RA 10175 ALSO KNOWN AS
“CYBERCRIME PREVENTION ACT OF 2012”
CHAPTER IV
ENFORCEMENT AND IMPLEMENTATION
Section 10. Law Enforcement Authorities. — The National Bureau
of Investigation (NBI) and the Philippine National Police (PNP)
shall be responsible for the efficient and effective law enforcement
of the provisions of this Act. The NBI and the PNP shall organize a
cybercrime unit or center manned by special investigators to
exclusively handle cases involving violations of this Act.
The PNP Anti-Cybercrime Group
• PNP – ACG was activated on MARCH 20, 2013:
Criminal
Investigation and
Detection Group
(CIDG)
ATCCD
Authority:
NAPOLCOM RESOLUTION NO. 2013-220 dated February 27, 2013; and
GENERAL ORDER NO. DPL-12-09 dated February 27, 2013.
PNP ACG Presence Nationwide
RACU 1
RACU COR RACU 2
RACU 3
ACG HQ
RACU 4A
RACU 5
RACU 8
RACU 6
RACU 7
RACU 10
RACU 11
RACU 9
RACU 12
Limitations/Challenges
Fast Emerging Technology Anonymity on the Internet Cross-border Jurisdiction
Free Data Encryption Sim Cards and Mobile Legal Limitation
Technology Phones
Internet Use in the Philippines
96% of 12-17 years-old are internet users
79% go online at least once a day
Most common barrier to effective internet
access was slow connection or poor signal
95% of children use smartphones to go online
72% of caregivers are internet users
Source: ECPAT/INTERPOL/UNICEF
WHY WE GO ONLINE?
Search Shopping Games
Music Movies E-Mails
Uploading Video Calls Chat
Downloading
Cybercrime is an activity done
using computers and internet. We
can say that it is an unlawful act
wherein the computer either as a
tool or target or both.
What is Cybercrime?
A computer or a network of
computers used as a tool in the
commission of cybercrime.
The targets:
* Another computer or network of
computers
* Information
* Another person, natural or juridical
“CYBERCRIME PREVENTON ACT
of 2012”
An act defining cybercrime, providing
for the prevention, investigation,
suppression and the imposition of penalties
therefor and for other purposes
Against the computer
The computer and/or contained data is the
objective
Using the Computer
The computer and/or contained data is the
method
Within the Computer
The data (content) is the object
Within the Computer
Child Abuse Materials
Pornography
Cyber- bullying
Child Grooming
Hate crime
ATTRIBUTES OF CYBERCRIME
UNLIMITED NUMBERS OF POTENTIAL
VICTIMS AND
ANONIMITY!!!
Because of :
• Anonymity
• Weakness in Operation System
• Lack of user Awareness
• Negligence of user
CATEGORIES OF CYBERCRIME
1. CYBERCRIME OFFENSES
Is a computer crime that requires the expertise of a highly
skilled and well knowledgeable person or group of person in the
field of Information and Communication Technology (ICT).
HACKING OR ILLEGAL ACCESS (email, Facebok,
etc) Violation:
PHISHING Sec. 4 of RA 10175
IDENTITY THEFT –CYBERCRIME
ONLINE LIBEL OFFENSES
CYBER SEX
Online Sexual Exploitation and abuse of Children
(OSEC)
2. CYBER-RELATED CRIMES
- Is a crime (Traditional) wherein the used
of Information and Communication
Technology is ESSENTIAL for its
commission.
CYBER-RELATED CRIMES
Theft
Robbery
INFORMATION AND
Libel
COMMUNICATION
Illegal Gambling TECHNOLOGY
(Online Games, e-sabong) (ICT)
Estafa / Swindling
Deceit
Obscene Publication/
Indecent Shows
Prostitution
Trespassing
Threat/ Coercion
Traditional Crime vs Cybercrime
Photo source: The Markle
Paradigm Shift
vs
Traditional Crime Cybercrime
LIBEL Online LIBEL
Deceptive Callers E-mail Phishing
Robbery Extortion Sex Extortion
Estafa Internet/Fraud Scam
Bullying CYBER BULLYING
Vandalism Web Defacement
DIFFERENCE…….
TRADITIONAL CRIME CYBERCRIME
Crime Against Person, Property Committed through the use of ICT
Tangible Pieces of Evidence are intangible
Simple to recognize and collect Hard to collect evidence it has to go
through deeper online investigation
and forensic analysis
Suspect’s location can easily be identified Target Rich Environment
Identifiable Anonymity
Easy if witnesses are available Hard to prosecute
PENALTIES