PHILIPPINE COLLEGE OF SCIENCE AND TECHNOLOGY
Old Nalsian Road, Nalsian Calasiao, Pangasinan, Philippines 2418
Tel. No. (075)522-8032/Fax No. (075) 523-0894/Website www.philcst.edu.ph
ISO 9001 – 2015 CERTIFIED, Member: Philippine Association of Colleges and Universities (PACU)
Philippine Association of Maritime Institution (PAMI)
______________________________________________________________________________
Reaction Paper on
ANTI-CYBER CRIME
Today’s society is all about fast pace and advancement. Part of this advancement
mentality includes the constant improvement of technology. Many people’s entire lives revolve
around technology and many times, they do not even realize it. Computer systems practically
run much of the world today from security systems to the computer systems that run most
businesses technology is taking control of the world. In this age of technology cybercrime
becomes an increasingly concerning issues. The world ‘s growing dependency on technology
also leads to the world’s vulnerability. Steps are in place to protect against and prevent
cybercrime, but with technology constantly, evolving there is a need for the precautions in
place to evolve as well. Cybercrimes includes a wide spectrum of crimes and many times make
crimes that have existed even easier to commit that they ever were before. Cybercrimes
prevention is important because in many cases nothing is attempted to stop it until the damage
has already been done.
Cybercrime is criminal activity that either targets or uses a computer, a computer
network or network devices. Most, but not all, cybercrime is committed by cybercriminals or
hackers who want to make money. Cybercrime is carried out by individuals or organizations.
There are many privacy concerns surrounding cybercrime when confidential information is
disclosed, lawfully or otherwise. Cybercrime against women as crimes targeted a woman with a
motive to intentionally harm the victim psychologically and physically, using modern
telecommunication networks such as internet and mobile phones. R.A 9995 also known as anti-
photo and video voyeurism act of 2009, is the act of taking photo or video coverage of a person
or group of persons performing sexual act or any similar activity or of capturing an image of the
private area of a person without the latter’s consent. This law makes it a crime to take photos
of a naked person without her or his consent and also record a video of people having sex
without their consent. Even if there was consent to the taking of the photo or video, if there is
no consent to the sharing or exhibition, then the offending party would still be liable.
One of the more popular cybercrimes is the unlawful access to a computer or computer
system with intent to commit a crime, or unlawful access to a computer system maintained by
a government unit. Computer trespass is often referred to hacking is something that is often
viewed as more of a hobby to those who do it than a crime. While they may be aware that what
they are doing is illegal, they simply enjoy the challenge of it. In this technology driven world, so
many people learn from watching various televisions shows. One example as seen on TV is the
news about hackers who are in charge of doing dummy account issues and what I have
observed their hacking abilities described them as a hobby, much as many today view it.
As far as I am concern, the world today relies heavily on the use of internet especially
now as we are facing the pandemic issues. No matter where one goes, there is always some
sort of technology that has a big impact on our life. Whether it be to the grocery store, the
movie theatre, gas station and even classes as it is demanded by educators and government
just to continue the study amidst the corona virus problem. At the same time the world has
become overly dependent on technology where criminals have taken advantage of this
situation to use it for their benefit and to make committing crimes easier for them and in many
cases the very people who are victims can unknowingly make themselves targets simply by not
protecting their presence in this technology-based world. As technology evolves and people
undoubtedly become increasingly more dependent on this technology you will get more and
more careless with the important information. As technology grows and cybercrime problem
increase, I have listed some growing issues on cybercrime such as the following; Stalking,
Identity theft, Child pornography, Sextortion and Text scam.
Stalking is to follow, watch and bother someone constantly in a way that is frightening
and dangerous. This definition seems to go best with the traditional sense of stalking that
involves physically and harassing another person. Stalking as far as I know has evolved as well
with the advancement of technology. The better definition of stalking for me that would best
apply to the reality of cybercrime would be to pursue obsessively and to the point of
harassment. Social media has made the crime of cyber-stalking just as if not more, prevalent
than the act of physically following someone. At the same time, social media has also made
physical stalking simple with the ability to track down someone through his or her status and
GPS.
Identity theft is the act of stealing a real person’s identification information or theft
based on creating a fake person’s identification. Identity theft ties right in with fraud and is
made more easier through the process of online banking and shopping which leaves personal
information vulnerable on the internet. With most cybercrimes, especially Identity theft, I think
there is nothing that can be done normally until it is too late. There is generally no detecting
one of those crimes beforehand, cases are brought forward 0nly after someone’s identity has
already been stolen.
Child Pornography, images of children involved in sexual activities is traded on the
internet around the clock. Child pornographers use the internet’s ease of distribution to sell
their material to pedophiles (adults who are sexually attracted to children). In addition to
purchasing child pornography, pedophiles also visit online chat rooms hoping to lure children
into situation for sea. Luring or tricking a minor into sexual activity is prohibited, any person
found guilty of violating this section shall suffer the penalty of reclusion temporal and if
committed through a computer system the penalty to be impose shall be a degree higher than
that provided by R.A. 9775. For example, chatting with a fifteen-year old girl over the internet,
then suggesting a meeting is illegal conduct. Traveling to a minor’s home to engage in sex after
meeting by way of internet chat rooms is also criminal activity that’s will be prosecute
Sextortion scams attempt to blackmail victims by telling them that sensitive, often
deeply personal and embarrassing information has been obtained and threatening to publish
the content unless a ransom payment is made. And right now, three scams are creating a
significant buzz worldwide. Including “sextortion” emails both men and women can be victims
of this crime, either by being blackmail or by being coerced into carrying and sexual acts believe
that the best way to stop yourself forms becoming a victim is to be very careful about who you
befriend with online, especially if you are considering sharing anything intimate with them.
Text scam on email, letter or text message from a lottery company arrives from out of
nowhere. It will advise you that you have won a lot of money or fantastic prizes- in a lottery or
competition you did not enter. Text scams will often use the names of legitimate lotteries, so
that even if you do some superficial research. The scam will seem real. The text message you
receive about your winnings will able you to respond quickly or risk missing out. The scammers
do this to try and stop you thinking about the surprise too much in case you start to suspect it
could be a scam to protect yourself from this scam, do not send money or pay any fee to claim
a price, never reply to a scam text which says you have won.
Many scams originate overseas or take place over the internal making them very
difficult to track down and prosecute. We all heard the timeless admonition if it sounds to
goods to be true, it probably is great advice, but the trick is figuring out when “good” becomes
“too good” just like magicians they understand enough about how the mind works to exploit its
vulnerabilities. Scams target people of all backgrounds. Ages and incomes levels. No single
academic discipline or methodology is likely to yield all the answers we would seek from this
kind of presentation in all transactions either on or offline, the greatest weapon of a fraudster is
getting yours trust and confidence by trickery through deception.
All levels of cybercrime tend to overlap. There are many of the crimes that cannot
happen without the other. Almost every cybercrime is going to require some level of computer
trespass and hacking at some point in the process. This is the exact reason that cybercrime is
such a problem in a day technology base society through not all people are victims of
cybercrime, they are still at risk. Crime by computer vary and they don’t always occur behind
the computer, but they executed by computer. The hackers identify is ranged between 12 years
young to 37 years old. The hacker could live three continents away from its victim, and they
would even know they were being hacked. Crimes done behind the computer are the 21 st
century problem. With the technology increasing, criminals don’t have to rob banks, nor do
they have to be outside in order to commit any crime. They have everything they need on their
lap. Their weapons aren’t gens anymore, they attack with mouse cursors and passwords.
Submitted by:
BENJIE F. AQUINO
(BSCrim-4 Student)
Checked by:
DEAN AMBROCIO P. DETRAN
(OJT Coordinator / Dean, CCJE)