Cdi 9 Cyber Crime Notes
Cdi 9 Cyber Crime Notes
Cybercrime, also called computer crime, the use of a computer as an instrument to further illegal ends, such
as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating
privacy. Cybercrime, especially through the Internet, has grown in importance as the computer has become
central to commerce, entertainment, and government.
Because of the early and widespread adoption of computers and the Internet in the United States, most of the
earliest victims and villains of cybercrime were Americans. By the 21st century, though, hardly a hamlet
remained anywhere in the world that had not been touched by cybercrime of one sort or another.
Defining cybercrime
New technologies create new criminal opportunities but few new types of crime. What distinguishes
cybercrime from traditional criminal activity? Obviously, one difference is the use of the digital computer, but
technology alone is insufficient for any distinction that might exist between different realms of criminal
activity. Criminals do not need a computer to commit fraud, traffic in child pornography and intellectual
property, steal an identity, or violate someone’s privacy. All those activities existed before the “cyber” prefix
became ubiquitous. Cybercrime, especially involving the Internet, represents an extension of existing criminal
behaviour alongside some novel illegal activities.
Most cybercrime is an attack on information about individuals, corporations, or governments. Although the
attacks do not take place on a physical body, they do take place on the personal or corporate virtual body,
which is the set of informational attributes that define people and institutions on the Internet. In other words,
in the digital age our virtual identities are essential elements of everyday life: we are a bundle of numbers and
identifiers in multiple computer databases owned by governments and corporations. Cybercrime highlights
the centrality of networked computers in our lives, as well as the fragility of such seemingly solid facts as
individual identity.
Get a Britannica Premium subscription and gain access to exclusive content.Subscribe Now
An important aspect of cybercrime is its nonlocal character: actions can occur in jurisdictions separated by vast
distances. This poses severe problems for law enforcement since previously local or even national crimes now
require international cooperation. For example, if a person accesses child pornography located on a computer
in a country that does not ban child pornography, is that individual committing a crime in a nation where such
materials are illegal? Where exactly does cybercrime take place? Cyberspace is simply a richer version of the
space where a telephone conversation takes place, somewhere between the two people having the
conversation. As a planet-spanning network, the Internet offers criminals multiple hiding places in the real
world as well as in the network itself. However, just as individuals walking on the ground leave marks that a
skilled tracker can follow, cybercriminals leave clues as to their identity and location, despite their best efforts
to cover their tracks. In order to follow such clues across national boundaries, though, international
cybercrime treaties must be ratified.
In 1996 the Council of Europe, together with government representatives from the United States, Canada, and
Japan, drafted a preliminary international treaty covering computer crime. Around the world, civil libertarian
groups immediately protested provisions in the treaty requiring Internet service providers (ISPs) to store
information on their customers’ transactions and to turn this information over on demand. Work on the treaty
proceeded nevertheless, and on November 23, 2001, the Council of Europe Convention on Cybercrime was
signed by 30 states. The convention came into effect in 2004. Additional protocols, covering terrorist activities
and racist and xenophobic cybercrimes, were proposed in 2002 and came into effect in 2006. In addition,
various national laws, such as the USA PATRIOT Act of 2001, have expanded law enforcement’s power to
monitor and protect computer networks.
Types of cybercrime
Cybercrime ranges across a spectrum of activities. At one end are crimes that involve fundamental breaches of
personal or corporate privacy, such as assaults on the integrity of information held in digital depositories and
2|Page
Prepared by Mon Kindipan- Notes on CDI 9
the use of illegally obtained digital information to blackmail a firm or individual. Also at this end of the
spectrum is the growing crime of identity theft. Midway along the spectrum lie transaction-based crimes such
as fraud, trafficking in child pornography, digital piracy, money laundering, and counterfeiting. These are
specific crimes with specific victims, but the criminal hides in the relative anonymity provided by the Internet.
Another part of this type of crime involves individuals within corporations or
government bureaucracies deliberately altering data for either profit or political objectives. At the other end
of the spectrum are those crimes that involve attempts to disrupt the actual workings of the Internet. These
range from spam, hacking, and denial of service attacks against specific sites to acts of cyberterrorism—that is,
the use of the Internet to cause public disturbances and even death. Cyberterrorism focuses upon the use of
the Internet by nonstate actors to affect a nation’s economic and technological infrastructure. Since
the September 11 attacks of 2001, public awareness of the threat of cyberterrorism has grown dramatically.
Cybercrime affects both a virtual and a real body, but the effects upon each are different. This phenomenon is
clearest in the case of identity theft. In the United States, for example, individuals do not have an official
identity card but a Social Security number that has long served as a de facto identification number. Taxes are
collected on the basis of each citizen’s Social Security number, and many private institutions use the number
to keep track of their employees, students, and patients. Access to an individual’s Social Security number
affords the opportunity to gather all the documents related to that person’s citizenship—i.e., to steal his
identity. Even stolen credit card information can be used to reconstruct an individual’s identity. When
criminals steal a firm’s credit card records, they produce two distinct effects. First, they make off with digital
information about individuals that is useful in many ways. For example, they might use the credit card
information to run up huge bills, forcing the credit card firms to suffer large losses, or they might sell the
information to others who can use it in a similar fashion. Second, they might use individual credit card names
and numbers to create new identities for other criminals. For example, a criminal might contact the issuing
bank of a stolen credit card and change the mailing address on the account. Next, the criminal may get a
passport or driver’s license with his own picture but with the victim’s name. With a driver’s license, the
criminal can easily acquire a new Social Security card; it is then possible to open bank accounts and receive
loans—all with the victim’s credit record and background. The original cardholder might remain unaware of
this until the debt is so great that the bank contacts the account holder. Only then does the identity theft
become visible. Although identity theft takes places in many countries, researchers and law-enforcement
officials are plagued by a lack of information and statistics about the crime worldwide. Cybercrime is clearly,
however, an international problem.
In 2015 the U.S. Bureau of Justice Statistics (BJS) released a report on identity theft; in the previous year
almost 1.1 million Americans had their identities fraudulently used to open bank, credit card, or utility
accounts. The report also stated that another 16.4 million Americans were victimized by account theft, such as
use of stolen credit cards and automatic teller machine (ATM) cards. The BJS report showed that while the
total number of identity theft victims in the United States had grown by about 1 million since 2012, the total
loss incurred by individuals had declined since 2012 by about $10 billion to $15.4 billion. Most of that decline
was from a sharp drop in the number of people losing more than $2,000. Most identity theft involved small
sums, with losses less than $300 accounting for 54 percent of the total.
Internet fraud
Schemes to defraud consumers abound on the Internet. Among the most famous is the Nigerian, or “419,”
scam; the number is a reference to the section of Nigerian law that the scam violates. Although this con has
been used with both fax and traditional mail, it has been given new life by the Internet. In the scheme, an
individual receives an e-mail asserting that the sender requires help in transferring a large sum of money out
of Nigeria or another distant country. Usually, this money is in the form of an asset that is going to be sold,
such as oil, or a large amount of cash that requires “laundering” to conceal its source; the variations are
endless, and new specifics are constantly being developed. The message asks the recipient to cover some cost
of moving the funds out of the country in return for receiving a much larger sum of money in the near future.
Should the recipient respond with a check or money order, he is told that complications have developed; more
money is required. Over time, victims can lose thousands of dollars that are utterly unrecoverable.
In 2002 the newly formed U.S. Internet Crime Complaint Center (IC3) reported that more than $54 million
dollars had been lost through a variety of fraud schemes; this represented a threefold increase over estimated
losses of $17 million in 2001. The annual losses grew in subsequent years, reaching $125 million in 2003,
3|Page
Prepared by Mon Kindipan- Notes on CDI 9
about $200 million in 2006, close to $250 million in 2008, and over $1 billion in 2015. In the United States the
largest source of fraud is what IC3 calls “non-payment/non-delivery,” in which goods and services either are
delivered but not paid for or are paid for but not delivered. Unlike identity theft, where the theft occurs
without the victim’s knowledge, these more traditional forms of fraud occur in plain sight. The victim willingly
provides private information that enables the crime; hence, these are transactional crimes. Few people would
believe someone who walked up to them on the street and promised them easy riches; however, receiving an
unsolicited e-mail or visiting a random Web page is sufficiently different that many people easily open their
wallets. Despite a vast amount of consumer education, Internet fraud remains a growth industry for criminals
and prosecutors. Europe and the United States are far from the only sites of cybercrime. South Korea is among
the most wired countries in the world, and its cybercrime fraud statistics are growing at an alarming
rate. Japan has also experienced a rapid growth in similar crimes.
ATM fraud
Computers also make more mundane types of fraud possible. Take the automated teller machine (ATM)
through which many people now get cash. In order to access an account, a user supplies a card and personal
identification number (PIN). Criminals have developed means to intercept both the data on the card’s
magnetic strip as well as the user’s PIN. In turn, the information is used to create fake cards that are then used
to withdraw funds from the unsuspecting individual’s account. For example, in 2002 the New York
Times reported that more than 21,000 American bank accounts had been skimmed by a single group engaged
in acquiring ATM information illegally. A particularly effective form of fraud has involved the use of ATMs in
shopping centres and convenience stores. These machines are free-standing and not physically part of a bank.
Criminals can easily set up a machine that looks like a legitimate machine; instead of dispensing money,
however, the machine gathers information on users and only tells them that the machine is out of order after
they have typed in their PINs. Given that ATMs are the preferred method for dispensing currency all over the
world, ATM fraud has become an international problem.
Wire fraud
The international nature of cybercrime is particularly evident with wire fraud. One of the largest and best-
organized wire fraud schemes was orchestrated by Vladimir Levin, a Russian programmer with a computer
software firm in St. Petersburg. In 1994, with the aid of dozens of confederates, Levin began transferring some
$10 million from subsidiaries of Citibank, N.A., in Argentina and Indonesia to bank accounts in San
Francisco, Tel Aviv, Amsterdam, Germany, and Finland. According to Citibank, all but $400,000 was eventually
recovered as Levin’s accomplices attempted to withdraw the funds. Levin himself was arrested in 1995 while
in transit through London’s Heathrow Airport (at the time, Russia had no extradition treaty for cybercrime). In
1998 Levin was finally extradited to the United States, where he was sentenced to three years in jail and
ordered to reimburse Citibank $240,015. Exactly how Levin obtained the necessary account names and
passwords has never been disclosed, but no Citibank employee has ever been charged in connection with the
case. Because a sense of security and privacy are paramount to financial institutions, the exact extent of wire
fraud is difficult to ascertain. In the early 21st century, wire fraud remained a worldwide problem.
Through the 1990s, sales of compact discs (CDs) were the major source of revenue for recording companies.
Although piracy—that is, the illegal duplication of copyrighted materials—had always been a problem,
especially in the Far East, the proliferation on college campuses of inexpensive personal computers capable of
capturing music off CDs and sharing them over high-speed (“broadband”) Internet connections became the
recording industry’s greatest nightmare. In the United States, the recording industry, represented by
the Recording Industry Association of America (RIAA), attacked a single file-sharing service, Napster, which
from 1999 to 2001 allowed users across the Internet access to music files, stored in the data-
compression format known as MP3, on other users’ computers by way of Napster’s central computer.
According to the RIAA, Napster users regularly violated the copyright of recording artists, and the service had
to stop. For users, the issues were not so clear-cut. At the core of the Napster case was the issue of fair use.
Individuals who had purchased a CD were clearly allowed to listen to the music, whether in their home stereo,
automobile sound system, or personal computer. What they did not have the right to do, argued the RIAA,
was to make the CD available to thousands of others who could make a perfect digital copy of the music and
create their own CDs. Users rejoined that sharing their files was a fair use of copyrighted material for which
they had paid a fair price. In the end, the RIAA argued that a whole new class of cybercriminal had been
4|Page
Prepared by Mon Kindipan- Notes on CDI 9
born—the digital pirate—that included just about anyone who had ever shared or downloaded an MP3 file.
Although the RIAA successfully shuttered Napster, a new type of file-sharing service, known as peer-to-
peer (P2P) networks, sprang up. These decentralized systems do not rely on a central facilitating computer;
instead, they consist of millions of users who voluntarily open their own computers to others for file sharing.
The RIAA continued to battle these file-sharing networks, demanding that ISPs turn over records of their
customers who move large quantities of data over their networks, but the effects were minimal. The RIAA’s
other tactic has been to push for the development of technologies to enforce the digital rights of copyright
holders. So-called digital rights management (DRM) technology is an attempt to forestall piracy through
technologies that will not allow consumers to share files or possess “too many” copies of a copyrighted work.
At the start of the 21st century, copyright owners began accommodating themselves with the idea of
commercial digital distribution. Examples include the online sales by the iTunes Store (run by Apple Inc.)
and Amazon.com of music, television shows, and movies in downloadable formats, with and without DRM
restrictions. In addition, several cable and satellite television providers, many electronic game systems (Sony
Corporation’s PlayStation 3 and Microsoft Corporation’s Xbox 360), and streaming services
like Netflix developed “video-on-demand” services that allow customers to download movies and shows for
immediate (streaming) or later playback.
File sharing brought about a fundamental reconstruction of the relationship between producers, distributors,
and consumers of artistic material. In America, CD sales dropped from a high of nearly 800 million albums in
2000 to less than 150 million albums in 2014. Although the music industry sold more albums digitally than it
had CDs at its peak, revenue declined by more than half since 2000. As broadband Internet connections
proliferate, the motion-picture industry faces a similar problem, although the digital videodisc (DVD) came to
market with encryption and various built-in attempts to avoid the problems of a video Napster. However, sites
such as The Pirate Bay emerged that specialized in sharing such large files as those of movies and electronic
games.
File sharing of intellectual property is only one aspect of the problem with copies. Another
more mundane aspect lies in the ability of digital devices to render nearly perfect copies of material artifacts.
Take the traditional crime of counterfeiting. Until recently, creating passable currency required a significant
amount of skill and access to technologies that individuals usually do not own, such as printing presses,
engraving plates, and special inks. The advent of inexpensive, high-quality colour copiers and printers has
brought counterfeiting to the masses. Ink-jet printers now account for a growing percentage of the
counterfeit currency confiscated by the U.S. Secret Service. In 1995 ink-jet currency accounted for 0.5 percent
of counterfeit U.S. currency; in 1997 ink-jet printers produced 19 percent of the illegal cash. By 2014 almost 60
percent of the counterfeit money recovered in the U.S. came from ink-jet printers. The widespread
development and use of computer technology prompted the U.S. Treasury to redesign U.S. paper currency to
include a variety of anticounterfeiting technologies. The European Union currency, or euro, had security
designed into it from the start. Special features, such as embossed foil holograms and special ribbons and
paper, were designed to make counterfeiting difficult. Indeed, the switch to the euro presented an
unprecedented opportunity for counterfeiters of preexisting national currencies. The great fear was that
counterfeit currency would be laundered into legal euros. Fortunately, it was not the problem that some
believed it would be.
Nor is currency the only document being copied. Immigration documents are among the most valuable, and
they are much easier to duplicate than currency. In the wake of the September 11 attacks, this problem came
under increasing scrutiny in the United States. In particular, the U.S. General Accounting Office (GAO) issued
several reports during the late 1990s and early 2000s concerning the extent of document fraud that had been
missed by the Immigration and Naturalization Service (INS). Finally, a 2002 report by the GAO reported that
more than 90 percent of certain types of benefit claims were fraudulent and further stated that immigration
fraud was “out of control.” Partially in response to these revelations, the INS was disbanded and its functions
assumed by the newly constituted U.S. Department of Homeland Security in 2003.
Child pornography
With the advent of almost every new media technology, pornography has been its “killer app,” or the
application that drove early deployment of technical innovations in search of profit. The Internet was no
5|Page
Prepared by Mon Kindipan- Notes on CDI 9
exception, but there is a criminal element to this business bonanza—child pornography, which is unrelated to
the lucrative business of legal adult-oriented pornography. The possession of child pornography, defined here
as images of children under age 18 engaged in sexual behaviour, is illegal in the United States, the European
Union, and many other countries, but it remains a problem that has no easy solution. The problem
is compounded by the ability of “kiddie porn” Web sites to disseminate their material from locations, such as
states of the former Soviet Union as well as Southeast Asia, that lack cybercrime laws. Some law-enforcement
organizations believe that child pornography represents a $3-billion-a-year industry and that more than
10,000 Internet locations provide access to these materials.
The Internet also provides pedophiles with an unprecedented opportunity to commit criminal acts through the
use of “chat rooms” to identify and lure victims. Here the virtual and the material worlds intersect in a
particularly dangerous fashion. In many countries, state authorities now pose as children in chat rooms;
despite the widespread knowledge of this practice, pedophiles continue to make contact with these “children”
in order to meet them “off-line.” That such a meeting invites a high risk of immediate arrest does not seem to
deter pedophiles. Interestingly enough, it is because the Internet allows individual privacy to be breached that
the authorities are able to capture pedophiles.
Hacking
While breaching privacy to detect cybercrime works well when the crimes involve the theft and misuse of
information, ranging from credit card numbers and personal data to file sharing of various commodities—
music, video, or child pornography—what of crimes that attempt to wreak havoc on the very workings of the
machines that make up the network? The story of hacking actually goes back to the 1950s, when a group of
phreaks (short for “phone freaks”) began to hijack portions of the world’s telephone networks, making
unauthorized long-distance calls and setting up special “party lines” for fellow phreaks. With the proliferation
of computer bulletin board systems (BBSs) in the late 1970s, the informal phreaking culture began to coalesce
into quasi-organized groups of individuals who graduated from the telephone network to “hacking” corporate
and government computer network systems.
Although the term hacker predates computers and was used as early as the mid-1950s in connection with
electronic hobbyists, the first recorded instance of its use in connection with computer programmers who
were adept at writing, or “hacking,” computer code seems to have been in a 1963 article in a student
newspaper at the Massachusetts Institute of Technology (MIT). After the first computer systems were linked
to multiple users through telephone lines in the early 1960s, hacker came to refer to individuals who gained
unauthorized access to computer networks, whether from another computer network or, as personal
computers became available, from their own computer systems. Although it is outside the scope of this article
to discuss hacker culture, most hackers have not been criminals in the sense of being vandals or of seeking
illicit financial rewards. Instead, most have been young people driven by intellectual curiosity; many of these
people have gone on to become computer security architects. However, as some hackers sought notoriety
among their peers, their exploits led to clear-cut crimes. In particular, hackers began breaking into computer
systems and then bragging to one another about their exploits, sharing pilfered documents as trophies to
prove their boasts. These exploits grew as hackers not only broke into but sometimes took control of
government and corporate computer networks.
One such criminal was Kevin Mitnick, the first hacker to make the “most wanted list” of the U.S. Federal
Bureau of Investigation (FBI). He allegedly broke into the North American Aerospace Defense
Command (NORAD) computer in 1981, when he was 17 years old, a feat that brought to the fore the gravity of
the threat posed by such security breaches. Concern with hacking contributed first to an overhaul of federal
sentencing in the United States, with the 1984 Comprehensive Crime Control Act and then with the Computer
Fraud and Abuse Act of 1986.
The scale of hacking crimes is among the most difficult to assess because the victims often prefer not to report
the crimes—sometimes out of embarrassment or fear of further security breaches. Officials estimate,
however, that hacking costs the world economy billions of dollars annually. Hacking is not always an outside
job—a related criminal endeavour involves individuals within corporations or
government bureaucracies deliberately altering database records for either profit or political objectives. The
greatest losses stem from the theft of proprietary information, sometimes followed up by the extortion of
money from the original owner for the data’s return. In this sense, hacking is old-fashioned industrial
espionage by other means.
6|Page
Prepared by Mon Kindipan- Notes on CDI 9
One of the largest known case of computer hacking was discovered in late March 2009. It involved
government and private computers in at least 103 countries. The worldwide spy network known as GhostNet
was discovered by researchers at the University of Toronto, who had been asked by representatives of
the Dalai Lama to investigate the exiled Tibetan leader’s computers for possible malware. In addition to
finding out that the Dalai Lama’s computers were compromised, the researchers discovered that GhostNet
had infiltrated more than a thousand computers around the world. The highest concentration of compromised
systems were within embassies and foreign affairs bureaus of or located in South Asian and Southeast Asian
countries. Reportedly, the computers were infected by users who opened e-mail attachments or clicked on
Web page links. Once infected with the GhostNet malware, the computers began “phishing” for files
throughout the local network—even turning on cameras and video-recording devices for remote monitoring.
Three control servers that ran the malware were located in Hainan, Guangdong, and Sichuan provinces in
China, and a fourth server was located in California.
Computer viruses
The deliberate release of damaging computer viruses is yet another type of cybercrime. In fact, this was
the crime of choice of the first person to be convicted in the United States under the Computer Fraud and
Abuse Act of 1986. On November 2, 1988, a computer science student at Cornell University named Robert
Morris released a software “worm” onto the Internet from MIT (as a guest on the campus, he hoped to remain
anonymous). The worm was an experimental self-propagating and replicating computer program that took
advantage of flaws in certain e-mail protocols. Due to a mistake in its programming, rather than just sending
copies of itself to other computers, this software kept replicating itself on each infected system, filling all the
available computer memory. Before a fix was found, the worm had brought some 6,000 computers (one-tenth
of the Internet) to a halt. Although Morris’s worm cost time and millions of dollars to fix, the event had few
commercial consequences, for the Internet had not yet become a fixture of economic affairs. That Morris’s
father was the head of computer security for the U.S. National Security Agency led the press to treat the event
more as a high-tech Oedipal drama than as a foreshadowing of things to come. Since then, ever more harmful
viruses have been cooked up by anarchists and misfits from locations as diverse as the United States, Bulgaria,
Pakistan, and the Philippines.
Compare the Morris worm with the events of the week of February 7, 2000, when “mafiaboy,” a 15-year-old
Canadian hacker, orchestrated a series of denial of service attacks (DoS) against several e-commerce sites,
including Amazon.com and eBay.com. These attacks used computers at multiple locations to overwhelm the
vendors’ computers and shut down their World Wide Web (WWW) sites to legitimate commercial traffic. The
attacks crippled Internet commerce, with the FBI estimating that the affected sites suffered $1.7 billion in
damages. In 1988 the Internet played a role only in the lives of researchers and academics; by 2000 it had
become essential to the workings of the U.S. government and economy. Cybercrime had moved from being an
issue of individual wrongdoing to being a matter of national security.
Distributed DoS attacks are a special kind of hacking. A criminal salts an array of computers with computer
programs that can be triggered by an external computer user. These programs are known as Trojan
horses since they enter the unknowing users’ computers as something benign, such as a photo or document
attached to an e-mail. At a predesignated time, this Trojan horse program begins to send messages to a
predetermined site. If enough computers have been compromised, it is likely that the selected site can be tied
up so effectively that little if any legitimate traffic can reach it. One important insight offered by these events
has been that much software is insecure, making it easy for even an unskilled hacker to compromise a vast
number of machines. Although software companies regularly offer patches to fix software vulnerabilities, not
all users implement the updates, and their computers remain vulnerable to criminals wanting to launch DoS
attacks. In 2003 the Internet service provider PSINet Europe connected an unprotected server to the Internet.
Within 24 hours the server had been attacked 467 times, and after three weeks more than 600 attacks had
been recorded. Only vigorous security regimes can protect against such an environment. Despite the claims
about the pacific nature of the Internet, it is best to think of it as a modern example of the Wild West of
American lore—with the sheriff far away.
One of the most significant problems in shutting down spammers involves their use of other individuals’
personal computers. Typically, numerous machines connected to the Internet are first infected with a virus
or Trojan horse that gives the spammer secret control. Such machines are known as zombie computers, and
networks of them, often involving thousands of infected computers, can be activated to flood the Internet
with spam or to institute DoS attacks. While the former may be almost benign, including solicitations to
purchase legitimate goods, DoS attacks have been deployed in efforts to blackmail Web sites by threatening to
shut them down. Cyberexperts estimate that the United States accounts for about one-fourth of the 4–8
million zombie computers in the world and is the origin of nearly one-third of all spam.
E-mail also serves as an instrument for both traditional criminals and terrorists. While libertarians laud the use
of cryptography to ensure privacy in communications, criminals and terrorists may also use cryptographic
means to conceal their plans. Law-enforcement officials report that some terrorist groups embed instructions
and information in images via a process known as steganography, a sophisticated method of hiding
information in plain sight. Even recognizing that something is concealed in this fashion often requires
considerable amounts of computing power; actually decoding the information is nearly impossible if one does
not have the key to separate the hidden data.
In a type of scam called business e-mail compromise (BEC), an e-mail sent to a business appears to be from an
executive at another company with which the business is working. In the e-mail, the “executive” asks for
money to be transferred into a certain account. The FBI has estimated that BEC scams have cost American
businesses about $750 million.
Sometimes e-mail that an organization would wish to keep secret is obtained and released. In 2014 hackers
calling themselves “Guardians of Peace” released e-mail from executives at the motion picture company Sony
Pictures Entertainment, as well as other confidential company information. The hackers demanded that Sony
Pictures not release The Interview, a comedy about a CIA plot to assassinate North Korean leader Kim Jong-Un,
and threatened to attack theatres that showed the movie. After American movie theatre chains canceled
screenings, Sony released the movie online and in limited theatrical release. E-mail hacking has even affected
politics. In 2016, e-mail at the Democratic National Committee (DNC) was obtained by hackers believed to be
in Russia. Just before the Democratic National Convention, the media organization WikiLeaks released the e-
mail, which showed a marked preference of DNC officials for the presidential campaign of Hillary Clinton over
that of her challenger Bernie Sanders. DNC chairperson Debbie Wasserman Schultz resigned, and some
American commentators speculated that the release of the e-mail showed the preference of the Russian
government for Republican nominee Donald Trump.
Sabotage
Another type of hacking involves the hijacking of a government or corporation Web site. Sometimes these
crimes have been committed in protest over the incarceration of other hackers; in 1996 the Web site of the
U.S. Central Intelligence Agency (CIA) was altered by Swedish hackers to gain international support for their
protest of the Swedish government’s prosecution of local hackers, and in 1998 the New York Times’s Web site
was hacked by supporters of the incarcerated hacker Kevin Mitnick. Still other hackers have used their skills to
engage in political protests: in 1998 a group calling itself the Legion of the Underground declared “cyberwar”
on China and Iraq in protest of alleged human rights abuses and a program to build weapons of mass
destruction, respectively. In 2007, Estonian government Web sites, as well as those for banks and the media,
were attacked. Russian hackers were suspected because Estonia was then in a dispute with Russia over the
removal of a Soviet war memorial in Tallinn.
Sometimes a user’s or organization’s computer system is attacked and encrypted until a ransom is paid. The
software used in such attacks has been dubbed ransomware. The ransom usually demanded is payment in a
8|Page
Prepared by Mon Kindipan- Notes on CDI 9
form of virtual currency, such as Bitcoin. When data are of vital importance to an organization, sometimes the
ransom is paid. In 2016 several American hospitals were hit with ransomware attacks, and one hospital paid
over $17,000 for its systems to be released.
Defacing Web sites is a minor matter, though, when compared with the specter of cyberterrorists using the
Internet to attack the infrastructure of a nation, by rerouting airline traffic, contaminating the water supply, or
disabling nuclear plant safeguards. One consequence of the September 11 attacks on New York City was the
destruction of a major telephone and Internet switching centre. Lower Manhattan was effectively cut off from
the rest of the world, save for radios and cellular telephones. Since that day, there has been no other attempt
to destroy the infrastructure that produces what has been called that “consensual hallucination,” cyberspace.
Large-scale cyberwar (or “information warfare”) has yet to take place, whether initiated by rogue states or
terrorist organizations, although both writers and policy makers have imagined it in all too great detail.
In late March 2007 the Idaho National Laboratory released a video demonstrating what catastrophic damage
could result from utility systems being compromised by hackers. Several utilities responded by giving the U.S.
government permission to run an audit on their systems. In March 2009 the results began to leak out with a
report in The Wall Street Journal. In particular, the report indicated that hackers had installed software in
some computers that would have enabled them to disrupt electrical services. Homeland Security
spokeswoman Amy Kudwa affirmed that no disruptions had occurred, though further audits of electric, water,
sewage, and other utilities would continue.
Pursuant to the authority of the Department of Justice, Department of Interior and Local Government, and
Department of Science and Technology under Republic Act No. 10175, otherwise known as the “Cybercrime
Prevention Act of 2012”, the following rules and regulations are hereby promulgated to implement the
provisions of said Act:
RULE 1
Preliminary Provisions
Section 1. Title. – These Rules shall be referred to as the Implementing Rules and Regulations of Republic Act
No. 10175, or the “Cybercrime Prevention Act of 2012”.
Section 2. Declaration of Policy. – The State recognizes the vital role of information and communications
industries, such as content production, telecommunications, broadcasting, electronic commerce and data
processing, in the State’s overall social and economic development.
The State also recognizes the importance of providing an environment conducive to the development,
acceleration, and rational application and exploitation of information and communications technology to attain
free, easy, and intelligible access to exchange and/or delivery of information; and the need to protect and
safeguard the integrity of computer, computer and communications systems, networks and databases, and the
confidentiality, integrity, and availability of information and data stored therein from all forms of misuse, abuse
and illegal access by making punishable under the law such conduct or conducts.
The State shall adopt sufficient powers to effectively prevent and combat such offenses by facilitating their
detection, investigation and prosecution at both the domestic and international levels, and by providing
arrangements for fast and reliable international cooperation.
a) Access refers to the instruction, communication with, storing data in, retrieving data from, or otherwise
making use of any resources of a computer system or communication network;
b) Act refers to Republic Act No. 10175 or the “Cybercrime Prevention Act of 2012”;
9|Page
Prepared by Mon Kindipan- Notes on CDI 9
c) Alteration refers to the modification or change, in form or substance, of an existing computer data or
program;
e) Child Pornography refers to the unlawful or prohibited acts defined and punishable by Republic Act No. 9775
or the “Anti-Child Pornography Act of 2009”, committed through a computer system: Provided, that the penalty
to be imposed shall be one (1) degree higher than that provided for in Republic Act No. 9775;
h) Competent Authority refers to either the Cybercrime Investigation and Coordinating Center or the DOJ –
Office of Cybercrime, as the case may be;
j) Computer data refers to any representation of facts, information, or concepts in a form suitable for processing
in a computer system, including a program suitable to cause a computer system to perform a function, and
includes electronic documents and/or electronic data messages whether stored in local computer systems or
online;
k) Computer program refers to a set of instructions executed by the computer to achieve intended results;
l) Computer system refers to any device or group of interconnected or related devices, one or more of which,
pursuant to a program, performs automated processing of data. It covers any type of device with data
processing capabilities, including, but not limited to, computers and mobile phones. The device consisting of
hardware and software may include input, output and storage components, which may stand alone or be
connected to a network or other similar devices. It also includes computer data storage devices or media;
m) Content Data refers to the communication content of the communication, the meaning or purport of the
communication, or the message or information being conveyed by the communication, other than traffic data.
n) Critical infrastructure refers to the computer systems, and/or networks, whether physical or virtual, and/or
the computer programs, computer data and/or traffic data that are so vital to this country that the incapacity
or destruction of or interference with such system and assets would have a debilitating impact on security,
national or economic security, national public health and safety, or any combination of those matters;
o) Cybersecurity refers to the collection of tools, policies, risk management approaches, actions, training, best
practices, assurance and technologies that can be used to protect the cyber environment, and organization and
user’s assets;
p) National Cybersecurity Plan refers to a comprehensive plan of actions designed to improve the security and
enhance cyber resilience of infrastructures and services. It is a top-down approach to cybersecurity that contains
broad policy statements and establishes a set of national objectives and priorities that should be achieved within
a specific timeframe;
q) Cybersex refers to the willful engagement, maintenance, control or operation, directly or indirectly, of any
lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or
consideration;
r) Cyber refers to a computer or a computer network, the electronic medium in which online communication
takes place;
10 | P a g e
Prepared by Mon Kindipan- Notes on CDI 9
s) Database refers to a representation of information, knowledge, facts, concepts or instructions which are
being prepared, processed or stored, or have been prepared, processed or stored in a formalized manner, and
which are intended for use in a computer system;
t) Digital evidence refers to digital information that may be used as evidence in a case. The gathering of the
digital information may be carried out by confiscation of the storage media (data carrier), the tapping or
monitoring of network traffic, or the making of digital copies (e.g., forensic images, file copies, etc.), of the data
held;
u) Electronic evidence refers to evidence, the use of which is sanctioned by existing rules of evidence, in
ascertaining in a judicial proceeding, the truth respecting a matter of fact, which evidence is received, recorded,
transmitted, stored, processed, retrieved or produced electronically;
v) Forensics refers to the application of investigative and analytical techniques that conform to evidentiary
standards, and are used in, or appropriate for, a court of law or other legal context;
w) Forensic image, also known as a forensic copy, refers to an exact bit-by-bit copy of a data carrier, including
slack, unallocated space and unused space. There are forensic tools available for making these images. Most
tools produce information, like a hash value, to ensure the integrity of the image;
x) Hash value refers to the mathematical algorithm produced against digital information (a file, a physical disk
or a logical disk) thereby creating a “digital fingerprint” or “digital DNA” for that information. It is a one-way
algorithm and thus it is not possible to change digital evidence without changing the corresponding hash values;
y) Identifying information refers to any name or number that may be used alone or in conjunction with any
other information to identify any specific individual, including any of the following:
1. Name, date of birth, driver’s license number, passport number or tax identification number;
2. Unique biometric data, such as fingerprint or other unique physical representation;
3. Unique electronic identification number, address or routing code; and
4. Telecommunication identifying information or access device.
z) Information and communication technology system refers to system intended for, and capable of,
generating, sending, receiving, storing or otherwise processing electronic data messages or electronic
documents, and includes the computer system or other similar device by or in which data is recorded or stored,
and any procedures related to the recording or storage of electronic data message or electronic document;
aa) Interception refers to listening to, recording, monitoring or surveillance of the content of communications,
including procurement of the content of data, either directly through access and use of a computer system, or
indirectly through the use of electronic eavesdropping or tapping devices, at the same time that the
communication is occurring;
bb) Internet content host refers to a person who hosts or who proposes to host internet content in the
Philippines;
cc) Law enforcement authorities refers to the National Bureau of Investigation (NBI) and the Philippine National
Police (PNP) under Section 10 of the Act;
dd) Original author refers to the person who created or is the origin of the assailed electronic statement or post
using a computer system;
ee) Preservation refers to the keeping of data that already exists in a stored form, protected from anything that
would cause its current quality or condition to change or deteriorate. It is the activity that keeps that stored
data secure and safe;
1. any public or private entity that provides users of its service with the ability to communicate by means
of a computer system; and
2. any other entity that processes or stores computer data on behalf of such communication service or
users of such service.
11 | P a g e
Prepared by Mon Kindipan- Notes on CDI 9
gg) Subscriber’s information refers to any information contained in the form of computer data or any other
form that is held by a service provider, relating to subscribers of its services, other than traffic or content data,
and by which any of the following can be established:
The type of communication service used, the technical provisions taken thereto and the period of service;
The subscriber’s identity, postal or geographic address, telephone and other access number, any assigned
network address, billing and payment information that are available on the basis of the service agreement or
arrangement; or
Any other available information on the site of the installation of communication equipment that is available on
the basis of the service agreement or arrangement.
hh) Traffic Data or Non-Content Data refers to any computer data other than the content of the
communication, including, but not limited to the communication’s origin, destination, route, time, date, size,
duration, or type of underlying service; and
ii) Without Right refers to either: (i) conduct undertaken without or in excess of authority; or (ii) conduct not
covered by established legal defenses, excuses, court orders, justifications or relevant principles under the law.
RULE 2
Punishable Acts and Penalties
Cybercrimes
Section 4. Cybercrime Offenses. – The following acts constitute the offense of core cybercrime punishable under
the Act:
A. Offenses against the confidentiality, integrity and availability of computer data and systems shall be
punished with imprisonment of prision mayor or a fine of at least Two Hundred Thousand Pesos (P200,000.00)
up to a maximum amount commensurate to the damage incurred, or both, except with respect to number 5
herein:
1. Illegal Access – The access to the whole or any part of a computer system without right.
2. Illegal Interception – The interception made by technical means and without right, of any non-public
transmission of computer data to, from, or within a computer system, including electromagnetic
emissions from a computer system carrying such computer data: Provided, however, That it shall not be
unlawful for an officer, employee, or agent of a service provider, whose facilities are used in the
transmission of communications, to intercept, disclose or use that communication in the normal course
of employment, while engaged in any activity that is necessary to the rendition of service or to the
protection of the rights or property of the service provider, except that the latter shall not utilize service
observing or random monitoring other than for purposes of mechanical or service control quality checks.
3. Data Interference – The intentional or reckless alteration, damaging, deletion or deterioration of
computer data, electronic document or electronic data message, without right, including the
introduction or transmission of viruses.
4. System Interference – The intentional alteration, or reckless hindering or interference with the
functioning of a computer or computer network by inputting, transmitting, damaging, deleting,
deteriorating, altering or suppressing computer data or program, electronic document or electronic data
message, without right or authority, including the introduction or transmission of viruses.
5. Misuse of Devices, which shall be punished with imprisonment of prision mayor, or a fine of not more
than Five Hundred Thousand Pesos (P500,000.00), or both, is committed through any of the following
acts:
a. The use, production, sale, procurement, importation, distribution or otherwise making available, intentionally
and without right, of any of the following:
i. A device, including a computer program, designed or adapted primarily for the purpose of committing any of
the offenses under this rules; or
ii. A computer password, access code, or similar data by which the whole or any part of a computer system is
capable of being accessed with the intent that it be used for the purpose of committing any of the offenses
under this rules.
12 | P a g e
Prepared by Mon Kindipan- Notes on CDI 9
b. The possession of an item referred to in subparagraphs 5(a)(i) or (ii) above, with the intent to use said devices
for the purpose of committing any of the offenses under this section.
Provided, That no criminal liability shall attach when the use, production, sale, procurement, importation,
distribution, otherwise making available, or possession of computer devices or data referred to in this section is
for the authorized testing of a computer system.
If any of the punishable acts enumerated in Section 4(A) is committed against critical infrastructure, the penalty
of reclusion temporal, or a fine of at least Five Hundred Thousand Pesos (P500,000.00) up to maximum amount
commensurate to the damage incurred, or both shall be imposed.
B. Computer-related Offenses, which shall be punished with imprisonment of prision mayor, or a fine of at least
Two Hundred Thousand Pesos (P200,000.00) up to a maximum amount commensurate to the damage incurred,
or both, are as follows:
1. Computer-related Forgery –
a. The input, alteration or deletion of any computer data without right, resulting in inauthentic data, with the
intent that it be considered or acted upon for legal purposes as if it were authentic, regardless whether or not
the data is directly readable and intelligible; or
b. The act of knowingly using computer data, which is the product of computer-related forgery as defined herein,
for the purpose of perpetuating a fraudulent or dishonest design.
2. Computer-related Fraud – The unauthorized “Input, alteration or deletion of computer data or program, or
interference in the functioning of a computer system, causing damage thereby with fraudulent intent: Provided,
That if no damage has yet been caused, the penalty imposable shall be one (1) degree lower.
3. Computer-related Identity Theft – The intentional acquisition, use, misuse, transfer, possession, alteration
or deletion of identifying information belonging to another, whether natural or juridical, without right: Provided,
That if no damage has yet been caused, the penalty imposable shall be one (1) degree lower.
C. Content-related Offenses:
1. Any person found guilty of Child Pornography shall be punished in accordance with the penalties set forth in
Republic Act No. 9775 or the “Anti-Child Pornography Act of 2009”: Provided, That the penalty to be imposed
shall be one (1) degree higher than that provided for in Republic Act No. 9775 if committed through a computer
system.
Section 5. Other Cybercrimes. – The following constitute other cybercrime offenses punishable under the Act:
1. Cyber-squatting – The acquisition of a domain name over the internet, in bad faith, in order to profit, mislead,
destroy reputation, and deprive others from registering the same, if such a domain name is:
a. Similar, identical, or confusingly similar to an existing trademark registered with the appropriate
government agency at the time of the domain name registration;
b. Identical or in any way similar with the name of a person other than the registrant, in case of a personal
name; and
c. Acquired without right or with intellectual property interests in it.
Cyber-squatting shall be punished with imprisonment of prision mayor, or a fine of at least Two Hundred
Thousand Pesos (P200,000.00) up to a maximum amount commensurate to the damage incurred, or
both: Provided, That if it is committed against critical infrastructure, the penalty of reclusion temporal, or a fine
of at least Five Hundred Thousand Pesos (P500,000.00) up to maximum amount commensurate to the damage
incurred, or both shall be imposed.
2. Cybersex – The willful engagement, maintenance, control or operation, directly or indirectly, of any lascivious
exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration. Any
person found guilty cybersex shall be punished with imprisonment of prision mayor, or a fine of at least Two
Hundred Thousand Pesos (P200,000.00), but not exceeding One Million Pesos (P1,000,000.00), or both.
Cybersex involving a child shall be punished in accordance with the provision on child pornography of the Act.
13 | P a g e
Prepared by Mon Kindipan- Notes on CDI 9
Where the maintenance, control, or operation of cybersex likewise constitutes an offense punishable under
Republic Act No. 9208, as amended, a prosecution under the Act shall be without prejudice to any liability for
violation of any provision of the Revised Penal Code, as amended, or special laws, including R.A. No. 9208,
consistent with Section 8 hereof.
3. Libel – The unlawful or prohibited acts of libel, as defined in Article 355 of the Revised Penal Code, as
amended, committed through a computer system or any other similar means which may be devised in the future
shall be punished with prision correccional in its maximum period to prision mayor in its minimum period or a
fine ranging from Six Thousand Pesos (P6,000.00) up to the maximum amount determined by Court, or both, in
addition to the civil action which may be brought by the offended party: Provided, That this provision applies
only to the original author of the post or online libel, and not to others who simply receive the post and react
to it.
4. Other offenses – The following acts shall also constitute an offense which shall be punished with
imprisonment of one (1) degree lower than that of the prescribed penalty for the offense, or a fine of at least
One Hundred Thousand Pesos (P100,000.00) but not exceeding Five Hundred Thousand Pesos (P500,000.00), or
both:
A. Aiding or Abetting in the Commission of Cybercrime. – Any person who willfully abets, aids, or financially
benefits in the commission of any of the offenses enumerated in the Act shall be held liable, except with
respect to Sections 4(c)(2) on Child Pornography and 4(c)(4) on online Libel.
B. Attempt to Commit Cybercrime. – Any person who willfully attempts to commit any of the offenses
enumerated in the Act shall be held liable, except with respect to Sections 4(c)(2) on Child Pornography
and 4(c)(4) on online Libel.
Section 6. Corporate Liability. – When any of the punishable acts herein defined are knowingly committed on
behalf of or for the benefit of a juridical person, by a natural person acting either individually or as part of an
organ of the juridical person, who has a leading position within, based on: (a) a power of representation of the
juridical person; (b) an authority to take decisions on behalf of the juridical person; or (c) an authority to exercise
control within the juridical person, the juridical person shall be held liable for a fine equivalent to at least double
the fines imposable in Section 7 up to a maximum of Ten Million Pesos (P10,000,000.00).
If the commission of any of the punishable acts herein defined was made possible due to the lack of supervision
or control by a natural person referred to and described in the preceding paragraph, for the benefit of that
juridical person by a natural person acting under its authority, the juridical person shall be held liable for a fine
equivalent to at least double the fines imposable in Section 7 up to a maximum of Five Million Pesos
(P5,000,000.00).
The liability imposed on the juridical person shall be without prejudice to the criminal liability of the natural
person who has committed the offense.
Section 7. Violation of the Revised Penal Code, as Amended, Through and With the Use of Information and
Communication Technology. – All crimes defined and penalized by the Revised Penal Code, as amended, and
special criminal laws committed by, through and with the use of information and communications technologies
shall be covered by the relevant provisions of the Act: Provided, That the penalty to be imposed shall be one (1)
degree higher than that provided for by the Revised Penal Code, as amended, and special laws, as the case may
be.
Section 8. Liability under Other Laws. – A prosecution under the Act shall be without prejudice to any liability
for violation of any provision of the Revised Penal Code, as amended, or special laws: Provided, That this
provision shall not apply to the prosecution of an offender under (1) both Section 4(c)(4) of R.A. 10175 and
Article 353 of the Revised Penal Code; and (2) both Section 4(c)(2) of R.A. 10175 and R.A. 9775 or the “Anti-Child
Pornography Act of 2009”.
RULE 3
Enforcement and Implementation
Section 9. Law Enforcement Authorities. – The National Bureau of Investigation (NBI) and the Philippine
National Police (PNP) shall be responsible for the efficient and effective law enforcement of the provisions of
the Act. The NBI and the PNP shall organize a cybercrime division or unit to be manned by Special Investigators
to exclusively handle cases involving violations of the Act.
14 | P a g e
Prepared by Mon Kindipan- Notes on CDI 9
The NBI shall create a cybercrime division to be headed by at least a Head Agent. The PNP shall create an anti-
cybercrime unit headed by at least a Police Director.
The DOJ – Office of Cybercrime (OOC) created under the Act shall coordinate the efforts of the NBI and the PNP
in enforcing the provisions of the Act.
Section 10. Powers and Functions of Law Enforcement Authorities. – The NBI and PNP cybercrime unit or
division shall have the following powers and functions:
Section 11. Duties of Law Enforcement Authorities. – To ensure that the technical nature of cybercrime and its
prevention is given focus, and considering the procedures involved for international cooperation, law
enforcement authorities, specifically the computer or technology crime divisions or units responsible for the
investigation of cybercrimes, are required to submit timely and regular reports including pre-operation, post-
operation and investigation results, and such other documents as may be required to the Department of Justice
(DOJ) – Office of Cybercrime for review and monitoring.
Law enforcement authorities shall act in accordance with the guidelines, advisories and procedures issued and
promulgated by the competent authority in all matters related to cybercrime, and utilize the prescribed forms
and templates, including, but not limited to, preservation orders, chain of custody, consent to search, consent
to assume account/online identity and request for computer forensic examination.
Section 12. Preservation and Retention of Computer Data. – The integrity of traffic data and subscriber
information shall be kept, retained and preserved by a service provider for a minimum period of six (6) months
from the date of the transaction. Content data shall be similarly preserved for six (6) months from the date of
receipt of the order from law enforcement authorities requiring its preservation.
Law enforcement authorities may order a one-time extension for another six (6) months: Provided, That once
computer data that is preserved, transmitted or stored by a service provider is used as evidence in a case, the
mere act of furnishing such service provider with a copy of the transmittal document to the Office of the
Prosecutor shall be deemed a notification to preserve the computer data until the final termination of the case
and/or as ordered by the Court, as the case may be.
The service provider ordered to preserve computer data shall keep the order and its compliance therewith
confidential.
Section 13. Collection of Computer Data. Law enforcement authorities, upon the issuance of a court warrant,
shall be authorized to collect or record by technical or electronic means, and the service providers are required
to collect or record by technical or electronic means and/or to cooperate and assist in the collection or recording
of computer data that are associated with specified communications transmitted by means of a computer
system.
The court warrant required under this section shall be issued or granted upon written application, after the
examination under oath or affirmation of the applicant and the witnesses he may produce, and the showing
that: (1) there are reasonable grounds to believe that any of the crimes enumerated hereinabove has been
committed, is being committed or is about to be committed; (2) there are reasonable grounds to believe that
the evidence that will be obtained is essential to the conviction of any person for, or to the solution of, or to the
prevention of any such crimes; and (3) there are no other means readily available for obtaining such evidence.
15 | P a g e
Prepared by Mon Kindipan- Notes on CDI 9
Section 14. Disclosure of Computer Data. – Law enforcement authorities, upon securing a court warrant, shall
issue an order requiring any person or service provider to disclose or submit, within seventy-two (72) hours
from receipt of such order, subscriber’s information, traffic data or relevant data in his/its possession or control,
in relation to a valid complaint officially docketed and assigned for investigation by law enforcement authorities,
and the disclosure of which is necessary and relevant for the purpose of investigation.
Law enforcement authorities shall record all sworn complaints in their official docketing system for
investigation.
Section 15. Search, Seizure and Examination of Computer Data. – Where a search and seizure warrant is
properly issued, the law enforcement authorities shall likewise have the following powers and duties:
a. Within the time period specified in the warrant, to conduct interception, as defined in this Rules, and to:
b. Pursuant thereto, the law enforcement authorities may order any person, who has knowledge about the
functioning of the computer system and the measures to protect and preserve the computer data therein, to
provide, as is reasonable, the necessary information to enable the undertaking of the search, seizure and
examination.
c. Law enforcement authorities may request for an extension of time to complete the examination of the
computer data storage medium and to make a return thereon, but in no case for a period longer than thirty (30)
days from date of approval by the court.
Section 16. Custody of Computer Data. – All computer data, including content and traffic data, that are
examined under a proper warrant shall, within forty-eight (48) hours after the expiration of the period fixed
therein, be deposited with the court in a sealed package, and shall be accompanied by an affidavit of the law
enforcement authority executing it, stating the dates and times covered by the examination, and the law
enforcement authority who may have access to the deposit, among other relevant data. The law enforcement
authority shall also certify that no duplicates or copies of the whole or any part thereof have been made or, if
made, that all such duplicates or copies are included in the package deposited with the court. The package so
deposited shall not be opened, or the recordings replayed, or used in evidence, or their contents revealed,
except upon order of the court, which shall not be granted except upon motion, with due notice and opportunity
to be heard to the person or persons whose conversation or communications have been recorded.
Section 17. Destruction of Computer Data. – Upon expiration of the periods as provided in Sections 12 and 15
hereof, or until the final termination of the case and/or as ordered by the Court, as the case may be, service
providers and law enforcement authorities, as the case may be, shall immediately and completely destroy the
computer data that are the subject of a preservation and examination order or warrant.
Section 18. Exclusionary Rule. – Any evidence obtained without a valid warrant or beyond the authority of the
same shall be inadmissible for any proceeding before any court or tribunal.
The Rules of Court shall have suppletory application in implementing the Act.
Section 19. Non-compliance. – Failure to comply with the provisions of Chapter IV of the Act, and Rules 7 and 8
of Chapter VII hereof, specifically the orders from law enforcement authorities, shall be punished as a violation
of Presidential Order No. 1829 (entitled “Penalizing Obstruction Of Apprehension And Prosecution Of Criminal
Offenders”) with imprisonment of prision correccional in its maximum period, or a fine of One Hundred
Thousand Pesos (P100,000.00), or both for each and every noncompliance with an order issued by law
enforcement authorities.
Section 20. Extent of Liability of a Service Provider. – Except as otherwise provided in this Section, no person
or party shall be subject to any civil or criminal liability in respect of a computer data for which the person or
party acting as a service provider merely provides access if such liability is founded on:
16 | P a g e
Prepared by Mon Kindipan- Notes on CDI 9
a. The obligations and liabilities of the parties under a computer data;
b. The making, publication, dissemination or distribution of such computer data or any statement made in such
computer data, including possible infringement of any right subsisting in or in relation to such computer
data: Provided, That:
1. The service provider does not have actual knowledge, or is not aware of the facts or circumstances from
which it is apparent, that the making, publication, dissemination or distribution of such material is
unlawful or infringes any rights subsisting in or in relation to such material;
2. The service provider does not knowingly receive a financial benefit directly attributable to the unlawful
or infringing activity; and
3. The service provider does not directly commit any infringement or other unlawful act, does not induce
or cause another person or party to commit any infringement or other unlawful act, and/or does not
directly benefit financially from the infringing activity or unlawful act of another person or
party: Provided, further, That nothing in this Section shall affect:
ii. The obligation of a service provider as such under a licensing or other regulatory regime established under
law;
iv. The civil liability of any party to the extent that such liability forms the basis for injunctive relief issued by a
court under any law requiring that the service provider take or refrain from actions necessary to remove, block
or deny access to any computer data, or to preserve evidence of a violation of law.
RULE 4
Jurisdiction
Section 21. Jurisdiction. – The Regional Trial Court shall have jurisdiction over any violation of the provisions of
the Act, including any violation committed by a Filipino national regardless of the place of commission.
Jurisdiction shall lie if any of the elements was committed within the Philippines, or committed with the use of
any computer system that is wholly or partly situated in the country, or when by such commission any damage
is caused to a natural or juridical person who, at the time the offense was committed, was in the Philippines.
Section 22. Venue. – Criminal action for violation of the Act may be filed with the RTC of the province or city
where the cybercrime or any of its elements is committed, or where any part of the computer system used is
situated, or where any of the damage caused to a natural or juridical person took place: Provided, That the court
where the criminal action is first filed shall acquire jurisdiction to the exclusion of other courts.
Section 23. Designation of Cybercrime Courts. – There shall be designated special cybercrime courts manned
by specially trained judges to handle cybercrime cases.
Section 24. Designation of Special Prosecutors and Investigators. – The Secretary of Justice shall designate
prosecutors and investigators who shall comprise the prosecution task force or division under the DOJ-Office of
Cybercrime, which will handle cybercrime cases in violation of the Act.
RULE 5
International Cooperation
Section 25. International Cooperation. – All relevant international instruments on international cooperation on
criminal matters, and arrangements agreed on the basis of uniform or reciprocal legislation and domestic laws
shall be given full force and effect, to the widest extent possible for the purposes of investigations or
proceedings concerning crimes related to computer systems and data, or for the collection of electronic
evidence of crimes.
The DOJ shall cooperate and render assistance to other contracting parties, as well as request assistance from
foreign states, for purposes of detection, investigation and prosecution of offenses referred to in the Act and in
the collection of evidence in electronic form in relation thereto. The principles contained in Presidential Decree
No. 1069 and other pertinent laws, as well as existing extradition and mutual legal assistance treaties, shall
apply. In this regard, the central authority shall:
17 | P a g e
Prepared by Mon Kindipan- Notes on CDI 9
a. Provide assistance to a requesting State in the real-time collection of traffic data associated with specified
communications in the country transmitted by means of a computer system, with respect to criminal offenses
defined in the Act for which real-time collection of traffic data would be available, subject to the provisions of
Section 13 hereof;
b. Provide assistance to a requesting State in the real-time collection, recording or interception of content data
of specified communications transmitted by means of a computer system, subject to the provision of Section
13 hereof;
1. Access publicly available stored computer data located in the country or elsewhere; or
2. Access or receive, through a computer system located in the country, stored computer data located in
another country, if the other State obtains the lawful and voluntary consent of the person who has the
lawful authority to disclose the data to said other State through that computer system.
d. Receive a request of another State for it to order or obtain the expeditious preservation of data stored by
means of a computer system located within the country, relative to which the requesting State shall submit a
request for mutual assistance for the search or similar access, seizure or similar securing, or disclosure of the
stored computer data: Provided, That:
ii. The offense that is the subject of a criminal investigation or proceedings and a brief summary of the related
facts;
iii. The stored computer data to be preserved and its relationship to the offense;
v. That the requesting State shall submit a request for mutual assistance for the search or similar access, seizure
or similar securing, or disclosure of the stored computer data.
2. Upon receiving the request from another State, the DOJ and law enforcement agencies shall take all
appropriate measures to expeditiously preserve the specified data, in accordance with the Act and other
pertinent laws. For the purposes of responding to a request for preservation, dual criminality shall not be
required as a condition;
i. The request concerns an offense that the Philippine Government considers as a political offense or an offense
connected with a political offense; or
ii. The Philippine Government considers the execution of the request to be prejudicial to its sovereignty,
security, public order or other national interest.
4. Where the Philippine Government believes that preservation will not ensure the future availability of the
data, or will threaten the confidentiality of, or otherwise prejudice the requesting State’s investigation, it shall
promptly so inform the requesting State. The requesting State will determine whether its request should be
executed; and
5. Any preservation effected in response to the request referred to in paragraph (d) shall be for a period not less
than sixty (60) days, in order to enable the requesting State to submit a request for the search or similar access,
seizure or similar securing, or disclosure of the data. Following the receipt of such a request, the data shall
continue to be preserved pending a decision on that request.
e. Accommodate request from another State to search, access, seize, secure, or disclose data stored by means
of a computer system located within the country, including data that has been preserved under the previous
subsection.
18 | P a g e
Prepared by Mon Kindipan- Notes on CDI 9
The Philippine Government shall respond to the request through the proper application of international
instruments, arrangements and laws, and in accordance with the following rules:
i. There are grounds to believe that relevant data is particularly vulnerable to loss or modification; or
ii. The instruments, arrangements and laws referred to in paragraph (b) of this section otherwise provide for
expedited cooperation.
2. The requesting State must maintain the confidentiality of the fact or the subject of request for assistance and
cooperation. It may only use the requested information subject to the conditions specified in the grant.
f. Make a request to any foreign state for assistance for purposes of detection, investigation and prosecution of
offenses referred to in the Act;
g. The criminal offenses described under Chapter II of the Act shall be deemed to be included as extraditable
offenses in any extradition treaty where the Philippines is a party: Provided, That the offense is punishable under
the laws of both Parties concerned by deprivation of liberty for a minimum period of at least one year or by a
more severe penalty.
The Secretary of Justice shall designate appropriate State Counsels to handle all matters of international
cooperation as provided in this Rule.
RULE 6
Competent Authorities
Section 26. Cybercrime Investigation and Coordinating Center; Composition. – The inter-agency body known
as the Cybercrime Investigation and Coordinating Center (CICC), under the administrative supervision of the
Office of the President, established for policy coordination among concerned agencies and for the formulation
and enforcement of the national cyber security plan, is headed by the Executive Director of the Information and
Communications Technology Office under the Department of Science and Technology (ICTO-DOST) as
Chairperson; the Director of the NBI as Vice-Chairperson; and the Chief of the PNP, the Head of the DOJ Office
of Cybercrime, and one (1) representative each from the private sector, non-governmental organizations, and
the academe as members.
The CICC members shall be constituted as an Executive Committee and shall be supported by Secretariats,
specifically for Cybercrime, Administration, and Cybersecurity. The Secretariats shall be manned from existing
personnel or representatives of the participating agencies of the CICC.
The CICC may enlist the assistance of any other agency of the government including government-owned and -
controlled corporations, and the following:
a. Bureau of Immigration;
b. Philippine Drug Enforcement Agency;
c. Bureau of Customs;
d. National Prosecution Service;
e. Anti-Money Laundering Council;
f. Securities and Exchange Commission;
g. National Telecommunications Commission; and
h. Such other offices, agencies and/or units, as may be necessary.
The DOJ Office of Cybercrime shall serve as the Cybercrime Operations Center of the CICC and shall submit
periodic reports to the CICC.
Participation and representation in the Secretariat and/or Operations Center does not require physical
presence, but may be done through electronic modes such as email, audio-visual conference calls, and the like.
Section 27. Powers and Functions. – The CICC shall have the following powers and functions:
a. Formulate a national cybersecurity plan and extend immediate assistance for the suppression of real-
time commission of cybercrime offenses through a computer emergency response team (CERT);
19 | P a g e
Prepared by Mon Kindipan- Notes on CDI 9
b. Coordinate the preparation of appropriate and effective measures to prevent and suppress cybercrime
activities as provided for in the Act;
c. Monitor cybercrime cases being handled by participating law enforcement and prosecution agencies;
d. Facilitate international cooperation on intelligence, investigations, training and capacity-building related
to cybercrime prevention, suppression and prosecution through the DOJ-Office of Cybercrime;
e. Coordinate the support and participation of the business sector, local government units and NGOs in
cybercrime prevention programs and other related projects;
f. Recommend the enactment of appropriate laws, issuances, measures and policies;
g. Call upon any government agency to render assistance in the accomplishment of the CICC’s mandated
tasks and functions;
h. Establish and perform community awareness program on cybercrime prevention in coordination with
law enforcement authorities and stakeholders; and
i. Perform all other matters related to cybercrime prevention and suppression, including capacity-building
and such other functions and duties as may be necessary for the proper implementation of the Act.
Section 28. Department of Justice (DOJ); Functions and Duties. – The DOJ-Office of Cybercrime (OOC),
designated as the central authority in all matters related to international mutual assistance and extradition, and
the Cybercrime Operations Center of the CICC, shall have the following functions and duties:
a. Act as a competent authority for all requests for assistance for investigation or proceedings concerning
cybercrimes, facilitate the provisions of legal or technical advice, preservation and production of data,
collection of evidence, giving legal information and location of suspects;
b. Act on complaints/referrals, and cause the investigation and prosecution of cybercrimes and other
violations of the Act;
c. Issue preservation orders addressed to service providers;
d. Administer oaths, issue subpoena and summon witnesses to appear in an investigation or proceedings
for cybercrime;
e. Require the submission of timely and regular reports including pre-operation, post-operation and
investigation results, and such other documents from the PNP and NBI for monitoring and review;
f. Monitor the compliance of the service providers with the provisions of Chapter IV of the Act, and Rules
7 and 8 hereof;
g. Facilitate international cooperation with other law enforcement agencies on intelligence, investigations,
training and capacity-building related to cybercrime prevention, suppression and prosecution;
h. Issue and promulgate guidelines, advisories, and procedures in all matters related to cybercrime
investigation, forensic evidence recovery, and forensic data analysis consistent with industry standard
practices;
i. Prescribe forms and templates, including, but not limited to, those for preservation orders, chain of
custody, consent to search, consent to assume account/online identity, and request for computer
forensic examination;
j. Undertake the specific roles and responsibilities of the DOJ related to cybercrime under the
Implementing Rules and Regulation of Republic Act No. 9775 or the “Anti-Child Pornography Act of
2009”; and
k. Perform such other acts necessary for the implementation of the Act.
Section 29. Computer Emergency Response Team (CERT). – The DOST-ICT Office shall establish and operate the
Computer Emergency Response Team (CERT) that shall serve as coordinator for cybersecurity related activities,
including but not limited to the following functions and duties:
a. Extend immediate assistance to the CICC to fulfil its mandate under the Act with respect to matters related
to cybersecurity and the national cybersecurity plan;
b. Issue and promulgate guidelines, advisories, and procedures in all matters related to cybersecurity and the
national cybersecurity plan;
c. Facilitate international cooperation with other security agencies on intelligence, training, and capacity-
building related to cybersecurity; and
d. Serve as the focal point for all instances of cybersecurity incidents by:
The Philippine National Police and the National Bureau of Investigation shall serve as the field operations arm
of the CERT. The CERT may also enlist other government agencies to perform CERT functions.
RULE 7
Duties of Service Providers
Section 30. Duties of a Service Provider. – The following are the duties of a service provider:
a. Preserve the integrity of traffic data and subscriber information for a minimum period of six (6) months
from the date of the transaction;
b. Preserve the integrity of content data for six (6) months from the date of receipt of the order from law
enforcement or competent authorities requiring its preservation;
c. Preserve the integrity of computer data for an extended period of six (6) months from the date of receipt
of the order from law enforcement or competent authorities requiring extension on its preservation;
d. Preserve the integrity of computer data until the final termination of the case and/or as ordered by the
Court, as the case may be, upon receipt of a copy of the transmittal document to the Office of the
Prosecutor;
e. Ensure the confidentiality of the preservation orders and its compliance;
f. Collect or record by technical or electronic means, and/or cooperate and assist law enforcement or
competent authorities in the collection or recording of computer data that are associated with specified
communications transmitted by means of a computer system, in relation to Section 13 hereof;
g. Disclose or submit subscriber’s information, traffic data or relevant data in his/its possession or control
to law enforcement or competent authorities within seventy-two (72) hours after receipt of order and/or
copy of the court warrant;
h. Report to the DOJ – Office of Cybercrime compliance with the provisions of Chapter IV of the Act, and
Rules 7 and 8 hereof;
i. Immediately and completely destroy the computer data subject of a preservation and examination after
the expiration of the period provided in Sections 13 and 15 of the Act; and
j. Perform such other duties as may be necessary and proper to carry into effect the provisions of the Act.
Section 31. Duties of a Service Provider in Child Pornography Cases. – In line with RA 9775 or the “Anti-Child
Pornography Act of 2009”, the following are the duties of a service provider in child pornography cases:
1. An internet service provider (ISP)/internet content host shall install available technology, program or
software, such as, but not limited to, system/technology that produces hash value or any similar
calculation, to ensure that access to or transmittal of any form of child pornography will be blocked or
filtered;
2. Service providers shall immediately notify law enforcement authorities within seven (7) days of facts and
circumstances relating to any form child pornography that passes through or are being committed in
their system; and
3. A service provider or any person in possession of traffic data or subscriber’s information, shall, upon the
request of law enforcement or competent authorities, furnish the particulars of users who gained or
attempted to gain access to an internet address that contains any form of child pornography. ISPs shall
also preserve customer data records, specifically the time, origin, and destination of access, for purposes
of investigation and prosecution by relevant authorities under Sections 9 and 11 of R.A. 9775.
RULE 8
Prescribed Forms and Procedures
SEC. 32. Prescribed Forms and Procedures. – The DOJ – Office of Cybercrime shall issue and promulgate
guidelines, advisories, and procedures in all matters related to cybercrime, investigation, forensic evidence
recovery, and forensic data analysis consistent with international best practices, in accordance with Section
28(h) and (i) hereof.
It shall also prescribe forms and templates such as, but not limited to, preservation orders, chain of custody,
consent to search, consent to assume account/online identity, request for computer forensic assistance, write-
blocking device validation and first responder checklist.
21 | P a g e
Prepared by Mon Kindipan- Notes on CDI 9
RULE 9
Final Provisions
SEC. 33. Appropriations. – The amount of Fifty Million Pesos (P50,000,000.00) shall be appropriated annually
for the implementation of the Act under the fiscal management of DOJ – Office of Cybercrime.
Section 34. Separability Clause. – If any provision of these Rules is held invalid, the other provisions not affected
shall remain in full force and effect.
Section 35. Repealing Clause. – All rules and regulations inconsistent with these Rules are hereby repealed or
modified accordingly.
Section 36. Effectivity. – These rules and regulations shall take effect fifteen (15) days after the completion of
its publication in at least two (2) newspapers of general circulation.
In partnership with stakeholders, the law aims to adopt a systematic, comprehensive and ecological solid waste
management program that shall ensure the protection of public health and environment. The law ensures
proper segregation, collection, storage, treatment and disposal of solid waste through the formulation and
adaptation of best eco-waste products.
The law aims to protect the country's water bodies from pollution from land-based sources (industries and
commercial establishments, agriculture and community/household activities). It provides for comprehensive
and integrated strategy to prevent and minimize pollution through a multi-sectoral and participatory approach
involving all the stakeholders.
The law aims to achieve and maintain clean air that meets the National Air Quality guideline values for criteria
pollutants, throughout the Philippines, while minimizing the possible associated impacts to the economy.
REPUBLIC ACT 6969 TOXIC SUBSTANCES, HAZARDOUS AND NUCLEAR WASTE CONTROL ACT OF 1990
The law aims to regulate restrict or prohibit the importation, manufacture, processing, sale, distribution, use
and disposal of chemical substances and mixtures the present unreasonable risk to human health. It likewise
prohibits the entry, even in transit, of hazardous and nuclear wastes and their disposal into the Philippine
territorial limits for whatever purpose; and to provide advancement and facilitate research and studies on toxic
chemicals.
The Environment Impact Assessment System was formally established in 1978 with the enactment of
Presidential Decree no. 1586 to facilitate the attainment and maintenance of rational and orderly balance
22 | P a g e
Prepared by Mon Kindipan- Notes on CDI 9
between socio-economic development and environmental protection. EIA is a planning and management tool
that will help government, decision makers, the proponents and the affected community address the negative
consequences or risks on the environment. The process assures implementation of environment-friendly
projects.