Академический Документы
Профессиональный Документы
Культура Документы
CHAPTER 1:
THE PROBLEM AND ITS BACKGROUND
Introduction
Life today is highly dependent on the technology that people have
changed many aspects of everyday life: the way to communicate; the way to
travel; and the way to learn. So many changes have been brought about by
lifestyle change, the demand for advancing the type of technology to be used
save time and cost of production, making the people concerned gain
super fast internet that has afforded small businesses the chance to reache
doing work, with others and the general view of the world. The accelerated
The Internet, was arguably considered the most powerful tool since the
invention of the printing press. The emergence of the virtual World Wide Web
or more commonly known as (www.) with nearby physical devices that are
part of what is called today as Internet of Things gives everyone, with the help
instrument anytime, and anywhere on the planet, which provides the needed
global information race and services. The majority of such interaction happens
through the World Wide Web (WWW) with myriad of computers running a
browser and communicating with cloud based storage through and by the use
of servers. However, the Internet is not limited to the Web due to a wide
if not all, have what experts call Web presence with corresponding or
assigned protocols.
since time immemorial. The recent development of the Internet has created a
transnational nature.
Cybercriminals always opt for an easy way to make big money. They
target rich people, or rich organizations like banks, casinos, and financial firms
where a huge amount of money flows daily and hack sensitive information.
The effect of cybercrime can be extremely upsetting for victims, and not
necessarily just for financial reasons. Victims may feel that their privacy has
of citizens. Police officers are given the mandate to use force and authority, if
create cyber units and ensure that the officers have access to the tools
between government and the private sector. This partnership will help law
enforcement scale with the rising tide of cybercrime and use the latest
The global nature of the Internet allows criminals to commit almost any,
if not all, forms of illegal activities anywhere and anytime in the world which
makes it essential for all countries to adapt local or domestic offline controls of
some sort to help cover crimes carried out in cyberspace much as the use of
4
and incitement towards radicalization that poses a serious threat not only to
but at the same time also increasingly expensive. The speed at which Internet
crime, as more criminals exploit the speed, convenience and anonymity that
These include but not limited to attacks against the computer itself, computer
data, and systems, identity theft, distribution of child sexual abuse images,
organizations or individuals are not even aware of hackers, cyber thieves, and
attentive will not keep out the crosshairs of a perpetrator’s line of sight out of
the headlines.
quarter of the population still lives below the poverty line. Poverty within
5
In the Philippines and in other parts of the world it takes a great deal of
problems. Hence, the crimes committed by the use of technology affect the
there is a need to introduce, enact laws or amend, revise existing laws to fully
East Asia and Hongkong, said that business organizations and individuals
increasingly rely on technology for their daily activities. They also expose
themselves to many dangers lurking online. He said that users can easily fall
prey to cybercrime specially now that cybercriminals are using a wide range of
organizations.
unknown threats. Despite their efforts, most firms are not able to figure out the
out how capable the PNP ACG is in the implementation of its anti-cybercrime
6
The Philippines, like any other country around the world, is increasingly
phishing and other types of identity theft, computer-related forgery and fraud,
awareness.
PNP and in line with the PNP’s strategic thrust, saw a need to enhance the
the way for the creation of the PNP Anti Cybercrime Group (ACG).
The PNP ACG started its humble beginnings when the Criminal
Investigation and Detection Group (CIDG) formed in 2003 under the Anti-
stakeholders.
In line with the program of the Task Force for the Security of Critical
Division of CIDG, became the focal point for reporting all internet-related
Research Locale
The study will take place at the Philippine National Police, National
Headquarters Camp Gen Rafael T. Crame, Quezon City where the Anti-
roots when the Cyber Crime Section (CCS) under the Anti-Transnational
CCS had very modest and unique beginnings and started its operation
and digital forensic examiners and cyber forensic laboratory. They made do
increasing concerns on the safe use of computers and internet that was
brought about by rapid modernization, the CCS quickly attracted attention and
Incident Response Team (GCSIRT) under the Office of the President’s Task
The training laboratory was developed and established through the assistance
(US ATAP).
Finally, on March 20, 2013, the then Chief of the Philippine National
Police PDG Alan La Madrid Purisima, activated the Philippine National Police
Directorate for Plans (DPL) -12-09 dated February 27, 2013 to address the
The establishment of the PNP ACG is a strong signal to criminals that the
9
The main cutting edge in the crackdown against cyber offenders and
Detailed Service from other PNP Units strategically positioned not only in the
questions:
ACG?
Hypothesis
Internet. The Internet has become the source for multiple types of crime and
11
loosely grouped into three categories. First, the Internet allows for the creation
venue for fraudulent behavior. Third, the Internet has become a place for the
research paper then shifts into a discussion of policy steps to reduce some
study would also serve as a motivation for the law enforcement to understand
the clamor for policies intended to help community become more effectively
would aid the framework for policy development that would directly improve
To the Courts, this study will give the information about the existence of
since this study will definitely help get a better perspective on the dynamics of
reference or guideline for students who wish to take the course as their
chosen field or for those who are not sure of what they want to pursue.
Moreover, this research will serve as an avenue for student opinions and
views on why they took the course/program. Consequently, this paper will
explain why these tend to limit the number of enrollees every school year.
Likewise, future related research can use the findings of this study as a
reference.
Cybercrime Group (PNP ACG) to be the setting of this study for reasons of
conveniently.
The respondents for the study are grouped into: (1) Non ACG police
personelle who are acquainted with the set-up ans operations of the ACG;
13
and (2) Judges, fiscals and lawyers who have an insight as to the system and
Definition of Terms
program.
in crime investigation.
sending information.
devices, mechanical and digital machines, objects, animals or people that are
provided with unique identifiers and the ability to transfer data over a network
in a number of countries.
content of data, either directly, through access and use of a computer system
the facts, probe and provide inquiry on crime committed. Hence, is a member
Investigation (NBI).
investigation.
deterring, rehabilitating, or punishing people who violate the rules and norms
Manpower. It refers to the total number of people who can work to get
something done.
National Law. It refers to the rule that has been established in a nation
or country, and the law was accepted as rule for all the citizens of the nations
and for all another people from other nations, who were residing in this area of
jurisdiction.
system.
form of computer data or any other form that is held by a service provider,
18
relating to subscribers of its services other than traffic or content data and by
transmission of viruses.
organization.
high quality products and enhance one’s own ability to think and collaborate.
potential effect across national borders, and crimes that are intrastate but
Philippines”.
1998”.
2009."
2012”.
LIST OF ACRONYMS
CHAPTER 2:
REVIEW OF RELATED LITERATURE AND STUDIES
Foreign Literature
Police: The Perspective of the Public” (2018), the aim of this project is to
review and critically assess the current survey methods used to measure
through public opinion polling may be distinguished in two kinds: general and
satisfaction with police are important to ask on surveys, but tend to be too
Canada every five years asks six questions on police performance. This
constitutes the only source of public opinion police performance metrics that is
response category thus making them incomparable across time and place.
More research into either testing the existing questions or creating new
groups engaged in cyber crime. It briefly outlines the definition and scope of
about cyber offenders, and the likely role of organized crime groups. The
paper gives examples of known cases that illustrate individual and group
Different types of cyber crime and different forms of criminal organization are
In this paper entitled “High Volume Cyber Crime and the Organization
of the Police: The results of two empirical studies in the Netherlands” (2013),
the question that is central is: to what extent is the Dutch police organization
able to effectively combat high volume cyber crime? First we focus on the
hacking and e-fraud. After that, based on police records, we analyze the
nature of these crimes. Thereafter, we will look at the functioning of the Dutch
police regarding cyber crime. What are the strengths and weaknesses of their
handling of cyber crimes? We conclude that the Dutch police are insufficiently
organized to combat cyber crime. The lack of priority and proper capacity
throughout the entire police organization to fight digital crimes results in cyber
cases never entering the criminal justice system or leaving the criminal justice
‘Cybercrime’ is the term used to describe the use of internet and computer
portability, the internet has revolutionised the way we live our lives while in
turn giving rise to new forms of crime and deviance. Policing must adapt to
internet has changed society and the demands on policing. It examines the
identified, reviewed and synthesised into three main themes to meet the
rise of the internet in England and Wales appears to correspond with changes
force’, the police response is exiguous to the current threat, harm and risk.
professionalism agenda.
activity that exists in cyberspace (e.g. Gabrys, 2002. For relevant discussions,
2010; Décary-Hétu and Dupont, 2013; Hutchings and Holt, 2015). Shadowy
attackers could strike from anywhere at any moment. They are a new type of
threat, unlike any criminal activity that has been observed before. In short,
these offenders challenge existing paradigms of crime and policing, and vastly
cases, such as ‘Silk Road’, cybercrime has been very much in the spotlight in
recent years, both in Europe and elsewhere. While this study shows that
that the key cybercrime concern for law enforcement is legal rather than
technical and technological. The study further underlines that the European
This article examines what constitutes cybercrime and the successes and
cybercrime. Finally, I consider and discuss the risks and challenges that
from practice have been described. The next section describes the structure
the latest trends in the structures of business logistics and the potential
Wuthichai Tengpongsthorn (2017) was to study the factors relative to the work
both cluster and simple random samplings included 405 police officers from
different police stations under the control of the Thai Metropolitan Police
using purposive sampling. Statistics used for data analysis were the frequency,
motivator factors and hygiene factors had positive relationships with the
performance.
the role of the police in fighting cybercrime” (2009), the recent growth of ICT
27
has brought all the opportunities provided by its global character and easy
the same time, it has also provided new possibilities for criminals who can
and society with regard to the use of these instruments for criminal purposes.
activities that include not only new types of crime, such as hacking or
malicious codes and programmes, such as ‘spam’, but also the migration of
infringements to the ICT networks. The fight against cybercrime requires the
instruments that allow for the investigation and prosecution of the misuse of
internet-related crime and the cross-border nature of ICT networks also evoke
addressing cybercrime also includes the development of the tools for effective
challengers, that could be either general problems emerging due to the global
real world and are now in charge of addressing crime in cyberspace. The
monitoring and preventing crime is one of the actors on this scene that faces
great number of challenges (Wall, 2007) related to the migration of old crime
to the ICT environment and the emergence of the new forms of criminal
activity (Quille, 2009; Kozlovski, 2005; Wall, 2007). This chapter provides an
policing cyberspace. The first section examines the role of the police in
fighting cybercrime and the problems of addressing the new threats in this
area, while the second part focuses on the opportunities for developing new
cooperation. Finally, conclusions are drawn to highlight the need for reviewing
the concept of police activity in the real world to address the challenges
presenting practical insights from those actually tasked with working cyber
crime cases. The author offers a grounded, pragmatic approach based on the
for combating the ubiquitous and evolving threat posed by cyber criminality.
Research in this paper has been guided by the firsthand global accounts (via
thinking and exemplify key points of reference. In this way, the author invites
the reader to contemplate the reality of a cyber crime inquiry and the practical
clear, concise explanations for students and professionals, who need not be
The book begins by identifying and defining the most prevalent and emerging
explores legal issues in the admission of digital evidence, and then examines
Law and Practice”, as computer technology has advanced - and along with it
the development of the internet- the utility and benefits that they have brought
with them have made them indispensible to modern society. With the ever
which society has decided are contrary to the public interest and therefore
computer technology, which did not exist prior to the development of the
technology. On the other side of the law, the courts have found themselves
can be used to commit criminal offences. This book is the first book to tackle
the fast growing topic of cyber crime and covers a wide range of topics from
31
electronic fraud, cyber stalking, online theft and intellectual property to more
relating to cyber crimes and computers. Through the use of detailed case
studies, examples and statutory extracts the reader is able to understand all
aspects of cyber crime and computer crime. Cyber Crime: Law and Practice
provides a practical, easy-to- follow guide for practitioners in the field, as well
claimed that digital technology has transformed the way in which we socialize
and do business. Proving the maxim that crime follows opportunity, virtually
computers themselves, criminals will find ways to exploit new technology. The
challenge for all countries is to ensure their criminal laws keep pace. The
challenge is a global one, and much can be learned from the experience of
other jurisdictions. Focusing on Australia, Canada, the UK and the USA, this
the prosecution of cybercrimes. This new edition has been fully revised to
take into account changes in online offending, as well as new case law and
Therefore, additional layers of defense are needed. Cyber crime has been
utilize computers in the course of doing business. Some of the case studies of
cyber crime include Parliament attack case. In this paper we have discussed
about Cyber crime and cyber security and different cyber crimes that we come
regulation acts imposed against Cyber crime and also online safety tips.
Crimes, Laws, and Policing in the 21st Century”, Hill and Marion (2016)
concluded that cybercrime will evolve and expand in the next few years as
businesses and governments will only continue to increase and become more
continue to seek to profit from their actions or harm other computer systems.
intellectual property will also increase as more people around the world
absolutely prevent a cyber attack or data breach, but some steps can be
taken to reduce the risk. By increasing security, the risk can be mitigated. If an
a company’s security are becoming more common and more serious. Hackers
have many weapons that they can use against a business, and these
technology personnel to know how to prevent malware that does not yet exist,
personnel must make the system as secure as possible and ensure that the
Analysis and Prevention Techniques” the claimed that the user of computer
system and internet are increasing worldwide in large number day by day,
using internet which is the medium for huge information and a base of
communications around the world. There has been tremendous growth in use
Variants of cyber crime like terrorist attack, cyber extortion, crimes against
includes impact on the real world and society, and how to handle cyber
crimes.
Computer Society (2016) identified the five core pillars of cyber security
readiness. First, education and readiness shows that it is essential that cyber
and preparations, shows that a cyber security incident is not an (if) but a
otherwise. Lastly, ethics and certification which may initially seem to be a less
practical pillar. In any company or organization, ethics plays a role and should
such as defense, will have their own means to present credentials, for an
professional institution.
Local Literature
(particularly in Hong Kong), Europe and United States which was estimated to
have reached to US$ 10 billion. Emanating from the Philippines, the virus was
received in e-mail inboxes in Hong Kong which erases and blurs the graphics
and data in the computer and gets the contact address in the computer
directory and sends the same email to all contacts listed therein. Once
received and opened in another computer, it replicates the same harm (Sosa
2009:80).
Guzman‟s arrest. However, the cases filed against him were dismissed based
on the principle of nullum crimen, nulla poena sine lege (for there is no crime
Act (RA) Number 8792, or the “Electronic Commerce Act of 2000” which
messages, documents and signatures. Under this law, the first Filipino to be
computer crime investigations and how they can facilitate the development
investigators from the Federal Bureau of Investigation (FBI), the U.S. Secret
Service and the Air Force Office of Special Investigations, these project aims
security and how they define operational success. Strategies employ the use
computer in Maltese criminal legislation and charts the way forward offering
an action plan in the field of technology, education, industry and law whilst
2002).
World Wide Web (www) have fundamentally changed the way society deals
with its various activities like academics, business and politics. With ease of
access and availability of ICTs and the Internet, pieces of evidence such as
can be known and felt without the affected party’s knowledge. However, the
(LEAs) such as the National Bureau of Investigation (NBI) and the Philippine
private institutions in the local arena as well as with other international bodies
have been pursued. But there is an apparent policy gap identified by various
(DOJ) said on Friday, June 13, that the City Prosecutor of Las Pinas has filed
the first case for violation of Republic Act 10175 or the Cybercrime Prevention
Pinas Regional Trial Court for the alleged fraudulent transactions of the
remittances which the respondent made using her ATM card. Computer-
related forgery covers the act of knowingly using computer data which is the
the case is the first reported under the Cybercrime Prevention Act after the
Supreme Court’s decision on the validity of the said law last February.
38
the government of the Philippines through Republic Act no. 10175 is one that
and data processing, in the nation’s overall social and economic development.
to the question of whether the regulatory model for broadcasting will continue
Theoretical Framework
The open-systems approach was first applied by Katz and Kahn, who
form of resources. The systems then process the input internally, which is
survival and emphasize long-term goals rather than the short-term goals of
relatively closed or relatively open. The distinction between closed and open
order to “avoid the static connotations of equilibrium and to bring out the
homeostasis, which includes not just survival but also growth, then it
not be propitious for the whole organization. Pfeffer and Salancik defined
various groups and organizations that are concerned with its activities.”Pfeffer
events occurring in the world that have any effect on the activities and
static environments.
organization must do in order to survive and grow. The key to dealing with
41
problem; positive input tells the organization that it is doing something right
the organization’s goals, values, and within the relationship context it holds
with publics.
42
car consumers to try the latest models, hoping that it has responded to
messages are not enough. If the cars are not really friendlier to the
environment, then these messages eventually will fall on skeptical ears and
were not effective then the process is repeated until the appropriate solution is
This theory can also be useful in understanding the role of research and
conceptualize and justify not only the research budget of the public relations
department but also the need for making decisions that strategically align the
from being used as a simple publicity function, and places the function
that one criticism of this approach is that its focus is on “the means necessary
Conceptual Framework
rules or decription points. Flow charts and process diagrams are often used to
capability of the PNP ACG and the problems encountered in this regard.
In the Output will be seen the Action Plan to enhance the anti-
Feedback
researcher is able to gather facts from both foreign and local literature as to
the early beginings of cybercrime, the nature of cybercrime, the severity of the
law and practice, cybercrime prevention and detection, the efforts made to
45
likewise been unfolded. The biggest question lies in the readiness of the
It is on this note that the present study is being tackled. While it is true
that the Philippine National Police has come up with its Anti-Cybercrime
cybercriminals.
46
CHAPTER 3:
METHODOLOGY
This study is the presentation of the research method, population and
Research Design
The study will utilize the descriptive-normative survey method with the
conditions that now exist. It aims primarily at gathering knowledge about the
object of the study but without modifying or changing it. Normative approach,
on the other hand, defines how things should be, which means that it will be
stressed that “the term normative is sometimes used because surveys are
compare local test results with a state or national norm. Hence, the
The researcher will utilize both primary and secondary sources of data
books, journals, and other related studies that are found in the library. Primary
data will definitely come from the sampled respondents who will act as
The total number of respondents for this study is average since there
are a number of people who can be tapped and are willing to act as
participants in the study. Hence, it will not be difficult for the researcher to get
qualifications and familiarity with the topic on hand. The respondents will be
divided into two (2) groups and will be referred to as Groups 1 and 2.
participants in this research study. They will share their opinions with the
are acquainted with the set up and operation of the ACG and judges, fiscals,
and lawyers, who have an insight as to the system and structure of the ACG.
48
In this study, the researcher will include as part of the study the profile
Table 1
CATEGORY OF RESPONDENTS
AGE
BRACKET IN GROUP 1 GROUP 2
TOTAL
YEARS
f % F % f %
21-30
31-40
41-50
51-Above
TOTAL
49
Table 2
Table 3
f % f % f %
Single
Married
Separated
Widowed
TOTAL
51
Table 4
Attainment
CATEGORY OF RESPONDENTS
HIGHEST
EDUCATIONAL GROUP 1 GROUP 2
TOTAL
ATTAINMENT
f % f % f %
High School
Graduate
College
Undergraduate
College
Graduate
Post Graduate
Units
Masters or
Doctoral
Degree
TOTAL
52
Table 5
CATEGORY OF RESPONDENTS
LENGTH OF
GROUP 1 GROUP 2
SERVICE TOTAL
f % f % f %
Less than 1
year
More than 1
year but less
than 2 years
2-3 years
4-5 years
TOTAL
used to gather data are documentary review, interview schedule and survey.
the researcher for the purpose of data gathering, the sampled respondents
opinions regarding the topic on hand. The main problems tackled in the
PNP-ACG.
survey questionnaire.
All data gathered though the use of the aforementioned instruments will
possibly the insufficient amount of available local materials for review. Hence,
researcher will seek the permission and approval of the Philippine Women’s
University Graduate School for the conduct of the study. He will consult
officials concerned who have jurisdiction over the selected respondents for
this study. After follow-ups are made and approval acquired, distribution of the
Ethical Considerations
P = f/N (100)
100 = constant
Where:
N = Number of respondents
rating scale that measures the strength of the respondents’ level of agreement
Md = Lb + (N/2 - <cf)i / f
N = total frequencies
class
σ(x – )2
Variance, s2 =
n-1 Where: σ =
Sigma
= arithmetic mean
n = sample size
S2 = Variance
the proportion of the total area under the normal distribution curve
that lies outside of the z value. As the total area was designated as
0.05.
58
INTERPRETATION OF DATA
RECOMMENDATIONS