Discussion 1 Flashcards
(64 cards)
involves illegal activities conducted through digital devices or the internet. These acts can target individuals, organizations, or entire networks, and may include hacking, identity theff, fraud, or distributing harmful content. Unlike traditional crimes, cybercrimes often transcend physical borders, making them complex to investigate.
Cybercrime
Offenses where technology is the primary tool (e.g., online scams, phishing).
Digital-Facilitated Crimes:
Crimes aimed at compromising systems or data (e.g., malware, ransomware).
Targeted Cyber attacks:
Devices holding evidence of unrelated crimes (e.g., messages planning a robbery).
Incidental Use:
Republic Act No. 10175
(Cybercrime Prevention Act of 2012),
emerged in the 1990s as internet use expanded globally. In response, the G8 nations formed a task force (later known as the Lyon Group) to address growing online criminal activities. This group highlighted how falling technology costs enabled new forms of transnational crime.
“cybercrime”
Examples: Hacking, Denial-of-Service (DoS) attacks, data breaches.
Goal: Disrupt or steal from a specific system.
- Target-Based Attacks
• Examples: Identity theft, cyberstalking, financial fraud.
Goal: Use technology to enable traditional crimes.
- Tool-Based Crimes
• Examples: Call logs proving a suspect’s location, browser history revealing motives.
Goal: Devices act as passive evidence repositories.
- Incidental Evidence
Perpetrators can operate from any location, complicating jurisdiction.
Borderless Nature:
Requires specialized skills to trace digital footprints.
Technical Complexity:
Data can be easily altered or deleted if mishandled.
Evidence Fragility:
notes that organized groups increasingly exploit these factors, making cybercrime a global security threat.
The United Nations Office on Drugs and Crime (UNODC)
Secure devices to prevent data tarnpering.
- Preserve Evidence:
Extract clues from emails, logs, or financial records.
- Analyze Data:
Link digital evidence to suspects (e.g., IP addresses, transaction trails).
- Build Connections:
is a virtual environment where individuals communicate, transact, and interact using interconnected digital devices. It is not a physical place but a network of computers, servers, and other devices linked through the internet. It is an indefinite, non-physical space where people interact and conduct transactions. It is the network of interconnected computers, routers, and switches that form the backbone of digital infrastructure. It is viewed as an interactional environment created by linking computers into a communication network.
Cyberspace
is intangible and cannot be physically entered or exited like a traditional space.
cyberspace
was first coined in 1984 by science fiction writer William Gibson. However, the concept predates this, as traditional electronic communications (e.g., telephones) also operated across time and space. The exponential growth of internet users has expanded cyberspace, providing cybercriminals with opportunities to commit crimes remotely and evade detection.
“cyberspace”
Perpetrators can hide their identities, making it harder for law enforcement to track them.
Anonymity:
Digital data can be easily altered, deleted, or lost, complicating investigations.
Ephemeral Evidence:
refers to information stored, sent, or received by digital devices that can be used in legal cases. According to RA 10175 (Cybercrime Prevention Act of 2012), digital evidence includes data from computers, phones, and other electronic devices.
Digital evidence
is the scientific process of collecting, preserving, analyzing, and presenting digital evidence. It plays a crucial role in cybercrime investigations.
Digital Forensics: Uncovering the Truth
Digital forensics
The use of scientific methods to preserve, collect, validate, and analyze digital evidence for legal purposes.
Digital Forensics