Cyber Crime and Cyber Security
Cyber Crime
Cyber Crime is described as the convergence of computer- and internet-based offenses, encompassing unlawful acts committed against individuals or groups with the intent to deliberately damage the victim's reputation or to inflict physical or psychological harm, whether directly or indirectly, through modern telecommunication channels such as the Internet and mobile devices.
It is defined as any criminal activity that is either targeting or using a computer, a computer network, or networked device.
Cyber Criminology
Cyber Criminology is the study of causation of crimes that occur in cyberspace and its impact in the physical space.
General Categories of Cyber Crime
A. Computer as a Target:
Description: Offenses where the primary goal of the criminal act is to compromise the computer system itself (data, operation or its availability) rather than simply using it as a tool to commit another crime.
Identification: How to identify that your computer is the TARGET?
Confidentiality: Purpose of stealing or exposing protected data.
Integrity: Altering or corrupting data or programs.
Availability: Disrupting or denying access to systems or services.
B. Computer as Weapon:
Definition: When a computer is deliberately used to execute malicious actions against another system, network or entity. In this role, it becomes the platform from which the attack originates.
Characteristics:
Offensive Use: The computer is the launchpad for the crime.
Remote Reach: Attacks can be carried out across borders without physical presence.
Automation: Malicious software can run continuously without direct human input.
Scalability: One system can target thousands or millions of victims at once.
Examples:
Distributed Denial of Service (DDoS)
Cyberweapons: Malware, Worms, Trojans
Phishing Campaigns
Botnet Operations
Cyber Espionage
How Computer Acts as a Weapon:
Flooding a target server with traffic from multiple compromised systems.
Deploying malicious code to infiltrate or damage systems.
Sending deceptive emails from a controlled system to harvest credentials.
Using infected computers to perform coordinated attacks.
Launching targeted intrusions to steal sensitive information.
C. Components of a Computer:
Hardware: Physical components of the computer
Input Devices - Any hardware component that allows the user to enter data into the computer:
Keyboard
Mouse
Scanner
Microphone
Digital Camera
PC Video Camera
Output Devices - Components that provide information to the users:
Monitor
Printer
Speaker
Software: Instructions that tell the computer what to do and how to do it.
Two main categories of Software:
System Software: Also known as Operating System (OS) which runs the computer (e.g., iOS, Windows, Linux).
Application Software: Programs that allow users to perform specific tasks on the computer (e.g. Word Processing, Spreadsheet, E-Mail, Internet Applications).
The Classification of Cybercrime:
A. Computer Fraud and Financial Crimes
Involves the use of computers, networks, or digital systems to unlawfully obtain money, property or financial advantage through deception, manipulation, or breach of trust.
TYPE | DESCRIPTION | EXAMPLE |
|---|---|---|
Computer-Related Fraud | Unauthorized input, alteration, or deletion of data to gain benefit or cause loss. | Manipulating online banking records to transfer funds. |
Phishing & Social Engineering | Deceiving victims into revealing credentials or financial info. | Fake bank emails requesting login details. |
Credit/Debit Card Fraud | Using stolen card data for unauthorized purchases. | Skimming devices or hacked e-commerce sites. |
Online Investment & Ponzi Schemes | Fraudulent offers promising high returns. | Crypto "pump-and-dump" scams. |
Business E-mail Compromise | Impersonating executives to trick staff into wiring funds. | Fake supplier payment instructions. |
Identity Theft | Using stolen personal data for financial gain. | Opening loans under another person's name. |
Note: All computer-related fraud and forgery are punishable under the following laws:
RA 10175: Cybercrime Prevention Act of 2012
RA 8795: Electronic Commerce Act of 2020 (penalizes hacking and unauthorized access).
Revised Penal Code: Applies to estafa, swindling, and falsification when committed digitally.
RA 9160 (amended): Anti-Money Laundering (covers laundering of proceeds from cyber-enabled crimes).
B. Cyberterrorism
Definition: A premeditated use of cyberspace and digital tools to conduct attacks or threats causing or aiming to cause grave harm to life, property, critical infrastructure, or public order in pursuit of political, ideological, religious, or social objectives.
Merges elements of terrorism: Coercion, Intimidation, Fear with cybercrime: Digital Methods or Network Exploitation.
Methods and Examples of Cyberterrorism:
Distributed Denial of Service (DDoS): Overwhelming a target's server to disrupt services.
Example: 2007 Estonia attacks on government and banks.
Malware & Cyberweapons: Infiltrating systems to sabotage or damage.
Example: Stuxnet worm targeting Iran's nuclear program.
Jeopardizing Critical Infrastructure: Targeting power or water systems to cause outages.
Example: Ukraine power grid attacks (2015-2016).
C. Cyberextortion
Also known as Digital Blackmail or Ransomware.
Definition: an offender gains unauthorized access to a victim's data, systems or networks and then demands payment or other benefits to stop access, or prevent an attack, or restore the release of sensitive information.
Characteristics:
Criminal Leverage - holding data, systems, or services hostage.
Threat of Harm - could be reputational, operational, financial, or physical.
Digital Delivery - Conducted entirely via online or networked systems.
Anonymity Tools - Use of crypto wallets, TOR or anonymizing services.
Types of Cyberextortion:
TYPE | HOW IT WORKS | EXAMPLE |
|---|---|---|
Ransomware | Malware encrypts files; attacker demands payment for decryption key. | WannaCry (May 2017) |
Ransom DDoS (RDDos) | Flood with traffic; attacking a site/server demands payment to stop. | 2020 attacks on NZ stock exchange. |
Data Theft & Threat to Leak | Stealing sensitive data and threatening public release unless paid. | $50 million ransom of corporate data (bank balances, communications, customer records). |
Penalties Related to Cyberextortion in the Philippines:
Under RA 10175: Computer-related fraud (Sec.8); Illegal access, data interference, system interference (Sec. 4).
D. Cyberwarfare
Definition: It is the use of cyberattacks by state or state-sponsored actors against another state's digital infrastructure.
Key Characteristics:
State-Linked Actors: Often military units, intelligence agencies or proxy hackers for strategic or military advantage.
Targeting Critical Infrastructure/Sectors: Such as power systems, defense networks, communications.
Potential Kinetic Link: Cyber operations may be paired with physical military action.
Examples:
2020 SolarWinds breach (suspected state espionage).
Iran's Stuxnet worm targeting nuclear centrifuges.
E. Cyber Fraud
Cyber Fraud is a form of fraud committed through ICT (computers, networks, mobile devices, or the internet) to deceive individuals or organizations for unlawful gain.
Types and examples:
TYPE
MODUS OPERANDI
EXAMPLE SCENARIO
Phishing/Spoofing
Fake E-Mails, SMS or Websites to steal credentials.
"Bank" e-mail asks you to log in via a fake link.
Business E-mail Compromise (BEC)
Impersonating executives to request fund transfers.
Fraudster poses as CEO instructs urgent payment.
Online Loan/Investment Scams
Offering unreal returns via digital platforms.
Victim pays fees for a non-existent loan.
F. Obscene or Offensive Content
Defined by the Miller Test in the Philippines jurisprudence, which helps assess online videos, images, or texts that depict sexual conduct in a patently offensive way.
Legal Definitions include Art. 201 of RPC criminalizing publication of obscene materials.
G. Harassment
Refers to the use of ICT (Information and Communication Technology) to repeatedly target, intimidate, threaten or cause distress to an individual or group.
Overlaps with cyber libel, cyber stalking, or online sexual harassment.
H. Drug Trafficking
The use of digital technologies, online platforms and ICT tools to facilitate the production, sale, distribution or financing of illegal drugs, often paired with cryptocurrency transactions.
Investigative and Legal Framework
Republic Act 10175 - Cybercrime Prevention Act of 2012
Details constitutional requirements, jurisdiction, penalties, and responsibilities related to cybercrime cases in the Philippines.
Conclusion
This study guide provides a comprehensive overview of cybercrime classifications, characteristics, legal implications, and implications for law enforcement and cybersecurity, specifically under Philippine law. It highlights key penalties, types of cybercriminals, and methods for protecting oneself against these various cyber threats.