0% found this document useful (0 votes)
2 views12 pages

Cyber Crime

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views12 pages

Cyber Crime

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

CYBERCRIME • Includes cybersex trafficking and

CYBERTERRORISM & ORGANIZED online pimping.


CRIMES ONLINE 4. Child Exploitation Networks
OLD CRIMES, NEW TACTIC
• Structured groups exchanging or
Hacking, previously discussed, is a crime selling child sexual abuse materials
arising from the development of information (CSAM).
and communication technology. Most of the
• Involves live streaming, encrypted file
dangerous cybercrimes are being committed
sharing, and money laundering.
through the use of hacking such as the
following: 5. Ransomware Attacks
Organized crimes online—also known as • Organized cybercriminals target
cyber-enabled organized crime—refer to businesses or government agencies.
criminal activities committed by structured,
coordinated groups using digital platforms • Demand ransom payments (usually in
and technologies to carry out illegal crypto) in exchange for data
operations. These crimes are often restoration.
transnational, financially motivated, and
difficult to detect due to the anonymity and 6. Online Extortion and Blackmail
speed of the internet.
• Includes sextortion, doxing, and
Examples of Organized Crimes Online threats made via email or social
platforms.
1. Cyber Fraud and Scams
• Sometimes coordinated by groups
• Online investment fraud (e.g., fake targeting victims at scale.
crypto schemes)
7. Illegal Online Gambling and Betting
• Romance scams or business email
compromise (BEC) • Run by criminal syndicates using
unlicensed or offshore sites.
• ATM skimming or phishing
• Launders large sums of money
2. Drug and Weapons Trafficking through fake bets and player
accounts.
• Use of encrypted messaging and the
dark web to sell drugs, firearms, or 8. Money Laundering through Online
counterfeit goods. Channels
• Use of shell companies, online
• Payments often made via casinos, digital wallets, and crypto
cryptocurrency (e.g., Bitcoin). exchanges to clean “dirty” money.
3. Human Trafficking and Cyber Prostitution Identity Theft and Identity Fraud
• Victims recruited online for sexual Identity Theft - the illegal use or transfer of
exploitation or forced labor. a third party’s personal identification
information with unlawful intent
Identity Fraud - refers to vast array of illegal • Accessing a victim’s retirement or
activities based on fraudulent use of investment accounts.
identifying information of a real or fictitious
person; encompasses identity theft 2. Criminal Identity Theft

- Committed when a credible identity is Definition: Posing as someone else when


created by accessing others’ credit cards, apprehended or investigated for a crime.
financial or employment records, secure
Examples:
facilities, computer systems, etc.

Criminal Acts Facilitated by Identity Theft / • Providing another person’s name and
Fraud: personal details during arrest.

• Using fake identification to avoid


• Money Laundering
criminal records.
• Drug trafficking
• Alien Smuggling
• Weapon Smuggling
• Extortion 3. Medical Identity Theft
• Misappropriation of Funds
• Embezzlement and other financial Definition: Using another individual’s
crime identity to obtain medical services or
prescription drugs.
A. Typologies of Identity Theft/Fraud
Examples:
Identity theft is not a new phenomenon. In
fact, the story of Esau and Jacob in the Old • Receiving surgery or medical
Testament is the first recorded example of treatment under someone else’s
identity theft. In the modern society, identity insurance.
theft/fraud is typically categorized by the
• Using another's identity to obtain
intention or motivation of the offender:
controlled substances.
financial or nonfinancial. To be specific, the
following types of identity theft/fraud were
identified:
4. Synthetic Identity Theft
Financial Identity Theft
Definition: Combining real and fabricated
Definition: Stealing someone’s identity to information to create a new, fictitious
gain access to their financial resources or identity.
credit.
Examples:
Examples:
• Creating a new identity using a real
• Using someone’s credit card without Social Security Number (SSN) but a
permission. fake name and birthdate.
• Opening new bank accounts or loans • Used often to build fraudulent credit
in another person’s name. profiles.
5. Child Identity Theft 8. Social Identity Theft

Definition: Stealing the identity of a minor, Definition: Impersonating someone on


often unnoticed for years. social media or online platforms for
malicious purposes.
Examples:
Examples:
• Using a child’s SSN to apply for credit
or loans. • Creating fake social media profiles.

• Filing tax returns or obtaining • Harassing or scamming others using


government benefits with a child’s another person's identity.
information.

9. Insurance Identity Theft


6. Tax Identity Theft
Definition: Using someone else’s identity to
Definition: Using someone’s personal make false insurance claims or obtain
information to file fraudulent tax returns and benefits.
claim refunds.
Examples:
Examples:
• Filing health or car insurance claims
• Filing a return before the real taxpayer under someone else’s name.
does.
• Using stolen IDs to receive worker’s
• Claiming false dependents or compensation.
deductions using stolen identities.

10. Identity Cloning


7. Employment Identity Theft
Definition: Assuming someone’s identity in
Definition: Using another’s identity to obtain its entirety to live or function as that person.
or maintain employment.
Examples:
Examples:
• Living under the victim’s name.
• Using false identity to pass
background checks. • Engaging in long-term activities such
as marriage, property ownership, or
• Avoiding tax liabilities or immigration employment using the stolen identity.
laws.
VICTIMOLOGY

Susceptible victims of Identity Theft/Fraud


include but are not limited to the following:
• Smartphone owners who fail to Examples:
safeguard their devices with • Observing someone type their PIN at
passwords an ATM.
• People who publicly share personal • Watching passwords or account
information in social networking sites numbers being entered on a phone or
• People who are usually using laptop.
services of online banking, online
communication, and online shopping IV. Pickpocketing or Purse Snatching
• People / companies who experienced Definition: Physically stealing wallets,
data breaches purses, or bags containing ID documents.
Examples:
• Theft of driver’s license, Social
Physical Methods of Identity Theft Security card, credit/debit cards.
• Passports or other government-
While many identity theft crimes occur issued IDs.
online, physical methods are still common
and often easier to execute than digital V. Theft of Devices
attacks. These involve obtaining a victim’s Definition: Stealing personal devices that
personal information through direct or contain sensitive data.
indirect physical access to documents, Examples:
devices, or personal belongings. • Mobile phones, laptops, USB drives
with saved passwords or personal
I. Dumpster Diving documents.
Definition: Searching through trash to find • Cameras or digital storage used for ID
personal documents or items with sensitive processing.
information.
Examples: VI. Insider Theft
• Bank statements, utility bills, credit Definition: Employees or insiders at
card offers. businesses or institutions stealing customer
• Pre-approved loan or credit card data.
applications. Examples:
• Medical or insurance records.
• Copying customer information from
files or databases.
II. Mail Theft • Taking photocopies of IDs,
Definition: Stealing physical mail to gather application forms, or account details.
personal and financial data.
Examples: VII. Social Engineering (In-Person)
• Taking checks, bank statements, or Definition: Manipulating people into
tax forms from mailboxes. revealing confidential information through
• Redirecting or intercepting mail by face-to-face deception.
submitting a false change-of-address Examples:
form. • Posing as utility workers or
government officials to gain access to
III. Shoulder Surfing homes or offices.
Definition: Watching someone enter • Pretending to conduct surveys to
sensitive information in public spaces. collect personal information.
\
VIII. Skimming (Using Physical Devices) Legal Framework (Philippines and
Definition: Installing a device on ATMs, gas International) Philippines:
pumps, or card readers to steal card • Republic Act No. 9775 – Anti-
information.
Child Pornography Act of 2009 o
Examples:
• ATM skimmers that record card data Prohibits the production,
and PINs. dissemination, and possession of
• Fake card readers at restaurants or child pornography in any form,
stores. including online.
o Criminalizes:
IX. Lost or Misplaced Documents
▪ Using children for pornographic
Definition: Identity thieves taking advantage
performances (even live-streamed). ▪
of unattended or lost personal items.
Examples: Storing, downloading, or sharing child
• Finding a dropped wallet or ID card pornographic materials via the internet or
and using the information electronic devices.
fraudulently. o Imposes obligations on
• Recovering documents left in printers, ISPs, content hosts, and
fax machines, or public copiers. cybercafé operators to report
and prevent such acts.
X. Fake Surveys, Forms, or Public
Giveaways International Laws:
Definition: Trick victims into physically filling • UN Convention on the Rights
out forms that collect sensitive data. of the Child (CRC)
Examples: • Optional Protocol on the Sale
• "Win a prize" entry forms asking for of Children, Child Prostitution and
name, address, birthdate, and ID Child Pornography
numbers.
• Interpol and Europol maintain
• Fake job applications or loan offers in
person. global databases to identify and
rescue victims.
CHILD PORNOGRAPHY ONLINE
Modes of Online Distribution
Child pornography online refers to the illegal 1. Dark Web Platforms o Hidden
production, possession, distribution, or networks that require special
access to sexually explicit material that browsers (like Tor).
involves or depicts minors (individuals under o Often used to exchange
the age of 18). This form of abuse is a explicit material anonymously.
serious criminal offense and a violation of 2. P2P File Sharing (Peer-to-
children’s rights, involving both real and Peer) o Decentralized sharing,
sometimes digitally manipulated images making it hard to trace the origin.
(e.g., deepfakes or computer-generated 3. Social Media and Messaging
images). Apps o Used to groom children and
share images. o Platforms like bypassing physical spaces like brothels or
Facebook, Telegram, Discord, and streets in favor of social media, dating apps,
WhatsApp have been used. live streaming, or dark web forums.
4. Live Streaming or Webcam Characteristics of Cyber Prostitution
Abuse 1. Online Platform Use
o Children, often in o Involves websites, social
developing countries, are media (e.g., Facebook,
coerced into live sexual Twitter, Telegram), adult
performances, sometimes content sites, or chatrooms.
under parental involvement. o May also include personal ads,
o Paid live streams escort websites, and dating
viewed by abusers globally. apps.
2. Remote Transactions
Victimology o Arrangements may involve in-
• Children aged 0–17, with rising person meetings or purely
cases involving prepubescent minors. virtual sexual acts (e.g.,
• Victims are often: sexting, cam shows, video
o Coerced, threatened, or calls).
deceived. 3. Live Streaming & Webcam
o From poor or Services
marginalized communities. o Individuals are paid to perform
o Lured through social sexually explicit acts in real-
media or games. time via webcam.
• Long-term psychological 4. Anonymity and Pseudonymity
effects: PTSD, shame, anxiety, o Use of fake names, encrypted
difficulty forming trust or intimacy. messaging, and hidden online
Child pornography online refers to any identities makes detection and
visual depiction of sexually explicit conduct law enforcement difficult.
involving a minor (a person under 18 years Cyber Prostitution and Human
old) that is produced, distributed, accessed, Trafficking
or stored through the internet or digital • Victims of online sex trafficking,
platforms. including minors, may be coerced or
deceived into cyber prostitution.
CYBER PROSTITUTION • Platforms may be used by traffickers
Cyber prostitution refers to the use of digital to advertise, control, and exploit
platforms and internet technologies to offer, individuals under false pretenses
solicit, or facilitate sexual services or (e.g., modeling, job offers).
transactions in exchange for money, goods,
or favors. It merges traditional prostitution Legal and Ethical Implications
with modern communication tools, often Philippines Legal Context:
• Republic Act No. 9208 – Anti- valuable digital assets through illegal access
Trafficking in Persons Act of 2003 to computer systems, networks, or online
(amended by RA 10364) platforms. It can target individuals,
• RA 10175 – Cybercrime Prevention businesses, or even governments.
Act of 2012 Cyber theft refers to the unlawful acquisition
• RA 9775 – Anti-Child Pornography of digital property—such as financial
Act of 2009 credentials, personal data, or intellectual
These laws criminalize: property—through hacking, phishing,
• Online sexual exploitation malware, or other cyber intrusions. It is
• Child cyber prostitution typically motivated by financial gain.
• Use of ICT for trafficking or solicitation
of sexual services Common Forms of Cyber Theft
1. Identity Theft – Stealing personal
Global Context: information to impersonate someone
• Many countries differentiate between for financial or criminal purposes.
consensual adult online sex work and 2. Phishing Attacks – Fraudulent emails,
exploitation or trafficking, especially messages, or websites tricking
of minors. victims into revealing sensitive
Typologies of Cyber Prostitution information.
1. Voluntary Cyber Sex Work 3. Credit Card Fraud – Unauthorized
o Adults engaging willingly in use of someone’s credit or debit card
digital sex work (e.g., information.
OnlyFans, cam models). 4. Online Banking Theft – Gaining
o Legal status varies by access to bank accounts via stolen
country. login credentials or malware.
2. Coerced or Trafficked Victims 5. Data Breaches – Hacking into
o Individuals forced into online databases to steal customer or
sexual performances, often employee records.
under threat or deception. 6. Ransomware – Encrypting data and
3. Child Cyber Prostitution demanding payment to restore
o Involves minors performing access.
sexual acts online—always 7. Intellectual Property Theft – Stealing
illegal and considered trade secrets, copyrighted materials,
exploitation. or proprietary technology.

CYBER THEFT, CYBER EXTORTION, Impact of Cyber Theft


CYBER VANDALISM • Financial Loss – Direct theft of funds
Cyber Theft or costly remediation.
Cyber theft is a form of cybercrime that • Reputational Damage – Loss of
involves stealing money, data, or other customer trust.
• Operational Disruption – Downtime 1. Infiltration – The attacker gains
and loss of productivity. access to systems or sensitive data
• Legal Consequences – Lawsuits or (via phishing, malware, or hacking).
regulatory fines for poor data 2. Threat Delivery – The criminal
protection. contacts the victim, outlining the
threat and the demanded payment.
Cyber Extortion 3. Pressure Tactics – Imposing
Cyber Extortion is a type of cybercrime deadlines, increasing demands, or
where criminals use threats—often involving demonstrating capabilities (e.g.,
stolen data, system disruption, or exposure leaking small portions of stolen data).
of sensitive information—to demand money, 4. Payment Channels – Demands are
services, or other benefits from victims. It’s usually in cryptocurrency for
essentially the digital version of blackmail. anonymity.
Cyber extortion is the act of using technology
to intimidate or coerce an individual, Cyber vandalism
organization, or government into giving up Cyber Vandalism is a type of cybercrime that
something of value, usually money, under involves intentionally damaging, defacing, or
the threat of carrying out a harmful action altering digital content, websites, or systems
such as releasing data, shutting down without authorization—often to cause
systems, or damaging a reputation. disruption, humiliation, or send a political or
personal message. It’s similar to graffiti in
Common Forms of Cyber Extortion the physical world, but done in cyberspace.
1. Ransomware Attacks – Criminals Cyber vandalism is the deliberate act of
encrypt a victim’s files and demand destroying, altering, or corrupting data,
payment to restore access. digital assets, or online platforms, typically
2. Data Breach Extortion – Hackers without direct financial gain, and often to
steal sensitive data and threaten to showcase technical skills, spread a
release it unless paid. message, or harm the victim’s reputation.
3. DDoS-for-Ransom – Threatening or
actually launching Distributed Denial Common Forms of Cyber Vandalism
of Service attacks to disrupt 1. Website Defacement – Changing the
operations until demands are met. appearance or content of a website.
4. Sextortion – Threatening to release 2. Data Deletion or Corruption – Erasing
intimate images or videos unless or damaging files to disrupt
demands are met. operations.
5. Corporate Blackmail – Threatening to 3. Malicious Code Injection – Altering a
expose damaging company program or database to cause errors
information. or chaos.
4. Digital Graffiti – Inserting unwanted or
How Cyber Extortion Works offensive messages in online spaces.
5. Virtual Sabotage – Shutting down ➢ The harassment can take place in any
services or altering online features for electronic environment where
disruption. communication with others is
possible, such as on social
Motives Behind Cyber Vandalism networking sites, on message
• Political Activism (“Hacktivism”) – boards, in chat rooms or through
Expressing dissent or protest. email. Just posting a general opinion
• Personal Revenge – Targeting on a discussion board or in a forum is
individuals or organizations over not considered harassment.
disputes. ➢ Various kinds of harassment do occur
• Thrill-Seeking – For fun, bragging in cyberspace. Harassment can be
rights, or notoriety among peers. sexual, racial, religious, etc.
• Competitive Sabotage – Damaging a Cyber Stalking
rival’s digital assets. ➢ A technologically based “attack” on
one person who has been targeted
WEEK 10: specifically for the reasons of anger,
CYBER DEFAMATION, CYBER revenge, control, flirting or love
HARASSMENT, CYBER STALKING AND obsession.
CYBER BULLYING ➢ Stalking can be accomplished by:
Cyber Defamation False accusations, Making threats,
➢ It involves any person with intent to Identity theft, the solicitation of minors
lower down the dignity of the person for sex and/or monitoring; Harassing,
by hacking his mail account and Threatening, Intimidating and
sending some mails with using vulgar Impersonating Profile
languages to unknown persons mail ➢ Cyber stalkers find their victims by
account. using search engines, online forums,
➢ Includes Cyber Libel - any bulletin and discussion boards, chat
inaccurately or injuriously written rooms, and social networking sites
defamation triggered via electronic such as Myspace, Facebook, Twitter,
means, including the Internet, social etc.
media, email and websites. Cyber ➢ They may engage in live chat
libel creates instant and irrevocable harassment or flaming or they may
reputation damage. send electronic viruses and
Cyber Harassment unsolicited e-mails.
➢ repeated, unsolicited, threatening ➢ Cyber stalker may research
behaviour by a person or group using individuals to feed their obsession
mobile or Internet technology with the and curiosity. Conversely they may
intent to bother, terrify, intimidate, become more intense, such as
humiliate, threaten, harass or stalk repeatedly instant messaging their
someone else. targets.
➢ Cyber stalkers will post defamatory or harm is re-inflicted with each reading
derogatory statements about their or viewing.
stalking target on web pages, o Audience size: the size of the
message boards and in guest books audience that is able to view or
designed to get a reaction or access the damaging material
response from their victim; create increases the victims humiliation.
fake blogs in the name of the victim o Familiarity: many young people are
containing defamatory or friends with or known their cyber bully
pornographic content; Once they get either through school or other
a reaction from the victim, they will personal connections, increasing the
typically attempt to track or follow the potential for embarrassment and
victims internet activity such as by humiliation.
tracing of the victim's IP address in an o Social networking: social
attempt to verify their home or place networking sites such as Facebook
of employment; In some situations, and my space allow cyber bullies to
they do physical stalking, and a victim engage in campaigns against
may experience abusive and particular person which may involve
excessive phone calls, vandalism, many others.
threatening or obscene mail, o Speed: the speed at which harmful
trespassing, and physical assault. messages can reach large audiences
➢ Many physical stalkers will use cyber also plays a major part in making
stalking as another method of cyber bullying so damaging to the
harassing their victims. targets.
Cyber Bullying o
➢ Cyber bullying is when persons, ➢ Cyber Bullying Tactics
usually minors, use the internet, cell o Gossip: posting or sending cruel
phones, or other technological gossip to damage a person’s
devices to send or post text or images reputation and relationship with
intended to hurt embarrass threaten, others.
torment, humiliate, or intimidate, their o Exclusion: deliberately excluding
victim. someone from an online group.
➢ Cyber bullying is more harmful than o Impersonation: breaking into
face-to-face bullying for many someone's online account and
reasons: sending messages or making post
o Permanence: the insults, comments that will cause embarrassment or
or images can be preserved by the damage to the persons reputation
person who has bullied or by others and affect is or her relationships with
so that the victim may read or view others.
them over and over again and the
o Harassment: repeatedly posting or be used by others. In exchange for this right,
sending offensive, rude, and insulting the patent owner makes technical
messages or post. information about the invention publicly
o Cyber stalking: posting or sending available in the published patent document.
unwanted or intimidating, which may
include threats. Trade Secrets - any confidential business
o Flaming: online fights where scornful information which provides an enterprise a
and offensive messages are posted competitive edge and is kept secret may be
on websites, forums or blogs. protected as a trade secret.
o Trickery: tricking someone into ***The unauthorized acquisition, use or
revealing secrets or embarrassing disclosure of such secret information in a
information, which is then shared manner contrary to honest commercial
online. practices by others is regarded as an unfair
o Cyber Threats: remarks on the practice and a violation of the trade secret
internet threatening or implying protection.
violent behaviour , displaying suicidal
tendencies. Trademarks - a sign capable of
distinguishing the goods or services of one
WEEK 11 enterprise from those of other enterprises.
THEFT OF INTELLECTUAL PROPERTY
➢ Defined as theft of material that is ➢ It involves robbing people or
copyrighted, the theft of trade secrets, companies of their ideas, inventions,
and trademark violations. and creative expressions which can
Intellectual Property - refers to creations of include everything from trade secrets
the mind, such as inventions; literary and and proprietary products and parts to
artistic works; designs; and symbols, names movies, music, and software.
and images used in commerce. SOFTWARE PIRACY
➢ A term used to describe the act of
Copyright - a legal term used to describe illegally using, copying or distributing
the rights that creators have over their software without ownership or legal
literary and artistic works. Works covered by rights or could also be the act of
copyright range from books, music, installing and using of commercial
paintings, sculpture and films, to computer software without paying for the
programs, databases, advertisements, program
maps and technical drawings. Five main types of software piracy:
1. Counterfeiting- this type of piracy is
Patent - is an exclusive right granted for an the illegal duplication, distribution
invention. Generally speaking, a patent and/or sale of copyrighted material
provides the patent owner with the right to with the intent of imitating the
decide how - or whether - the invention can copyrighted product. In the case of
packaged software, it is common to purchase of the machines more
find counterfeit copies of the compact attractive.
discs incorporating the software FILM PIRACY
programs, as well as related • Film piracy is the illegal copying and
packaging, manuals, license distribution of movies in print, videos,
agreements, labels, registration cards DVDs or electronic files.
and security features. Film Piracy is done in many ways like:
2. Internet Piracy- this occurs when a) Video piracy- this takes place when
software is downloaded from the a film is produced in the form of a
Internet. The same purchasing rules videocassette without proper
apply to online software purchases as authorization from the right holder i.e.
for those bought in compact disc the producer. Often, film producers
format. sell video rights to another party
3. End User Piracy- this occurs when (generally after six weeks or more of
an individual reproduces copies of release in theatres), which makes
software without authorization. Using video cassettes for selling, or lending.
one licensed copy to install a program b) Cable piracy- refers to unauthorized
on multiple computers: transmission of films through cable
1. Copying discs for installation network. Very often, films, especially
or distribution the new releases, are shown through
2. Taking advantage of upgrade cable without permission from the
offers without having a legal rights holder. Piracy is a rare
copy of the version to be phenomenon in satellite channels
upgraded because these are organized and
3. Acquiring academic or other generally do not show films without
restricted or non-retail buying proper rights.
software without a proper c) DVD/VCD piracy- usually happens in
license the international markets. The prints
4. Swapping discs in or outside sent for overseas screening of the film
the workplace are pirated, typically at any of the
4. Client-Server Overuse- this type of country airports. DVD/VCD prints are
piracy occurs when too many users prepared and are sent to any country
on a network are using a central copy which may travel to different
of a program at the same time. If you countries.
have more users than allowed by the
license, that's "overuse.“
5. Hard-Disk Loading- this occurs
when a business sells new computers
with illegal copies of software loaded
onto the hard disks to make the

You might also like