Procedures in Handling of Computer/Cybercrime Cases: Legal Basis
Procedures in Handling of Computer/Cybercrime Cases: Legal Basis
Procedures in Handling of Computer/Cybercrime Cases: Legal Basis
COMPUTER/CYBERCRIME CASES
LEGAL BASIS
- R.A. 8792 Electronic Commerce Act of 2000
- R.A. 8484 Access Device Act
PURPOSE
The standard operating procedure prescribes a uniform and step-by-
step process to be observed by all personnel of CIDG in the conduct of
investigation regarding Computer/Cybercrime cases.
SCOPE OF APPLICATION
This procedure shall be strictly observed by investigators handling
computer/cybercrime cases. The head of office or Chief must always be
informed of the disposition or action taken on complaints. Computer
and Network can be involved in crimes in several ways:
a. Computer or network can be a tool of crime (used to commit the
crime)
b. Computer or network can be a target of the crime (the “victim”)
c. Computer or network can be used for incidental purposes related to
the crime
PROCEDURES
a. Walk-in Complainant
NOTE: Complaints can be handled by RCIDU or coordinated
with ATCD.
1. Complaint(s) will be guided to fill up a complaint sheet and affix
his/her signature.
2. Sworn statements and other necessary documents will be prepared.
3. If the nature of complaint is pertaining to Computer/Cyber Crime
cases such as but not limited to:
a) Hacking/Cracking
b) Email Cases (Hacking/Threat/Extortion)
c) Identity theft or in relation to Social Networking cases
5. If the result of the WHOIS traces to the local IP address and Local
Domain Name Hosting, the investigator shall coordinate with the ISP
and Web Hosting Company through letters rogatory to preserve the
log files and further identify the owner of the IP address and the
registrant of Domain Name (website).
6. Else, If the WHOIS traces foreign IP address and Foreign Domain Name
Hosting, the investigator shall coordinate with the foreign counter-part Law
Enforcement Agency through Mutual Legal Assistance Treaty (MLAT)
procedures to get the information on the owner of the IP address and the
registrant of Domain Name (website). Coordination should be made with Legal
Division, CIDG.
7. After the completion of the investigative requirements, the case will be filed
in court for possible arrest and conviction of the suspect. If not, pursued the
solution of the case.
NOTE: All seized devices should be sent to Computer Forensic Sec, ATCD,
CIDG for Computer/Cellphone Forensic examination. (Requirements stated in
Part VI para 3)
8. If the nature of the complaint is pertaining to cellphone-related cases such as but
not limited to:
a. Text Scam
b. Cellphone Threat
c. Cellphone Extortion, and etc.
NOTE: The investigator shall identify the Subscriber Identity Module (SIM) Card
number and its corresponding Telecommunication Company (TELCO) carrier.
(SMART/GLOBE/SUN/PLDT, etc)
If the SIM card number belongs to a local TELCO, then the investigator shall
coordinate through letter derogatory to determine the owner of the SIM card number
and any logs/records pertaining to the said SIM.
9. If the SIM card number belongs to a foreign TELCO, then the investigator shall
coordinate through letter rogatory with the foreign counter-part Law Enforcement
Agency through Mutual Legal Assistance Treaty (MLAT) procedures to get the
information on the owner of the SIM card number and other log/records pertaining
to the said SIM.
10. After completion of the investigative requirements, the case will be filed in
court for possible arrest and conviction of the suspect. If not, pursue the solution of
the case.
NOTE: All seized devices should be sent to Computer Forensic Sec, ATCD,
CIDG for Computer/Cellphone Forensic examination. (Requirements stated in
Part VI para 3)
Once the system has been labeled correctly, the investigator can place evidence tape
over the 3 ½ inch drive and the drive case. This will help the investigator know if
anyone tampers with the computer system in transit back to the forensic lab.
If there is any media located in the drives, the media should be photographed and then
removed to protect the evidence from being destroyed or altered. CD-ROMS may be
scratched in transit and therefore may become unreadable. At this time, remove any
media in the drive bays and place evidence tape over the drives.
Now it is time to package all the equipment for transportation. All electronic evidence should
be packaged in anti-static bags to help ensure the integrity of the data is maintained. As each
piece of evidence is packaged, an evidence label should be attached.
This evidence label will help identify the evidence, the date and time it was found on the
scene, the location it was recovered from, and the investigator who found the evidence.
Additional information can be added to include the Case Number and the primary
investigating officer. At this time, please ensure all evidence has been packaged and labeled
from the crime scene.
Before each item is removed from the crime scene, a
chain of custody must be filled out to ensure the evidence
is properly tracked from investigator to investigator. A
chain of custody will contain the name of the recovering
officer and the date and time he transferred the evidence
to the primary investigating officer. Additionally, the
chain of custody may contain the item number or
evidence number along with the case number of the
crime.
8. An act of multiple imprinting on more than one transaction record, sales slip or
similar document, thereby making it appear that the device holder has entered into a
transaction other than those which said device holder had lawfully contracted for, or
submitting, without being an affiliated merchant, an order to collect from the issuer of
the access device, such extra sales slip through an affiliated merchant who connives
therewith, or, under false pretences of being an affiliated merchant, present for
collection such sales slips, and similar documents;
9. An act of disclosing any information imprinted on the access device, such as, but not
limited to, the account number or name or address of the device holder, without the latter's
authority or permission;
10. An act of obtaining money or anything of value through the use of an access device, with
intent to defraud or with intent to gain and fleeing thereafter;
11. An act of having in one's possession, without authority from the owner of the access
device or the access device company, an access device, or any material, such as slips, carbon
paper, or any other medium, on which the access device is written, printed, embossed, or
otherwise indicated;
12. An act of writing or causing to be written on sales slips, approval numbers from the
issuer of the access device of the fact of approval, where in fact no such approval was
given, or where, if given, what is written is deliberately different from the approval
actually given;
13. An act of making any alteration, without the access device holder's authority, of any
amount or other information written on the sales slip;
14. An act of effecting transaction, with one or more access devices issued to another
person or persons, to receive payment or any other thing of value;
15. An act, without the authorization of the issuer of the access device, soliciting a
person for the purpose of:
a) Offering an access device; or
b) Selling information regarding or an application to obtain an access device; or
16. An act, without the authorization of the credit card system member or its agent,
causing or arranging for another person to present to the member or its agent, for
payment, one or more evidence or records of transactions made by credit card.
17. Other analogous acts
What is the evidence needed to file a case of access device fraud?
1. Testimonial Evidence – affidavit of complainants and witnesses
2. Documentary Evidence - Certificate of Registration of the owner of access devices,
Photographs of access devices fraudulently used, Certificate of Obligation issued as a
result of fraudulent transactions or contract of sale and other pertinent documents
obtained through the use of fraudulent access device, police records and other relevant
records
3. Object Evidence - Subject access devices, computers and other electronic equipments
4. Other relevant documents
CREDIT CARD FRAUD INVESTIGATIONS (VIOLATION OF RA 8484)
ACCOUNT TAKE-OVER
Account Take-over (ATO) – a criminal trying to take over another person‟s account,
first by gathering information about the intended victim, then contacting their bank or credit
issuer – masquerading as the genuine cardholder – asking for mail to be redirected to a new
address. The criminal then reports the card lost and asks for a replacement to be sent. The
replacement card is then used fraudulently.
c. Filing of the Case (the documents needed can be secured from the complainant)
FILING OF THE CASE (the documents needed can be secured from the complainant)
c. Suspect/s can be charged with Sec 9 of RA 8484, Art 172 and 171, Art 178, Art 315 all of RPC,
and CA 142 as amended by RA 6085, etc.
Note: The Case Folder shall contain all of paragraph 3
d. Counterfeit credit cards
e. Suspect can be charged with sec 9 of RA 8484, Art 308 and Art 178 all of RPC, CA 142
as amended by RA 6085, etc.
Note: The Case Folder shall contain all of paragraph 3.
STEPS IN INVESTIGATING MANUFACTURING OF CREDIT CARDS
a. There must be a complaint
1. Duly accomplished complaint sheet
2. Affidavit of the complainant
3. If complainant is a juridical person, ask for his/her authority to file a
complaint.
4. Evaluate the case to ascertain the offense committed.
5. Determine what laws are applicable.
6. Determine what document/s or pieces of evidence are needed to complete
the picture of the case.
b. Piece/s of evidence needed
1. Skimming device (Card Reader) – a device used to record the data of credit card and
then transferred to a duplicate card
2. Hot Stamper – machine used to shape plastic material by bending, folding, pressing,
stretching and or twisting
3. Embosser – machine used to carve a design in relief on a surface
4. Printer – external
5. Scanner – computer peripheral or a stand-alone device that converts a document,
filing, graphic, or photographic to a digital image.
6. Blank PVC Cards – a standard-sized blank plastic card where a certain credit card is
to be printed
7. Computers – general purpose machine, commonly consisting of digital circuitry,
that accepts (inputs), stores, manipulates, and generates (outputs) data a number, text,
graphics, voice, video files, or electrical signals, in accordance with instructions called
programs.
c. If possible, apply for Search Warrant
d. Filing of the Case
1. Inquest if arrest was made
a) Referral addressed to the City Prosecutor
b) Duly accomplished sheet
c) Affidavit of the complainant/Certification from the Credit Card Association of the
Philippines
Note: If the complainant is a juridical person, Special Power of Attorney and/or
Corporate Secretary‟s Certificate is needed.
d) Skimming Device
e) Stamper
f) Embosser
g) Printer
h) Scanner
i) Blank PVC Card
j) Computers
k) Copy of Search Warrant/s
l) Receipt of property seized
m) Certificate of orderly searched
n) Affidavit of Arrest
o) Booking Sheet
2. Ordinary Filing if no arrest was made
Note: Affidavit of Arrest and booking sheet is not needed
3. Suspect/s can be charged with sec 9 of RA 8484
e. Return of Search Warrant/s
Note: The Case Folder shall contain all of paragraph 4 and 5.
END…?