PHILIP B.
MAGTAAN,
MSCRIM
LECTURER
CYBERCRIME
• It is criminal activity done using computers
and the Internet. This includes anything from
downloading illegal music files to stealing
millions of dollars from online bank
accounts. Cybercrime also includes non-
monetary offenses, such as creating and
distributing viruses on other computers or
posting confidential business information on
the Internet.
THE NEED FOR UNDERSTANDING
CYBERCRIME:
Because –
Everybody is using COMPUTERS.
From white collar criminals to terrorist
organizations and from teenagers to adults.
Conventional crimes like forgery, extortion,
kidnapping etc. are being committed with the help
of computers
New generation is growing up with computers.
MOST IMPORTANT – Monetary transactions are
moving on to the INTERNET.
NATURE OF CYBERCRIME
• Cyberspace provides a target rich
environment for criminals
• It is easy to carry out an attack, has lower
risks associated with it, is hard to trace
technically, and hard to prosecute.
• Sophisticated tools are readily available on
the Internet publicly.
• Access and attack can be from anywhere
and anonymous.
EFFECT OF CYBERCRIME TO
ECONOMY IN RELATION TO NATION
BUILDING
GLOBAL SCENE
• In 2014, global losses at close to $500
billion, or 0.7% of global income.
• IN 2016, cybercrime costs the world
almost $600 billion, or 0.8 percent of
global GDP.
(Source: Center for Strategic and International Studies)
The reasons for this growth are as
follows:
• Quick adoption of new technologies by
cybercriminals
• The increased number of new users online (these
tend to be from low-income countries with weak
cybersecurity)
• The increased ease of committing cybercrime,
with the growth of Cybercrime-as-a-Service
• An expanding number of cybercrime “centers”
that now include Brazil, India, North Korea, and
Vietnam
• A growing financial sophistication among top-
tier cybercriminals that, among other things,
ESTIMATED CYBERCRIME ACTIVITIES
Estimated Daily
Cybercrime
Activity
Malicious Scan 80 Billion
New Malware 300,000
Phishing 33,000
Ransomware 4,000
Records Lost to Hacking 780,000
• Malicious Scan - is a reconnaissance technique used to
collect information about a target’s machine or network
to facilitate an attack against it.
• Malware (malicious software) - is any program or file
that is harmful to a computer user that
includes viruses, worms, Trojan horses and spyware.
• Phishing - the fraudulent practice of sending emails
purporting to be from reputable companies in order to
induce individuals to reveal personal information, such
as passwords and credit card numbers.
• Ransomware - a type of malicious software designed to
block access to a computer system until a sum of money
is paid.
• Hacking - use a computer to gain unauthorized access to
data in a system.
REGIONAL DISTRIBUTION OF
CYBERCRIME
CYBERCRIME AROUND THE
WORLD
• Brazil: It is the second leading source of cyberattacks and
the third most-affected target.
• Germany: The country is home to the most sophisticated
underground internet economy in the EU.
• Japan: Previously protected from cybercrime because of the
language barrier and no infrastructure for money
laundering, Japan is seeing an increase, especially in
attacks targeting banks.
• United Kingdom: Online fraud and cybercrime account for
nearly half of all crimes, amounting to more than 5.5
million offenses annually.
• United Arab Emirates: It is the second most targeted
country in the world, with the cost of cybercrime estimated
at $1.4 billion per year.
PHILIPPINE SETTINGS
• Statistics show that from January to December 2016, the
Department of Justice, the National Bureau of Investigation
and the Philippine National Police received a total of 3,951
complaints for cybercrime and cyber-related offenses. This
is 53.92 percent higher than the number of complaints
received in 2015.
• Fifty million pesos (PhP50,000,000.00) is the Ph annual
budget for cyber security as mandated by RA 10175.
• Under the 2018 GA, the approved budget for Cybercrime
Investigation and Coordination Center was PhP19,722.00
intended for general administration and support, and
operations.
• In 2014, the country ranked 9th among Asia Pacific
countries when it comes to cybersecurity readiness,
according to the Global Cybersecurity Index
(GCI).
• In the 3rd quarter of 2015, meanwhile, Kaspersky
Lab reported that the Philippines took the 33rd spot
out of 233 countries prone to cybersecurity threats
– a huge jump from the previous quarter’s 43rd
rank.
• The security firm warned that the rise indicates that
“cyberattacks against the Philippines are
accelerating at full speed.”
• It may not show now, but “there is no doubt that
cybercriminals are now noticing the country”, with
17% of Filipino users’ systems infected with
malicious programs or malware used by
cybercriminals.
• Symantec’s latest Internet Security Threat Report
(ISTR) said the Philippines placed 20th globally and
3rd in the Asia Pacific region for social media scams.
• It added that in 2015, the country was hit by an
average of 17 ransomware attacks a day – a type of
virus that prevents a user from accessing this system.
• According to the 2014-2015 Cybercrime
Report of the Department of Justice’s Office of
Cybercrime, cyberespionage attacks or
intellectual property theft is on the rise as a
major threat.
• In fact, 31% of the tallied attacks in recent years
were directed against small businesses, while
33% of the 614 recorded cybercrime incidents
involved internet/ATM fraud and identity theft.
• The Philippine National Police Anti-Crime
Group reports that there were 3,368 recorded
cases of cybercrime from 2003 to 2014.
• Of these cases, the most common forms of cyber
crimes were identified as website defacements,
personal account infiltrations, and internet fraud.
• TheBangko Sentral ng Pilipinas estimates that
PhP175 million was lost due to ATM fraud in
2012 and PhP220 million in 2013.
LAWS ON CYBERCRIME
• Cybercrime Prevention Act of 2012 (RA 10175)
• Data Privacy Law of 2012 (RA 10173)
• Anti-Photo and Voyeurism Act of 2009 (RA 9995)
• Anti-Child Pornography Act of 2009 (RA 9775)
• E-Commerce Act of 2000 (RA 8792)
• Access Devices Regulation Act of 1998 (RA 8484)
• Anti-Wiretapping Law of 1965 (RA 4200)
CYBERCRIME OFFENSES
A.Offenses against the confidentiality,
integrity and availability of computer
data and systems
a. Illegal Access
b. Illegal Interception
c. Data Interference
d. System Interference
e. Misuse of Devices
f. Cyber-squatting
B. Computer-related Offenses
a. Computer-related Forgery
b. Computer-related Fraud
c. Computer-related Identity Theft
C. Content-related Offenses
a. Cybersex
b. Child Pornography
c. Unsolicited Commercial Communications
d. Libel
D. Other Offenses
a. Aiding or Abetting in the Commission of
Cybercrime
b. Attempt in the Commission of Cybercrime
LAW ENFORCEMENT AGENCY THAT
FIGHT CYBERCRIME
• Cybercrime Investigation and
Coordination Center (Department of
Science and Technology)
• Office of Cybercrime (Department of
Justice)
• Cybercrime Division (National
Bureau of Investigation)
• Anti-Cybercrime Group (Philippine
National Police
• Building on these efforts, there are two reasons
why the government is encouraged to sustain
and further develop the capacity to address cyber
crimes. First, domestic enforcement agencies,
specifically the National Bureau of Investigation
and the Philippine National Police, still lack the
expertise, capabilities, and resources to
effectively counter cyber threats. Given the
rapidly rising number of internet users, it is
impossible for the government to monitor
millions of internet users without advanced
network surveillance systems and sufficient
resources.
• Second, the mechanisms for inter-agency
cooperation are underdeveloped and need to be
strengthened. Since cyber crimes are pervasive
and persistent, it is crucial for the government to
create a cohesive strategy that defines the
responsibilities of each agency and sets out a
clear implementation plan that accurately
integrates their functions.
CASES UNDER INVESTIGATION
END OF PRESENTATION…