Friday, December 6, 2019

Cybercrime free essay sample

A discussion on the consequences of cybercrime on children and the ways in which we can make children safe from sexual predators without harming them in the process. (more) Cybercrime free essay sample Features and issues Philippine Dally Inquirer 9:49 pm I Saturday, October 6th, 2012 ANTIGENS, floggers and Journalists hold a rally outside the Supreme Court to protest Republic Act No. 10175, also known as the Cybercafà © Prevention Act. RAFF LEARN Recently, the President signed into law two key pieces of legislation-?the Cybercafà © Prevention Act and the Data Privacy Act, both of which were meant to assist the development of the business process outsourcing Industry In the country. As late as last year, the Philippines reigned as the country with the biggest number of seats In he call center industry, as the BOP industry grew in terms of total revenue, foreign exchange inflow and employment generation. BOP lobby It is believed that the BOP industry needs the Cybercafà © Act (the Act) to respond to the demands of foreign clients for a strong legal environment that can secure their data from being stolen and sold.As early as 2000, the E-commerce Act (ACE) already punished hacking but the penalties were deemed too light. The persons convicted served no Call time If they opted to plead guilty In exchange for probation In lieu of imprisonment. Law enforcement agencies also faced various roadblocks when investigating cybercafà © incidents. Even during emergency situations, service providers were reluctant to cooperate with law enforcement officers, citing the need to protect subscriber privacy.Theoretically, search warrants would have addressed that problem but they were difficult to procure and Involved a lengthy process that would have given cybercafà © offenders enough time to delete precious data and cover their tracks. In cross-border cybercafà © Incidents, law enforcement efforts were even more challenging since foreign governments were not equipped to spend quickly to requests for assistance and no International framework was in place to address cross-border investigations and prosecution. To be sure, no one in government was asleep at the wheel.The Philippine National Police (PEN) and the National Bureau of Investigation (NIB), blessed with foreign-funded training in computer forensics and cybercafà © Investigation techniques, proceeded to organize and staff their cybercafà © units. These were the two agencies that were very active in cybercafà © investigation since the passage of the ACE. Budapest Convention Meanwhile, In the realm of international cooperation, the Department of Justice (DOC) officially endorsed the Philippines accession to the Council of Rupees Convention on Cybercafà ©, also known as the Budapest Convention.The treaty was fast becoming the vehicle to harmonize cybercafà ƒ © definitions and promoted international cooperation in cybercafà © enforcement and investigation. After all, the Budapest Convention was signed by many countries in Europe and even counted non-E countries such as the United States, Canada, Japan, China and South Africa as among its member-states. It was against this backdrop that various cybercafà © bills were and it would take Congress more than 10 years to pass the Cybercafà © Act.Salient features The salient features of the Act include internationally consistent definitions for certain cybercafà ©s, nuanced liability for perpetrators of cybercafà ©s, increased penalties, greater authority granted to law enforcement authorities, expansive jurisdictional authority to prosecute cybercafà ©s, provisions for international cybercafà © coordination efforts and greater ability to combat cybercafà ©s. Indeed, many of the cybercafà ©s defined under the Act hewed closely to the BudapestConvention and it borrowed heavily from the conventions definition of illegal access and interception, data and system interference, misuse of devices, computer-related forgery and computer-related fraud. Attempts now punishable Under the ACE, cybercafà ©s can be prosecuted only if the offense was consummated. Unsuccessful intrusions or hacki ng incidents were not punishable. From a law enforcement standpoint, this means no arrest can occur until the harm or injury is actually inflicted upon the victims. Mere attempts were not punishable. Also, only the principal perpetrator was subject to criminal penalties.These were addressed under the Act, where attempted cybercafà ©s are now punished and those who aid and abet the commission of cybercafà ©s are also made liable. This more nuanced approach to liability translates to greater flexibility in law enforcement and prosecution since cybercafà ©s can be stopped while being committed, though not yet consummated. Stiffer penalties The Act also increased the penalties from those imposed under the ACE. From the standard three-year prison term under the ACE, the Act increased the penalty to a period from six to 12 years for a lot of cybercafà ©s.This ensured that any person invoiced under the Act would surely face imprisonment since the option to apply for probation would no longer be available. In direct response to the difficulties faced by law enforcement agencies in investigating cybercafà © incidents, the Act gave greater authority to the PEN and NIB to engage in wa rranties real-time collection of minimized traffic data as well as the explicit authority to secure warrants for the interception of all types of electronic communication. To prevent the destruction of precious evidence housed in various service providers like cell phone companies and roadman providers, the Act requires the preservation of data for a minimum of six months. This gives law enforcement authorities the ability to investigate past cybercafà © incidents as well as lead time to get pertinent court orders to access such data. The Act further specifies the means and manner by which law enforcement authorities should conduct computer-related searches and seizures of data, their custody, preservation and destruction.Expanded Jurisdiction Since many cybercafà ©s are transnational in character, Congress vested in courts an expanded Jurisdiction over the commission of cybercafà ©s. The pre-war Revised Penal Code took a more conservative stance and as a rule, the law was not applicable to acts committed outside the physical boundaries of the republic. In contrast, the application of the Act was expanded beyond the Philippines so long as the perpet rator was a Filipino, or the effects of the cybercafà © were felt within the country.In addition, the law applied if any of the elements were committed in the office Accordingly, to ensure the proper adjudication of cybercafà ©s, the Act mandates specialized training for Judges in newly created cybercafà © courts. Since the Philippines has yet to enact the Budapest Convention and take advantage of the international cooperation available to its member-states, Congress, in the meantime, organized the Cybercafà © Office at the DOC and designated it as the central authority in all matters related to international mutual assistance and extradition.It is meant as a stop-gap measure, which hopefully can transition seamlessly when the country accedes to the treaty. Emergency response team Finally, the Cybercafà © Act created the Cybercafà © Investigation and Coordinating Center for policy coordination among concerned agencies and the formulation of a sectional subjectivity plan that includes the creation of a computer emergency response team. Clearly, the approach taken by Congress in the Cybercafà © Act was to enlist the participation of various sectors of government to combat cybercafà © not only at the national level but also internationally.While the BOP industry lobbied for the passage of t he Act, it is undeniably a statute that applies to anyone who can potentially become a victim of cybercafà ©. Unfortunately, not all statutes are perfect and although the best of intentions are embedded throughout the Act, some flaws in the law have caught the attention of the public, of late. Petitions in high court Indeed, various petitions have been lodged in the Supreme Court to question the constitutionality of the Acts provisions relating to libel, increased penalties, real-time collection of traffic data and the so-called teakwood provision. Online libel was not an original creation under the Act. In fact, as early as 2010, the Supreme Court recognized that comments on a blob entry could give rise to a prosecution for libel. To its credit, the high court reasonably interpreted the law. The complainant argued that it was permissible to choose where to initiate the case upon the theory that inline libel was published simultaneously throughout the Philippines. Recognizing that the law did not allow a party to choose inconvenient venues for online libel cases, the Court limited the choice to only one-?the place where the complainant resides.One degree higher The Acts libel provision seemed harmless on its face. The law itself imposed no specific penalty unlike in other cybercafà ©s mentioned in the statute. But the Act provides that online libel is punished by one degree higher and that the prosecution under the law would still be independent of a separate prosecution for libel under the Revised Penal Code. Under the old regime, an accused facing libel can expect to face no more than four years and two months Jail time. Under the Act, the maximum penalty shot up to 10 years.Since the penalties were cumulative, a single act of online libel can attract a maximum Jail time of more than 14 years. Double convictions The double convictions and the increased penalties made the accused ineligible for probation, thus guaranteeing imprisonment. Since the acts and the crime of online libel are the same as that defined in the Revised Penal Code, it has been argued that the law violates the rule against double Jeopardy which seeks to protect citizens against being penalized twice for the same offense.Also, by imposing increased and communications technologies (Sits), Congress was unfairly segregati ng users of Sits and treating them more harshly. Protection clause violated There seems to be no rational basis for this classification and the discrimination imposed by Congress violates the equal protection clause that requires the government to treat all citizens equally.Since the online libel law targets the fundamental right to free speech, the onus is upon the government to demonstrate a compelling state interest in penalizing online libel in this manner, and show that here was no less restrictive alternative available to promote that interest. In the desire to empower law enforcement agencies, the Act authorizes the PEN and the NIB to conduct real-time collection of traffic data, or data about a communications origin, destination, route, date, size and duration, but excluding identities and content.In the context of mobile communications, traffic data will reveal the originating number, the destination number, the time and date of the communication, as well as the length of the conversation or the size of the SMS message se nt. Surveillance The law enforcement authorities may claim that the traffic data are anonymous, but the fact is that the law allows collection of specified communications, which necessarily means the PEN or NIB must already know something about the communications or the identity of their source.Even if they did not, it is easy to know the identity of a cell phones owner by simply dialing the number and employing various social engineering techniques to get that information. Once the identity of the person has been determined, the real-time collection of traffic data effectively becomes a targeted surveillance. That is not to say that government authorities are prevented from engaging in surveillance, but the Constitution requires the intervention of a Judge and the issuance of a warrant before this authority can be exercised.Sadly, the real-time collection of traffic data under the Act does not afford anyone the same protection. Indeed, the privacy of suspected terrorists are protected to a greater degree under the Human Security Act that at least requires the intervention of the Court of Appeals in any surveillance and the careful handling of the evidence collected. No similar protections exist under the Act, not even in the ass of ordinary citizens. Certainly, these violate the right to the privacy of communications, and the right against unreasonable searches and seizure.Most odious provision Finally, the most odious provision of the Act is the so-called teakwood provision that authorizes the DOC to block access to any content upon a prima facie (or first glance) finding of a violation of the provisions of the Act. This means that a person who believes he has become the victim of an online libel can file a complaint in the DOC and if at first blush it appears there has been a violation of the Act, an order will be sued directing Internet service providers to block the content. Under this scenario, the DOC has effectively become the Judge, Jury and executioner without the benefit of a trial or a conviction established beyond reasonable doubt. No time limit The teakwood order has no time limit and can be in place for years or even forever. The complainant is not required to file a case in court while the teakwood order is in place. In fact, it is likely that no such case will ever be filed since the remedy sought has already been obtained, as the online content is already gone.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.