cyber part 1

Example Problem How Computer Acts as a Weapon Impact

Distributed Denial of Service Flooding a target server with traffic

from multiple compromised systems.

Website/Service downtime, Financial

Loss.

Cyberweapons: Malware, Worms,

Trojans

Deploying malicious code to infiltrate

or damage systems. Data Theft, Espionage, Sabotage.

Phishing Campaigns

Sending deceptive emails from a

controlled system to harvest

credentials.

Identity Theft, Fraud, Scam.

Large-scale disruption, spam,

Botnet Operations Using infected computers to perform

coordinated attacks.

ransomware delivery.

Cyber Espionage Launching targeted intrusions to steal

sensitive information.

National security threats, corporate

espionage.

yber Crime

- Described as the convergence of computer- and internet-based offenses, encompassing unlawful acts

commited against individuals or groups with the intent to deliberately damage the victim's reputation, or to inflict

physical or psychological harm, whether directly or indirectly, through modem telecommunication channels such

as the Internet and mobile devices.

- A criminal activity that either targets or uses a computer, a computer network or networked device.

Cyber Criminology

- Study of causation of crimes that occur in the cyberspace and its impact in the physical space.

General Categories of Cyber Crime

A. Computer as a Target

- Offenses where the primary goal of the criminal act is to compromise the computer system itself (data,

operation or its availability) rather than simply using it as a tool to commit another crime.

How to identify that your computer is the TARGET?

1. 2. Confidentiality - purpose of stealing or exposing protected data.

Integrity - altering or corrupting data or programs.

3. Availability - disrupting or denying access to systems or services.

B. Computer as Weapon

When it is deliberately used to execute malicious actions against another system, network or entity. In this

role, it becomes the platform from which the attack originates.

Characteristics:

1. Offensive Use - computer is the launchpad for the crime.

2. Remote Reach - attacks can be carried out across borders without physical presence.

3. Automation - malicious software can run continuously without direct human input.

4. Scalability - one system can target thousands or millions of victims at once.

Examples:

COMPONENTS OF COMPUTER

A. Hardware - physical components of computer

Input Devices - any hardware component that allows the user to enter data into the computer.

2

1.

2.

Keyboard

Mouse

S c a n n e r

Microphone

5. Digital Camera

6. PC Video Camera

Output Devices - component that gives information to the users.

1. Monitor

2. Printer

3. Speaker

B. Software - there are instructions that tell the computer what to do and how to do it.

2 Main Categories of Software:

1. System Software - Also known as Operating System (OS) which actualy runs the computer. (Ex. /OS, Windows,

Linux)

2. Application Software - programs that allows users to a specific task on the computer. (Ex. Word Processing,

Spreadsheet, E-Mail, Internet Applications)

THE CLASSIFICATION OF CYBERCRIME

A. COMPUTER FRAUD AND FINANCIAL CRIMES

- It involves the use of computers, networks, or digital systems to unlawfully obtain money, property or financial

advantage through deception, manipulation or breach of trust.

Note:

Any computer-related fraud and computer-related forgery are punishable offenses under the following laws:

* RA 10175 (Cybercrime Prevention Act of 2012

* RA 8795 (Electronic Commerce Act of 2020) - penalizes hacking and unauthorized access.

* Revised Penal Code - applies to estafa, swindling, and falsification when committed digitally.

* RA 9160 as amended (Anti-Money Laundering) - covers laundering of proceeds from cyber-enabled crimes.

OFFENSE TYPE

Computer-Related

Fraud

Prisión mayor (6 yrs

TYPE DESCRIPTION EXAMPLE

Computer-Related Fraud

Unauthorized input, alteration, or

deletion of data to gain benefit or

cause loss.

Manipulating online banking

records to transfer funds.

Phishing & Social Engineering Deceiving victims into revealing

credentials or financial info

Fake bank emails requesting login

details.

Credit/Debit Card Fraud Using stolen card data for

unauthorized purchases. Skimming devices or hacked e-

commerce sites.

Online Investment & Ponzi Schemes

Fraudulent offers promising high

returns. Crypto "pump-and-dump" scams.

Business E-mail Compromise Impersonating executives to trick

staff into wiring funds.

Fake supplier payment instructions.

Identity Theft financial gain. Using stolen personal data for

Opening loans under another

person's name.

3

Unauthorized input,

MO/TECHNIQUE LAW & PROVISION PENALTY

transaction logs to

alteration, or deletion RA 10175 (Sec. 8 in

relation to Sec. 6)

1 day-12 yrs) + fine

SCENARIO

Altering e-banking

redirect funds to

of computer data to

cause loss or gain.

≥ P200k; higher if

Creating forged e-

Computer-Related

Forgery

Input/alteration of data

info treated as

to produce inauthentic

RA 10175, Sec. 7

committed against

critical infrastructure

own account

Same as computer-

land titles uploaded

Phishing / Social

Engineering

authentic

Deceiving user into

revealing credentials

via fake sites/emails

RA 10175 (as

fraud or identity

provisions theft) + RPC related fraud

computer-related

estafa

RPC Art. 315

to government database

collecting ATM

PINS

Credit/Debit Card

Fraud

Use of stolen card

data for purchases or

cash advance

RA 8484 - Access

Devices Regulation

Act

yrs-20 yrs + fine up

to triple the value

defrauded

spoofed link

Imprisonment of 6

Skimming ATM

Online Investment /

Ponzi Schemes

Offering unreal returns

via digital platforms

Securities

Regulation Code (RA

8799) + RA 10175 if

Fine up to P5M +

cards in mall kiosk

Crypto "pump-and-

media groups

Business Email

Compromise (BEC)

Impersonating

executives/suppliers

to order fund transfers

computer used

RA 10175, Sec. 8;

RPC Estafa

imprisonment

Prison mayor + fine dump" via social

Finance officer

wires P5M to

"supplier" email

that was spoofed

Identity Theft for

Financial Gain

Using stolen personal

data to open accounts

or secure loans

RA 10175, Sec. 4(b)

Prisión mayor + fine

≥ P200k Loan approved

using hacked govt

ID data

Money Laundering

(linked to

cybercrime)

Concealing origins of

criminal proceeds via

e-transfers

RA 9160 (AMLA) as

amended РЗМ-P4M

7-14 yrs + fine

Routing hacked

bank funds through

online wallets

"Bank' email with

B. CYBERTERRORISM

- A premeditated use of cyberspace and digital tools to conduct attacks or threats that cause, or aim to cause

grave harm to life, property, critical infrastructure, or public order in pursuit of political, ideological, religious or

social objectives

- It merges the elements of terrorism: Coercion, Intimidation, Fear with cybercrime: Digital Methods or Network

Exploitation.

Figure 01 - Venn Diagram of Comparison of Cyberterrorism and Cybercrime

centrifuges

4

METHOD DESCRIPTION EXAMPLE

Distributed Denial of

Service (DDos)

Overwhelming a target's server

to disrupt services.

2007 Estonia attacks on

government and banks.

Estonia (2007) -

Massive DDos attack

on government, media

and banking systems.

Malware &

Cyberweapons Infiltrating systems to sabotage

or damage.

Stuxnet worm targeting Iran's

nuclear program.

Stuxnet (2010) -

Malware that

physically damaged

Iranian Nuclear

Jefacement &

Propaganda Hijacking websites to spread

Critical Infrastructure

Intrusion

Data Breach & Leak

extremist messages.

on

Jefacement &

Propaganda HiAccessing and manipulating

control systems.

Stealing sensitive data to

(2015-2016)

Terror hacked new sites. Ukraine Power Grid

Ukraine power grid attacks

group propaganda on

intimidate or destabilize.

Sony Pictures hack linked to

political retaliation.

(2015-2016) -

Cyberattacks causing

widespread blackouts

Sony Pcitures (2014)

Hack linked to political

retaliation over a film.

Comparison of Cybercrime and Cybertemorion

In the Philippine Legal Context, Cybercrime Prevention Act of 2012 does not

explicitly define cyberterrorism, such acts may be prosecuted under:

* Human Security Act of 2007 (RA 9372) or Anti-Terrorism Act of 2020

(RA 11479) - if the cyberattack meets the definition of terrorism

(Intent to cause death, serious injury or extensive damage to critical

infrastructure to intimidate the public or coerce the government).

* Cybercrime Act of 2012 (RA 10175) - for component offenses like

illegal access, system interference, or data interference.

Special Laws - RA 4200 (Anti-Wiretapping Law), RA 9995 (Anti-

Photo and Video Voyeurism Act), if relevant to the act.

Cybercine

C. CYBEREXTORTION

- Also known as Digital Blackmail or Ransomware.

- An offender gains unauthorized access to a victim's data, systems or networks and then demands payment or

other benefits to stop access, or prevent an attack, restore the release of sensitive information.

- Payment is often demanded in Cryptocurrency for anonymity. Even if paid, there is no guarantee the attacker

will honor the agreement.

Characteristics of Cyberextortion

1. Criminal Leverage - holding data, systems, or services hostage.

2. Threat of Harm - could be reputational, operational, financial, or physical.

3. Digital Delivery - Conducted entirely via online or networked systems.

TYPE 4. Anonymity Tools - Use of crypto wallets, TOR or anonymizing services.

HOW IT WORKS EXAMPLE Ransomware

Ransom DDos (RDDos)

Malware encrypts files;

attacker demands payment

for decryption key.

Flood with traffic; attacking a

Ransom DWannaCry (May 2017) DEFINITION

Ransomware+Worm

Hybrid - Self-spreading

worm, no user

interaction needed once

inside a network.

)

Malware encrypts fData Theft & Threat to Leak

) Ransomware+Worm

Hybrid - Self-site/server demands

payment to stop.

2020 attacks on NZ stock

exchange.

Trading halted for the

rest of the day.

Attacks resumed on

subsequent days,

forcing four days of

trading suspensions

with only intermittent

availability.

Stealing sensitive data and 2021 ACER breach. with Encrypted critical Acer

Email-based Extortion

unless paid

threatening Threatening to release

unless paid.

public release

$50million ransom

balances,

data unless paid.

Sext compromising extortion

scams targeting individuals.

family, friends,

— usually in

for anonymity.

files. cryptocurrency or cash

PENALTY (PH)

CYBEREXTORTION - PHILIPPINE CASE MATRIX

MODUS

leak the

datrecords).

Threatened toYEARICASE

2017 - Bicol

Businessman Case

ial wEmail-based

extortion (sextortion)

SUMMARY

Offender threatened

to release fabricated

obscene images

unless victim paid

P50,000 via

RA 10175 - Sec.

4(b)(3)(Computer-related

fraud), Sec. 4(a)(1)

(Illegal Access); RPC -

OUTCOME

Arrest of suspect in

entrapment; case

filed with DOJ

2018 - Cebu

Ransom DDoS

Attempt

Ransom DDoS site

flooded with

cease remittance center.

Local e-commerce

traffic; attacker

emailed demand for

attacks. $1,500 in Bitcoin to

extortion (sextortion)

OArt. 282 (Grave Threats)

RA 10175 - Sec. 4(a)(3)

4(a)(5) (System

Interference); RA 8484 if

(Data Interference), Sec.

used

cybercrime office

No payment made;

NBI Cybercrime

Division traced IP to

foreign actor.

Case under

2019 - Govemment

Attack

Data theft Agency

leak

Data Bre & threat Confidential

government

employee data

to

stolen; hackers

BTC to withhold

demanded P3M release.

payment instruments

RA 10175 - Sec. 4(a)(1)

(Illegal Access), Sec.

4(a)(3) (Data Interference); RA 9160

(Anti-Money Laundering

in

Act) for ransom

investigation;

CERT-PH involved in

response.

2020 - OFW

Sextortion Scam

Social engineering +

webcam recording

Of of OFW online,

recorded gained

trust intimate video

calls, then

demanded money to

avoid release.

proceeds

RA 10175, Anti-Photo

and Video Voyeurism Act

of 2009 (RA 9995); RPC

- Art. 294 (Robbery with

Violence/Intimidation) by

analogy

Victim reported to

PNP-ACG

cross-border

perpetrator identified

via INTERPOL.

2021 - Philippine

University

Ransomware

Academic ware

Attack

servers encrypted;

attacker demanded US$20,000 in crypto

for decryption key.

RA 10175 - Sec. 4(a)(3)

& 4(a)(5): RA 8484; RA

10173 (Data Privacy Act)

if personal data restored

backups compromised

University;

investigation

ongoing; no ransom

paid.

corporate data (bank

communications,

customer records).

Threatened to leak the

Victims are told the

material will be sent to

Stole sensitive

employers, or posted

online unless they pay

Note: Cyberextortion can be prosecuted under multiple laws:

6

Cybercrime Prevention Act of 2012 (RA 10175) - Computer-related fraud (Sec. 8) Ilegal access, data

interference, system interference (Sec. 4).

• RPC - Grave Threats, Coercion, Extortion (Art. 282-294)

3 Access Device Regulation Act (RA 8484) - i payment involved or if with ransom (Anti-Money Laundering). D.

CYBERWARFARE

-

It is the use of cyberattacks by a state or state-sponsored actors against another state's digital infrastructure.

With the intent to traditional warfare to cause harm comparable critical systems - such as disrupting, damaging

infrastructure or undermining national security.

Key Characteristics

1. State-Linked Actors - often military units, intelligence agencies or proxy hacker intent for strategic, military or

economic advantage.

2. Critical Infrastructure Grids, Financial Focus - power systems, defense networks, communications.

Potential Kinetic Link - cyber operation may accompany or trigger physical military action.

EXAMPLE

TYPE

Espionage

Sabotage DESCRIPTION

Stealing classified or sensitive data

from government or military systems. Damaging or disabling systems to

hinder operations.

DDos Attacks Overwhelming servers

Attacks on govemment infrastructure; power grid, transport

Targeting

attacks

2020 Solar Winds breach (suspected

state espionage)

Stuxnet worm targeting Iranian

Nuclear centrifuges.

2007 Estonia to disrupt services and

banks.

Ukraine power or water systems grid

outages (2015-2016)

Attacking financial and economy:

Disruption markets or payment

systems.

To influence public opinion.

2020 NZ stocks exchange DDos

extortion campaign

Proofreading; Disinformation

propaganda

Social campaigns during media

influence elections.

Note: Relevant provision to define cyberwarfare

* Illegal Access, Data Interference - attacks system interference, target Philippine Systems.

Misuse of Devices - for creating, distributing cyberweapons. If the act meets the definition of terrorism under

RA 11479 - Anti-Terrorism Act of 2020 (intent to cause death, serious injury, or extensive damage to critical

infrastructure to intimidate the public or coerce it may be prosecuted the goverment.

E. CYBER FRAUD

A form of fraud committed through ICT (computers, networks, mobile devices, or the internet) to deceive

individuals or organization for unlawful gain - usually financial, but sometimes involving data theft or

reputational harm.

TYPE MODUS OPERANDI EXAMPLE SCENARIO

Phishing/Spoofing

Business E-mail Compromise (BEC) Online Loan/Investment Scams

Fake E-mails, SMS or Websites to

steal credentials.

"Bank" e-mail asks you to log in via a

fake link.

Impersonating executives to request

fund transfers.

Fraudster poses as CEO instructs

Fake offers requiring "processing urgent payment.

7

Victim pays fess for a non-existent

loan.

fees

loan.

fees

E-Commerce Fraud

Digital Arrest Scam Identity Theft to coerce payment.

online

transactions.

Threats of arrest via fake police calls

Selling non-existent goods/services

erce payment.

fearing detention.

Buyer paUsing stolen personal data for

Senior citizen transfers millions

fearing detention.

Buyer pays; seller disappears

Fraudster opens bank accounts under

another name.

Penalties:

* RA. 10175 Cybercrime Prevention Act of 2012 - penalties for computer-elated fraud are prison mayor or fines

up to P500,000.00 higher if in relation to critical infrastructure.

* RA. 8792 Electronic Commerce Act of 2000 - Imprisonment up to 6 years and/or fines up to P1,000,000.00.

* Art. 315 RPC Estafa (Swindling) - Penalty depends on amount defrauded; can reach reclusion temporal.

F. OBSCENE OR OFFENSIVE CONTENT

- The content of websites and other electronic communication may be distasteful, obscene or offensive for a

variety of reasons.

Miler Test is used as a reference in the Philippines jurisprudence that help assess online videos, images or

texts. It depicts sexual conduct in a patently offensive way. (e.g. Pita Vs. Court of Appeals) - Here are some legal definitions:

a. Art. 201 of RPC - criminalizes the publication, exhibition and distribution of obscene materials, including

those offensives to race, religion or public morals.

b. RA 10175 Cybercrime Prevention Act of 2012 - Extends Art. 201 to acts committed through ICT like

uploading sharing or streaming obscene content online.

c. Customs Modemization and Tariff Act - Prohibits importation of obscene materials, including digital media.

Common Cybercrime (Obscene or Offensive Contents)

1.

I.

Uploading obscene videos to social media or adult sites accessible in the Philippines.

Live-streaming indecent show for paying viewers.

III.

Sharing obscene memes or deepfakes targeting individuals that may overlap with cyber libel or gender-based

online sexual harassment.

IV. Selling obscene digital content via encrypted messaging apps or dark web marketplaces.

Key Distinctions and Overlaps

- Victim Profile

Obscenity - may involve adults; focus on protecting public.

- Child Pornography - exclusively involves minors under 18 years old

- GBOSH - targets specific individuals, often to harassment context (Hate Crimes).

* Consent

- Obscenity - consent irrelevant if content meets obscene threshold.

- Child Pomography - consent invalid; minors cannot legally consent.

- GBOSH - revolves around lack of consent to receive/share sexual content.

- Protected Interests

- Obscenity - community morals and decency.

- Child Pornography - welfare and dignity of children.

GBOSH - dignity, safety and psychological well-being of individuals.

CATEGORY

CORE LEAGL

BASIS DEFINITION/ELEMENTS APPLICATION PENALTY

oscenity

Child Pornography

Revised Penal

Code Art. 201

(Immoral doctrines,

obscene

publications,

exhibitions, indecent

shows) as amended

by R.A. 10175

(Cybercnime

Prevention Act)

R.A. 9775

(Anti-Child

Pomography Act of

2009), as amended

by R.A. 10175

Material or act offensive

lo prevailing moral

standards, often sexual,

with no serious literary,

artistic, political, or

scientific value:

determined by

community standards

and tests such as Miller

Uploading,

streaming, or sharing

obscene content via

ICT; online indecent

performances;

distribution of

obscene e-books,

images, or videos

Prisión mayor or

P6k-P12k fine, or

both; one degree

higher if via ICT

Any representation of a

child (real or simulated)

engaged in explicit

sexual activity, o r any

lewd depiction of a child's

sexual organs

Producing,

distributing, or

accessing child porn

via internet; grooming

and live-streaming

child sexual abuse

Reclusion temporal

to reclusion

perpetua, plus fines

up to P5M; one

degree higher if via

ICT

Gender-Based

Online Sexual

Harassment

(GBOSH)

R.A. 11313 (Safe

Spaces Acf), plus

R.A. 10175 if

committed via ICT

Acts online or through

electronic means that

cause mental, emotional,

or psychological distress,

fear, or intimidation;

includes unwanted

sexual remarks, advances, and sharing o f

sexual content without

consent

Sending unsolicited

P100k-P500k fine

sexual

and/or 6-8 years

images/messages;

doxxing with sexual

imprisonment; higher if committed

threats,

by authority figures

non-consensual

or in

sharing of intimate

workplaces/schools

videos

Penalties:

Art. 201 of RPC - Prision Mayor or fine of P6,000.00 - P12,000.00 or both.

R A 10175 - Penalties for Art. 201 offenses are one degree higher when committed through ICT.

Civil liability for damages to victims.

G. HARASSMENT

- Refers to the use of ICT (Information and Communication Technology) to repeatedly target, intimidate, threaten

or cause distress to an individual or group.

- It can be direct (e.g. messages, posts, calls) or indirect (e.g. doxxing, impersonation, spreading harmful

- Often overlaps with related offenses like cyber libel, cyber stalking or online sexual harassment.

Common Cyber Harassment Forms

1. Cyberstalking - Continuous monitoring of online activity, sending repeated unwanted messages.

2. Cyberbullying - humiliating or intimidating someone online (often in school contexts).

Doxxing - Publishing private information to invite harassment.

5. Impersonation - creating fake accounts to damage reputation.

Threats & Intimidation - messages implying harm to life, property or reputation.

Legal Framework that punishes Cyber Harassment

LAW

9

R.A. 10175 - Cybercrime Prevention

signed Benigno A Q u i n o

SeP. 12, 2012

RELEVANT PROVISIONS

APPLICATION TO CYBER

Sec. 4(c)(4) - Cyber libel; Sec. 4(a)(1)

HARASSMENT

Defamatory posts, hacking accounts

at of 2012

interference

R.A. 11313 - Safe Spaces Act

Gender-Based Online Sexual

- Illegal access, Sec, 4(a)(3) - Harassment

R.A. 9262 - Anti-VAWC Act

hamm

Unwanted sexual remarks,

Data

advances, or threats via digital

platforms

R.A. 9995 - Anti-Photo and Video

Voyeurism Act

Psychological violence via ICT

Unauthorized recording/distribution of

intimate images

Revised Penal Code Arts. 282-283 - Grave threats;

Harassment by a partner/ex-partner

causing emotional distress

annoyance

- Often paired with cryptocurrency transactions to conceal identities and lauder proceeds.

METHODS PLATFORM/TOOL

Darknet Markets TOR-Hidden services

CRIMINOLOGICAL NOTES

Anonymous vendor-buyer networks;

escrow via crypto.

Encrypted Messaging Apps Signal, Telegrams, WhatApp End-to-end encryption hinders

interception; often used for "dead-

drop" coordination.

Social media Micro-Markets Facebook, Instagram, Tiktok Code words, emojis, and closed

groups to advertise and arrange

sales.

Illicit E-Pharmacies Rogue websites Sell prescription drugs without

authorization; often ship

internationally.

Cryptocurrency Laundering Bitcoin, Monero Obscures payment trail;

mixers/tumblers used to break

transaction links.

to harass, altering data to cause

'Revenge pom" or threats to release

private images

Threats of harm, persistent online

Art 287 - Unjust vexation

H. DRUG TRAFFICKING

- The use of digital technologies, online platforms and ICT tools to facilitate the production, sale, distribution or

financing of illegal drugs.

- It includes dark-net markets, encrypted messaging apps, social media, and illicit e-commerce sites.

TYPES OF CYBER CRIMINALS

1. SCRIPT KIDDIES

- Also known as wannabe hackers; they want to be a hacker (or thinks they are) but lacks any serious technical

expertise. They are usually only able to attack very weakly secured systems.

- Uses prewritten hacking tools or scripts created by others to launch cyberattacks.

2. SCAMMERS

- Scammers are digital manipulators who exploit technology and human psychology to cimmit fraud, identity theft,

and financial deception.

3. HACKER GROUP

- Usualy work anonymously and create tools for hacking. They often hack computers for no criminal reason and

are sometimes even hired by companies wanting to test their security.