Cybercrime 1
Cybercrime 2
Cybercrime 3
Cybercrime 4
Cybercrime 5
100

NBI Division responsible for investigating high-profile and complex cybercrime cases.

Cybercrime Division

100

Refers to an electronic, magnetic, optical, electrochemical, or other data processing or communications device, or grouping of such devices, capable of performing logical, arithmetic, routing, or storage functions and which includes any storage facility or equipment or communications facility or equipment directly related to or operating in conjunction with such device.  

Computer

100

Unauthorized acquisition, use, misuse, transfer, possession, alteration, or deletion of identifying information.

Computed Related Identity Theft

100

Traditional crimes which can be increased in scale or reach by the use of computers, computer networks or other forms of ICT

Cyber-Enabled Crimes

100

Any information contained in the form of computer data or any other form that is held by a service provider, relating to subscribers of its services other than traffic or content data

Subscriber's Information

200

Focuses on building capacity to address cyber threats and enhancing legal and enforcement frameworks of Asia Pacific Members

Asia-Pacific Economic Cooperation (APEC)

200

What law is violated when an individual takes photo or video of a person or group of persons performing sexual act or any similar activity without the consent of the person/s involved and under circumstances in which the person/s has/have a reasonable expectation of privacy 

Republic Act No. 9995, otherwise known as the “Anti-Photo and Video Voyeurism Act of 2009”.

200

Digital or virtual currency which operate on decentralized networks based on blockchain technology.

Crytocurrency

200

An Unauthorized access to a computer system.

Illegal Access

200

An international agreement between countries that facilitates cooperation in legal matters, particularly in the context of criminal investigations and prosecutions.

Mutual Legal Assistance Treaty (MLAT)

300

Require any person or service provider to submit subscriber’s information, traffic data, or relevant data in his/her controversial or is possession or control

Warrant to Disclose Computer Data (WDCD)

300

Application of R.A 10175 (Jurisdiction of R.A 10175)

R.A 10175 applies to all offenses committed within the Philippines and by Filipinos Abroad, or to those that cause damage or affect individuals or or entities within the country.

300

Involves gaining unauthorized access to computer systems or networks, usually to steal data, disrupt operations, or commit fraud.

Hacking

300

Refers to the process of examining the details of an email to determine its authenticity, trace its origin, or gather evidence for investigative purposes.

Email Header Analysis or Email Analysis

300

What is the timeframe for submission of computer data from service provider in a WDCD.

Within 72 hours from receipt of the order

400

Software or method used to trace and analyze the movement of data, assets, or events through a network, system, or process. These tools is use in investigations to uncover patterns of behavior, track malicious activities, and identify connections between entities.

Chain Analysis Software

400

An attack whereby a cybercriminal intercepts and relays communication between two parties without their knowledge, allowing the attacker to eavesdrop on sensitive information or manipulate the communication.

Man in the Middle Attack

400

Any computer data other than the content of the communication including, but not limited to, the communication’s origin, destination, route, time, date, size, duration, or type of underlying service.

Traffic Data or Non- content data

400

Protocol used to query databases that store the registration information of domain names and IP addresses. It allows anyone to retrieve details about a domain name, such as who owns it, the owner’s contact information, and other related data.

WhoIs Lookup

400

It is the online fraud that involves the use of malicious code to direct victims to spoofed websites in an attempt to steal their credentials and data.

Pharming

500

The intentional alteration or reckless hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document, or electronic data message, without right or authority, including the introduction or transmission of viruses.

System Interference

500

Cybercrime courts that has special authority to act on applications and issue warrants which shall be enforceable nationwide and outside the Philippines. (At least 5)

Quezon City, the City of Manila, Makati City, Pasig City, Cebu City, Iloilo City, Davao City and Cagayan de Oro City

500

This cybercrime technique involves manipulating individuals into divulging confidential information through deception or trickery.

Social Engineering


500

This process in cybercrime investigations involves tracking the origin and path of digital attacks through detailed analysis of network logs and system data.

Digital Forensic or Network Forensic

500

The process of investigating, analyzing and recovering critical forensic digital data from the networks involved in the attack – this could be the Internet and/or a Local Network – in order to identify the authors of the digital crime and their true intentions.

Cybercrime Investigation Techniques

M
e
n
u