NBI Division responsible for investigating high-profile and complex cybercrime cases.
Cybercrime Division
Refers to an electronic, magnetic, optical, electrochemical, or other data processing or communications device, or grouping of such devices, capable of performing logical, arithmetic, routing, or storage functions and which includes any storage facility or equipment or communications facility or equipment directly related to or operating in conjunction with such device.
Computer
Unauthorized acquisition, use, misuse, transfer, possession, alteration, or deletion of identifying information.
Computed Related Identity Theft
Traditional crimes which can be increased in scale or reach by the use of computers, computer networks or other forms of ICT
Cyber-Enabled Crimes
Any information contained in the form of computer data or any other form that is held by a service provider, relating to subscribers of its services other than traffic or content data
Subscriber's Information
Focuses on building capacity to address cyber threats and enhancing legal and enforcement frameworks of Asia Pacific Members
Asia-Pacific Economic Cooperation (APEC)
What law is violated when an individual takes photo or video of a person or group of persons performing sexual act or any similar activity without the consent of the person/s involved and under circumstances in which the person/s has/have a reasonable expectation of privacy
Republic Act No. 9995, otherwise known as the “Anti-Photo and Video Voyeurism Act of 2009”.
Digital or virtual currency which operate on decentralized networks based on blockchain technology.
Crytocurrency
An Unauthorized access to a computer system.
Illegal Access
An international agreement between countries that facilitates cooperation in legal matters, particularly in the context of criminal investigations and prosecutions.
Mutual Legal Assistance Treaty (MLAT)
Require any person or service provider to submit subscriber’s information, traffic data, or relevant data in his/her controversial or is possession or control
Warrant to Disclose Computer Data (WDCD)
Application of R.A 10175 (Jurisdiction of R.A 10175)
R.A 10175 applies to all offenses committed within the Philippines and by Filipinos Abroad, or to those that cause damage or affect individuals or or entities within the country.
Involves gaining unauthorized access to computer systems or networks, usually to steal data, disrupt operations, or commit fraud.
Hacking
Refers to the process of examining the details of an email to determine its authenticity, trace its origin, or gather evidence for investigative purposes.
Email Header Analysis or Email Analysis
What is the timeframe for submission of computer data from service provider in a WDCD.
Within 72 hours from receipt of the order
Software or method used to trace and analyze the movement of data, assets, or events through a network, system, or process. These tools is use in investigations to uncover patterns of behavior, track malicious activities, and identify connections between entities.
Chain Analysis Software
An attack whereby a cybercriminal intercepts and relays communication between two parties without their knowledge, allowing the attacker to eavesdrop on sensitive information or manipulate the communication.
Man in the Middle Attack
Any computer data other than the content of the communication including, but not limited to, the communication’s origin, destination, route, time, date, size, duration, or type of underlying service.
Traffic Data or Non- content data
Protocol used to query databases that store the registration information of domain names and IP addresses. It allows anyone to retrieve details about a domain name, such as who owns it, the owner’s contact information, and other related data.
WhoIs Lookup
It is the online fraud that involves the use of malicious code to direct victims to spoofed websites in an attempt to steal their credentials and data.
Pharming
The intentional alteration or reckless hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document, or electronic data message, without right or authority, including the introduction or transmission of viruses.
System Interference
Cybercrime courts that has special authority to act on applications and issue warrants which shall be enforceable nationwide and outside the Philippines. (At least 5)
Quezon City, the City of Manila, Makati City, Pasig City, Cebu City, Iloilo City, Davao City and Cagayan de Oro City
This cybercrime technique involves manipulating individuals into divulging confidential information through deception or trickery.
Social Engineering
This process in cybercrime investigations involves tracking the origin and path of digital attacks through detailed analysis of network logs and system data.
Digital Forensic or Network Forensic
The process of investigating, analyzing and recovering critical forensic digital data from the networks involved in the attack – this could be the Internet and/or a Local Network – in order to identify the authors of the digital crime and their true intentions.
Cybercrime Investigation Techniques