Philippine Lawbytes 212: Data Security and Privacy Breaches, Malicious State Actors and Cyber Warfare, Copyright by Dr. Atty. Noel G. Ramiscal

Last March 25, 2022, I had the great privilege to open the Mandatory Continuing Legal Education (MCLE) seminars of the University of Cebu Law School (UCLS) for the 7th Compliance period, with my lecture on “Protecting Personal and Financial Data from Theft, Privacy and Security Breaches” for the 108 lawyers/attendees via Zoom. This was quite especial because the UCLS is celebrating its 20th Anniversary this year.

Dr. Atty. Noel G. Ramiscal University of Cebu MCLE lecture March 25, 2022
Dr. Atty. Noel G. Ramiscal University of Cebu MCLE lecture March 25, 2022

For this undertaking, I had to apprise every one of the very real cyber threatscape looming over the Philippines. In 2020, more than 7,000 Philippine companies encountered ransomware attacks, and that web threats in the Philippines increased more than 59 percent to some 44.4 million detections in 2020, compared to the year before, according to a Kaspersky report. From January to June of 2021, cyberattacks on Philippine government agencies and the private sector numbered to 5,608,320 (STATISTA, https://www.statista.com/statistics/1268283/philippines-amount-of-cyberattacks/). In the first quarter of 2022, cyberattacks have been revealed against Smartmatic-TIM last January 2022 and the Senate actually conducted a hearing last March 17, 2022. Converge also notified the NPC, last March 10, 2022 of a data privacy breach on its GoFiber app that affected its customers.

The Introductory Slide of Dr. Atty. Noel G. Ramiscal's University of Cebu MCLE Lecture Powerpoint Presentation
The Introductory Slide of Dr. Atty. Noel G. Ramiscal’s University of Cebu MCLE Lecture Powerpoint Presentation

To counter such attacks, I discussed the importance of putting security first in our daily transactions and work ethic. It is unfortunate that the Philippines, like other countries, appear to prioritize data privacy over data security, in terms of its legal framework and the way these two concepts are operationalized and implemented. While data privacy is considered a legal issue, data security is viewed mainly as a technical and business issue. But the reality is, data privacy cannot be achieved without first establishing data security, not the other way around. So it is very important, to have the right kind of people at the helm of an organization’s I.T. infrastructure and operations, implementing and enforcing proper security measures, like encryption, strong passwords, multi-factor authentication, proper backing up of copies of e-data, backing up the back-ups of those e-data copies, applying early and regularly, security patches, and most importantly, educating all the officials and employees about their observance and responsibility for doing the reasonable cyberhygiene practices that can prevent data breaches, particularly at this time, when many people work from home, outside the relative secure confines of the organization’s network system.

It is very important, for organizations, including law firms to be up to date on data security practices. I explicated on why, for example, virtual private networks (VPNs) are considered on the way out, and why the concept and implementation of “Zero Trust Network Access” (ZTNA) should take its place, with the primary objective of properly containing data security threats. For the very first time, I discussed and distinguished between two types of ethical hacking that are not tackled in data security MCLE lectures for lawyers: penetration testing and red teaming. I delved in detail as to what the qualifications these ethical hackers should have, the methodologies they should know, the content of their evaluation report, and the obligations they must comply with, in respect to the organization that hired them to test the network infrastructure and applications this organization utilizes.

The resplendant and brilliant Atty. Josh Carol Ventura giving the Introductory Remarks for the UC MCLE 7th Compliance Period March 25, 2022
The resplendant and brilliant Atty. Josh Carol Ventura giving the Introductory Remarks for the UC MCLE 7th Compliance Period March 25, 2022

One very crucial point that I made is the fact that Philippine law firms of whatever size are attractive targets of hackers for the very rich trove of information they have about their clients. Hackers have used social engineering tactics like phishing and spear phishing to make lawyers, their employees and clients download malware, or click on links to scammy sites that make them reveal important personal information. One of the tips I gave the attendees is to never reveal in their websites or social media accounts the names of their clients, particularly those who are quite prominent, or those in the I.T. industry, or discuss the cases they are handling which involve the sovereignty and claims of the Philippine government.

Aside from rogue employees who would betray their employers’ secrets in the caverns of the dark web, an unfortunate reality that we all must deal with is the presence of malicious state actors that engage in cyberattacks for espionage, IP rights theft, money heists, and lately, ransomware. A cautionary tale I presented was the NanHaiShu malware, a Remote Access Trojan (RAT) that was spread as a file attachment in spear phishing email messages that targeted the Department of Justice of the Philippines, the organizers of the Asia-Pacific Economic Cooperation (APEC) Summit and a major international law firm which was involved in a dispute centering on the West Philippine Sea. enSilo, which investigated the malware, named the Chinese cyber espionage group called the Advanced Persistent Threat (APT) group 10 as responsible for the attacks.

In my February 11, 2022 MCLE lecture for the Legal Management Council of the Philippines, I dissected, as one of the case studies I presented, the Bangladesh Bank heist, and presented never before seen evidence (certainly not in an MCLE lecture) as to the real hackers behind the heist which siphoned of US$81 million from the bank, through various conduits that included the Jupiter branch in Makati, of the RCBC. The heist had been attributed to the Lazarus group, affiliated with North Korea.

In the ongoing war by Russia against Ukraine, the Russian government of course had resorted to its army of hackers, as part of its military campaign. The Microsoft Threat Intelligence Center (MSTIC) reported this year that it detected a malware installed on devices belonging to “multiple government, non-profit, and information technology organizations” in Ukraine. The software, named DEV-0586, and attributed to Russia, was designed to look like ransomware, but it does not have any recovery feature. The MSTIC reported that the malware was programmed to execute when the targeted device was powered down. It was reported that the malware would overwrite the master boot record (MBR) and all the files with certain extensions from a predetermined list, which would delete all data contained in the targeted files.  Even if one paid the ransom, one would not be able to retrieve any data. So its destructive purpose is laid bare. Due to the fact that this type of malware cannot be contained within the boundaries of Ukraine, it is therefore imperative that all of us must be extra careful in opening emails and attachments from unknown sources.   

Prior to the new normal, I had given several MCLE lectures for the UCLS, and special lectures for their students, as well as students from other law schools in Cebu. One thing that struck me with UCLS is, its commitment to excellence and it has an academic culture that values integrity and top notch research. It is therefore an honor to be part of the endeavors of UCLS in bringing relevant and current matters of interest to the Cebu legal community, so thank you to Atty. Stephen Yu for inviting me. It was also such a pleasure to see and hear the resplendent and brilliant Atty. Josh Carol Ventura give the introductory remarks. The vivacious Atty. Lorenil Archival moderated the whole event.

A random photo from Dr. Atty. Ramiscal's UCMCLE lecture with wonderful comment from a UCMCLE participant, March 25, 2022
A random photo from Dr. Atty. Ramiscal’s UCMCLE lecture with wonderful comment from a UCMCLE participant, March 25, 2022

To all the MCLE attendees, thank you for giving me a truly gracious and warm reception and for your wonderful comments about my lecture! And to UCLS, Congratulations on your 20th Anniversary and many, many, more decades of Excellence to Come! God Bless Us Always In All Ways!

Philippine Lawbytes 138: Dr. Ramiscal for the Philippine National Police Investigators: Trends in Anti-Cybercrime Measures (Copyright by Dr. Atty. Noel G. Ramiscal)

I was given the opportunity by the UP POPLAW to lecture for our brothers and sisters in blue on the topic “Cybercrime” as part of the Philippine National Police (PNP) Investigation Officers Basic Course” (IOBC) Class 98-2018, and the “Criminal Investigation Course” Class 561-2018, Seminar on Laws and Jurisprudence for the PNP.

Dr. Atty. Noel G. Ramiscal at his lecture for the PNP Officers and Investigators at UP Diliman, July 4, 2018

Dr. Atty. Noel G. Ramiscal at his lecture for the PNP Officers and Investigators at UP Diliman, July 4, 2018

The PNP has a competent Anti-Cybercrime Group (ACG), so I took it upon myself to introduce some concepts and developments in this quite expansive area, that these fine investigators may not have yet encountered in their work, or must be apprised of to update their awareness.

Dr. Atty. Noel G. Ramiscal during his lecture for the PNP Officers and Investigators in UP Diliman, July 4, 2018

Dr. Atty. Noel G. Ramiscal during his lecture for the PNP Officers and Investigators in UP Diliman, July 4, 2018

The Implementing Rules and Regulations of the Philippine Cybercrime Prevention Act or R.A. 10175 defined a “computer” to include “any storage facility or equipment or communications facility or equipment directly related to or operating in conjunction with such device. It covers any type of computer device including devices with data processing capabilities like mobile phones, smart phones, computer networks and other devices connected to the internet.” What this basically meant is that all e-devices that operate with a computing device should also be considered a computer. Due to this, the scope of the task of any PNP cybercrime investigator has been tremendously widened. The Internet of Things (IoT) devices which I briefly discussed, as well as social media, and other e-devices that suspects can use to communicate, or can contain incriminating evidence are all part of the e-data net that cybercrime investigators must now cast. Due to this reality, the possibility of electronic evidence being tampered with, altered, destroyed or lost, is magnified, especially if the e-data are located in different countries, and can be remotely controlled or manipulated.

The PNP Officers and Investigators who gave Dr. Ramiscal a standing ovation in his Lecture at UP Diliman, July 4, 2018

The PNP Officers and Investigators who gave Dr. Ramiscal a standing ovation in his Lecture at UP Diliman, July 4, 2018

One significant matter I imparted to them is the fact that e-data privacy crimes under the Data Privacy Law or R.A. 10173 are cybercrimes. And while the National Privacy Commission is the governing agency on this law, the help of cybercrime investigators may be needed to establish evidence of culpability. On this regard, I showed them several cases, among which included the COMELEC e-data breaches, that have caused a lot of dismay, disgust and actual and potential damage to the welfare and safety of each individual Philippine voter whose sensitive personal information, down to his/her voting history and biometrics have been disclosed to, and sold to, and bought by nefarious third party e-data traffickers. I discussed several aspects of digital identity fraud, including synthetic ID fraud, that I have handled.

Some of the PNP Officers and Investigators who attended Dr. Ramiscal's Lecture, UP Diliman, July 4, 2018

Some of the PNP Officers and Investigators who attended Dr. Ramiscal’s Lecture, UP Diliman, July 4, 2018


I endeavored to go thru the gamut of different cyber scams and fraudulent activities that abound online, from virtual fraudulent states, to digital misappropriation of intellectual property, social media crimes, to ransomware but our three-hour session was just not enough.
Some of the PNP Officers and Investigators who attended Dr. Ramiscal's Lecture, July 4, 2018

Some of the PNP Officers and Investigators who attended Dr. Ramiscal’s Lecture, UP Diliman,, July 4, 2018

I always have a deep respect for the work of our dear brothers and sisters in blue who put themselves in harm’s way to keep us safe. I have met and worked with several cops whose integrity, honesty and dedication are unquestioned. But I was not prepared for the generous reception they gave to me. For the first time in my almost two decades stint as a lecturer and trainer, the wonderful attendees of these two classes actually rose from their seats and gave me a standing ovation! My mother who was with me, and I, will never forget that moment! To them, thank you for your awesomeness! God Bless us!

Lawbytes 115: The Extra-Territorial Prosecution of Cyber Privacy Predators and Cybercriminals, Copyright by Dr. Atty. Noel G. Ramiscal

August 15, 2016 was an extra special day for my advocacies on several levels. It was the day when I got to debut a very new and hot topic for the UP IAJ [through the urging of the wonderful Ms. Mabel Perez] in their Mandatory Continuing Legal Education (MCLE) seminar series. This lecture, which I entitled “Trends and Issues in the Prosecution of Cyber Privacy Predators and Personal Information Thieves” is in all probability, the first time that would be tackled by any MCLE lecturer in the Philippines. The National Privacy Commission (NPC) was just established last March 8, 2016, despite the fact that the law (R.A. 10173) creating it was passed in 2012, and up to now, the lmplementing Rules and Regulations (I.R.R.) that the NPC was tasked to promulgate is still in the process of being finalized.

Dr. Atty. Noel G. Ramiscal, at his August 15, 2016 MCLE lecture for UP IAJ

Dr. Atty. Noel G. Ramiscal, at his August 15, 2016 MCLE lecture for UP IAJ

The proposed I.R.R. seeks to create a Data Security and Compliance Office, a Legal and Enforcement Office and a Privacy Policy Office which are all crucial to the NPC, because as a quasi-judicial body, it would be deciding on data privacy violations arising from the different and new cybercrimes concerning data processing that R.A. 10173 established. Since the NPC is swamped with many issues concerning its existence and operations, I figured my lecture can help clarify some of these issues and point to some trends, standards or guidelines that these new offices need to be apprised of to do their jobs effectively.

I went through many essential concepts that are unique to the Data Privacy law, for a very attentive and receptive audience (none of whom slept during my lecture): from the right of informational privacy that was developed in Europe after the Second World War and the right to informational self-determination which was first recognized as a constitutionally guaranteed right in 1983 by the German Constitutional Court; to the explication of the right to be forgotten, and the relevance of our very own writ of habeas data in enforcing this right; to the right of portability and how that right had been enforced in some jurisdictions; to the right of transmissibility and my own advocacy for the establishment of a Digital Inheritance Law in the Philippines which would give access to the heirs of a decedent, and the police and prosecutors to e-data, particularly emails and social media e-data, that can give a clue to any foul play or crime that was perpetrated on the decedent; to the different types of identity theft, impersonation and misappropriation of personal information; to the role of encryption in securing our privacy; to the electronic means of stealing personal information like spamming and ransomware; to the types of electronic evidence that prosecutors should recognize and present in court as incriminating evidence; and everything in between.

Dr. Atty. Noel G. Ramiscal with Former Philippine Vice President, Atty. Jejomar C. Binay and a group of brilliant Ibanag lawyers who attended his MCLE LECTURE, AUGUST 15 2016

Dr. Atty. Noel G. Ramiscal with Former Philippine Vice President, Atty. Jejomar C. Binay and a group of brilliant Ibanag lawyers who attended his MCLE LECTURE, AUGUST 15 2016

One of the most important concepts I discussed at some length is the extra-territorial application of R.A. 10173, as well as the Cybercrime Prevention Act (R.A. 10175). Prior to these laws, law students and lawyers were only taught criminal laws are primarily territorial in application, and the only way that courts can have jurisdiction over the person of the accused would be through the latter’s arrest, voluntary surrender or arraignment appearance.

The two laws changed all previous conceptions of the territorial application of Philippine criminal laws by broadening their scope. R.A. 10175 made it easier to file any cybercrime case in a Philippine cybercrime court, even if the offender is not in the Philippines so long as any of these jurisdictional requirements are met: if the computer system which was used to commit the crime is situated wholly or partially in the Philippines; or when the offender is a Philippine citizen; or when any of the elements were committed in the Philippines; or when the offended party, natural or juridical, was in the Philippines when the offense was committed and experienced damage here.

In a similar manner, R.A. 10173 and its proposed I.R.R. made filing a cybercrime case for any unlawful data processing of the personal information of a data subject apparently simpler, by requiring the fulfilment of any of these conditions: the data wrongfully processed belongs to a Philippine citizen or resident; or the data processor [personal information controller or personal information processor] has a Philippine link. The linkage can be through the fact that the data processor processes personal information in the Philippines; or carries business in the Philippines; or uses equipment located in the country, or maintains an office, branch or agency in the Philippines for processing of personal data; or has a branch, agency, office or subsidiary in the Philippines and the parent or affiliate of the Philippine entity has access to personal information. If the data processor processes the personal information outside the Philippines, it could still be held liable as long as the information is about Philippine citizens or residents. Other links include the data processor having entered into a contract in the Philippines; or if it’s not incorporated in the Philippines, it somehow “has central management and control in the country”.

Some lawyers who attended Dr. Noel G. Ramiscal's MCLE lecture PROSECUTING CYBERPRIVACY PREDATORS, AUGUST 15, 2016

Some lawyers who attended Dr. Noel G. Ramiscal’s MCLE lecture PROSECUTING CYBERPRIVACY PREDATORS, AUGUST 15, 2016

While these jurisdictional “links” or anchors that Philippine prosecutors can now use to go after cybercriminals in other countries legally exist, I gave a cautionary note in their enforcement. In this “cloud” era, incriminating or offending data can easily be transferred to different servers in different countries and the challenge for the prosecution is how to have access to these data, present them in a Philippine court and bring the criminals to justice. In the controversial and recently decided case involving the US government against Microsoft, Microsoft refused to honor and moved for the quashal of the search warrant issued by District Judge Francis of the Southern District Court of New York that would have given the US DOJ and FBI access to the electronically stored data of a person under investigation for drug charges. Microsoft’s refusal was based on the fact that the data which belonged to one of its customers is physically stored in a server located in Dublin, Northern Ireland. The case was elevated to the Chief Judge of the same District Court of New York who affirmed the findings of Judge Francis.

The District Court’s rulings were based on the appreciation of the nature of search warrants for cloud e-data. The court noted that it is a “hybrid order” that is “executed like a subpoena in that it is served on the ISP [Internet Service Provider] in possession of the information and does not involve government agents entering the premises of the ISP to search its servers and seize the email account in question.” The service of the warrant and the seizure of the e-data can be completed not from the physical location of the server but from any remote location by a certified Microsoft owned computer that has lawful access to, and control of the e-data. The relevant test is not one of location, but of control. In ruling like this, the District Court overturned the territorial principle in the application of search warrants outside of the U.S.

As expected, Microsoft appealed this decision to the U.S. Court of Appeals, and the Second Circuit of the Court of Appeals came out with a decision last July 14, 2016 reversing the District Court’s ruling, and vindicating the privacy rights of the subscribers of Microsoft’s cloud services. The Court of Appeals, through Judge Susan Carney, emphatically stated that the U.S. Stored Communications Act, under which the search warrant was issued, was intended by the U.S. Congress to apply only to information that is domestically stored in the U.S., and not to e-data that are physically located outside its boundaries. To decide in the manner of the District Judge would mean the abandonment of the time honoured territoriality principle which the Court of Appeals stated “(w)e are not at liberty to do so.” The Court of Appeals, among others, reversed the decision of the District Court and remanded the case back to it with instructions the quash the search warrant, insofar as it directs Microsoft to produce customer content outside of the U.S.

Some of the lawyers who attended Dr. Ramiscal's lecture on Prosecuting Cyberprivacy Predators and ID Thieves, AUGUST 15 2016

Some of the lawyers who attended Dr. Ramiscal’s lecture on Prosecuting Cyberprivacy Predators and ID Thieves, AUGUST 15 2016

One comment that I have on this is that the US government pursued this process in order to evade the Data Privacy Law of Northern Ireland and bypass the Mutual Legal Assistance Treaty (MLAT) process it has with this country, as shortcuts. But it took them longer than they imagined. This case was brought to Judge Francis last 2013, and decided by the Court of Appeals in July 14, 2016. Had the U.S. Government gone through the MLAT process, it might have succeeded in getting the e-data it required in a shorter time, instead of having the lengthy litigation which proved futile for its cause, and the negative publication it received from the international diplomatic and business community.

Since R.A. 10175 expressly mentioned MLATs as a way of enforcing its provisions, it is my suggestion that this is a valuable tool in the arsenal of prosecutors, which they must master, in terms of going after criminals outside Philippine territory. Under the law (R.A. 10844) creating the Department of Communication Information Technology (DCIT), this agency was placed in charge of the Cybercrime Investigation and Coordination Center (CICC) which would be attached to it. The law specifically stated “(i) All powers and functions related to cybersecurity including, but not limited to the formulation of the National Cybersecurity Plan, establishment of the National Computer Emergency Response Team (CERT), and the facilitation of international cooperation on intelligence regarding cybersecurity matters are transferred to the Department”. Under this set-up, the DCIT will be engaged with the DOJ in terms of the international aspects of cybercrime. The DCIT must also be apprised with the MLATs, etc., so it can do its tasks well. The Philippines’ MLAT with the U.S. offers several measures that could effectively facilitate the production of evidence and even the forfeiture of the proceeds of the crimes committed against Philippine citizens by people or entities domiciled in the U.S. In fact, this could be used to go after the U.S. owners of the “wehaveyourdata.com” site which published the personal information of over 40 million registered Philippine voters in the massive breach of the Commission on Elections (COMELEC) e-database.

DR. RAMISCAL'S SKETCH BY ATTY. ADAN

DR. RAMISCAL’S SKETCH BY ATTY. ADAN

One of the reasons why I said this was an extra-special occasion for me is that I got to meet the former Vice President of the Philippines, who is a very distinguished lawyer himself, Atty. Jejomar C. Binay, and a host of several Ibanag lawyers who are brilliant in their own fields who attended my lecture. It was also on this event that Atty. Dan Adan, a multi-talented lawyer, presented me with his pencil sketch of my image while I was lecturing. That was truly a first!

Warmest gratitude to UP IAJ, Prof. Daway and all their truly supportive staff, and the splendid lawyers who gave me their undivided attention and genuine interest for the two hours that I spent with them! God Bless Us!