I was given the opportunity by the UP POPLAW to lecture for our brothers and sisters in blue on the topic “Cybercrime” as part of the Philippine National Police (PNP) Investigation Officers Basic Course” (IOBC) Class 98-2018, and the “Criminal Investigation Course” Class 561-2018, Seminar on Laws and Jurisprudence for the PNP.
The PNP has a competent Anti-Cybercrime Group (ACG), so I took it upon myself to introduce some concepts and developments in this quite expansive area, that these fine investigators may not have yet encountered in their work, or must be apprised of to update their awareness.
The Implementing Rules and Regulations of the Philippine Cybercrime Prevention Act or R.A. 10175 defined a “computer” to include “any storage facility or equipment or communications facility or equipment directly related to or operating in conjunction with such device. It covers any type of computer device including devices with data processing capabilities like mobile phones, smart phones, computer networks and other devices connected to the internet.” What this basically meant is that all e-devices that operate with a computing device should also be considered a computer. Due to this, the scope of the task of any PNP cybercrime investigator has been tremendously widened. The Internet of Things (IoT) devices which I briefly discussed, as well as social media, and other e-devices that suspects can use to communicate, or can contain incriminating evidence are all part of the e-data net that cybercrime investigators must now cast. Due to this reality, the possibility of electronic evidence being tampered with, altered, destroyed or lost, is magnified, especially if the e-data are located in different countries, and can be remotely controlled or manipulated.
One significant matter I imparted to them is the fact that e-data privacy crimes under the Data Privacy Law or R.A. 10173 are cybercrimes. And while the National Privacy Commission is the governing agency on this law, the help of cybercrime investigators may be needed to establish evidence of culpability. On this regard, I showed them several cases, among which included the COMELEC e-data breaches, that have caused a lot of dismay, disgust and actual and potential damage to the welfare and safety of each individual Philippine voter whose sensitive personal information, down to his/her voting history and biometrics have been disclosed to, and sold to, and bought by nefarious third party e-data traffickers. I discussed several aspects of digital identity fraud, including synthetic ID fraud, that I have handled.
I endeavored to go thru the gamut of different cyber scams and fraudulent activities that abound online, from virtual fraudulent states, to digital misappropriation of intellectual property, social media crimes, to ransomware but our three-hour session was just not enough.
I always have a deep respect for the work of our dear brothers and sisters in blue who put themselves in harm’s way to keep us safe. I have met and worked with several cops whose integrity, honesty and dedication are unquestioned. But I was not prepared for the generous reception they gave to me. For the first time in my almost two decades stint as a lecturer and trainer, the wonderful attendees of these two classes actually rose from their seats and gave me a standing ovation! My mother who was with me, and I, will never forget that moment! To them, thank you for your awesomeness! God Bless us!