Download - Cybercrimes Investigation
-
8/12/2019 Cybercrimes Investigation
1/52
PSUPT EDUARDO F KEMPISAsst Regional Chief, 5RCDU, CIDG
-
8/12/2019 Cybercrimes Investigation
2/52
Legal BasisRA 8792 Electronic Commerce Act of2000RA 8484 Access Device Act
RA 9775 Anti-Child Pornography Actof 2009
Introduction to Cyber Crimes
-
8/12/2019 Cybercrimes Investigation
3/52
Scope of ApplicationComputer or network can be a tool
of crime (use to commit the crime)Computer or network can be atarget of the crime (the victim)
Computer or network can be usedfor incidental purposes related to thecrime
Introduction to Cyber Crimes
-
8/12/2019 Cybercrimes Investigation
4/52
Definition of TermsComputer Serveris a computer or device on anetwork that manages network resources. Eg. A file
server is a computer and storage device dedicated tostoring files. Any user in the network can store fileson the server. A print server is a computer thatmanages one or more printer, and a network server
is a computer that manages network traffic. Adatabase server is a computer system that processesdatabase queries.
Introduction to Cyber Crimes
-
8/12/2019 Cybercrimes Investigation
5/52
Computer Network is a collection of computersand devices connected to each other. The networksallows computers to communicate with each other
and share resources and information.
Cyber Crime any illegal behavior committed bymeans of, or in relation to, a computer system ornetwork, including such crimes as illegal possession,offering or distributing information my means of acomputer system or network. (UN Definition)
Introduction to Cyber Crimes
-
8/12/2019 Cybercrimes Investigation
6/52
Computer Crime any illegal behavior directedby means of electronic operations that targets thesecurity of computer systems and the data processed
by them. (UN Definition)
Domain Name is an identification label to definerealms of administrative autonomy, authority, or
control in the internet, based on the Domain NameSystem.
Introduction to Cyber Crimes
-
8/12/2019 Cybercrimes Investigation
7/52
Electronic Mail often abbreviated as email, is amethod of exchanging digital messages, designedprimarily for human use. A message at least consistsof its contents, an author, address, and one or more
recipient addresses.Internet Protocol (IP) Address a numericalidentification and logical address that is assigned todevices participating in a computer network utilizingthe Internet Protocol for communication.Electronic Evidence is any probativeinformation stored or transmitted in digital form thata party to a court case may use at trial.
Introduction to Cyber Crimes
-
8/12/2019 Cybercrimes Investigation
8/52
Electronic Crime Scene A crime scene where
there are electronic evidence found.Web Hosting Service is an individual ororganizations providing website or internet hostingservice that allows individuals or organizations to
provide their own website accessible via World WideWeb.Web site (Group of Web pages) is a collectionof related web pages, images, videos or other digitalassets that are addressed with a common domain
name or IP address in an Internet Protocol-basednetwork. A web site is hosted on at least one webserer, accessible via the Internet or a private localarea network.
Introduction to Cyber Crimes
-
8/12/2019 Cybercrimes Investigation
9/52
Social Network Website - a web site thatfocuses on building online communities of people whoshare interests and/or activities, or who areinterested in exploring the interests and activities of
others.Hacking or Cracking (Lifted from R.A. 8792Sec 33 para A) refers to unauthorized access intoor interference in an computer system/server orinformation and communication system; or any
access in order to corrupt, alter, steal, or destroyusing a computer or other similar information andcommunication devices, without the knowledge andconsent of the owner of the computer or information
Introduction to Cyber Crimes
-
8/12/2019 Cybercrimes Investigation
10/52
and communications system, including theintroduction of computer viruses and the like,resulting in the corruption, destruction, alteration,
theft, or loss of electronic data messages orelectronic documents shall be punished by aminimum fine of One Hundred Thousand pesos(100,000.00) and a maximum commensurate to thedamage incurred and a mandatory imprisonment ofsix (6) months to three (3) years;
Introduction to Cyber Crimes
-
8/12/2019 Cybercrimes Investigation
11/52
Introduction to Cyber CrimesCyber stalking can be defined as the repeated acts
of harassment or threatening behavior of the cybercriminal towards the victim by using internet services.Virus Disseminationmalicious software that
attaches itself into other software (virus, worms, Trojan,
horse, time bomb, logic bomb, etc.).Software Piracytheft of software through the
illegal copying of genuine programs or counterfeitingand distribution of products intended to pass for the
original.Net Extortioncopying the companys confidential
data to extort said company of huge amount.
-
8/12/2019 Cybercrimes Investigation
12/52
Introduction to Cyber Crimes
COMMON INTERNET SCAMS/CYBER CRIMES
On line Child PornographyViolation of Intellectual Property Rights
Internet Auction FraudNon-Delivery of Merchandise FraudCredit Card FraudInvestment Fraud
Business FraudNigerian Letter ScamCellphone Text Scam
-
8/12/2019 Cybercrimes Investigation
13/52
PROCEDURES
a. Walk-in Complainant
NOTE: Complaints can be handled by RCIDU or
coordinated with ATCD.
1. Complaint(s) will be guided to fill up acomplaint sheet and affix his/her signature.
2. Sworn statements and other necessarydocuments will be prepared.
Introduction to Cyber Crimes
-
8/12/2019 Cybercrimes Investigation
14/52
3. Nature of complaint is pertaining toComputer/Cyber Crime cases such as but not limitedto:
a) Hacking/Cracking
b) Email Cases (Hacking/Threat/Extortion)c) Identity theft or in relation to SocialNetworking cases.
NOTE: The investigator shall determine the InternetProtocol (IP) address or Domain Name Service
(DNS) Address in question/involved in theinvestigation.
Introduction to Cyber Crimes
-
8/12/2019 Cybercrimes Investigation
15/52
4. The investigator shall then conduct online WHOIStracing on the identified IP address or Domainname (website) to determine its Internet ServiceProvider (ISP) and Web Hosting Company.
5. If the result of the WHOIS traces to the local IPaddress and Local Domain Name Hosting, theinvestigator shall coordinate with the ISP andWeb Hosting Company through letters rogatory to
preserve the log files and further identify theowner of the IP address and the registrant ofDomain Name (website).
Introduction to Cyber Crimes
-
8/12/2019 Cybercrimes Investigation
16/52
6. Else, if the WHOIS traces foreign IP address andForeign Domain Name Hosting, the investigatorshall coordinate with the foreign counter-part LawEnforcement Agency through Mutual LegalAssistance Treaty (MLAT) procedures to get the
information on the owner of the IP address andthe registrant of Domain Name (website).Coordination should be made with Legal Division,CIDG.
7. After the completion of the investigativerequirements, the case will be filed in court forpossible arrest and conviction of the suspect. Ifnot, pursued he solution of the case.
Introduction to Cyber Crimes
-
8/12/2019 Cybercrimes Investigation
17/52
NOTE: All seized devices should be sent to
Computer Forensic Sec, ATCD, CIDG forComputer/Cellphone Forensic examination.(Requirements stated in Part VI para 3)
8. If the nature of the complaint is pertaining to
cellphone-related cases such as but not limitedto:a. Text Scamb. Cellphone Threatc. Cellphone Extortion, and etc..
NOTE: The investigator shall identify the SubscriberIdentity Module (SIM) Card number and itscorresponding Telecommunication Company(TELCO) carrier. (Smart/Globe/Sun/PLDT, etc..)
Introduction to Cyber Crimes
-
8/12/2019 Cybercrimes Investigation
18/52
If the SIM card number belongs to a local TELCO,then the investigator shall coordinate through letterderogatory to determine the owner of the SIM cardnumber and any logs/records pertaining to the said
SIM.9. If the SIM card number belongs to a foreignTELCO, then the investigator shall coordinatethrough letter rogatory with the foreign counter-partLaw Enforcement Agency through Mutual Legal
Assistance Treaty (MLAT) procedures to get theinformation on the owner of the SIM card numberand other log/records pertaining to the said SIM.
Introduction to Cyber Crimes
-
8/12/2019 Cybercrimes Investigation
19/52
10.After completion of the investigativerequirements, the case will be filed in court for
possible arrest and conviction of the suspect. If not,pursue the solution of the case.
NOTE: All seized devices should be sent toComputer Forensic Sec, ATCD, CIDG for
Computer/Cellphone Forensic examination.(Requirements stated in Part VI para 3).
Introduction to Cyber Crimes
-
8/12/2019 Cybercrimes Investigation
20/52
b. Application of Search Warrant
NOTE: Preferably conducted by Trained Personnelnot necessarily coming from Computer Forensic Sec,ATCD, CIDG.
Introduction to Cyber Crimes
-
8/12/2019 Cybercrimes Investigation
21/52
ELECTRONIC CRIME SCENE PROCEDURES1. Secure and take control of the area containing
the suspected electronic media. Always be awareof officerssafety and securely take control of thescene.
2. The investigator should move individuals at thescene away from all computer equipment toensure no last-minute changes or corruption tothe data occur. (if suspect is allowed to access
computer equipment, he or she may be able todestroy or alter the evidence making it muchmore difficult to conduct the forensic analysis at alater time.)
Introduction to Cyber Crimes
-
8/12/2019 Cybercrimes Investigation
22/52
3. Once all individuals have been removed fromareas containing the electronic evidence,investigators can start conducting interviews ofeither the suspects on the scene or potentialwitnesses. Interviewing the individuals on the
scene may provide a substantial amount ofinformation pertaining to the case and may heplead the investigators in the right direction. Theinterviews should take place in an area where the
interviews will not be interrupted and allow forthe individual to talk freely to the investigator.At this time conduct your interviews with
individual found on the scene or the crime or thereporting person who provided the information.
Introduction to Cyber Crimes
-
8/12/2019 Cybercrimes Investigation
23/52
4.a The investigator should avoid switching thecomputer system on, if it is turn-off upon yourarrival. Make sure there is no active screen saverby pressing one of the arrow keys located on thekey board connected to the computer system.The arrow keys will not alter any documents ifthe system is active. (Photograph the monitor to
show the status of the system upon your arrivalon the scene.)
Introduction to Cyber Crimes
-
8/12/2019 Cybercrimes Investigation
24/52
4.b If the screen is blank and the system is turnedon, again, press the arrow keys to ensure ascreen saver is not active. If the monitor poweris off, turn the monitor power on. Once themonitor comes on, photograph the monitor toshow what was on the screen at the time of your
arrival.
Introduction to Cyber Crimes
-
8/12/2019 Cybercrimes Investigation
25/52
5. Check to see the system is not connected to theinternet or has network capabilities. Somesystem may not have a CAT5 of type or networkcable attached; the system could be utilizing awireless connection. If the system is networked,the investigator will want to capture the volatiledata contained in the systems memory. If thesystem power is disconnected before volatile data
has been collected, the data will be lost and theinvestigator will not be able to retrieve that dataat a later time.
Introduction to Cyber Crimes
-
8/12/2019 Cybercrimes Investigation
26/52
6. Once the investigator has collected the volatiledata, he will want to disconnect the power fromthe machine in order to shut it down. Theforensic practice is to disconnect the power
source from the rear of the machine and NOTfrom the wall outlet. This will make sure theinvestigator is removing the correct power supplyand not another systems power. Shutting down
(using the Operating System) will alter theregistry and it will be considered as tampering ofevidence.
Introduction to Cyber Crimes
-
8/12/2019 Cybercrimes Investigation
27/52
7. The investigator will then document the crimescene by taking photographs. This photographswill help the investigator remember whereeverything was located on the crime scene andhow the crime scene looked when he or shearrived. The investigator should take pictures ofthe entrance to the crime scene, and then takephotographs from each corner of the crime scene.Additionally as evidence is located and recovered,
the investigator should photograph the evidencebefore it is moved to document the location itwas found in the scene.
Introduction to Cyber Crimes
-
8/12/2019 Cybercrimes Investigation
28/52
8. The next step is to document the crime sceneeven further by drawing a sketch of the entirecrime scene. The sketch will show the
measurements of the crime scene and where theevidence is located on the crime scene by theirexact distance from other objects on the crimescene. The investigator can find two unmovable
points on the crime scene and conduct allmeasurements from that location.
Introduction to Cyber Crimes
-
8/12/2019 Cybercrimes Investigation
29/52
9. After taking all the necessary photographs, the
investigator must to label and tag all the evidencelocated in the crime scene. When labeling thecomputer system, the investigator should labeleach connector and port attached to the system.This will help ensure the investigator will be ableto reconstruct the system in a court of law. Theinvestigator can place a tag on the video cablelabeled A. Then label the video port on theback of the system also with the letter A. This
way the investigator will know that cable Aconnects to port A. This method, also known asbagging and tagging should be done for eachcable connected to the system.
Introduction to Cyber Crimes
-
8/12/2019 Cybercrimes Investigation
30/52
10. Once the system has been labeled correctly, theinvestigator can place evidence tape over the 3 inch drive and the drive case. This will heldthe investigator know if anyone tampers with thecomputer system in transit back to the forensiclab. If there is any media located in the drives,the media should be photographed and thenremoved to protect the evidence from beingdestroyed or altered. CD-ROMS may be scratched
in transit and therefore may become unreadable.At this time, remove any media in the drive baysand place evidence tape over the drives.
Introduction to Cyber Crimes
-
8/12/2019 Cybercrimes Investigation
31/52
11. Now it is time to package all the equipment fortransportation. All electronic evidence should bepackaged in anti-static bags to help ensure theintegrity of the data is maintained. As each pieceof evidence is packaged, an evidence label should
be attached. (This evidence label will help identifythe evidence, the date and time it was found onthe scene, the location it was recovered from,and the investigator who found the evidence.
Additional information can be added to includethe Case Number and the primary investigatingofficer.) At this time, please ensure all evidencehas been packaged and labeled from the crimescene.
Introduction to Cyber Crimes
-
8/12/2019 Cybercrimes Investigation
32/52
12. Before each item is removed from the crimescene, a chain of custody must be filled out toensure the evidence is properly tracked from
investigator to investigator. A chain of custodymay contain the name of the recovering officerand the date and time he transferred theevidence to the primary investigating officer.
Additionally, the chain of custody may contain theitem number or evidence number along with thecase number of the crime.
Introduction to Cyber Crimes
-
8/12/2019 Cybercrimes Investigation
33/52
-
8/12/2019 Cybercrimes Investigation
34/52
ELECTRONIC COMERCE ACT (RA 8792)
ACTS IN VIOLATIONS OF ELECTRONIC COMMERCE ACT
1. Any acts of hacking or cracking or unauthorized access into
or interference in a computer system/server or information
and communication system; or any access in order to
corrupt, alter, steal, or destroy using a computer or other
similar information and communication devices including
the introduction of computer viruses and the like, resulting
in the corruption, destruction, alteration, theft or loss of
electronic data messages or electronic documents.
-
8/12/2019 Cybercrimes Investigation
35/52
ELECTRONIC COMERCE ACT (RA 8792)
2. Any act of Piracy or the unauthorized copying,
reproduction, dissemination, or distribution, importation,
use, removal, alteration, substitution, modification,
storage, uploading, downloading, communication,
making available to the public or broadcasting of
protected materials, electronic signature or copyrighted
works including legally protected sound recording or
phonograms or information material on protected
works, through the use of telecommunication networks,
such as, but not limited to, the internet, in a manner thatinfringes intellectual property rights.
-
8/12/2019 Cybercrimes Investigation
36/52
ELECTRONIC COMERCE ACT (RA 8792)
3. The access is without the knowledge and consent of
the owner of the computer or information and
communications system.
4. Other analogous acts.
-
8/12/2019 Cybercrimes Investigation
37/52
EVIDENCE NEEDED TO FILE FOR VIOLATION OF RA 8792
1. Testimonial Evidence Affidavit of Complainants and Witnesses.
2. Documentary Evidence Cyber or Computer forensic Results,
Police Records, transaction records and other documents.3. Object of Evidence Computer and any devise used to hack or
crack or pirate the computer information. Original documents
copied or pirated Documents.
4. Other relevant evidence.
ELECTRONIC COMERCE ACT (RA 8792)
-
8/12/2019 Cybercrimes Investigation
38/52
ACTS THAT CONSTITUTE ACCESS DEVICE FRAUDS
1. An act of producing, using, trafficking in one of more counterfeit
access devices;
2. An act trafficking in one or more unauthorized access devices or
access devices fraudulently applied for;
3. An act of using, with intent to defraud, an unauthorized access
device;
4. An act of using an access device fraudulently applied for;
5. An act of possessing one or more counterfeit access devices or
access devices fraudulently applied for;
6. An act of producing, trafficking-in, having control or custody orpossessing device-making or altering equipment without being in
the business or employment, which lawfully deals with the
manufacture, issuance, or distribution of such equipment;
ACCESS DEVICES REGULATION ACT (RA 8484)
-
8/12/2019 Cybercrimes Investigation
39/52
7. An act of inducing, enticing, permitting or in any manner allowing
another, for consideration or otherwise to produce, use, traffic in
counterfeit access devices fraudulently applied for;
8. An act of multiple imprinting on more than one transaction record,
sales slip or similar document, thereby making it appear that thedevice holder has entered into a transaction other than those which
said device holder has lawfully contracted for, or submitting, without
being an affiliated merchant, an order to collect the issuer of the
access device, such extra sales slip through an affiliated merchant
who connives therewith, or, under false pretences of being anaffiliated merchant, present for collection such sales slips, and
similar documents;
ACCESS DEVICES REGULATION ACT (RA 8484)
-
8/12/2019 Cybercrimes Investigation
40/52
9. An act of disclosing any information imprinted on the accessdevice, such as but not limited to, the account number or name or
address of the device holder, without the latters authority or
permission;
10. An act obtaining money or anything of value through the use of
an access device, with intent to defraud or with intent to gain and
fleeing thereafter;
11. An act of having in onespossession, without authority from the
owner or the access device, or any material, such as slips, carbon
paper, or any other medium, on which the access device is written,
printed, embossed, or otherwise indicated;
12. An act of writing or causing to be written on sales slips, approvalnumbers from the issuer of the access device of the fact of approval,
where in fact no such approval was given, or where, if given, what is
written is deliberately different from approval actually given;
ACCESS DEVICES REGULATION ACT (RA 8484)
-
8/12/2019 Cybercrimes Investigation
41/52
13. An act of making any alteration, without the access deviceholdersauthority, of any amount or other information written on
the sales slip;
14. An act of effecting transaction, with one or more access devices
issued to another person or persons, to receive payment or any
other thing of value;
15. An act, without the authorization of the issuer of the access
device, soliciting a person for the purpose of;
a)Offering an access device; or
b) selling information regarding or an application to obtain an
access device; or
16. An act, without the authorization of credit card system memberor its agent, causing or arranging for another person to present
to the member of its agent, for payment, one or more evidence
or records of transactions made by credit card.
ACCESS DEVICES REGULATION ACT (RA 8484)
-
8/12/2019 Cybercrimes Investigation
42/52
EVIDENCE NEEDED TO FILE A CASE OF ACCESS DEVICE FRAUD
1. Testimonial Evidence affidavit of complainants and witnesses
2. Documentary Evidence Certificate of Registration of the owner
of access devices, photographs of access devices fraudulently used,
certificate of obligation issued as a result of fraudulent transactions
or contact of sale and other pertinent documents obtained through
the use fraudulent access device, police records and other relevant
records.
3. Object Evidence subject access device, computers, and other
electronic equipments
4. Other relevant documents
ACCESS DEVICES REGULATION ACT (RA 8484)
-
8/12/2019 Cybercrimes Investigation
43/52
Anti-Child Pornography Act of 2009 (RA 9775)
UNLAWFUL OR PROHIBITED ACTS:
(a) To hire, employ, use, persuade, induce or coerce a child to
perform in the creation or production of any form of child
pornography;
(b) To produce, direct, manufacture or create any form of childpornography;
(c) To publish offer, transmit, sell, distribute, broadcast, advertise,
promote, export or import any form of child pornography;
(d) To possess any form of child pornography with the intent to sell,
distribute, publish, or broadcast: Provided. That possession of three
(3) or more articles of child pornography of the same form shall be
prima facie evidence of the intent to sell, distribute, publish or
broadcast;
-
8/12/2019 Cybercrimes Investigation
44/52
Anti-Child Pornography Act of 2009 (RA 9775)
UNLAWFUL OR PROHIBITED ACTS:
(e) To knowingly, willfully and intentionally provide a venue for the
commission of prohibited acts as, but not limited to, dens, private
rooms, cubicles, cinemas, houses or in establishments purporting to
be a legitimate business;
(f) For film distributors, theaters and telecommunication companies,
by themselves or in cooperation with other entities, to distribute any
form of child pornography;
(g) For a parent, legal guardian or person having custody or controlof a child to knowingly permit the child to engage, participate or
assist in any form of child pornography;
-
8/12/2019 Cybercrimes Investigation
45/52
Anti-Child Pornography Act of 2009 (RA 9775)
UNLAWFUL OR PROHIBITED ACTS:
(h) To engage in the luring or grooming of a child;
(i) To engage in pandering of any form of child pornography;
(j) To willfully access any form of child pornography;
(k) To conspire to commit any of the prohibited acts stated in this
section. Conspiracy to commit any form of child pornography shall be
committed when two (2) or more persons come to an agreement
concerning the commission of any of the said prohibited acts and decideto commit it; and
(l) To possess any form of child pornography
-
8/12/2019 Cybercrimes Investigation
46/52
Anti-Photo and Video Voyeurism Act (RA 9995)
UNLAWFUL OR PROHIBITED ACTS:
a) To take photo or video coverage of a person or group of persons
performing sexual act or any similar activity or to capture an image of
the private area of a person/s such as the naked or undergarment clad
genitals, public area, buttocks or female breast without the consent of
the person/s involved and under circumstances in which the person/shas/have a reasonable expectation of privacy;
(b) To copy or reproduce, or to cause to be copied or reproduced, such
photo or video or recording of sexual act or any similar activity, with or
without consideration, notwithstanding that consent to record or takephoto or video coverage of the same was given by such person/s;
http://lexforiphilippines.com/2010/03/02/republic-act-no-9995-%e2%80%93-anti-photo-and-video-voyeurism-act/http://lexforiphilippines.com/2010/03/02/republic-act-no-9995-%e2%80%93-anti-photo-and-video-voyeurism-act/http://lexforiphilippines.com/2010/03/02/republic-act-no-9995-%e2%80%93-anti-photo-and-video-voyeurism-act/http://lexforiphilippines.com/2010/03/02/republic-act-no-9995-%e2%80%93-anti-photo-and-video-voyeurism-act/http://lexforiphilippines.com/2010/03/02/republic-act-no-9995-%e2%80%93-anti-photo-and-video-voyeurism-act/http://lexforiphilippines.com/2010/03/02/republic-act-no-9995-%e2%80%93-anti-photo-and-video-voyeurism-act/http://lexforiphilippines.com/2010/03/02/republic-act-no-9995-%e2%80%93-anti-photo-and-video-voyeurism-act/http://lexforiphilippines.com/2010/03/02/republic-act-no-9995-%e2%80%93-anti-photo-and-video-voyeurism-act/http://lexforiphilippines.com/2010/03/02/republic-act-no-9995-%e2%80%93-anti-photo-and-video-voyeurism-act/ -
8/12/2019 Cybercrimes Investigation
47/52
Anti-Photo and Video Voyeurism Act (RA 9995)
UNLAWFUL OR PROHIBITED ACTS:
c) To sell or distribute, or cause to be sold or distributed, such photo or
video or recording of sexual act, whether it be the original copy or
reproduction thereof, notwithstanding that consent to record or take
photo or video coverage of the same was given by such person/s; or
(d) To publish or broadcast, or cause to be published or broadcast,
whether in print or broadcast media, or show or exhibit the photo or
video coverage or recordings of such sexual act or any similar activity
through VCD/DVD, internet, cellular phones and other similar means or
device, notwithstanding that consent to record or take photo or videocoverage of the same was given by such person/s.
http://lexforiphilippines.com/2010/03/02/republic-act-no-9995-%e2%80%93-anti-photo-and-video-voyeurism-act/http://lexforiphilippines.com/2010/03/02/republic-act-no-9995-%e2%80%93-anti-photo-and-video-voyeurism-act/http://lexforiphilippines.com/2010/03/02/republic-act-no-9995-%e2%80%93-anti-photo-and-video-voyeurism-act/http://lexforiphilippines.com/2010/03/02/republic-act-no-9995-%e2%80%93-anti-photo-and-video-voyeurism-act/http://lexforiphilippines.com/2010/03/02/republic-act-no-9995-%e2%80%93-anti-photo-and-video-voyeurism-act/http://lexforiphilippines.com/2010/03/02/republic-act-no-9995-%e2%80%93-anti-photo-and-video-voyeurism-act/http://lexforiphilippines.com/2010/03/02/republic-act-no-9995-%e2%80%93-anti-photo-and-video-voyeurism-act/http://lexforiphilippines.com/2010/03/02/republic-act-no-9995-%e2%80%93-anti-photo-and-video-voyeurism-act/ -
8/12/2019 Cybercrimes Investigation
48/52
Anti-Photo and Video Voyeurism Act (RA 9995)
PENALTY:
Imprisonment of not less than 3 years but not more than
seven 7 years and a fine of not less than P100,000.00 but
not more than P500,000.00, or both, at the courtsdiscretion.
http://lexforiphilippines.com/2010/03/02/republic-act-no-9995-%e2%80%93-anti-photo-and-video-voyeurism-act/http://lexforiphilippines.com/2010/03/02/republic-act-no-9995-%e2%80%93-anti-photo-and-video-voyeurism-act/http://lexforiphilippines.com/2010/03/02/republic-act-no-9995-%e2%80%93-anti-photo-and-video-voyeurism-act/http://lexforiphilippines.com/2010/03/02/republic-act-no-9995-%e2%80%93-anti-photo-and-video-voyeurism-act/http://lexforiphilippines.com/2010/03/02/republic-act-no-9995-%e2%80%93-anti-photo-and-video-voyeurism-act/http://lexforiphilippines.com/2010/03/02/republic-act-no-9995-%e2%80%93-anti-photo-and-video-voyeurism-act/http://lexforiphilippines.com/2010/03/02/republic-act-no-9995-%e2%80%93-anti-photo-and-video-voyeurism-act/http://lexforiphilippines.com/2010/03/02/republic-act-no-9995-%e2%80%93-anti-photo-and-video-voyeurism-act/ -
8/12/2019 Cybercrimes Investigation
49/52
Anti-Photo and Video Voyeurism Act (RA 9995)
If the violator is a juridical person, its license or franchise will be
automatically deemed revoked and the persons liable will be the
officers, including the editor and reporter in the case of print
media, and the station manager, editor and broadcaster in thecase of a broadcast media. If the offender is a public officer or
employee, or a professional, he/she will be administrativelyliable. If the offender is an alien, he/she will be subject to
deportation proceedings after serving his/her sentence and
payment of fines.
Any photo or video, or any copy of such photo or video, obtainedin violation of the law, will not be admissible in evidence in any
judicial, quasi-judicial, legislative or administrative hearing or
investigation.
http://lexforiphilippines.com/2010/03/02/republic-act-no-9995-%e2%80%93-anti-photo-and-video-voyeurism-act/http://lexforiphilippines.com/2010/03/02/republic-act-no-9995-%e2%80%93-anti-photo-and-video-voyeurism-act/http://lexforiphilippines.com/2010/03/02/republic-act-no-9995-%e2%80%93-anti-photo-and-video-voyeurism-act/http://lexforiphilippines.com/2010/03/02/republic-act-no-9995-%e2%80%93-anti-photo-and-video-voyeurism-act/http://lexforiphilippines.com/2010/03/02/republic-act-no-9995-%e2%80%93-anti-photo-and-video-voyeurism-act/http://lexforiphilippines.com/2010/03/02/republic-act-no-9995-%e2%80%93-anti-photo-and-video-voyeurism-act/http://lexforiphilippines.com/2010/03/02/republic-act-no-9995-%e2%80%93-anti-photo-and-video-voyeurism-act/http://lexforiphilippines.com/2010/03/02/republic-act-no-9995-%e2%80%93-anti-photo-and-video-voyeurism-act/ -
8/12/2019 Cybercrimes Investigation
50/52
Cases handled by CIDG
The CIDG said it received 25 complaints involving the use of
Facebook between January 1 and June 14 this year. Incomparison, the agency received 26 cases involving Facebook
for the entire year of 2010.
Of the cases involving Facebook this year, 6 were estafa; 6
were libel; 3 each for harassment and hacking; 5 cases ofidentity theft and fake accounts; and 2 cases of pornography.
Aside from the Facebook complaints, the CIDG also received 11
cases of threats made via cellphone calls and texts for the first
half of the year. The agency also received 5 complaintsinvolving email; 2 complaints of credit card fraud; and one
complaint eachinvolving Twitter (libel) and Multiply (estafa).
In addition, 5 complaints involving other websites were reported
-
8/12/2019 Cybercrimes Investigation
51/52
Cases handled by CIDG
In all, the CIDG received 56 computer related crimes and
complaints from January to June.
Last year, the CIDG recorded 72 computer related walk-in
complaints for the entire year. Aside from the Facebook-linkedcrimes, the agency also received 14 complaints of crimes involving
e-mail and 9 cases involving the website eBay, all dealing with
estafa. In addition, 12 cases involving other websites, in cases
ranging from identity theft to estafa, were recorded in 2010.The
CIDG also received 6 cases of credit card fraud; and 5 cases of
cellphone threats and harassment. There were no reported cases
involving Twitter and Multiply.
The CIDG's Cyber Crime Unit handles the said cases. The
cases are handled based on Section 33 of Republic Act 8792, or
the E-Commerce Act.
-
8/12/2019 Cybercrimes Investigation
52/52
CRIMINAL INVESTIGATION