Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 130

CDI- 9

INTRODUCTION TO
CYBERCRIME AND
ENVIRONMENTAL
LAWS
REPUBLIC ACT NO. 10175
AN ACT DEFINING CYBERCRIME, PROVIDING FOR THE PREVENTION, INVESTIGATION,
SUPPRESSION AND THE IMPOSITION OF PENALTIES THEREFOR AND FOR OTHER
PURPOSES
Section 1. Title. — This Act shall be known as
the "Cybercrime Prevention Act of 2012″.
Section 4. Cybercrime Offenses. — The following acts constitute the offense of cybercrime punishable under
this Act:

(a) Offenses against the confidentiality, integrity and availability of computer data and systems:

(1) Illegal Access. – The access to the whole or any part of a computer system without right.

(2) Illegal Interception. – The interception made by technical means without right of any non-public
transmission of computer data to, from, or within a computer system including electromagnetic emissions
from a computer system carrying such computer data.

(3) Data Interference. — The intentional or reckless alteration, damaging, deletion or deterioration of
computer data, electronic document, or electronic data message, without right, including the introduction or
transmission of viruses.
(4) System Interference. — The intentional alteration or reckless hindering or interference with the functioning of a
computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing
computer data or program, electronic document, or electronic data message, without right or authority, including the
introduction or transmission of viruses.

(5) Misuse of Devices.

(i) The use, production, sale, procurement, importation, distribution, or otherwise making available, without right, of:

(aa) A device, including a computer program, designed or adapted primarily for the purpose of committing any of the
offenses under this Act; or

(bb) A computer password, access code, or similar data by which the whole or any part of a computer system is
capable of being accessed with intent that it be used for the purpose of committing any of the offenses under this Act.

(ii) The possession of an item referred to in paragraphs 5(i)(aa) or (bb) above with intent to use said devices for the
purpose of committing any of the offenses under this section.

(6) Cyber-squatting. – The acquisition of a domain name over the internet in bad faith to profit, mislead, destroy
reputation, and deprive others from registering the same, if such a domain name is:
• Computer crime refers to criminal activity involving a computer. The
computer may be used in the commission of a crime or it may be the target.
Net-crime refers to criminal use of the Internet. Cyber-crimes are essentially
a combination of these two elements and can be best defined as “Offenses
that are committed against individuals or groups of individuals with a
criminal motive to intentionally harm the reputation of the victim or cause
physical or mental harm to the victim directly or indirectly using modern
telecommunication networks such as the Internet (Chat rooms, emails, notice
boards and groups) and mobile phones (SMS/MMS)”.
• In its most simple form, cyber-crime can be defined as any illegal activity
that uses a computer as its primary means of function. The U.S. Department
of Justice broadens this definition to include any illegal activity that uses a
computer for the storage of evidence. The term ‘cyber-crime’ can refer to
offenses including criminal activity against data, infringement of content and
copyright, fraud, unauthorized access, child pornography and cyber-stalking.
• There are two main categories that define the make-up of cyber-crimes:
1. Those that target computer networks or devices such as viruses, malware, or denial of
service attacks.
2. Those that relate to crimes that are facilitated by computer networks or devices like
cyber-stalking, fraud, identity-theft, extortion, phishing (spam) and theft of classified
information.
Cyber-crimes have expanded to include activities that cross international borders and can
now be considered a global epidemic. The international legal system ensures cyber
criminals are held accountable through the International Criminal Court.L enforcement
agencies are faced with unique challenges and the anonymity of the Internet only
complicates the issues. There are problems with gathering evidence, cross-jurisdictional
issues and miscommunication related to reporting. It is widely Known that victims of
Internet crimes are often reluctant to report an offense to authorities. In some cases the
individual or organization may not even be aware a crime has been committed. Even
though facilities for reporting incidents of cyber-crime have improved in recent years
many victims remain reluctant due essentially to embarrassment.
• CHAPTER 1 The Computer and the Internet “Ever since men began to
modify their lives by using technology they have found themselves in a
series of Technological traps”. - Roger Revelle –

Famed mathematician Charles


Babbage designed a Victorian-
era computer called the
Analytical Engine. This is a
portion of the mill with a
printing mechanism.
• The computer was born not for entertainment or email but out of a need to
solve a serious number-crunching crisis. By 1880, the U.S. population had
grown so large that it took more than seven years to tabulate the U.S. Census
results. The government sought a faster way to get the job done, giving rise
to punch-card based computers that took up entire rooms.
• History of the Computer - The computer as we know it today had its
beginning with a 19th century English mathematics professor named Charles
Babbage. He designed the Analytical Engine and it was this design that the
basic framework of the computers of today are based on. Generally speaking,
computers can be classified into three generations. Each generation lasted for
a certain period of time, and each gave us either a new and improved
computer or an improvement to the existing computer.
• First generation:1937-1946 -In 1937 the first electronic digital computer was built by Dr. John V. Atanasoff and
Clifford Berry. It was called the Atanasoff-Berry Computer (ABC). In 1943 an electronic computer name the
Colossus was built for the military. Other developments continued until in 1946 the first general- purpose digital
computer, the Electronic Numerical Integrator and Computer (ENIAC) was built. It is said that this computer
weighed 30 tons, and had 18,000 vacuum tubes which was used for processing. When this computer was turned on
for the first time lights dim in sections of Philadelphia. Computers of this generation could only perform single task,
and they had no operating system.

• Second generation:1947-1962 -This generation of computers used transistors instead of vacuum tubes which were
more reliable. In 1951 the first computer for commercial use was introduced to the public; the Universal Automatic
Computer (UNIVAC 1). In 1953 the International Business Machine (IBM) 650 and 700 series computers made
their mark in the computer world. During this generation of computers over 100 computer programming languages
were developed, computers had memory and operating systems. Storage media such as tape and disk were in use
also were printers for output.

• Third generation: 1963 – present – The invention of integrated circuit brought us the third generation of
computers. With this invention computers became smaller, more powerful more reliable and they are able to run
many different programs at the same time. In1980 Microsoft Disk Operating System (MS-Dos) was born and in
1981 IBM introduced the personal computer (PC) for home and office use. Three years later Apple gave us the
Macintosh computer with its icon driven interface and the 90s gave us Windows operating system. As a result of the
various improvements to the development of the computer we have seen the computer being used in all areas of life.
It is a very useful tool that will continue to experience new development as time passes.
What does Computer mean? A computer is a machine or device that performs processes,
calculations and operations based on instructions provided by a software or hardware program. It
is designed to execute applications and provides a variety of solutions by combining integrated
hardware and software components.
• A computer is made up of multiple parts and components that facilitate user
functionality. A computer has two primary categories:
• 1. Hardware: Physical structure that houses a computer's processor, memory, storage,
communication ports and peripheral devices
• 2. Software: Includes operating system (OS) and software applications A computer
works with software programs that are sent to its underlying hardware architecture
for reading, interpretation and execution. Computers are classified according to
computing power, capacity, size, mobility and other factors, as personal computers
(PC), desktop computers, laptop computers, minicomputers, handheld computers and
devices, mainframes or supercomputers.
• Computer Fundamentals- A computer is an electronic machine that accepts data,
stores and processes data into information. The computer is able to work because
there are instructions in its memory directing it. The parts of the computer that you
can see and touch, such as the keyboard, monitor and the mouse are called hardware.
The instructions that direct the computer are called software or computer program.
• Computers are usually categories into three general categories:
• 1. Supercomputer- The fastest, largest, most powerful and most expensive
computer.
• 2. Mainframe Computer- This is a little smaller and less powerful than the
supercomputer, but, like the supercomputer it is also expensive.
• 3. Personal Computer (PC)-This is the computer that most people use in their
daily lives. This computer is much smaller, less powerful and less expensive
than the supercomputer and the mainframe computer.
• There are two main types of personal computers. Macintosh (Macs) and the PC
compatibles (PC).The main difference between the two is the operating systems
and the processors they use. This category of computer has two additional types
of computers. These are mobile computer and handheld computer. The most
popular type of mobile computer is the notebook or laptop computer, and the
handheld computer is a very small PC that you can hold in your hand.
• Computer Hardware You learned earlier that a computer has electronic and mechanical parts
known as hardware. Hardware also includes input devices, output devices, system unit,
storage devices and communication devices. Without these components we would not be
able to use the computer.
Input Devices-An input device is any hardware component that allows you the user to enter
data into the computer. There are many input devices. Six of the most widely used input
devices are:
1. Keyboard—You use the keyboard to type letters, numbers, and symbols into the computer.
2. Mouse-The mouse is a pointing device that has a pointer that changes into different shapes
as you use the mouse. You click the mouse by pressing and releasing the button. This action
allows you to enter data when using a mouse.
3. Scanner- This input device copies from paper into your computer.
4. Microphone- The microphone is usually used for voice input into the computer.
5. Digital Camera- The digital camera allows you to take pictures that you can input into your
computer.
6. PC Video Camera- The PC video camera allows you take both video and still images that
• Output Devices- An output device is any hardware component that gives
information to the user. Three commonly used output devices are as follow:
1. Monitor- This output device displays your information on a screen,
2. Printer- This output device prints information on paper. This type of printed output
is called a hard copy
3.Speaker-Sound is the type of output you will get from a speaker.
Computer Software The computer will not work without software. Software also call
programs. These are the instructions that tell the computer what to do and how o do
it. The two main categories of software are system software and application software.
The system software also called the operating system(OS)actually runs the computer.
This software controls all the operations of the computer and its devices. All
computers use system software and without the system software the application
software will not work. The most common OS on a PC is the Windows operating
system and for the Mac computer it would be the Mac operating system.
• Four examples of common application software and what they are used for
are:
1. Word Processing Application: One word processing program is Microsoft
Word. This program allows you to type letters, assignments and do any other
written activity on the computer.
2. Spreadsheet Application: Microsoft Excel is an example of a spreadsheet
program. One can use this program to create charts and do calculations.
3. E-mail Application: Outlook Express is an e-mail program that allows you to
receive and send e-mails.
4. Internet Application: Internet Explorer is a program that allows you to get
connected to the Internet and look at Web sites like the one you are reading
now.
• Storage Media Storage keeps data, information and instructions for use in the future. All
computers use storage to keep the software that makes the hardware work.
Common storage media are:
1. Hard Drive: This storage medium which looks like the one below, is a hard drive. This medium
comes with the computer and is always inside the computer. It stores all the programs that the
computer needs to work. In addition users store their data and information on the hard drive.
2. Floppy Disk: This storage medium is considered to be a portable storage medium. You put it
into the computer save your information on it, take it out, and take it with you wherever you go.
3. CD & DVD: These types of storage media hold much more information than a floppy disk.
They are also considered portable storage. These types of storage media come in different
forms. This means that there are CDs and DVDs that you can only save information on but you
cannot erase the information. In addition there are those that can both save information on and
erase the information you have saved.
4. USB Flash Drive: This is a storage medium that is very easy to carry around and it also holds
more data than a floppy disk. As you can see from the picture below it is very small when
compared with the others.
• Computer Care- Taking care of your computer is just as important as taking care of your books. Both the
internal and the external parts of the computer have to be cared for. Scanning, defragging and
reformatting are some of the activities performed to clean up the hard drive. These activities are best left
to a grown up and such you should not attempt them.
1. Keep Dust Away: Dust your computer to keep it free of dust and dirt.
2. Keep Food Away: Do not eat or drink while working on the computer.
3. Use Clean Hands: Make sure your hands are clean before you type on the keyboard of click the mouse.
4. Treat With Respect: If you are having problems with your computer, ask for help. Do not bang or hit
the computer.
5. Keep Off: Seeing that the computer is connected to electricity, this means that lightning could be
conducted to your computer through the electrical connection. For this reason it is best not to use your
computer during a storm.
6. Stop Virus Attack: A computer virus is a program written by a person on purpose to harm other
peoples’ computers. A computer virus is passed from one computer o another when you share and
download files without the protection of an antivirus software. For this reason you should get
permission before downloading files.
7. Handle With Care: The way you handle your CDs will determine how long they will last. Always hold
the CD correctly.
• History of Internet- The Internet Timeline begins in1962,before the word ‘Internet’
is invented. The world’s 10,000 computers are primitive, although they cost
hundreds of thousands of dollars. They have only a few thousand words of
magnetic core memory, and programming them is far from easy.
• Vint Cerf. Widely known as a “Father of the Internet,” Cerf is the co-designer of
the TCP/IP protocols and the architecture of the Internet.
• In December 1997,President Bill Clinton presented the U.S. National Medal of
Technology to Cerf and his colleague, Robert E. Kahn, founding and developing
the Internet. Michael Bauer, the original owner of Internet.org before Facebook
founder and CEO Mark Zuckerberg, discovered what became of his treasured
domain just like anyone else: while watching Chris Cuomo on CNN.
• Meaning of Internet The Internet, sometimes called simply “the Net,” is a
worldwide system of computer networks-a network of networks in which users at
any one computer can, if they have permission, get information from any other
computer (and sometimes talk directly users at other computers).
• Different Types of Internet Connections- As technology changes, faster internet
connections are needed to handle those changes.
1. Dial-Up (Analog 56K). -Dial-up access is cheap but slow. A modem (internal
or external) connects to the Internet after the computer dials a phone number.
2. DSL. DSL stands for Digital Subscriber Line. It is an internet connection that
is always “on”. This uses 2 lines so your phone is not tied up when your
computer is connected. There is also no need to dial a phone number to connect.
DSL uses a router to transport data and the range of connection speed, depending
on the service offered, is between 128K to 8 Mbps.
3. Cable. Cable provides an internet connection through a cable modem and
operates over cable TV lines. There are different speeds depending on if you are
uploading data transmissions or downloading. Since the coax cable provides a
much greater bandwidth over dial-up or DSL telephone lines, you can get faster
access. Cable speeds range from 512K to 20 Mbps
4. Wireless. Wireless, or Wi-Fi, as the name suggests, does not use telephone lines or
cables to connect to the internet. Instead, it uses radio frequency. Wireless is also an
always on connection and it can be accessed from just about anywhere. Wireless networks
are growing in coverage areas by the minute so when I mean access from just about
anywhere, I really mean it. Speeds will vary, and the range is between 5 Mbps to 20 Mbps.
5. Satellite. Satellite accesses the internet via a satellite in Earth’s orbit. The enormous
distance that a signal travels from earth to satellite and back again, provides a delayed
connection compared to cable and DSL. Satellite connection speeds are around 512K to
2.0 Mbps
6. Cellular. Cellular technology provides wireless Internet ccess through cell phones. The
speeds vary depending on the provider, but the most common are 3G and 4G speeds A 3G
is a term that describes a 3rd generation cellular network obtaining mobile speeds of
around 2.0 Mbps. 4G is the fourth generation of cellular wireless standards. The goal of
4G is to achieve peak mobile speeds of 100 Mbps but the reality is about 21 Mbps
currently.
• Advantages and Risks of information and communication technologies(ICTs)
The introduction of ICTs into many aspects of everyday life has led to the
development of the modern concept of the information society. This
development of the information society offers great opportunities.
Unhindered access to information can support democracy, as the flow of
information is taken out of the control of state authorities (as has happened,
for example, in Eastern Europe and North Africa).Technical developments
have improved daily life -for example, online banking and shopping, the use
of mobile data services and voice over Internet protocol (VolP) telephony are
just some examples of how far the integration of ICTs into our daily lives has
advanced.
• What is Cybercrime?- Cybercrime is an activity done using computers and internet. We can
say that it is an unlawful act wherein the computer either as a tool or target or both.
Cybercrime is any crime that takes place online or primarily online. That can run the gamut
from the aforementioned identity theft and other security breaches to things like “revenge
porn,” cyber-stalking, harassment, bullying and even child sexual exploitation. Terrorists
are collaborating more on the Internet, moving that most terrifying of crimes into
cyberspace.
• HISTORY OF CYBER CRIME The first recorded cybercrime took place in 1820. That is
not surprising considering the fact that the abacus, which is thought to be the earliest from
of a computer, has been around since 3500 B.C. In India, Japan and China, the era of
modern computer, however, began with the analytical engine of Charles Babbage. The first
spam email took place in 1976 when it was sent out over the ARPANT. The first virus was
installed on an Apple computer in 1982 when a high school student, Rich Skrenta,
developed the EIK Cloner. Cybercrime first started with hackers trying to break into
computer networks. Some did it just for the thrill of accessing high-level security networks,
but others sought to gain sensitive, classified material. Eventually, criminals started to
infect computer systems with computer viruses, which led to breakdowns on personal and
• Cybersecurity and Cybercrime “Cybersecurity is the collection of tools,
policies, security concepts, security safeguards, guidelines, risk management
approaches, actions, training, best practices, assurance and technologies that
can be used to protect the cyber environment and organization and user’s
assets. Organization and user’s assets include connected computing devices,
personnel, infrastructure, applications, services, telecommunication systems,
and the totality of transmitted and/or stored information in the cyber
environment. Cybersecurity strives to ensure the attainment and maintenance
of the security properties of the organization and user’s assets against
relevant security risks in the cyber environment. Cyber Security involves
protection of sensitive personal and business information through prevention,
detection and response to different online attacks. Cyber security actually
preventing the attacks,
• DISABLE REMOTE CONNECTIVITY: Some PDA’s and phones are equipped
with wireless technologies, such as Bluetooth, that can be used to connect to other
devices or computers. You should disable these features when they are not in use.
ADVANTAGES OF CYBER SECURITY The cyber security will defend us from
critical attacks. 1. It helps us to browse the site, website. 2. Internet Security
process all the incoming and outgoing data on your computer. 3. It will defend us
from hacks and virus. 4. Application of cyber security used in our PC needs
update every week.
• SAFETY TIPS TO CYBER CRIME
• 1. Use antivirus Software
• 2. Insert Firewalls
• 3. Uninstall unnecessary software
• 4. Maintain backup
• 5. Check security settings
• Typology of Cyber Crime In a traditional means, a term crime covers a broad range of
offenses. It is from this broad range, the typology or classification of cybercrime
became difficult. A good example of an international instrument which tried to
categorize types of cybercrime is the Council of Europe the History of Global
Harmonization on Cyber Crime Legislation-The Road to Geneva, December 2008.
• The Convention on Cyber Crime distinguishes between four different types of offenses
1. Offenses against the confidentiality, integrity and availability of computer data and
systems, such as illegal access, illegal interception, data interference, system interference,
and misuse of devoice;
2. Computer-related offenses, such as computer-related forgery and computer related
Fraud
3. Content-related offenses, such as offenses related to child pornography;
4. Copyright-related offenses, such as offenses related to copyright infringements and
related rights.
• The term “cybercrime” is used to cover a wide variety of criminal conduct.
As recognized crimes include a broad range of different offenses, it is
difficult to develop a typology or classification system for cybercrime. One
approach can be found in the Convention on Cybercrime, which
distinguishes between four different types of offenses:
1. Offenses against the confidentiality, integrity and availability of computer
data and systems;
2. Computer-related offenses;
3. Content-related offenses;
4. Copyright-related offenses.
Cyberterrorism Government officials and information technology security
specialists have documented a significant increase in Internet problems and
server scans since early 2001. But there is a growing concern among
government agencies such as the Federal Bureau of Investigations (FBI) and
the Central Intelligence Agency (CIA) that such intrusions are part of an
organized effort by cyberterrorists’, foreign intelligence services, or other
groups to map potential security holes in critical systems. A cyberterrorist is
someone who intimidates or coerces a government or an organization to
advance his or her political or social objectives by launching a computer-based
attack against computers, networks, or the information stored on them.
• Cyber-extortion Cyber-extortion occurs when a website, e-mail server, or
computer system is subjected to or threatened with repeated denial of service
or other attacks by malicious hackers. These hackers demand money in return
for promising to stop the attacks and to offer “protection”. According to the
Federal Bureau of Investigation, cyber-crime extortionists are increasingly
attacking corporate websites and networks, crippling their ability to operate
and demanding payments to restore their service. More than 20 cases are
reported each month to the FBI and many go unreported in order to keep the
victim’s name out of the public domain. Perpetrators typically use a
distributed denial-of service attack.
• Crimes that primarily target computer networks or devices include:
1. Computer viruses
2. Denial-of-service attacks
3. Malware (malicious code)
• What does Spamming mean? Spamming is the use of electronic messaging systems
like e-mails and other digital delivery systems and broadcast media to send unwanted
bulk messages indiscriminately. The term spamming is also applied to other media
like in internet forums, instant messaging, and mobile text messaging, social
networking spam, junk fax transmissions, television advertising and sharing network
spam.
• Crimes that use computer networks or devices to advance other ends include: Fraud
and identity theft (although this increasingly uses malware, hacking or phishing,
making it an example of both «computer as target» and «computer as tool» crime)
• Information warfare
• Phishing scams
• Spam
• Propagation of illegal obscene or offensive content, including harassment and threats
• Phishing is mostly propagated via email. Phishing emails may contain links to other
websites that are affected by malware. Or, they may contain links to fake online
banking or other websites used to steal private account information.
• Online harassment- Whereas content may be offensive in a non-specific way,
harassment directs obscenities and derogatory comments at specific individuals
focusing for example on gender, race, religion, nationality, sexual orientation. This
often occurs in chat rooms, through newsgroups, and by sending hate e-mail to
interested parties. Harassment on the internet also includes revenge porn.
• Drug trafficking Dark net markets are used to buy and sell recreational drugs
online. Some drug traffickers use encrypted messaging tools to communicate with
drug mules. The dark web site Silk Road was a major online marketplace for drugs
before it was shut down by law enforcement (then reopened under new
management, and then shut down by law enforcement again). After Silk Road 2.0
went down, Silk Road 3 Reloaded emerged. However, it was just an older
marketplace named Diabolus Market, that used the name for more exposure from
the brand’s previous success.
• CATEGORIES OF CYBER CRIME We can categorize cybercrime in two
ways
1. The computer as a target :-using a computer to attacks other computer, e.g.
Hacking, virus/worms attacks, Dos attack etc.
2. The computer as a weapon :- using a computer to commit real world crime
e.g. cyber terrorism, credit card fraud and pornography etc.
Legislation Due to easily exploitable laws, cybercriminals use developing
countries in order to evade detection and prosecution from law enforcement. In
developing countries, such as the Philippines, laws against cybercrime are
weak or sometimes nonexistent. These weak laws allow cybercriminals to
strike from international borders and remain undetected.
• Stalking Defined Carrie walks back to her dorm room, but she cannot shake
the feeling that she’s being watched. Over the last two weeks, she has received
several blocked calls to her cell phone. Sometimes she will answer the calls, and
other times she lets it go to voicemail. When she answers, no one speaks, and
whoever it is does not leave a voicemail message. Carrie has also been getting
emails to her school account. The emails tell her that she is pretty, and there will
be comments about the pants or shirt she wore that day. Tonight, Carrie feels she
needs to talk to the police because she feels someone is stalking her.
• Types of Stalking – Stalking can occur in several forms. The first type of
stalking is when the perpetrator follows an individual and watches them. Maria
is being watched while she is walking back to her home. Her stalker is using
surveillance stalking to track and follow her. With surveillance stalking, the
perpetrator is known to sit outside the home, place of work, school, or other
places that the individual usually go to regularly. Along with surveillance
stalking, there is cyberstalking.
• Types of Stalkers Actions define the type of stalking, but personalities
combined with the actions define the type of stalker:
1. Rejected Stalker- This type of stalker becomes upset when the friendship
or romantic relationship has ended. The rejected stalker is not only self-
centered and jealous but also over-dependent and persistent.
2. Resentful Stalker – The resentful stalker feels humiliated that the
relationship has ended and seeks revenge upon the victim. Resentful
stalkers are often irrationally paranoid and are known to verbally assault
their victims.
3. Predatory Stalker- The predatory stalker seeks power and sexual
gratification. They will not make physical contact but will use surveillance
to track the victim.
4. Intimacy Seeker– The intimacy-seeking stalker seeks an intimate and
romantic relationship with the victim. When the stalker is rejected by the
victim, he or she will continually phone the victim, write the victim letters, and
can become jealous and violent if the victim enters into a relationship with
someone else.
5. Incompetent Suitor- The incompetent suitor stalker usually has inadequate
social skills. They want a relationship with the victim but do not have the
ability to realize he or she is not meant to be with the victim.
6. Erotomania and Morbidly Infatuated- This type of stalker feels that the
victim loves them even though they may not have had any contact with the
victim. The stalker is usually paranoid, prefers suitors in a higher social class,
and will repeatedly approach the victim.
• Cyberstalking is the use of the Internet or other electronic means to stalk or
harass an individual, group, or organization. It may include false accusations,
defamation, slander and libel. It may also include monitoring, identity theft,
threats, vandalism, solicitation for sex, or gathering information that may be
used to threaten, embarrass or harass. Cyberstalking is often accompanied by
real time or offline stalking. In many jurisdictions, such as California, both
are criminal offenses. Both are motivated by a desire to control, intimidate or
influence a victim.
• The Hacker, Hacking Tactics and the Victim
• Who is the hacker?
Hacking emerged with the invention of computers. The term “hacker” has a variety of
definitions. Among computer professionals, it is applied to someone who is proficient at
software programming, debugging systems, or identifying vulnerabilities in a given
computer, software application, or computer network. These are valuable skills for
computer programmers and technicians. However “hacker” has taken on a negative
meaning among the public and in the media. Outside the computer industry, the term is
now generally used to describe a person with these skills who decides to apply them
toward a damaging or illegal purpose.
A hacker is an individual who uses computer, networking or other skills to overcome a
technical problem. The term hacker may refer to anyone with technical skills, but it often
refers to a person who uses his or her abilities to gain unauthorized access to systems or
networks in order to commit crimes. A hacker may, for example, steal information to hurt
people via identity theft, damage or bring down systems and often, hold those systems
hostage to collect ransom.
• Types of Hackers The security community has informally used references to
hat color as a way different types of hacker are identified, usually divided
into three types:
1. White hat
2. Black hat
3. Gray hat
White hat hackers, also known as ethical hackers, strive to operate in the
public’s best interest, rather than to create turmoil. Many white hat hackers
work doing penetration, hired to attempt to break into the company’s networks
to find and report on security vulnerabilities. The security firms then help their
customers mitigate security issues before criminal hackers can exploit them
• Black hat hackers intentionally gain unauthorized access to networks and systems
with malicious intent, whether to steal data, spread malware or profit from
ransomware, vandalize or otherwise damage systems or for any other reason
including gaining notoriety. Black hat hackers are criminals by definition because
they violate laws against accessing systems without authorization, but they may
also engage in other illegal activity, including identity theft and distributed denial-
of-service attacks.
• Gray hat hackers fall somewhere between white hat hackers and black hat
hackers. While their motives may be similar to those of white hat hackers, gray hats
are more likely than white hat hackers to access systems without authorization; at
the same time, they are more likely than black hat hackers to avoid doing
unnecessary damage to the systems they hack. Although they aren’t typically-or
only-motivated by money, gray hat hackers nay offer to fix vulnerabilities they
have discovered through their own, unauthorized, activities rather than using their
knowledge to exploit vulnerabilities for illegal profit.
• A black hat hacker accesses systems without authorization and steals or
damages data Hackers of all types participate in forums to exchange hacking
information and tradecraft. There are a number of hacker forums where white
hat hackers can discuss or ask questions about hacking. Other white hat
forums offer technical guides with step by-step instructions on hacking.
• The Hacker Attitude
1. The world is full of fascinating problems waiting to be solved
2. No problem should ever have to be solved twice
3. Boredom and drudgery are evil
4. Freedom is good
5. Attitude is no substitute for competence
• Hackers solve problems and build things, and they believe in freedom and
voluntary mutual help. To be accepted as a hacker, you have to behave as
though you have this kind of attitude yourself. And to behave as though you
have the attitude, you have to really believe the attitude.
• Unethical hacking can be called an illegal activity to get unauthorized
information by modifying a system’s features and exploiting its loopholes. In
this world where most of the things happen online, hacking provides wider
opportunities for the hackers to gain unauthorized access to the unclassified
information like credit card details, email account details, and other personal
information.
• Hacking techniques that are commonly used to get your Personal information in an
unauthorized way. Hacking techniques
1. Bait and switch Using bait and switch hacking technique, an attacker can buy
advertising spaces on the websites. Later, when a user clicks on the ad, he might get
directed to a page that’s infected with malware. This way, they can further install
malware or adware on your computer. The ads and download links shown in this
technique are very attractive and users are expected to end up clicking on the same.
2. Cookie theft The cookies of a browser keep our personal data such as browsing
history, username, and passwords for different sites that we access. Once the hacker
gets the access to your cookie, he can even authenticate himself as you on a
browser. A popular method to carry out this attack is to encourage a user’s IP
packets to pass through attacker’s machine. Also known as Side Jacking or Session
Hijacking, this attack is easy to carry out if the user is not using SSL (https) for the
complete session. On the websites where you enter your password and banking
details, it’s of utmost importance for them to make their connections encrypted.
3. Click Jacking Attacks Click Jacking is also known by a different name, Ul
Redress. In this attack, the hacker hides the actual Ul where the victim is
supposed to click. This behavior is very common in app download, movie
streaming, and torrent websites. While they mostly employ this technique to
earn advertising dollars, others can use it to steal your personal information. In
another word, in this type of hacking, the attacker hijacks the clicks of the
victim that aren’t meant for the exact page, but for a page where the hacker
wants you to be. It works by fooling an internet user into performing an
undesired action by clicking on hidden link.
4. Virus, Trojan etc. Virus or trojans are malicious software programs which
get installed into the victim’s system and keeps sending the victims data to the
hacker. They can also lock your files, serve fraud advertisement, divert traffic,
sniff your data, or spread on all the computer connected to your network.
5. Phishing is a hacking technique using which a hacker replicates the most
accessed sites and traps the victim by sending that spoofed link. Combined
with social engineering, It becomes one of the most commonly used and
deadliest attack vectors.
6. Eavesdropping (Passive Attacks) Unlike other attacks which are active in
nature, using a passive attack, a hacker just monitors the computer systems and
networks to gain some unwanted information. The motive behind
eavesdropping is not to harm the system but to get some information without
being identified. These types of hackers can target email, instant messaging
services, phone calls, web browsing, and other methods of communication.
Those who indulge in such activities are generally black hat hackers,
government agencies, etc.
7. Fake WAP Even just for fun, a hacker can use software to fake a wireless access point.
This WAP connects to the official public place WAP. Once you get connected the fake
WAP, a hacker can access your data, just like in the above case. It’s one of the easier hacks
to accomplish and one just needs a simple software and wireless network. Anyone can
name their WAP as some legit name like “Heathrow Airport WiFi” or “Starbucks WiFi”
and start spying on you. One of the best ways to protect yourself from such attacks is
using a quality VPN service.
8. Waterhole attacks If you are a big fan of Discovery or National Geographic channels,
you could relate easily with the waterhole attacks. To poison a place, in this case, the
hacker hits the most accessible physical point of the victim. Once hackers are aware of
your timings, using this type of hacking, they might create a fake Wi-Fi access point and
modify your most visited website to redirect them to you to get your personal information.
As this attack collects information on a user from a specific place, detecting the attacker is
even harder. One of the best ways to protect yourself again such types of hacking attacks
is to follow basic security practices and keep your software/OS updated.
9. Denial of Service (DoS\DDoS)- A Denial of Service attack is a hacking
technique to take down a site or server by flooding that site or server with a lot
of traffic that the server is unable to process all the requests in the real time and
finally crashes down. This popular technique, the attacker floods the targeted
machine with tons of requests to overwhelm the resources, which, in turn,
restrict the actual requests from being fulfilled.
10.Keylogger Keylogger is a simple software that records the key sequence
and strokes of your keyboard into a log file on your machine. These log files
might even contain your personal email IDs and passwords. Also known as
keyboard capturing, it can be either software or hardware. While software-
based keyloggers target the programs installed on a computer, hardware
devices target keyboards, electromagnetic emissions, smartphone sensors, etc.
• Hacker vs. cracker The term hacker was first used in the 1960s to describe a
programmer or an individual who, in an era of highly constrained computer
capabilities, could increase the efficiency of computer code in a way that
removed, or “hacked,” excess machine-code instructions from a program. It
has evolved over the years to refer to a person with an advanced
understanding of computers, networking, programming or hardware.
• Famous hackers While many famous technologists have been considered
hackers, including Donald Knuth, Ken Thompson, Vinton Cerf, Steve Jobs
and Bill Gates, black hat hackers are more likely to gain notoriety as hackers
in mainstream accounts. Gates was also caught breaking into corporate
systems as a teenager before founding Microsoft.
• Some notorious black hat hackers include:
1. Anonymous is a group of hackers from around the world who meet on online
message boards and social networking forums. They mainly focus their efforts on
encouraging civil disobedience and/or unrest via denial-of-service attacks,
publishing victims> personal information online, as well as defacing and defaming
websites.
2. Jonathan James gained notoriety for hacking into multiple websites, including those
of the U.S. Department of Defense and NASA, as well as for stealing software code
when he was a teenager. In 2000, James became the first juvenile, he was just 16
years old to be incarcerated for computer hacking. He committed suicide in 2008
when he was 25 years old.
3. Adrian Lamo hacked into the systems of several organizations, including The New
York Times, Microsoft and Yahoo to exploit their security flaws. Lamo was arrested
in 2003,convicted in 2004 and sentenced to six months of home detention at his
parents’ home, two years’ probation and ordered to pay about $65,000 in restitution.
4. Kevin Mitnick was convicted of a number of criminal computer crimes after
evading authorities for two and a half years. Once one of the FBI’s Most
Wanted for hacking into networks of 40 high-profile corporations, Mitnick was
arrested in 1993 and served five years in a federal prison. After his release,
Mitnick founded a cybersecurity firm to help organizations keep their networks
safe.
Cybercrime Laws in the Philippines
Republic Act No.10175- known as the “Cybercrime Prevention Act of 2012”. The State recognizes the
vital role of information and communications industries such as content production,
telecommunications, broadcasting electronic commerce, and data processing, in the nation’s overall
social and economic development.
Child Pornography.- The unlawful or prohibited acts defined and punishable by Republic Act No. 9775
or the Anti-Child Pornography Act of 2009, committed through a computer system: Provided, That the
penalty to be imposed shall be (1) one degree higher than that provided for in Republic Act No. 9775.
Unsolicited Commercial Communications. The transmission of commercial electronic communication
with the use of computer system which seek to advertise, sell, or offer for sale products and services are
prohibited unless: a. Third is prior affirmative consent from the recipient; or b. The primary intent of the
communication is for service and/or administrative announcements from the sender to its existing users,
subscribers or customers; or c. The following conditions are present: I. The commercial electronic
communication contains a simple, valid, and reliable way for the recipient to reject. Receipt of further
commercial electronic messages (opt-out) from the same source; II. The commercial electronic
communication does not purposely disguise the source of the electronic message; and III. The
commercial electronic communication does not purposely include misleading information in any part of
the message in order to induce the recipients to read the message.
(1) Cybersex. ✓ Shall be punished with imprisonment of prision mayor or a
fine of at least Two hundred thousand pesos (PhP200,000.00) but not
exceeding One million pesos (PhPI,000,000.00)or both. D- Any person found
guilty of any of the punishable acts enumerated in Section 4(c)(2) (c) Content-
related Offenses: (2) Child Pornography Shall be punished with the penalties
as enumerated in Republic Act No. 9775 or the “Anti-Child Pornography Act
of 2009”: Provided, That the penalty to be imposed shall be one (1) degree
higher than that provided for in Republic Act No. 9775, if committed through a
computer system. E- Any person found guilty of any of the punishable acts
enumerated in Section 4(c)(3) (c) Content-related Offenses: (3) Unsolicited
Commercial Communications. Shall be punished with imprisonment of arresto
mayor or a fine of at least Fifty thousand pesos (PhP50,000.00) but not
exceeding Two hundred fifty thousand pesos (PhP250,000.00) or both.
F- Any person found guilty of any of the punishable acts enumerated in Section
5 Section 5. Other Offenses. Shall be punished with imprisonment one (1)
degree lower than that of the prescribed penalty for the offense or a fine of at
least One hundred thousand pesos (PhPI00,000.00) but not exceeding Five
hundred thousand pesos (PhP500,000.00) or both.
Corporate Liability When any of the punishable acts herein defined are
knowingly committed on behalf of or for the benefit of a juridical person, by a
natural person acting either individually or as part of an organ of the juridical
person, who has a leading position within, based on: (a) a power of
representation of the juridical person provided the act committed falls within
the scope of such authority; (b) an authority to take decisions on behalf of the
juridical person: Provided, That the act committed falls within the scope of
such authority; or
(c) an authority to exercise control within the juridical person, the juridical
person shall be held liable for a fine equivalent to at least double the fines
imposable in Section 7 (Liability under Other Laws. A prosecution under this
Act shall be without prejudice to any liability for violation of any provision of
the Revised Penal Code, as amended, or special laws) up to a maximum of Ten
million pesos (PhP10,000,000.00). If the commission of any of the punishable
acts herein defined was made possible due to the lack of supervision or control
by a natural person referred to and described in the preceding paragraph, for
the benefit of that juridical person by a natural person acting under its
authority, the juridical person shall be held liable for a fine equivalent to at
least double the fines imposable in Section 7 up to a maximum of Five million
pesos (PhP5,000,000.00). The liability imposed on the juridical person shall be
without prejudice to the criminal liability of the natural person who has
committed the offense.
ENFORCEMENT AND IMPLEMENTATION Law Enforcement Authorities
The National Bureau of Investigation(NBI) and the Philippine National Police
(PNP) shall be responsible for the efficient and effective law enforcement of
the provisions of this Act. The NBI and the PNP shall organize a cybercrime
unit or center manned by special investigators to exclusively handle cases
involving violations of this Act.
• Man and Environment
Man and environment are inter-related. The environment influences the life of
human beings and also human beings modify their environment as a result of
their growth, dispersal, activities, death and decay etc. Thus all living beings
including man and their environment are mutually reactive affecting each other
in a number of ways and a dynamic equilibrium is possible in between the two,
i.e. human beings (society) and environment are interdependent.
• 5 Ways Students Can Help Save the Environment
1. Use Reusable Bags. Plastic grocery- Plastic grocery-type bags that get
thrown out end up in lakes and landfills or in other parts of the environment.
These can clog sewage pipes and drainage canals and ultimately pollute the
water bodies into which sewage water is pumped into. Also, it takes a while for
the bags to decompose. Whether you are shopping for food, clothes or books,
use a reusable bag.
2. Recycle. Recycling is such a simple thing to do, but so many people don’t
do it. Look for recycling cans near trashcans. Instead of throwing recyclables
in the trash with your non-recyclables, make it a point to take an extra step to
locate recycling cans around your campus. Always separate biodegradable and
non biodegradable wastes.
3. Save Electricity! Use energy-efficient light bulbs instead of regular bulbs. They
last longer, which will save you a bit of money too. Make sure you turn off lights,
the TV, and other appliances when you are not using them. Lower your air
conditioning or when it is not necessary. I know this is hard to do with the
excruciating heat this summer, but it is necessary.
4. Save Water -is wasted more frequently than we can see. Turn off the faucet as
you are brushing your teeth. Don’t turn your shower on until you're ready to get in
and wash your hair. Limit your water usage as you wash dishes. Changing old
habits will be extremely good for the environment.
5. Walk or cycle. Driving is one of the biggest causes of pollution. If you want to
use your car, ask yourself the following question: do i really need my car? Walk or
use your bicycle if the journey is a short one. It’s high time each and every one of
us took action. It’s our planet, and it’s our responsibility to take care of it. We’ve
damaged it enough. Climate change is reversible, we just need enough motivated
people doing the right thing.
• Meanings of Environment
• Descending from the Middle French preposition environ “around,”
environment , in its most basic meaning, is “that which surrounds.” When
preceded by the and unmodified, it usually refers to the natural world
(“please don’t litter if you care about the environment”). In a less physical,
more extended sense, it may signify the circumstances and conditions that
make up everyday life (‘He grew up in a loving environment.”) The word
may also be applied in highly specialized ways, denoting, for example, “the
position of a linguistic element” (“how g gets pronounced in Italian depends
upon its phonetic environment”) or “a computer interface from which various
tasks can be performed” (“the app works in varied environments”).
• Environment is the sum total of all surroundings of a living organism, including
natural forces and other living things. Both biotic and abiotic components form
environment. These two components interact with each other and they are
interdependent. The environment consists of the interactions among plants,
animals, soil, water, temperature, light, and other living and non-living things.
Environment Can Be Categorized as:
1. Built Environment- Built Environment The term built environment refers to
the human-made surroundings that provide the setting for human activity.
2. Natural Environment- Natural environment is often used as a synonym for
habitat. For instance, when we say that, the natural environment of giraffes is the
savanna.
3. Social Environment- The social environment refers to the immediate physical
and social setting in which people live or in which something happens or
develops. It includes the culture that the individual was educated or lives in, and
the people and institutions with whom they interact.

You might also like