0% found this document useful (0 votes)
12 views

Cybercrime

The document provides a comprehensive history of cybercrime, detailing significant events and milestones from 1834 to 2002, including early hacking incidents and the evolution of computer-related crimes. It also defines key terms related to computers and cybercrime, discusses the impact of technology on criminal activities, and outlines the basic components and types of software and memory in computers. Additionally, it highlights the role of notable figures in the development of computing technology and cybercrime.

Uploaded by

et07261998
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

Cybercrime

The document provides a comprehensive history of cybercrime, detailing significant events and milestones from 1834 to 2002, including early hacking incidents and the evolution of computer-related crimes. It also defines key terms related to computers and cybercrime, discusses the impact of technology on criminal activities, and outlines the basic components and types of software and memory in computers. Additionally, it highlights the role of notable figures in the development of computing technology and cybercrime.

Uploaded by

et07261998
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

Cybercrime History of Cybercrime

• It generally refers to any crime facilitated


or committed through the use of computers, 1834 - A couple of robber hack the French
information systems, or other types of Telegraph system and steal information
information technology devices. from the stock market, essentially carrying
● money laundering, cyber warrants, out the first cyber attack in the world.
stealing identities (sim cards)
● R.A. 10173 1878 - Early Telephone Calls — Two years
after Alexander Graham Bell invents the
Cyberspace - any computer literate can be telephone, the Bell Telephone Company
a cyber criminal kicks a group of teenage boys off the
telephone system in New York for
Computer repeatedly and intentionally misdirecting
• Any device capable of computing data and and disconnecting customer calls.
gathering information.
● “computare” 1903 - Wireless Telegraphy — During John
Ambrose Fleming’s first public
Information- Is like a raw materials / demonstration of Marconi’s “secure”
collected data wireless telegraphy technology, Nevil
Maskelyne disrupts it by sending insulting
The term cybercrime also refers to Morse code messages discrediting the
unlandul activities involving the use of a invention.
computer as a target of criminal activity, the
use of a computer or a tool or instrument to 1955 — Phone Hacker — David Condon
commit a criminal. activity and the use of a whistles his “Davy Crockett Cat” and
computer as incidental to a timina activity. “Canary Bird Call Flute” into his phone,
testing a theory on how phone systems
As the number of people worldwide using work. The system recognizes the secret
internal information increases, cybercrime code, assumes he is an employee, and
poses a significant threat to citizens, connects him to a long-distance operator.
consumers , business financial institutions, She connects him to any phone number he
and governments all over the world. requests for free.

As a global criminal phenomenon 1957 — Joybubbles — Joe Engressia


cybercrime also presents issues and (Joybubbles), a blind, 7-year-old boy with
challenges for law enforcement officials and perfect pitch, hears a high-pitched tone on a
prosecutions of this type of crime. phone line and begins whistling along to it at
a frequency of 2600Hz, enabling him to
It is also called computer crime, the use of communicate with phone lines and become
computer fraud, trafficking in child, the U.S.’s first phone hacker or “phone
pornograpny and intellectual property, phreak.”
stealing identities, or violating privacy.
Cybercrime especially through the internet 1969 — RABBITS Virus — An anonymous
has grown in importance as the computer person installs a program on a computer at
has become central to commerce, the University of Washington Computer
entertainment, and government. Center. The inconspicuous program makes
copies of itself (breeding like a rabbit) until
● Because of early and widespread the computer overloads and stops working.
adoption of computers. It is thought to be the first computer virus.

Cyberspace 1970-1995 — Kevin Mitnick — Beginning in


● Transforms the scale and scope of 1970, Kevin Mitnick penetrates some of the
offense; has its own limits; most highly-guarded networks in the world,
interactional forms, roles, and rules; including Nokia and Motorola, using
● Anyone who is computer literate can elaborate social engineering schemes,
become a cybercriminal. tricking insiders into handing over codes
and passwords, and using the codes to
access internal computer systems. He
becomes the most-wanted cybercriminal of
the time.

1973 – Embezzlement — A teller at a local 1995 — Vladmir Levin — Russian software


New York bank uses a computer to engineer Vladimir Levin hacks into
embezzle over $2 million dollars. Citibank’s New York IT system from his
apartment in Saint Petersburg and
1981 – Cybercrime Conviction — Ian authorizes a series of fraudulent
Murphy, aka “Captain Zap,” hacks into the transactions, eventually wiring an estimated
AT&T network and changes the internal $10 million to accounts worldwide.
clock to charge off-hour rates at peak times.
The first person convicted of a cybercrime, 1999 — The Melissa Virus — A virus infects
and the inspiration for the movie Microsoft Word documents, automatically
“Sneakers,” he does 1,000 hours of disseminating itself as an attachment via
community service and 2.5 years of email. It mails out to the first 50 names
probation. listed in an infected computer’s Outlook
email address box. The creator, David
1982 — The Logic Bomb — The CIA blows Smith, says he didn’t intend for the virus,
up a Siberian Gas pipeline without the use which caused $80 million in damages, to
of a bomb or a missile by inserting a code harm computers. He is arrested and
into the network and the computer system in sentenced to 20 months in prison.
control of the gas pipeline. The code was
embedded into equipment purchased by the 2000 — Lou Cipher — Barry Schlossberg,
Soviet Union from a company in Canada. aka Lou Cipher, successfully extorts $1.4
million from CD Universe for services
1984 — US Secret Service — The U.S. rendered in attempting to catch the Russian
Comprehensive Crime Control Act gives hacker.
Secret Service jurisdiction over computer
fraud. 2002 – Internet Attack — By targeting the
thirteen Domain Name System (DNS) root
1988 — The Morris Worm — Robert Morris servers, a DDoS attack assaults the entire
creates what would be known as the first Internet for an hour. Most users are
worm on the Internet. The worm is released unaffected.
from a computer at MIT to suggest that the
creator is a student there. The potentially What is a computer?
harmless exercise quickly became a vicious
denial of service attack when a bug in the The word compute is derived from the Latin
worm’s spreading mechanism leads to word computare', was meaning "arithmetic,
computers being infected and reinfected at accounting".
a rate much faster than he anticipates.
It is a digital or electronic device that is
1989 — Trojan Horse Software — A capable of storing information in the
diskette claiming to be a database of AIDS memory using input devices and
information is mailed to thousands of AIDS manipulating data into information to
researchers and subscribers to a UK produce output according to given
computer magazine. It contains a Trojan instructions.
(after the Trojan Horse of Greek mythology),
or destructive program masquerading as a Refers to an electronic, magnetic, optical,
benign application. electrochemical, or other data processing or
communications device, or grouping of such
1994 — Datastream Cowboy and Kuji — devices, capable of performing logical,
Administrators at the Rome Air arithmetic, routing, or storage functions and
Development Center, a U.S. Air Force which includes any storage facility
research facility, discover a password communications equipment directly related
“sniffer” has been installed onto their to or operating in conjunction with such
network, compromising more than 100 user device. It covers any type of computer
accounts. Investigators determined that two device, including devices with data
hackers, known as Datastream Cowboy and processing capabilities like mobile phones,
Kuji, are behind the attack. smart phones, computer networks, and
other devices connected to the internet. subtraction; however, this machine is
(Sec. 3(d)) Definition of terms R A. 10175) expensive.

Computer Application 1
Gottfried Wilhelm von Leibniz invented the
Tally Sticks - It is an ancient memory aid stepped reckoner in 1672. The machine can
device used to record and document automatically add, subtract, multiply, and
numbers, quantities, or even messages. divide.

Abacus - It was invented in Babylonia in Jacquard Loom - Invented by Joseph


2400 B.C. It is a mechanical device used to Jacquard and demonstrated in 1801, the
aid an individual in performing basic Jacquard Loom is an attachment for
arithmetic operations. It was first used in powered fabric looms. It uses a chain of
China in around 500 B.C punch cards to instruct the loom on how to
make intricate textiles. For example, a loom
Napier's Bones - This was invented by could have hundreds of cards with holes in
John Napier in 161.4. John Napier is a them that correspond to hooks that can be
Scottish mathematician and theological raised or lowered to make a textile brocade.
writer. He originated the concept of Below is an illustration of the Jacquard
logarithms as a tool to aid mathematical Loom attachment on top of a textile loom.
calculations. This machine allowed the (computerhope.com June 6, 2020)
operator to multiply, divide, and calculate
square and cube roots by moving the rods Thomas de Colmarin - invented the
around and placing them in specially mechanical calculator in 1820.
constructed boards Arithmometer It was the first dependable
successful calculating machine that was
Slice Rule was invented in 1622 by William available in the market. This machine can
Oughtred, an English mathematician and perform the four basic arithmetic functions
Anglican minister. This was based on hsuch as addition, subtraction, multiplication
Napier's ideas about logarithms. It is used and division and was the first mass-
primarily for multiplication, division, roots, produced calculating machine.
and logarithms. In trigonometry. This is not
normally used for addition or subtraction Analytical Machine and Difference
Engine Machine - Invented by Charles
Mechanical Clocks - In the early to mid- Babtage the "Father of Computer" in 1822
14th century, large mechanical clocks and 1834. It is the first mechanical
began to appear in the towers of several computer.
Italian cities. There is no record of any
working models preceding these public Charles Babbage - Father of Computer
clocks that were weight-driven and
regulated by verge-and-foliot escapements. Ada Byron Lovelace (Agusta Ada Byron)
Verge-and-foliot mechanisms reigned for ● She was the first Computer
more than 300 years with variations in the programmer. Augusta Ada Byron
shape of the foliot, but all had the same was the first computer programmer
basic problem: The period of oscillation in 1840. She recommended to
depended heavily on the amount of driving Charles Babbage to use the binary
force and the amount of friction in the drive, system. She wrote programs for the
so the rate was difficult to regulate. Analytical Engine.

Invented by Blaise Pascal, a French Scheutzian Calculation Engine - It was


mathematician, physicist, religious invented by Per Georg Scheutz in 1843. His
philosopher, and master of prose in 1642. invention was based on Charles Babbage's
Pascaline, it was the first calculator or difference engine and was considered the
adding machine to be mass produced in first printing calculator.
quantity and used. This machine can only
compute and perform two arithmetic Tabulating Machine - It was invented by
operations, such as addition and Dr. Herman Hollerith in 1890 to assist his
father in summarizing information and displayed and where the user can see the
accounting of censuses, as mandated by inputs created by the user.
the U.S. Constitution.

Havard Mark 1 - It was invented by Howard Central processing unit (CPU) - which
H. Aikenin in 1943 and was the first electro- serves as the heart and brain of the
mechanical machine computer. This was computer where all data are being
also known as IBM Automatic Sequence processed and stored to display the
Controlled Calculator (ASCC). information to an out-device example the
monitor
Professor John Atanasoff - Anatasoff-
Berry Computer (ABC) Keyboard and Mouse- The keyboard and
mouse is a device that transforms analog
Z4 - This machine was created by Konrad audio signals into air vibrations.
Zusein in Germany from the year 1936 to
1938. It was the first programmable Speaker - is a device that transforms
computer wherein users are required to analog audio signals into air vibrations.
insert punch tape into the punch tape reader
and all output and the output will be Printer - is a device that transforms
generated through a punch tape. computer output into printed images

ENIAC (Electronic Numerical Integrator Basic elements of the computer system


and Computer)
A. People ware -These are different
It was the first electronic computer and persons involved in the computer
completed in 1946 by John Presper Eckert operation and different tasks and
and John W. Mauchly functions in a computer system.
Mostly are users that used
UNIVAC 1 (UNIVersal Automatic computers, since it was made by
Computer 1) was the first commercial man, it is created for a specific
computer designed by John Presper purpose and use.
Eckertand John Mauchly.
The computer cannot function on its
EDVAC (Electronic Discrete Variable own; without people, it becomes
Automatic Computer) The First Stored useless. (Example Computer
Program Computer Designed by Von Professionals, such as System
Neumann in 1952. It has a memory to hold Administrator, System Analyst,
both a stored program as well as data. Computer Programmer, Computer
Operator, and Computer User like
Osborne 1 - it was the First Portable Encoder)
Computer, the first portable computer. It
was released in 1981 by the Osborne B. Software - is a set of electronic
Computer Corporation. commands that instruct the
computer on the tasks that the
Electronic Controls Company computer should perform. These are
programs that users mostly see in
their screens which enable users to
finish their work faster.

Types of Software

● Windows 11
Basic Parts or components of the
● macOS
Computer
● Office
● Chrome
Monitor- The monitor serves as an output
device where texts and in ages are being
System Software - a computer program
that manages, synchronizes, coordinates
different activities of the computer.
(Examples Google Chrome, Windows,
Android OS, Mac Os, etc.,)

Application Software - -specific tasks or Types of Primary Memory in Computer


jobs. a computer program that executes
only (examples are the following for Word A. RAM (Random Access Memory) -
Processing (MsWord, LibreOffice Writer, it is the main memory of computers.
Google Docs) Spreadsheet (MsExcel, Libre It is where data is being temporarily
Calculator, Google Sheets) stored and read. In case that the
power is being turned off, all of the
data and information stored are lost.

Computer Presentation - (MsPower Point,


LibreOffice Impress, Google Slides)
Database Management (Microsoft Access)
Desktop Publishing (MsPublisher, Adobe
Pagemaker, etc.,) Graphics (AUTOCAD),
Multimedia -Macromedia, Entertainment -
VLC Player, Nero Player, etc)
Types of RAM
Browser (Internet Explorer, Safari, Google
1. Static RAM - it is known as an
Chrome, Firefox, Opera, etc.)
SRAM and it can retain information
provided that the power supply is
C. Hardware - is the tangible or
turned on.
physical part of the computer where
the users can see and touch input
2. Dynamic RAM - It is known as
and output devices (like hard disks,
DRAM, it can hold information in a
USB flash disk, webcam, etc.,)
very minimal period although the
power supply is turned on. These
are more economical in cost and
consumption of electricity at a
reasonable speed.

B. ROM (Read Only Memory) - is a


permanent type of Memory. The
information or data stored cannot be
lost even if the power supply is being
turned off. The data and information
Memory - It is either volatile or non-volatile.
are permanently stored. The
It is where data can either be lost or cannot
manufacturer permanently embeds
be lost when the power source is turned off.
the data and information during its
production and cannot be
overridden. It is known as non-
Types of Memory in Computer
volatile memory.
1. Primary Memory- is the internal
Types of ROM
memory and known as the main
memory or temporary memory. It
1. PROM (Programmable Read-Only
holds data and instructions that a
Memory) - PROM a programmable
computer is currently working on. It
ROM chip. This type of chip can
is known as volatile because when
write and store a program.
power is turned off, all of the data is
lost.
2. EPROM (Erasable Programmable Blu-ray - (not Blue-ray) is known as Blu-ray
Read-Only Memory) - The EPROM Disc (BD), which is the name of a new
chip has the capability of removing optical disc format jointly developed by the
all the information stored in the chip. Blu-ray Disc Association (BDA). The format
was developed to enable recording,
rewriting, and playback of high-definition
video (HD), as well as storing large amounts
of data.

2. Secondary Memory - is an external


memory of the computer or known as The format offers more than five times the
auxiliary memory or permanent memory. It storage capacity of traditional DVDs and
is used to store a variety of data and can hold up to 25GB on a single-layer disc
programs and to store information. It is non- and 50GB on a dual-layer disc. This extra
volatile which means data that is being capacity combined with the use of advanced
stored can't be lost even if the power supply video and audio codecs will offer consumers
is being turned off. an unprecedented HD experience.

The following are secondary storage


devices:

Floppy Disks - is known as a floppy


diskette. This type of storage is made up of
thin, flexible magnetic storage, sealed and
enclosed with a rectangular plastic line with
fabric to remove dust. The 3.5 or 3 ½ inch
Common hard drives used:
floppy disk drive has a capacity of 1.44 MB.
Unlike its predecessor, that 5.25 or 51½
a. Serial ATA - this type of hard drive
inch has a capacity of 1.2 MB.
is now used in most desktops and
laptop computers because the
Flash Disk - is a flash module memory
transfer rate of data being
chip. The term disk is used because it
transferred is faster as it uses serial
performs like a hard drive where you can
signaling technology. Its cables are
store and access data. The Kingston Data
thinner and more flexible than other
Traver Max is a blazingly fast USB flash
cables. It has a 7-pin data
drive that packs in the performance of an
connection which is up to 1 meter
external SSD in a small chassis. Thanks to
long. It consumes less power and it
a combination of high-speed USB 3.2 Gen 2
requires only 250 mV as compared
Type-C connector and fast TLC flash
to other drive: that need 5V.
memory from Micron TLC, you can expect
However, it does not share
this flash drive to offer spectacular speeds.
bandwidth since there is only one
SATA disk per controller chip on the
Compact Disc - it is also known as a CD.
computer motherboard.
Invented by Philips and Sony who
collaborate to make a standard player It was
b. Solid State Drives - The latest drive
previously used to store data such as
technology available in the market
programs and files for computers. This Jed
and different from typical hard drives
the floppy disk to become obsolete. This
available. It has no moving parts and
capacity of a compact disc is capable of
no longer uses magnetism in storing
handling data up to 700 MB.
data
Digital Versatile Disc - is known as DVD. It
Internal and External Parts of Computer
can store up to 4.7 Gigabyte (GB) Single-
Layer Disc, 8.5-8.7 GB double-sided, single
Motherboard
layer 9.4 GB to although double-layer disc
Random access memory
(https://www.pcmag.com/encyclopedia,
Graphic Cards
June 6, 2020)

Basic elements of Computer System


Secondary Memory - A human cannot work for several
hours without resting, yet a
● Hard disk drives computer never res. A computer can
● Seagate Exos Mozaic 3+: The 36 TB conduct millions of calculations per
● HDD is not available for purchase second with cumplete precision
yet. without stopping. A computer can
consistently and accurately do
millions of jobs or calculations.
Western Digital Gold HDD: Available in There is no weariness or lack of
capacities up to 24 TB, these HDDs are concentration. Its memory ability
designed for enterprise-class data centers. also places it ahead of humans.

Seagate BarraCuda: These HDDs are 3. Reliability


available in capacities up to 14 ТВ.WD - A computer is reliable. The output
Elements 6TB portable HDD: This is the results never differ unless the input
largest portable HDD on the market. varies. the output is totally depend
on the input. when an input is the
● Solid state drives (SSDs) same the output will also be the
● Seagate BarraCuda SATA SSD: same. A computer produces
● Available in capacities from 240 GB consistent results for similar sets of
to 3840 GB. data, if we provide the same set of
input at any time, we will get the
As of January 2025, the largest capacity same result.
hard disk drive (HDD) is 36 TB, released by
Seagate. 4. Automation
- The world is quickly moving toward
The largest portable HDD is 6 TB, released Al (Artificial Intelligence)-based
by Western Digital. technology. A computer may
conduct tasks automatically after
Hard disks - It is also known as a hard instructions ale programmed. By
drive or HDD. It is a primary storage executing jobs automatically, this
computer because it is usually located computer feature replaces
inside the computer casing and in some are thousands of workers. Automation in
external drives where it has the capacity up computing is often achieved by the
to 36 Terabytes in capacity (TB). This drive use of a program, a script, or batch
usually spins inside. processing.
(https://www.techradar.com/best/large-hard-
drives-and-ssds,January30,2025). 5. Versatility
- Versatility refers to a capacity of
The characteristics of computers computer. Computer perform
different types of tasks with the
1. Speed same accuracy and efficiency. A
- Executing mathematical calculation, computer can perform multiple tasks
a computer works faster and more at the same time this is known as
accurately than human. Computers versatility. For example, while
have the ability to process so many listening to music, we may develop
millions (1,000,000) of instructions our project using PowerPoint and
per second. Computer operations Wordpad, or we can design a
are pe formed in micro and nano website.
seconds. A computer is a time
saving device. It pen orms several 6. Memory
calculations and tasks in few - A computer can store millions of
seconds that we take hours to solve. records. these records may be
The speed of a computer is measure accessed with complete precision.
in terms of GigaHertz and Computer memory storage capacity
MegaHertz. is measured in Bytes, Kilobytes
(KB), Megabytes (MB), Gigabytes
2. Diligence (GB), and Terabytes (TB). A
computer has built-in memory known
as primary memory. RA 8792-E-Commerce Law

7. Accuracy This law as created because of the i


- When a computer performs a love you virus.
computation or operation, the
chances of errors Occurring are low. This Act aims to facilitate domestic
Errors in a computer are caused by and international dealings,
human's submitting incorrect data. A transactions, arrangements,
computer can do a variety of agreements, contracts and
operations and calculations faut and exchanges and storage of
accurately. information through the utilization of
electronic, optical and similar
Text and word processing files, doc, medium, mode, instrumentality and
docx, odt, pages, rtf, txt, wpd, wps. technology to recognize the
authenticity and reliability of
Spreadsheet files. esv, numbers, ods, xis, electronic data messages or
xisx. leb-related files. asp, aspx, ess, htm, electronic documents related to such
html, jsp, php, xml. activities and to promote the
universal use of electronic
Image files. bmp, gif, ico, jpeg, jpg, png, transactions in the government and
raw, tif, tiff. by the general public.

Audio and video files. aif, mov, mp3, mp4, Republic Act No. 10173 - DATA PRIVACY
mpg, wav, wma, wmv. LAW

Draw program files. afdesign, ai, cad, cdr, To safeguard the right of every
drw, dwg, eps, odg, sug, vsdx. lage layout individual to privacy while ensuring
files. afpub, indd, pdf, pdfxml, pmd, pub, free flow of information for
qxp. innovation, growth and national
development
Programming files. c, gpp, cs, java, js,
json, py, sal, swift, vb. Scope

Compression and archive files. 7z, rar, ● Define rights of data subjects
tar, tar.gz, zip. ● Provides parameters for securing,
'process and providing access to
System files. bak, cfg, conf, ini, msi, sys, personal information, by any natural
tmp. and juridical person in the
government or private sector
Executable program files. app, bat, bin, ● Imposes penal and pecuniary
cmd, com, exe, vbs, x86 sanctions for unlawful use or
disclosure of information

CYBERCRIME AND ENVIRONMENTAL Republic Act No. 9995- ANTI-PHOTO


LAWS AND VIDEO VOYEURISM LAW

Onel de Guzman Photo or video voyeurism means the


act of taking photo or video
He was accused of authoring and coverage of a person or group of
releasing the first truly global persons performing sexual act or
computer virus that had disrupted any similar activity or of capturing an
the operations of businesses and image of the private area of a person
government agencies the world or persons without the latter's
over, from Ford (F) and Merrill Lynch consent under circumstances in
to the Pentagon and. the British which such person/s has/have a
Parliament, and was on track to reasonable expectation of privacy
cause an estimated $10 billion in person/s has/have a reasonable
damages - all in the name of love. expectation of privacy, or the act of
selling, copying, reproducing, It covers any type of computer
broadcasting, sharing, showing or device including devices with data
exhibiting the photo or video processing capabilities like mobile
coverage or recordings of such phones, smart phones, computer
sexual act or similar activity through networks and other connected to the
VCD/DVD, internet, cellular phones internet.
and similar means or device without
the written consent of the person/s Communication
involved, notwithstanding that Refers to the transmission of
consent to record or take photo or information through ICT media,
video coverage of same was given including voice, video and other
by such persons. forms of data.

Cybercrime
Is criminal activity where services or Computer data
applications in the Cyberspace are Refers to any representation of
used for or are the target of a crime, facts, information, or concepts in a
or where the Cyberspace is the form suitable for processing in a
source, tool, target, or place of a computer system including a
crime (ISO 27032) program suitable to cause a
computer system to perform a
Republic Act No. 10175 - CYBERCRIME function and includes electronic
LAW documents and/or electronic data
messages whether stored in local
The vital role of information and computer systems or online.
communications industries such as content
production, telecommunications, Computer program
broadcasting electronic commerce, and Refers to a set of instructions
data processing, in the nation's overall executed by the computer to achieve
social and economic development. intended results. (RA 10175)

The importance of providing an environment Subscriber's information


conducive to the development, acceleration, Refers to any information contained
and rational application and exploitation of in the form of computer data or any
information and communications technology other form that is held by a service
(ICT) to attain free, easy, and intelligible provider, relating to subscribers of its
access to exchange and/or delivery of services other than traffic or content
information and the need to protect and data and by which identity can be
safeguard the integrity of computer, established:
computer and communications systems,
networks, and databases, and the The type of communication service used,
confidentiality, integrity, and availability of the technical provisions taken thereto and
information and data stored therein, from all the period of service (RA 10175)
forms of misuse, abuse, and illegal access
by making punishable under the law such The subscriber's identity, postal or
conduct or conducts. geographic address, telephone and other
access numbers, any assigned network
Adopting sufficient powers to effectively address, billing and payment information,
prevent and combat such offenses by available on the basis of the service
facilitating their detection, investigation, and agreement or arrangement; and any other
prosecution at both the domestic and available information on the site of the
international levels, and by providing installation of communication equipment,
arrangements for fast and reliable available on the basis of the service
international cooperation. agreement or arrangement. Traffic data or
non-content data refers to any computer
Computer data other than the content of the
communication including, but not limited to,
the communication's origin, destination, or interference with such system and
route, time, date, size, duration, or type of assets would have a debilitating
underlying service. (RA 10175) impact on security, national or
economic security, national public
Cybercrime Offenses health and safety, or any
combination of those matters. (RA
(a) Offenses against the confidentiality, 10175)
integrity and availability of computer
data and systems: Cybersecurity
Refers to the collection of tools,
● Illegal Access policies, risk management
● Illegal Interception approaches, actions, training, best
● Data Interference practices, assurance and
● System Interference technologies that can be used to
● Misuse of Devices protect the cyber environment and
organization and user's assets. (RA
Computer system 10175)
Refers to any device or group of
interconnected or related devices, Interception
one or more of which, pursuant to a Refers to listening to, recording,
program, performs automated monitoring or surveillance of the
processing of data. (RA 10175) content of communications,
including procuring of the content of
Computer system data, either directly (RA 10175)
It covers any type of device with
data processing capabilities Service provider refers to:
including, but not limited to,
computers and mobile phones. The ● Any public or private entity that
device consisting of hardware and provides to users of its service the
software may include input, output ability to communicate by means of
and storage components which may a computer system (RA 10175); and
stand alone or be connected in a
network or other similar devices. It ● Any other entity that processes or
also includes computer data storage stores Computer data on behalf of
devices or media. such communication service or
users of such. service. (RA 10175)
Without right refers to either:

● conduct undertaken without or in CYBERCRIME OFFENSES


excess of authority. (RA 10175); or
● conduct not covered by established A Hacker is a person who is intensely
legal defenses, excuses, court interested in the mysterious workings of any
orders, justifications, or relevant computer operating system. Hackers are
principles under the law. most often programmers. They gather
advanced knowledge of operating systems
and programming languages and discover
Cyber loopholes within systems and the reasons
Refers to a computer or a computer for such loopholes. (Geeksforgeek 2024)
network, the electronic medium in
which online communication takes In this article, we will learn about all types of
place. (RA 10175) hackers, the Difference between White,
black and, grey hat hackers, ways to protect
Critical infrastructure against them.
Refers to the computer systems,
and/or networks, whether physical or
virtual, and/or the computer What are the three Main Types of
programs, computer data and/or Hackers?
traffic data so vital to this country
that the incapacity or destruction of White Hat Hackers
White-hat hackers are the one who websites. Their main purpose is to
are authorized or certified hackers impress their friends and society.
who work for the government and Generally, Script Kiddies are
organizations by performing juveniles who are unskilled about
penetration testing and identifying hacking
loopholes in their cybersecurity.
Green Hat Hackers
They also ensure protection from They are also amateurs in the world
malicious cybercrimes. They work of hacking but they are a bit different
under the rules and regulations from script kiddies. They care about
provided by the government, that's hacking and strive to become full-
why they are called Ethical hackers blown hackers.
or Cybersecurity experts.

Black Hat Hackers


They are often called Crackers.
Black Hat Hackers can gain Blue Hat Hackers
unauthorized access to your system They are much like the white hat
and destroy your vital data. The hackers, they work for companies for
method of attack they use common security testing of their software right
hacking practices they have learned before the product launch.
earlier.
Are outsourced by the company
They are considered to be criminals unlike white hat hackers which are
and can be easily identified because employed by the (part of the)
of their malicious actions. company.

Gray Hat Hackers Red Hat Hackers


Gray hat hackers fall somewhere in They are also known as the eagle-
the category between white hat and eyed hackers. Like white hat
black hat hackers. They are not hackers, red hat hackers also aim to
legally authorized hackers. halt the black hat hackers.

They work with both good and bad There is a major difference in the
intentions, they can use their skills way they operate. They become
for personal gain. It all depends ruthless while dealing with malware
upon the hacker. actions of the black hat hackers.

If a gray hat hacker uses his skill for They will keep on attacking the
his personal gains, he/she is hacker aggressively that the hacker
considered as black hat hackers. may know it as well and have to
replace the whole system.
There are generally 7 types of Hackers,
after the main 3 types, they are:

Script Kiddies State/Nation Sponsored Hackers


State or Nation sponsored hackers
They are the most dangerous people are those who are appointed by the
in terms of hackers. A Script kiddie government to provide them
is an unskilled person who uses cybersecurity and to gain
scripts or downloads tools available confidential information from other
for hacking provided by other countries to stay at
hackers.
Hacktivist is a hacker or a group of
They attempt to attack computer anonymous hackers who gain unauthorized
systems and networks and deface
access to government's computer files and is information that can be interpreted
networks for further social or political ends and used by computers. It is a
collection of facts, such as numbers,
A malicious insider or a whistleblower could words, measurements, observations
be an employee of a company or a or even just descriptions of things. In
government agency with a grudge or a computing, data is typically stored
strategic employee who becomes aware of electronically in the form of files or
any illegal activities happening within the databases. (Lenovo.com, 2024)
organization and can blackmail the
organization for his/her personal gain. Data Interference

● Alteration
● Damaging
● Deletion or deterioration of
computer data, electronic
document, or electronic data
message, without right,
including the introduction or
transmission of viruses.

Cybercrime Offenses

Offenses against the confidentiality, integrity


and availability of computer data and System Interference
systems: The intentional alteration or reckless
hindering or interference with the
● Illegal Access functioning of computer networks by
● Illegal Interception inputting, transmitting, damaging,
● Data Interference deleting, deteriorating, altering or
● System Interference suppressing computer data or
● Misuse of Devices program, electronic document, or
electronic data message, without
RA 10175, Sec 4 - Cybercrime Offenses right or authority, including the
introduction or transmission of
Illegal Access. viruses.
The access to the whole or any part
of a computer system without right. Misuse of Devices

Illegal Interception 1. The use, production, sale, procurement,


The interception made by technical importation, distribution, or otherwise
means without the right of any non- making available, without right, of.
public transmission of computer data
to, from, or within a computer a) A device, including a computer program,
system. including electromagnetic designed or adapted primarily for the
emissions from a computer system purpose of committing any of the
carrying such computer data. (RA cybercrime offenses.
10175)
b) A computer password, access code, or
Data Interference similar data by which the whole or any part
The intentional or reckless alteration, of a computer system is capable of being
damaging, deletion or deterioration accessed with intent that it be used for the
of computer data, electronic purpose of committing any violation under
document, or electronic data RA 10175.
message, without right, including the
introduction or transmission of The possession of an item referred to in (a)
viruses. (RA 10175) or (b) with intent to use said devices for the
purpose of committing offenses under RA
Data 10175.
Malware (or malicious software) is used to
infect target systems in order to monitor Similar, identical, or confusingly
them, collect data, take control of the similar to an existing trademark
system, modify system operation and/or registered with the appropriate
data, and damage the system and/or data government agency at the time of
the domain name registration:
There are several forms of malware that
can be used to infect systems (Maras, Acquired without right or with
2014; Maras, 2016): intellectual property interests in it.

Worm Standalone malicious software that Computer-related Offenses:


spreads without the need for user activity.
● Computer-related Forgery
Virus Malware that requires user activity to ● Computer-related Fraud
spread (e.g., an executable file with virus ● Computer-related Identity Theft
spreads when opened by the user).
Computer-related Forgery
Trojan horse Malware designed to look like
legitimate software in order to trick the user The input, alteration, or deletion of any
into downloading the program, which infects computer data without right resulting in
the users' system to spy, steal and/or cause inauthentic data with the intent that it be
harm. considered or acted upon for legal purposes
as if it were authentic, regardless whether or
Spyware Malware designed to not the data is directly readable and
surreptitiously monitor infected systems, intelligible.
and collect and relay information back to the
creator and/or user of the spyware. Forgery consists of creating or changing
something with the intent of passing it off as
Ransomware Malware designed to take genuine, usually for financial gain or to gain
users' system, files, and/or data hostage something else of value. This often involves
and relinquish control back to the user only creation of false financial instruments, such
after ransom is paid. as checks, or official documents.

CryptoRansomware (a form of It can also include signing another person's


ransomware) is malware that infects a name to a document without his or her
user's digital device, encrypts the user's consent or faking the individual's
documents, and threatens to delete files handwriting. Forging money or other
and data if the victim does not pay the currency is generally considered a separate
ransom. offense, known as counterfeiting, although
the word "counterfeit" may apply to the
Doxware is a form cryptoransomware that forgery of consumer goods and other items.
perpetrators use against victims that
releases the user's data (i.e., makes it The act of knowingly using computer data
public) if ransom is not paid to decrypt the which is the product of computer-related
files and data. forgery as defined herein, for the purpose of
perpetuating a fraudulent or dishonest
Cyber-squatting design.
The acquisition of a domain name
over the internet in bad faith to profit, Computer-related Fraud
mislead, destroy reputation, and
deprive others from registering the Fraud is a term commonly heard in legal
same. discussions and can encompass a wide
range of actions and behaviors. In the
A domain name is a unique, easy-to- context of Philippine law, fraud refers to
remember address used to access deceptive practices that are generally
websites, such as 'google.com', and intended to gain an unfair advantage or
'facebook.com'. Users can connect cause harm to another party.
to websites using domain names
thanks to the DNS system.
The unauthorized input, alteration, or
deletion of computer data or program or
interference in the functioning of a computer
system, causing damage thereby with
fraudulent intent: Provided, that if no
damage has yet been caused, the penalty
imposable shall be one (1) degree lower.

Computer-related Identity Theft

The intentional acquisition, use, misuse,


transfer, possession, alteration or deletion
of identifying information belonging to
another, whether natural or juridical, without
right: Provided, that if no damage has yet
been caused, the penalty imposable shall
be one (1) degree lower.

Cyber identity theft cases up by 13.9% in


2023

You might also like