Cdi9 Module
Cdi9 Module
College of Criminology
Academic Year 2021-2022
Second Semester
Prelim-Midterm
This virus was created by computer programmer student of AMA namely Onel De Guzman .
What was the effect of I Love You virus case on the Philippine Legislation?
In order to curb the threat posed by cybercrime, the Philippine Congress enacted Republic Act 8792,
otherwise known as the “electronic commerce act of 2000. This was signed into law on June 14, 2000.
Input devices - An input device is any hardware component that allows the user to enter data into the
computer.
• Keyboard
• Mouse
• Scanner
• Microphone
• Digital Camera
• PC Video Camera
Output Devices - An output device is any hardware component that gives information to the user
• Monitor
• Printer
• Speaker
Primary storage
• RAM (Random Access Memory) - is the primary storage of a computer. When you’re working
on a file on your computer, it will temporarily store data in your RAM. It allows you to perform
everyday tasks like opening applications, loading webpages, editing a document or playing
games, and allows you to quickly jump from one task to another without losing your progress.
Secondary Storage (Hard Disk Drives (HDD) & Solid-State Drives (SSD))
• Hard Disk Drives (HDD) - Hard disk drives are commonly used as the main storage device in a
computer. HDDs often store operating system, software programs and other files. These are
magnetic storage devices
• Solid-state drives (SSD) is a new generation of storage device used in computers. SSDs replace
traditional mechanical hard disks by using flash-based memory, which is significantly faster.
SSDs don’t rely on magnets and disks, instead they use a type of flash memory called NAND
• Offenses against the confidentiality, integrity and availability of computer data and systems,
• Computer-related offenses Content-related offenses
• Copyright-related offenses
1. Unauthorized Access - Unauthorized access is when someone gains access to a website, program,
server, service, or other system using someone else's account.
2. Hacking - Any attempt to intrude into a computer or a network without authorization. This involves
changing of system or security features in a bid to accomplish a goal that differs from the intended
purpose of the system. It can also refer to non-malicious activities, usually involving unusual or
improvised alterations to equipment or processes. An individual who involves themselves in hacking
activities is known as a hacker.
What are the various kinds of hackers?
• White hats - also known as ethical hackers, strive to operate in the publics best interest, rather than to
create turmoil. Many white hat hackers work doing penetration, to attempt to break into the company’s
networks to find and report on security vulnerabilities.
• Black hat hackers – this kind of hackers, hack to take control over the system for personal gains. They
destroy, steal and even prevent authorized users from accessing the system
• Gray hat hackers - They belong to the neutral zone. They act in the middle ground between white hat
hackers, who operate on behalf of those maintaining secure systems, and sometimes act as black hat
hackers who act maliciously to exploit vulnerabilities in systems.
4. Cyber Fraud - is the crime committed via a computer and internet with the intent to corrupt another
individual’s personal and financial information stored online from people illegally by deceiving them.
a. Spoofing or Phishing - Spoofing is a type of scam in which criminals attempt to obtain someone's
personal information by pretending to be a legitimate source. It can be in the form of:
•Email Spoofing- Email spoofing is a technique used in spam and phishing attacks to trick users
into thinking a message came from a person or entity they either know or can trust. In email
spoofing attacks, the sender forges email headers so that client software displays the fraudulent
sender address, which most users take at face value.
•Text Message Spoofing - Sometimes referred to as smishing. The text message may appear to
come from a legitimate source, such as your bank. It may request that you call a certain phone
number or click on a link within the message, with the goal of getting you to divulge personal
information.
•URL Spoofing - URL spoofing happens when scammers set up a fraudulent website to obtain
information from victims or to install malware on their computers. Virus hoax emails - Virus
hoaxes are false reports about non-existent viruses, often claiming to do impossible things like
blow up the recipient's computer and set it on fire, or less sensationally, delete everything on the
user's computer.
b. Lottery Frauds - These are emails, which inform the recipient that he/ she has won a prize in a lottery.
c. Credit Card Fraud -Credit card fraud is the unauthorized use of a credit or debit card, or similar
payment tool to fraudulently obtain money or property. Credit and debit card numbers can be stolen
from unsecured websites or can be obtained in an identity theft scheme.
d. Theft of Internet Hours - Unauthorized use of Internet hours paid for by another person.
e. Cyber Terrorism - It refers to unlawful attacks and threats of attacks against computers, networks and
the information stored therein when done to intimidate or coerce a government or its people in
furtherance of political or social objectives.
f. Cyber Pornography – is the act of using cyberspace to create, display, distribute, import, or publish
pornography or obscene materials, especially materials depicting children engaged in sexual acts with
adults.
g. Cyber-libel or cyber defamation- is a term used when someone has posted or emailed something that is
untrue and damaging about someone else on the social media, including blogs, chat rooms, personal
websites, social media, social networking sites, or other published articles. Cyber defamation is also
called as Cyber smearing.
h. Cyber Stalking - Cyber-stalking refers to the use of the Internet, email, or other electronic
communications device to stalk and later on harass another person.
i. Denial of Service attacks- DoS attacks accomplish this by flooding the target with traffic, or sending
many information that triggers a crash on someone’s computer or computer network..
j. Distributed denial-of-service attack (DDoS attack) - occurs when multiple systems flood the bandwidth
or resources of a targeted system, usually one or more web servers.
k. Salami Slicing Attack - A “salami slicing attack” is a technique by which cyber-criminals steal money
or resources a bit at a time so that it will be remain unnoticeable.
j. Malware attack - is a common cyberattack where malware executes unauthorized actions on the
victim’s computer system. The malicious software encompasses many specific types of attacks like
infecting computers.
c.Rootkit – A rootkit is a type of malicious software designed to remotely access or control a computer
without being detected by users or security programs. Once a rootkit has been installed it is possible for
the malicious party behind the rootkit to remotely execute files, access/steal information. Rootkit can
modify system configurations, alter software.
d.Trojan Horse - Trojan horse, commonly known as a “Trojan,” is a type of malware that disguises itself
as a normal file or program to trick users into downloading and installing malware. A Trojan can give a
malicious party remote access to an infected computer. Once an attacker has access to an infected
computer, it is possible for the attacker to steal data.
e.Virus - Viruses are designed to damage the target computer or device by corrupting data, reformatting
your hard disk, or completely shutting down your system.
f. Worm - A computer worm is a type of malware that spreads copies of itself from computer to computer.
A worm can replicate itself without any human interaction, and it does not need to attach itself to a
software program in order to cause damage.
What is RA 10175?
Republic Act No. 10175, otherwise known as the “Cybercrime
Prevention Act of 2012”
What are the acts the constitute Cybercrime Offenses under RA 10175?
A. Offenses against the confidentiality, integrity and availability of computer data and systems
1. Illegal Access – The access to the whole or any part of a computer system without right.
2. Illegal Interception – The interception made by technical means and without right, of any non-public
transmission of computer data to, from, or within a computer system, including electromagnetic
emissions from a computer system carrying such computer data: Provided, however, That it shall not be
unlawful for an officer, employee, or agent of a service provider, whose facilities are used in the
transmission of communications, to intercept, disclose or use that communication in the normal course
of employment, while engaged in any activity that is necessary to the rendition of service or to the
protection of the rights or property of the service provider, except that the latter shall not utilize service
observing or random monitoring other than for purposes of mechanical or service control quality
checks.
4. System Interference – The intentional alteration, or reckless hindering or interference with the
functioning of a computer or computer network by inputting, transmitting, damaging, deleting,
deteriorating, altering or suppressing computer data or program, electronic document or electronic data
message, without right or authority, including the introduction or transmission of viruses.
5. Misuse of Devices
a. The use, production, sale, procurement, importation, distribution or otherwise making available,
intentionally and without right, of any of the following:
i. A device, including a computer program, designed or adapted primarily for the purpose of
committing any of the offenses under this rules; or
ii. A computer password, access code, or similar data by which the whole or any part of a
computer system is capable of being accessed with the intent that it be used for the purpose of
committing any of the offenses under this rules.
b. The possession of an item referred to in 5a(i) or(ii) above, with the intent to use said devices for the
purpose of committing any of the offenses under this section.
B. Computer-related Offenses
1.Computer-related Forgery
a. The input, alteration or deletion of any computer data without right, resulting in inauthentic data,
with the intent that it be considered or acted upon for legal purposes as if it were authentic,
regardless whether or not the data is directly readable and intelligible; or
b. The act of knowingly using computer data, which is the product of computer-related forgery as
defined herein, for the purpose of perpetuating a fraudulent or dishonest design.
2. Computer-related Fraud – The unauthorized “Input, alteration or deletion of computer data or program,
or interference in the functioning of a computer system, causing damage thereby with fraudulent intent
3. Computer-related Identity Theft – The intentional acquisition, use, misuse, transfer, possession,
alteration or deletion of identifying information belonging to another, whether natural or juridical, without
right C. Content-related Offenses:
1. Any person found guilty of Child Pornography shall be punished in accordance with the penalties set forth in
Republic Act No. 9775 or the “AntiChild Pornography Act of 2009”.
The following constitute other cybercrime offenses punishable under the RA 10175:
1. Cyber-squatting – The acquisition of a domain name over the internet, in bad faith, in order to profit,
mislead, destroy reputation, and deprive others from registering the same, if such a domain name is:
a. Similar, identical, or confusingly similar to an existing trademark registered with the appropriate
government agency at the time of the domain name registration;
b. Identical or in any way similar with the name of a person other than the registrant, in case of a personal
name; and
c. Acquired without right or with intellectual property interests in it.
2. Cybersex – The willful engagement, maintenance, control or operation, directly or indirectly, of any
lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or
consideration.
3. Libel – The unlawful or prohibited acts of libel, as defined in Article 355 of the Revised Penal Code, as
amended, committed through a computer system or any other similar means (RA 10175 Sec. 4)
A. Aiding or Abetting in the Commission of Cybercrime. – Any person who willfully abets, aids, or
financially benefits in the commission of any of the offenses enumerated in the Act shall be held liable,
except with respect to Child Pornography and online Libel.
B. Attempt to Commit Cybercrime. – Any person who willfully attempts to commit any of the offenses
enumerated in the Act shall be held liable, except with respect to Child Pornography and online Libel.
RA 10175 Sec. 6
All crimes defend and penalized by the Revised Penal Code, as amended, and special laws, if committed
by through and with the use of information and communications technologies shall be covered by the relevant
provisions of this Act: provided that the penalty to be imposed shall be one (1) degree higher than that provided
for by Revised Penal Code as amended, or special laws.
1. Law Enforcement Authorities. – The National Bureau of Investigation (NBI) and the Philippine National
Police (PNP) shall be responsible for the efficient and effective law enforcement of the provisions of the
Act. The NBI and the PNP shall organize a cybercrime division or unit to be manned by Special
Investigators to exclusively handle cases involving violations of this Act.
Duties of Law Enforcement Authorities. – To ensure that the technical nature of cybercrime and its prevention
is given focus, and considering the procedures involved for international cooperation, law enforcement
authorities, specifically the computer or technology crime divisions or units responsible for the investigation of
cybercrimes, are required to submit timely and regular reports including pre-operation, post-operation and
investigation results, and such other documents as may be required to the Department of Justice (DOJ) – Office
of Cybercrime for review and monitoring.
Preservation and Retention of Computer Data. – The integrity of traffic data and subscriber information shall
be kept, retained and preserved by a service provider for a minimum period of six (6) months from the date of
the transaction. Content data shall be similarly preserved for six (6) months from the date of receipt of the
order from law enforcement authorities requiring its preservation.
Collection of Computer Data. Law enforcement authorities, upon the issuance of a court warrant, shall be
authorized to collect or record by technical or electronic means, and the service providers are required to
collect or record by technical or electronic means and/or to cooperate and assist in the collection or recording
of computer data that are associated with specified communications transmitted by means of a computer
system.
Disclosure of Computer Data. – Law enforcement authorities, upon securing a court warrant, shall issue an
order requiring any person or service provider to disclose or submit, within seventy-two (72) hours from
receipt of such order, subscriber’s information, traffic data or relevant data in his/its possession or control.
Search, Seizure and Examination of Computer Data. – Where a search and seizure warrant is properly issued,
the law enforcement authorities shall likewise have the following powers and duties:
a. Within the time period specified in the warrant, to conduct interception, asdefined in this Rules, and to:
b. Pursuant thereto, the law enforcement authorities may order any person,who has knowledge about the
functioning of the computer system and the measures to protect and preserve the computer data therein, to
provide, as is reasonable, the necessary information to enable the undertaking of the search, seizure and
examination.
c. Law enforcement authorities may request for an extension of time tocomplete the examination of the
computer data storage medium and to make a return thereon, but in no case for a period longer than thirty (30)
days from date of approval by the court.
Custody of Computer Data. – All computer data, including content and traffic data, that are examined under a
proper warrant shall, within fortyeight (48) hours after the expiration of the period fixed therein, be deposited
with the court in a sealed package, and shall be accompanied by an affidavit of the law enforcement authority
executing it, stating the dates and times covered by the examination, and the law enforcement authority who
may have access to the deposit, among other relevant data.
Destruction of Computer Data. – Upon expiration of the periods as provided in Sections 12 (6months) and
Section 15 ( Within the time period specified in the warrant), or until the final termination of the case and/or as
ordered by the Court, as the case may be, service providers and law enforcement authorities, as the case may be,
shall immediately and completely destroy the computer data.
4. Where does Cybercrime case be filed and who have the Jurisdiction over the Cybercrime Cases in the
Philippines?
5. The criminal actions for violation of RA 10175, shall be filed before the designated special
cybercrime court (RTC) of the province or city where the offense or any of its elements is committed, or where
any part of the computer system used is situated, or where any of the damage caused to a natural or juridical
person took place.
Preservation Request; Warrants and Other Issuances for Computer Data; And Duties Of
Law Enforcement Agency
1. Access publicly available stored computer data located in the country or elsewhere; or
2. Access or receive, through a computer system located in the country, stored computer
data located in another country, if the other State obtains the lawful and voluntary consent
of the person who has the lawful authority to disclose the data to said other State through
that computer system.
d. Receive a request of another State for it to order or obtain the expeditious preservation of data
stored by means of a computer system located within the country, relative to which the
requesting State shall submit a request for mutual assistance for the search or similar access,
seizure or similar securing, or disclosure of the stored computer data: Provided, That:
ii.The offense that is the subject of a criminal investigation or proceedings and a brief summary
of the related facts; iii. The stored computer data to be preserved and its relationship to the
offense; iv. The necessity of the preservation; and
v. That the requesting State shall submit a request for mutual assistance for the search or similar
access, seizure or similar securing, or disclosure of the stored computer data.
2. Upon receiving the request from another State, the DOJ and law enforcement agencies
shall take all appropriate measures to expeditiously preserve the specified data, in
accordance with the Act and other pertinent laws. For the purposes of responding to a
request for preservation, dual criminality shall not be required as a condition;
i. The request concerns an offense that the Philippine Government considers as a political
offense or an offense connected with a political offense; or
ii. The Philippine Government considers the execution of the request to be prejudicial to its
sovereignty, security, public order or other national interest.
4. Where the Philippine Government believes that preservation will not ensure the
future availability of the data, or will threaten the confidentiality of, or otherwise
prejudice the requesting State’s investigation, it shall promptly so inform the requesting
State. The requesting State will determine whether its request should be executed; and
e. Accommodate request from another State to search, access, seize, secure, or disclose data
stored by means of a computer system located within the country, including data that has been
preserved under the previous subsection.
The Philippine Government shall respond to the request through the proper application of
international instruments, arrangements and laws, and in accordance with the following rules:
1. The request shall be responded to on an expedited basis where:
i. There are grounds to believe that relevant data is particularly vulnerable to loss or
modification; or
ii. The instruments, arrangements and laws referred to in paragraph (b) of this
section otherwise provide for expedited cooperation.
2. The requesting State must maintain the confidentiality of the fact or the subject of request for
assistance and cooperation. It may only use the requested information subject to the conditions
specified in the grant.
f. Make a request to any foreign state for assistance for purposes of detection, investigation
and prosecution of offenses referred to in the Act;
g. The criminal offenses described under Chapter II of the Act shall be deemed to be
included as extraditable offenses in any extradition treaty where the Philippines is a party:
Provided, That the offense is punishable under the laws of both Parties concerned by deprivation
of liberty for a minimum period of at least one year or by a more severe penalty.
The Secretary of Justice shall designate appropriate State Counsels to handle all matters of
international cooperation as provided in this Rule.
The INTERPOL tagged the Philippines, Morocco and Ivory Coast as the top three countries where “sextortion”
rings operate. Due to this, a massive operation dubbed as “OPERATION STRIKE BACK” were launched by
the PNP ACG aimed at neutralizing cybersex syndicates in the country particularly those involved in so-called
SEXTORTION.
• November 11-13, 2013 - 1st Eurasian Working Group Meeting for Heads of Cybercrime Units in Singapore.
ENVIRONMENTAL CRIMES
It is an illegal act which directly harms the environment. These illegal activities involve the
environment, wildlife, biodiversity and natural resources. It covers the activities that breach environmental
legislation and cause significant harm or risk to the environment, human health or both.
Green Collar Crime – it is a crime committed against nature. This term can refers to actual crime, in the sense
that the act is illegal by the country’s law, or a moral crime that may not be illegal.
ENVIRONMENTAL CRIMES
Is now becoming a serious problem worldwide in different forms, with some of them being among
the most profitable criminal activities in the world. The most common crimes against the
environment are connected with the unlawful exploitation of wild fauna and flora, pollution, waste
disposal and its trade.
The following are the kinds of environmental crimes committed and punishable by law:
Wild animal traffic – it is regarded by the INTERPOL as the third largest illegal business in
the world after drug and arms trafficking. Wild animal traffic raises a serious threat for the
world’s biodiversity survival.
Indiscriminate logging- it is the main cause of deforestation, the largest rainforest in the
world speeded up in 2013 at a 29% rise in deforestation, according to the Brazilian
government. The uncontrolled logging to get wood for furniture or other good or even for
farm lands. It is the most serious cause of this environmental crime.
Electronic waste mismanagement – there are up to 50 million tones of electronic waste every
year and up to 75% of all these is estimated to leave the official circuit and a good deal of
them to be illegally exported to Africa, china of India.
Finning – a hundred million sharks are captured every year by specialized ships and up to 70
million of them are captured to only have their fins cut off alive on the ships and then thrown
back into the sea.
Dumping in rivers and Aquifers – this kind of environmental crime is most often caused by
companies, factories and Public Administration. Faecal and toxic waste coming from
factories are dumped in rivers which cause the local wildlife to die or get ill and also finds its
way to pollute the surrounding flora as well.
Waste disposal – improper waste disposal creates a hazardous problem. It may infect people
not only physically but through the air and water. Garbage thrown in the rivers and canals
may not only block our waterways but invites rodents to infect the water and soon be
transferred to humans.
Global warming due to emission of greenhouse gasses – in almost any activity, we emit
greenhouse gas such as using our electricity, cooking and driving our cars. As we breath out,
we also produce carbon dioxide. The more people in the certain area, the bigger carbon
dioxide are emitted into the environment. As the gases are produce, it generates heat causing
a change in the climate.
In partnership with stakeholder, the law aims to adopt a systematic, comprehensive and ecological
solid waste management program that shall ensure the protection of public health and environment.
The law ensures proper segregation, collection, storage treatment and disposal of solid waste through
the formulation and adaption of the best eco-waste products.
The law aim to protect the country’s water bodies from pollution from land-based sources (industries
and commercial establishment, agriculture and community/household activities). It provides for
comprehensive and integrated strategy to prevent and minimize pollution through a multi-sectoral
and participatory approach involving all the stakeholders.
The law aims to achieve and maintain clean that meets the National Air Quality guidelines value for
criteria pollutants, throughout the Philippines, while minimizing the possible associated impacts to
the economy.
The law aims to regulate restrict or prohibit the importation, manufacture, processing, sale,
distribution, use and disposal of chemical substances and mixtures the present unreasonable risk to
human health. It likewise prohibits the entry, even in transit of hazardous and nuclear waste and their
disposal into the Philippine territorial limits of whatever purpose and to provide advancement and
facilitate research and studies in toxic chemicals.
The environmental impact assessment system was formally established in 1978 with the enactment
of PD No. 1586 to facilitate the attainment and maintenance of rational and order. It balance between
socio-economic development and environmental protection. EIA is a planning and management tool
that will help government, decision makers, the proponents and the affected community address the
negative consequences or risks on the environments. The process assures implementation of
environmental-friendly projects.
The purpose of this decree is to prevent, control, and abate the emission of air pollution from motor
vehicle in order to protect the health and welfare of the people and to prevent or minimize damage to
property and hazards to land transportation.
The state adapts the principle of protecting the climate system for the benefit of humankind, on the
basis of climate justice or common but differentiated responsibilities and the precautionary principle
to guide decision-making in climate risk management.
It is an act to strengthen the food safety regulatory system in the country to protect consumer health
and facilitate market access of local food and food products, and for other purposes.
Investigation method – criminal investigation of environmental crime target the most harmful violations
of environmental laws that pose significant threats to human health and the environment. Criminal
investigation are carried our via methods including interviews, searching a document or person,
examining documents or objects, use of force for self-defense and subject expert area. This requires
well-trained special agents and investigators.
Science and Technical Expertise – environmental crime investigations require in depth investigations
with scientific methodologies and technical expertise. Sampling and testing of materials to obtain
evidence against environmental criminals is a critical and specialized area. Scientist and specialized
technical experts are required to collect this evidence.
Legal and Prosecution Aspects – the legal and prosecution aspects of environmental crime is
significantly increasing in demand. Environmental laws and regulations developed are at all level
including sanctions, prison sentences, fines and restoration of damage. Cost of legal and prosecution
cases are high and are conducted by specialized environmental law experts.
Environmental Protection
Noted By: