0% found this document useful (0 votes)
81 views73 pages

Introduction To Cybercrime

This document provides an introduction to cybercrimes, environmental laws and protection as they relate to a bachelor's degree program in criminology. It outlines the major objectives of studying these topics, which include understanding definitions of cybercrime, the roles of hackers, victims and IT managers in cybercrime, applying criminological theories to cybercrime and environmental laws, learning about tools for collecting cyber data, and understanding the roles of law enforcement in investigating cybercrime. It also discusses applying environmental aspects to problem solving, conceptual solutions to regional development issues, and applying the research process to cybercrime and environmental laws and protection.

Uploaded by

paolovarias7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
81 views73 pages

Introduction To Cybercrime

This document provides an introduction to cybercrimes, environmental laws and protection as they relate to a bachelor's degree program in criminology. It outlines the major objectives of studying these topics, which include understanding definitions of cybercrime, the roles of hackers, victims and IT managers in cybercrime, applying criminological theories to cybercrime and environmental laws, learning about tools for collecting cyber data, and understanding the roles of law enforcement in investigating cybercrime. It also discusses applying environmental aspects to problem solving, conceptual solutions to regional development issues, and applying the research process to cybercrime and environmental laws and protection.

Uploaded by

paolovarias7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 73

Introduction to Cyber-Crimes and Environmental Laws

and Protection
The major objectives in the study of Cyber-
crimes and Environmental Laws and Protection in
relation to the new curriculum for the Bachelor of
Science of Criminology as stipulated in CHED Memo
# 05 are enumerated:
ü To become a familiar with various definition and typologies of
cybercrime and environmental laws and protection

ü To understand the contribution of hackers, victims and IT


managers to cybercrime

ü To apply criminological theories in the study of cybercrime


and environmental laws

ü To become familiar with technical tools allowing the collection


of data in cyber space
ü To explain role of both the private sector and law enforcement
agencies in investigating, prosecuting and preventing cyber
crime

ü To apply environmental aspects in analytical, conceptual and


implementation stage of dealing with a specific problem

ü Conceptual solution of regional development issues

ü To apply the research process on cybercrime, environmental


laws and protection
Cybercrime research has grown in visibility
and importance during the last two decades.
Nevertheless, despite the growing public
interest in the cybercrime and its
consequences for businesses and
individuals, only limited attention has been
given in the criminological discipline to
investigation and understanding of this new
type of crime.
The purpose of this subject is to introduce
student with the technical, social and legal aspect of
cybercrime as well as expose students to theories
and tools that enable scientific exploration of this
phenomenon. In the first week of semester we will
learn about the computer and internet, and discuss
several definition and typologies of cybercrime, then
discuss the hacker, the victim and the IT manager.
We will conclude this section by reviewing important
steps taken by scholars while conducting scientific
research.
We will review various theories of crime
causation, and assess the relevance of these
theories in the context of cyber space. We will
then describe several technical tools that allow
the collection of data from the internet. We will
conclude with a discussion on the legal issues
affected and created by online crime.
Likewise we will study the Environmental Laws
and Protection. It will provide students with an
understanding of the major environmental statutes
and the common and constitutional law that are
relevant to environmental protection of the
Philippines. Law will be examined from the point of
view of its effectiveness in developing healthy and
sustainable human societies that also honor the
inherent value of nature and of people as part of
nature.
Students will examine how we can use law to
develop a cleaner, safer and more stable economy,
to protect our health, and the natural resources our
descendants will need.
With its provisions for general and particular care
of the environment, environmental law will continue
to stress the absolute need of a regulatory
framework within which its existential, social and
aesthetic functions can be fulfilled.
THE COMPUTER AND THE INTERNET
“Ever since men began to modify their lives by using technology they have found themselves in a series of
technological traps”.
- Roger Revelle -
Today we carry more computing power on our
smart phones than was available in these early
models. The following brief history of computing is
a timeline of how computers evolved from their
humble beginnings to the machines of today that
surf the internet play games and stream
multimedia and addition to crunching numbers.
History of the Computer
The computer as we know it today had its beginning with
a 19th century English mathematics professor named
Charles Babbage. He designed the Analytical Engine and
it was this design that the basic framework of computers
of today based on.

Generally speaking, computer can be classified into three


generations. Each generation lasted for a certain period
of time, and each gave as either a new improved
computer or an improvement to the existing computer.
First generation: 1937 -1946 - in 1937 the
first electronic digital computer was built by
Dr. John V. Atanasoff and Clifford Berry. It
was called Atanasoff-Berry Computer (ABC).
In 1943 an electronic computer name the
colossus was built for the military . Other
developments continued until 1946 the first
general-purpose digital computer, the
Electronic Numeral Integrator and
Computer (ENIAC) was built. It is said that
this computer weigh 30 tons, and had
18,000 vacuum tubes which was used for
processing. When this computer was turned
on for the first time lights dim in sections of
Philadelphia . Computers of this generation
could only perform single task, and they no
had operating system.
Second generation: 1947-1962 This
generation of computers used transistor
instead of vacuum tubes which were more
reliable. In 1951 the first computer for
commercial use was introduce to public; the
Universal Automatic Computer (UNIVAC 1).
In 1953 the International Business Machine
(IBM) 650 AND 700 series computer made
their mark in the computer word. During this
generation of computers over 100
computers programming language were
developed, computers had memory and
operating systems. Storage media such as
tape and disk ware in use also were printers
for output.
Third generation: 1963 – present – The invention of
integrated circuit brought us the third generation of
computers. With this invention computers became
smaller, more powerful more reliable and they are
able to run many different program at the same
time. In 1980 Microsoft Disk Operating System
(MS-Dos) was born and in 1981 IBM introduced
the personal computer (PC) for home and office
use. Three years later Apple gave us the
Macintosh computer with is icon driven interface
and the 90s gave us Windows operating system.

As a result of the various improvements to


the development of the computer we have seen
the computer being used in all areas of life. It is
very useful tool that will continue to experiences
new development as time passes
What does computer mean?

A computer is a machine or
device that performs processes,
calculations and operations based
on instructions provided by a
software or hardware program. It
is designed to execute
applications and provides a
variety of solutions by combining
integrated hardware and software
components.
Two primary categories of a computer:
1. Hardware: Physical structure that houses a computer’s
processor, memory, storage, communication ports and
peripheral devices
2. Software: Includes operating system (OS) and software applications
A computer works with software programs that
are sent to its underlaying hardware architecture
for reading, interpretation and execution.
Computers are classified according to computing
power, capacity, size, mobility and other factors,
as a personal computers (PC), desktop computers,
laptop computers, minicomputers, handheld
computers and devices, mainframes or super
computers.
Computer Fundamental
A computer is an electronic machine that accepts data, stores
and processes data information. The computer is able to work
because there are instructions in its memory directing it. The parts of
the computer that you can see and touch, such as the keyboard,
monitor and the mouse are called hardware. The instructions that
direct the computer are called software or computer program. Data
which is raw facts that the user into the computer is called input.
These includes; words, numbers, sounds and pictures. When data is
entered into the computer, the computer processes the data produce
information which is output. For example, you enter 2+2 into the
computer as data, the computer processes it and the result is 4
which is information.
Data which is raw facts that the user into
the computer is called input. These includes;
words, numbers, sounds and pictures. When
data is entered into the computer, the computer
processes the data produce information which is
output. For example, you enter 2+2 into the
computer as data, the computer processes it
and the result is 4 which is information.
Three general categories of Computer:
1. Supercomputer – The fastest, largest, most powerful and most
expensive computer
2. Mainframe Computer - This is a little smaller and less powerful than the
supercomputer, but like the super computer it is so expensive.
3. Personal Computer (PC) – This is the computer that most people use in their
daily lives. This computer must smaller, less powerful and less expensive than
the super computer and the main frame computer..
Computer Hardware
You learned earlier that a computer has electronic and
mechanical parts known as hardware. Hardware also
includes input devices, output devices, system unit,
storages devices and communication devices. Without
these components we would not be able to use the
computer.

Input Devices – An input devices is any hardware


component that allows you the user to enter data into the
computer. There are many input devices.
Six of the most widely used input devices are:

1. Keyboard – You use the keyboard to type letters, numbers, and


symbols into the computer.
2. Mouse – The mouse is the pointing device that has pointer that
changes into different shape as you use the mouse. You click the
mouse by pressing and realizing the button. This action allows
you to enter data when using a mouse.
3. Scanner – This input devices copies from paper into computer.
4. Microphone – The microphone is usually use for
voice input into the computer.

5. Digital Camera – The digital camera allows you to


take pictures that you can input into your computer.

6. PC Video Camera – The PC video camera allows


you take both video and still images that you can
input onto your computer.
Output Devices – An output device is any hardware
components that gives information to the user.

Three Commonly used output devices are as follow:

1. Monitor – This output device display your information on a


screen.
2. Printer – This output device prints information on paper.
This type of printed output is called a hard copy
3. Speaker – Sounds is the type of output you will get from a
speaker.
Computer Software

The computer will not work without software. Software


also call programs. These are the instructions that tell the
computer what to do and how o do it. The two main
categories of software are system software and application
software. The system software also called the operating
system (OS) actually runs the computer. This software
controls all the operations of the computers and its devices.
All computers use system software and without the system
software the application software will not work. The most
common OS on a PC is the windows operating system and
for the Mac computer it would be the Mac operating system.
Application software is a program that allows
users to a specific tasks on the computer. There
are a number of different types of application
software available to do many of the tasks we do
daily.
Four examples of common application software and
what they are used for are:
1. Word Processing Application: One word processing program is Microsoft Word.
This program allow you to type letters, assignment and do any other written activity
on the computer.

2. Spreadsheet Application: Microsoft Excel is an example of a spreadsheet


program. One can use this program to create charts and do calculation.

3. E-mail Application: Outlook express is an email program that allows you to


receive and send e-mails.

4. Internet Application: Internet explorer is program that allows you to get


connected to the Internet and look at Web sites like the one you are reading now.
It is important to note that when you buy a computer the
computer comes with the operating system and some
software already installed. You may have to buy more
software and install them on the computers. Installs
mean to load the software onto the hard disk of the
computer so that you can run or use the software.

Like any other equipment the computer needs to be


cared for; let us discuss how we should go about caring
for our computer next meeting.
Storages keeps data, information and instruction for use in
the future. All computers use storage to keep the software that
makes the hardware work.

As a user you store a variety of data and information on


your computer or on storage media. Storage media are the
physical materials on which data , information and instruction are
kept. When a users saves information or data to a storage
medium he or she is storing a file, and this process is called
writing. When the file is opened, the process is called reading.
Common storage media are:

1. Hard Drive: This storage


medium which looks like
the one below, is a hard
drive. This medium comes
with the computer and is
always inside the
computer. It stores all the
programs that the
computer needs to work. In
addition users store their
data and information on the
hard drive.
2. Floppy Disk: This storage medium is considered to be a
portable storage medium. You put it into the computer save your
information on it, take it out, and take it with you whatever you go.
3. CD & DVD: These types of storages media hold much more information
than a floppy disk. They are also considered portable storage. These types
of storages media come in different forms. This mean that there are CDs
and DVDs that you can only save information on but you cannot erase the
information. In addition there are those that can both save information on
and erase the information you have saved.
4. Flash drive: This is a storage medium that is very easy to
around and it also holds more data than a floppy disk. As you can
see from the picture below it is very small when compared with the
others. They are called "flash drive" because they use flash
memory to store files. Flash memory is a type of computer chip.
Computer Care

Taking care of your computer is just as important as


taking care of your books. Both the internal and the
external parts of the computer have to cared for.
Scanning, defragging and reformatting are some of
the activities performed to clean up the hard drive.
These activities performed to clean up the hard drive.
These activities are the best left to a grown up and
such you should not attempt them.
Tasks to ensure the computer is clean
1. Keep Dust away: Dust your computer to keep it free of dust and dirt
2. Keep food away: Do not eat or drink while working on the computer
3. Use Clean Hands: Make sure your hands are clean before you type on the
keyboard or click the mouse.
4. Treat with respect: If you are having problems with your computer, ask for
help. Do not bang or hit the computer
5. Keep Off: Seeing that the computer is connected to electricity, this means
that lightning could be conducted to your computer through the electrical
connection. For this reason, it is best not to use your computer during storm.
6. Stop Virus Attack: A computer virus is a program written by a person on
purpose to harm other people’s computers. A computer virus is passed from
one computer to another when you share and download files without the
protection of an antivirus software.
7. Handle with Care: The way you handle your CDs will determine how long
they will last. Always hold the CD correctly.
Meaning of Internet

- It is sometimes called simply “Net”, is a worldwide


system of computer networks.
- a network of networks in which users at any one
computer can, if they have permission, get information from
any other computer (and sometimes talk directly to users at
other computers).
- connecting a computer to any other computer
anywhere in the world via dedicated routers and servers.
- basically, the way the internet works is by connecting
billions of computer together in things called networks.
- Networks (Net” for short) are clusters of computers
linked together so that they can send data to each other.
DIFFERENT TYPES OF INTERNET CONNECTIONS

1. Dial-up (Analog 56k) – Dial-up access is cheap but slow.


A modem connects to the internet after the computer dials a
phone number.
2. Digital Subscriber Line (DSL) - It is an internet connection that is
always “on”. This uses 2 lines so your phone is not tied up when your
computer is connected. There is also no need to dial a phone number to
connect.
3. Cable - provides an internet connection through a cable modem
and operates over cable TV lines. There are different speeds
depending on if you are uploading data transmissions or
downloading.
4. Wireless - wireless or Wi-Fi, as the name suggests, does not use
telephone lines or cables to connect to the internet. Instead, it uses radio
frequency. Wireless is also an always on connection and it can be
accessed from just about anywhere.
5. Satellite - accesses the internet via satellite in Earth’s orbit.
The enormous distance that a signal travels from earth to
satellite and back again
6. Cellular - cellular technology provides wireless internet
access through cell phones.
R.A. 10175 - Cybercrime
Prevention Act of 2012
Introduction
Computer crime refers to criminal activity involving a
computer. The computer may be used in the commission of a
crime or it may be the target. Net-crime refers to criminal use
of the Internet. Cyber-crimes are essentially a combination of
these two elements and can be best defined as “Offenses that
are committed against individuals or groups of individuals with
a criminal motive to internationally harm the reputation of the
victims directly or indirectly using modern telecommunication
network such as the Internet (Chat rooms, emails, notice
boards and groups) and mobile phone (SMS/MMS)”.
In its most simple form, cyber-crime can be
defined as any illegal activity that uses a computer
as its primary means of function. The U.S
Department of Justice broadens this definition to
include any illegal activity that uses a computer for
the storage of evidence. The term ‘cyber-crime’
can refer to offenses including criminal activity
against data, infringement of content and good
copyright, fraud, unauthorized access, child
pornography and cyber-stalking
There are two main categories that define
the make-up of cyber-crimes:
1. Those that target computer networks or
devices such as viruses, malware, or denial
service attacks.
2. T h o s e t h a t r e l a t e t o c r i m e s t h a t a r e
facilitated by computer networks or devices
like cyber-stalking, fraud, identity theft,
extortion, phishing (spam) and theft
classified information.
It is widely known that victims of
Internet crime are often reluctant to
report an offense to authorities. In some
cases the individual or organization may
not even be aware a crime has been
committed. Even though facilities for
reporting incidents of cyber-crime have
improved in recent years many victims
remain reluctant due essentially to
embarrassment.
The problem of cyber-crime seems
almost immeasurable in size. Looking at
recent trends and advances in mobile
technology and cloud computing we realize
it is an ever-evolving and rapidly changing
dynamic. There is growing evidence globally
of newly formed partnerships between
government and industry aimed at
prevention. These partnership create
opportunities to share information and
bolster law enforcement response to
organized Internet-based crime.
CYBERCRIME

- an illegal activity done using computers and internet.


- an unlawful act wherein computer either as a tool or
target or both.
- is any crime that takes place online or primarily online.
- offenses that are committed against individuals or
groups of individuals with a criminal motive to intentionally harm
the reputation of the victim or cause physical or mental harm, or
loss, to the victim directly or indirectly, using modern
telecommunication networks such as internet.
Have you ever have an email saying you have
inherited five million dollars from a prince in another
country?According to the email, all you need to do is
provide the sender with your bank account number, and
he’ll put the money in your account, making you an instant
millionaire!!!
Sometimes, this scheme actually works. As a result,
unfortunate individuals who provided the prince with their
bank account numbers later discovered that their account
had been cleaned out.
ELEMENTS OF CYBERCRIME:

1. Computer
2. Crime

Therefore, it involves a crime in a relationship with a


computer.

However the relationship can be indirect, the criminal can


not only use a computer to commit his crime but can also use
someone to make changes in a computer system, by
manipulating a key computer user.
CYBER SECURITY

Cyber security is the collection of tools, policies, security


concepts, security safeguards, guidelines, risk management
approaches, actions, training, best practices, assurance and
technologies that can be used to protect the cyber environment
and organization and user’s assets.

It involves protection of sensitive personal and business


information through prevention, detection and response to different
online attacks.

It actually preventing the attacks.


Smart ways to protect your personal data:

1. Create unique username and create strong password.

2. Update your software/OS.

3. Make It Harder for Other People to Get Credit in Your Name.

4. Don't Give Out Personal Information on the Phone or Through Email


or Text.

5. Be Careful About Opening Email Attachments or Clicking Links.

6. As much as possible, do not use your real picture on your social


media account.
NOTE:

Some phones are equipped with wireless technologies such


as bluetooth, that can be used to connect to other devices or
computers. You should disable these features when they are not
in use
ADVANTAGES OF CYBER SECURITY

1. It helps us to browse the site, website.

2. Internet Security process all the incoming and outgoing


data on your computer

3. It will defend us from hacks and virus

4. Application of cyber security used in our PC needs update


every week.
PUNISHABLE ACTS (RA 10175):

(a) Offenses against the confidentiality, integrity and availability of computer


data and systems

(b) Computer-related Offenses

(c) Content-related Offenses


(a) Offenses against the confidentiality, integrity and availability of computer data and
systems

(1) Illegal Access. – The access to the whole or any part of a computer system
without right.

(2) Illegal Interception. – The interception made by technical means without right of
any non-public transmission of computer data to, from, or within a computer system
including electromagnetic emissions from a computer system carrying such
computer data.
(a) Offenses against the confidentiality, integrity and availability of computer data and
systems (CONT...)

(3) Data Interference. — The intentional or reckless alteration, damaging, deletion


or deterioration of computer data, electronic document, or electronic data message,
without right, including the introduction or transmission of viruses.

(4) System Interference. — The intentional alteration or reckless hindering or


interference with the functioning of a computer or computer network by
inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing
computer data or program, electronic document, or electronic data message,
without right or authority, including the introduction or transmission of viruses.
(a) Offenses against the confidentiality, integrity and availability of computer data and
systems (CONT...)
(5) Misuse of Devices.

(i) The use, production, sale, procurement, importation, distribution, or


otherwise making available, without right, of:

(aa) A device, including a computer program, designed or adapted primarily


for the purpose of committing any of the offenses under this Act; or

(bb) A computer password, access code, or similar data by which the whole
or any part of a computer system is capable of being accessed with intent that it be
used for the purpose of committing any of the offenses under this Act.

(ii) The possession of an item referred to in paragraphs 5(i)(aa) or (bb)


above with intent to use said devices for the purpose of committing any of
the offenses under this section.
(a) Offenses against the confidentiality, integrity and availability of computer data and
systems (CONT...)

(6) Cyber-squatting. – The acquisition of a domain name over the internet in bad faith
to profit, mislead, destroy reputation, and deprive others from registering the same, if
such a domain name is:

(i) Similar, identical, or confusingly similar to an existing trademark registered


with the appropriate government agency at the time of the domain name registration:

(ii) Identical or in any way similar with the name of a person other than the
registrant, in case of a personal name; and

(iii) Acquired without right or with intellectual property interests in it.


(b) Computer-related Offenses
(1) Computer-related Forgery. —

(i) The input, alteration, or deletion of any computer data without right
resulting in inauthentic data with the intent that it be considered or acted upon for legal
purposes as if it were authentic, regardless whether or not the data is directly readable
and intelligible; or

(ii) The act of knowingly using computer data which is the product of computer-
related forgery as defined herein, for the purpose of perpetuating a fraudulent or
dishonest design.

(2) Computer-related Fraud. — The unauthorized input, alteration, or deletion of


computer data or program or interference in the functioning of a computer system,
causing damage thereby with fraudulent intent: Provided, That if no damage has yet
been caused, the penalty imposable shall be one (1) degree lower.
(b) Computer-related Offenses (CONT...)

(3) Computer-related Identity Theft. – The intentional acquisition, use,


misuse, transfer, possession, alteration or deletion of identifying information
belonging to another, whether natural or juridical, without right: Provided, That if
no damage has yet been caused, the penalty imposable shall be one (1)
degree lower.
(c) Content-related Offenses:

(1) Cybersex. — The willful engagement, maintenance, control, or


operation, directly or indirectly, of any lascivious exhibition of sexual
organs or sexual activity, with the aid of a computer system, for favor or
consideration.

(2) Child Pornography. — The unlawful or prohibited acts defined and


punishable by Republic Act No. 9775 or the Anti-Child Pornography Act
of 2009, committed through a computer system: Provided, That the
penalty to be imposed shall be (1) one degree higher than that provided
for in Republic Act No. 9775.
(c) Content-related Offenses (CONT...):

(3) Unsolicited Commercial Communications. — The transmission of


commercial electronic communication with the use of computer system
which seek to advertise, sell, or offer for sale products and services are
prohibited unless:

(i) There is prior affirmative consent from the recipient; or

(ii) The primary intent of the communication is for service and/or


administrative announcements from the sender to its existing users,
subscribers or customers; or
(c) Content-related Offenses (CONT...):

(iii) The following conditions are present:

(aa) The commercial electronic communication contains a simple, valid, and


reliable way for the recipient to reject. receipt of further commercial electronic
messages (opt-out) from the same source;

(bb) The commercial electronic communication does not purposely disguise


the source of the electronic message; and

(cc) The commercial electronic communication does not purposely include


misleading information in any part of the message in order to induce the recipients to
read the message.
(c) Content-related Offenses (CONT...):

(4) Libel. — The unlawful or prohibited acts of libel as defined in Article


355 of the Revised Penal Code, as amended, committed through a
computer system or any other similar means which may be devised in the
future.
Other Offenses. — The following acts shall also constitute an offense:

(a) Aiding or Abetting in the Commission of Cybercrime. – Any person who


willfully abets or aids in the commission of any of the offenses enumerated in
this Act shall be held liable.

(b) Attempt in the Commission of Cybercrime. — Any person who willfully


attempts to commit any of the offenses enumerated in this Act shall be held
liable

You might also like