly asthe
government screwsyou over. So yes, it can protect industries
and therich and powerful, just not you.
BY BERNADETTE H. SCHELL AND CLEMENSMARTINS
CA: ABC-CLIO,2004. 247PP