Documente Academic
Documente Profesional
Documente Cultură
Sequence of Presentation
5
Cybercrime Offenses
6
Offenses against the confidentiality, integrity and
availability of computer data and systems:
8
Offenses against the confidentiality, integrity and
availability of computer data and systems:
• (ii) Identical or in any way similar with the name of a person other
than the registrant, in case of a personal name; and
• (ii) The act of knowingly using computer data which is the product of
computer-related forgery as defined herein, for the purpose of
perpetuating a fraudulent or dishonest design.
11
Computer-related offenses
12
Content-related offenses
Introduction to Computer 14
Hardware and Storage Devices
• “Without right” means either:
a.) conduct undertaken without or in
excess of authority; or
b.) conduct not covered by established
legal defenses, excuses, court orders,
justifications, or relevant principles under the
law.
15
• Aiding or Abetting in the
Commission of Cybercrime.
– Any person who willfully abets or aids in
the commission of any of the offenses
enumerated in this Act shall be held liable.
16
• Attempt in the Commission of
Cybercrime.
• — Any person who willfully attempts to
commit any of the offenses enumerated in
this Act shall be held liable.
17
• All crimes defined and penalized by the Revised
Penal Code, as amended, and special laws, if
committed by, through and with the use of
information and communications technologies
shall be covered by the relevant provisions of
this Act: Provided, That the penalty to be
imposed shall be one (1) degree higher than
that provided for by the Revised Penal Code,
as amended, and special laws, as the case
may be.
18
• Real-Time Collection of Traffic Data.
25
E-Commerce Act of 2000
Salient features of Republic
Act 8792
It gives legal recognition of electronic data messages,
electronic documents, and electronic signatures.
(section 6 to 13)
Allows the formation of contracts in electronic form.
(section 16)
Makes banking transactions done through ATM
switching networks absolute once consummated.
(section 16)
Parties are given the right to choose the type
and level of security methods that suit their needs.
(section 24)
Introduction to Computer 26
Hardware and Storage Devices
Salient features of Republic
Act 8792
Introduction to Computer 28
Hardware and Storage Devices
Salient features of Republic
Act 8792
Introduction to Computer 29
Hardware and Storage Devices
Salient features of Republic
Act 8792
Introduction to Computer 31
Hardware and Storage Devices
What is computer refers
to?
“Computer” refers to any device or
apparatus singly or interconnected which,
by electronic, Transmit,
electro-mechanical, Store,
optical and/or magnetic Process,
impulse, Correlate,
or other means with the analyze,
same function, Project,
can receive, retrieve and/or produce
record, information,
data,
Introduction to Computer 32
Hardware and Storage Devices
What is computer refers
to?
“Computer” refers to any device or
apparatus singly or interconnected which,
text,
graphics,
figures,
voice,
Video,
symbols or other modes of
expression or perform any
one or more of these
functions.
33
What is a Computer?
35
Acts that penalized by fine
and/or imprisonment
Hacking or cracking which refers to unauthorized
access into or interference in a computer
system/server or information and communication
system;
40
Acts that penalized by fine
and/or imprisonment
Continuation…
41
III. Access Device Act
ACCESS DEVICE ACT
43
ACCESS DEVICE ACT
For purposes of this Act, the terms:
Access Device — means any card, plate, code, account
number, electronic serial number, personal identification
number, or other telecommunications service, equipment, or
instrumental identifier, or other means of account access
that can be used to obtain money, good, services, or any
other thing of value or to initiate a transfer of funds (other
than a transfer originated solely by paper instrument)
45
ACCESS DEVICE ACT
For purposes of this Act, the terms:
47
ACCESS DEVICE ACT
For purposes of this Act, the terms:
52
ACCESS DEVICE ACT
Prohibited Acts (Section 9).
54
ACCESS DEVICE ACT
Prohibited Acts (Section 9).
55
ACCESS DEVICE ACT
Prohibited Acts (Section 9).
56
ACCESS DEVICE ACT
Prohibited Acts (Section 9).
57
ACCESS DEVICE ACT
Prohibited Acts (Section 9).
58
ACCESS DEVICE ACT
Penalties (Section 10)
Any person committing any of the acts constituting
access device fraud enumerated in the immediately
preceding section shall be punished with:
59
ACCESS DEVICE ACT
Penalties (Section 10)
Any person committing any of the acts constituting
access device fraud enumerated in the immediately
preceding section shall be punished with:
60
ACCESS DEVICE ACT
Conspiracy to commit access device fraud under Section 11
61
ACCESS DEVICE ACT
Frustrated and attempted access device fraud (Section 12)
62
ACCESS DEVICE ACT
Frustrated and attempted access device fraud (Section 12)
63
ACCESS DEVICE ACT
Accessory to access device fraud (Section 13).
Any person who, with intent to gain for himself or for another,
buy, receives, possesses, keeps, acquires, conceals, sells,
or disposes of, shall buy and sell, or in any manner deal in
any article, item, object or anything of value which he knows
or should be known to him, to have been acquired through
the use of counterfeit access device or an unauthorized
access device or an access device known to him to have
been fraudulently applied for,
64
ACCESS DEVICE ACT
Accessory to access device fraud (Section 13).
Continuation…
shall be considered as an accessory to an access device
fraud and shall be punished with one-half (1/2) of the fine
and imprisonment provided for the applicable consummated
offenses listed in Section 9 of this Act. Said person shall be
prosecuted under this Act or under the Anti-Fencing Law of
1979 (Presidential Decree No. 1612) whichever imposes the
longer prison term as penalty for the consummated offense.
65
ACCESS DEVICE ACT
69
IV. CLASSIFICATION OF
CYBERCRIME
AND
PRESENTATION OF
RELEVANT CASES.
CLASSIFICATION OF
CYBERCRIME
AND
PRESENTATION OF
RELEVANT CASES.
Introduction to Computer 71
Hardware and Storage Devices
CLASSIFICATION OF CYBER CRIME AND
PRESENTATION OF RELEVANT CASES.
Introduction to Computer 72
Hardware and Storage Devices
CLASSIFICATION OF CYBER CRIME AND
PRESENTATION OF RELEVANT CASES.
CLASSIFICATION OF CYBER CRIME
Email spoofing
Spamming
Cyber Defamation
Harassment & Cyber stalking
Introduction to Computer 73
Hardware and Storage Devices
CLASSIFICATION OF CYBER CRIME AND
PRESENTATION OF RELEVANT CASES.
CLASSIFICATION OF CYBER CRIME
Forgery
Cyber Terrorism
Web Jacking
76
Presentation of JJ Maria G. Gener case
( Website Defacement)
Chronology of events:
INTERNET
BITSTOP
NETWORK
PLDT
(Telco Gateway Provider) SERVICES
INTERNET
DSL connection
April 30, 2004
Start: 10:11:39 AM
BITSTOP
End: 10:11:39 AM
IP Address: 202.131.71.94 INFOCOM NETWORK
Amellar Solutions
Type of Attack: Scripting
(Internet Service SERVICES
Provider)
April 26, 2004
Start: 10:29:36 AM
End: 11:59:39 AM
IP Address: 202.131.71.94
WebHosting Server
Amellar Solutions
Bitstop Network Services
Type of Attack: Scripting
IP Address: 202.91.163.2
April 23, 2004
Dial-up Subscriber
Location: Dagupan City, Pang
Start: 11:55:41 AM
Www.gov.ph
End: 11:55:53 AM
Www.journal.com.ph
IP Address: 202.131.71.94 April 29, 2004 “Victim Computer”
Amellar Solutions
Start: 11:49:23 PM
Type of Attack: Scripting
End: 11:53:56 PM
IP Address: 203.131.73.96
April 29, 2004 April 30,2004 Phone number : 034-4346417
Start: 07:28:07 AM 09:03:58 AM
End: 08:35:31 AM 09:07:47 AM Mr. Omad Sayd S. Kanaan
Start: 08:11:51 AM
748 Makiling St., Brgy Villamonte,
End: 10:22:21 AM
Bacolod City, Negros Occidental
DSL connection
IP Address: 202.163.226.140
SSS Diliman, Quezon City
Type of Attack: Large ICMP Packet Type of Attack: Scripting
GLOBE SUBSCRIBER
INTERNET
BITSTOP
NETWORK
GLOBE SERVICES
(Telco Gateway Provider)
WebHosting Server
Bitstop Network Services
‘202.91.169.38’ ‘202.91.170.3
202.91.169.55'
202.91.171.47' Cavite
United States
‘202.91.168.198’
202.91.168.253'
202.91.168.254'
202.91.168.172'
202.91.168.163'
202.91.168.205'
202.91.168.164'
202.91.168.250'
Hongkong
Bitstop Dagupan City
‘202.91.161.44'
‘202.91.172.61’
VMU
‘202.91.160.216’
San Carlos City
‘202.91.160.106'
‘202.91.175.130’
‘202.91.160.39’
U.P Visayas
On-Site Investigation
• Set of IP addresses identified and
analyzed by ATCD-CCU came from
U.P.Visayas Linux Gateway computer.
U.P Visayas
Cont’…
On-Site Investigation
• Suspected hard drive was seized by U.P.V officials and was turned-
over to ATCD-CIDG.
Cont’… CASE REFERRAL TO
DOJ
RESOLUTION BY THE STATE
PROSECUTOR
Cont’… RESOLUTION
BY THE
STATE PROSECUTOR
Cont’… RESOLUTION
BY THE STATE
PROSECUTOR
Press Release
Warrant of Arrest
Press Release
106
Judgment
THE FIRST FILIPINO
CONVICTED HACKER