PHNO-HL: PNoy SIGNED CYBERCRIME PREVENTION ACT / CYBERCOMBAT: ACT OF WAR


PHNO NEWS SERVICE TURNS 15 THIS YEAR. PHNO NOW A 'WEEKLY' eZINE. Headline news update
every Monday]


PNoy SIGNED CYBERCRIME PREVENTION ACT / CYBERCOMBAT: ACT OF
WAR
MANILA, SEPTEMBER 17, 2012 (PHILSTAR) By Aurea Calica
- President Aquino signed on Wednesday Republic Act 10175 or the Cybercrime
Prevention Act of 2012 that will punish libel online and combat Internet-related
offenses in the country.
Deputy presidential spokesperson Abigail Valte said over radio dzRB yesterday
that among the punishable acts under the new law are offenses against the
confidentiality, integrity and availability of computer data system, illegal
access, illegal interception, data interference, system interference and misuse
of devices.
Also covered are computer-related offenses such as computer-related forgery,
fraud and identity theft, crimes rampant over the Internet.
Also punishable under the new law are content-related offenses like cybersex
and child pornography, unsolicited commercial communications or cyber squatting.

Cyber squatting is the acquisition of a person's domain name in bad faith to
profit, mislead, destroy the reputation and deprive others from registering the
same.
Valte said RA 10175 also punishes libel.
Asked about possible libel suits because of posts on Twitter and Facebook,
Valte said, "We will leave it up to the lawyers to determine."
Under the new law, unlawful or prohibited acts of libel as defined in Article
355 of the Revised Penal Code, as amended, are those "committed through a
computer system or any other similar means which may be devised in the future."

The government classified cyber crimes in the Philippines into two
categories: Internet and commercial crimes committed with the use of the
Internet.
Last year, authorities issued a legal advisory on Internet crimes to protect
the public using the Web.
Existing Philippine laws punishing Internet crimes are RA 9995 (Anti-Photo
and Voyeurism Act of 2009), RA 9775 (Anti-Child Pornography Act of 2009), and RA
9208 (Anti-Trafficking in Persons Act of 2003).
Valte said the National Bureau of Investigation and the Philippine National
Police would have to create a cybercrime unit or a center manned by special
investigators.
"They need to beef up (anti-cybercrime forces). There are provisions for the
creation of these specialized units to enforce the Cybercrime Prevention Act of
2012," she said.
She also said the corresponding penalties were delineated and that an "Office
of Cybercrime" within the Department of Justice would be established.
EARLIER REPORT FROM THE WALL STREET
JOURNAL
Cyber Combat: Act of War Pentagon
Sets Stage for U.S. to Respond to Computer Sabotage With Military
Force

[VIDEO: WSJ's Siobhan
Gorman has the exclusive story of the Pentagon classifying cyber attacks by
foreign nations as acts of war. Photo: THOMAS
KIENZLE/AFP/Getty Images]
By SIOBHAN GORMAN And JULIAN E. BARNES WASHINGTON—The Pentagon has concluded
that computer sabotage coming from another country can constitute an act of war,
a finding that for the first time opens the door for the U.S. to respond using
traditional military force.
The Pentagon's first formal cyber strategy, unclassified portions of which
are expected to become public next month, represents an early attempt to grapple
with a changing world in which a hacker could pose as significant a threat to
U.S. nuclear reactors, subways or pipelines as a hostile country's military.

In part, the Pentagon intends its plan as a warning to potential adversaries
of the consequences of attacking the U.S. in this way. "If you shut down our
power grid, maybe we will put a missile down one of your smokestacks," said a
military official.
Recent attacks on the Pentagon's own systems—as well as the sabotaging of
Iran's nuclear program via the Stuxnet computer worm—have given new urgency to
U.S. efforts to develop a more formalized approach to cyber attacks.
A key moment occurred in 2008, when at least one U.S. military computer
system was penetrated. This weekend Lockheed Martin, a major military
contractor, acknowledged that it had been the victim of an infiltration, while
playing down its impact.
The report will also spark a debate over a range of sensitive issues the
Pentagon left unaddressed, including whether the U.S. can ever be certain about
an attack's origin, and how to define when computer sabotage is serious enough
to constitute an act of war. These questions have already been a topic of
dispute within the military.
One idea gaining momentum at the Pentagon is the notion of "equivalence." If
a cyber attack produces the death, damage, destruction or high-level disruption
that a traditional military attack would cause, then it would be a candidate for
a "use of force" consideration, which could merit retaliation.
The War on Cyber Attacks Attacks of varying severity have rattled nations in
recent years:

June 2009: First version of Stuxnet virus starts spreading, eventually
sabotaging Iran's nuclear program. Some experts suspect it was an Israeli
attempt, possibly with American help.

November 2008: A computer virus believed to have originated in Russia
succeeds in penetrating at least one classified U.S. military computer network.


August 2008: Online attack on websites of Georgian government agencies and
financial institutions at start of brief war between Russia and Georgia.

May 2007: Attack on Estonian banking and government websites occurs that is
similar to the later one in Georgia but has greater impact because Estonia is
more dependent on online banking.
The Pentagon's document runs about 30 pages in its classified version and 12
pages in the unclassified one. It concludes that the Laws of Armed
Conflict—derived from various treaties and customs that, over the years, have
come to guide the conduct of war and proportionality of response—apply in
cyberspace as in traditional warfare, according to three defense officials who
have read the document.
The document goes on to describe the Defense Department's dependence on
information technology and why it must forge partnerships with other nations and
private industry to protect infrastructure.
The strategy will also state the importance of synchronizing U.S. cyber-war
doctrine with that of its allies, and will set out principles for new security
policies.
The North Atlantic Treaty Organization took an initial step last year when it
decided that, in the event of a cyber attack on an ally, it would convene a
group to "consult together" on the attacks, but they wouldn't be required to
help each other respond. The group hasn't yet met to confer on a cyber incident.

Pentagon officials believe the most-sophisticated computer attacks require
the resources of a government. For instance, the weapons used in a major
technological assault, such as taking down a power grid, would likely have been
developed with state support, Pentagon officials say.
The move to formalize the Pentagon's thinking was borne of the military's
realization the U.S. has been slow to build up defenses against these kinds of
attacks, even as civilian and military infrastructure has grown more dependent
on the Internet. The military established a new command last year, headed by the
director of the National Security Agency, to consolidate military network
security and attack efforts.
The Pentagon itself was rattled by the 2008 attack, a breach
significant enough that the Chairman of the Joint Chiefs briefed then-President
George W. Bush. At the time, Pentagon officials said they believed the attack
originated in Russia, although didn't say whether they believed the attacks were
connected to the government. Russia has denied involvement.
The Rules of Armed Conflict that guide traditional wars are derived from a
series of international treaties, such as the Geneva Conventions, as well as
practices that the U.S. and other nations consider customary international law.
But cyber warfare isn't covered by existing treaties. So military officials say
they want to seek a consensus among allies about how to proceed.
"Act of war" is a political phrase, not a legal term, said Charles Dunlap, a
retired Air Force Major General and professor at Duke University law school.
Gen. Dunlap argues cyber attacks that have a violent effect are the legal
equivalent of armed attacks, or what the military calls a "use of force."
"A cyber attack is governed by basically the same rules as any other kind of
attack if the effects of it are essentially the same," Gen. Dunlap said Monday.
The U.S. would need to show that the cyber weapon used had an effect that was
the equivalent of a conventional attack.
James Lewis, a computer-security specialist at the Center for Strategic and
International Studies who has advised the Obama administration, said Pentagon
officials are currently figuring out what kind of cyber attack would constitute
a use of force. Many military planners believe the trigger for retaliation
should be the amount of damage—actual or attempted—caused by the attack.
For instance, if computer sabotage shut down as much commerce as would a
naval blockade, it could be considered an act of war that justifies retaliation,
Mr. Lewis said. Gauges would include "death, damage, destruction or a high level
of disruption" he said.
Culpability, military planners argue in internal Pentagon debates, depends on
the degree to which the attack, or the weapons themselves, can be linked to a
foreign government. That's a tricky prospect at the best of times.
The brief 2008 war between Russia and Georgia included a cyber attack that
disrupted the websites of Georgian government agencies and financial
institutions. The damage wasn't permanent but did disrupt communication early in
the war.
A subsequent NATO study said it was too hard to apply the laws of armed
conflict to that cyber attack because both the perpetrator and impact were
unclear. At the time, Georgia blamed its neighbor, Russia, which denied any
involvement.
Much also remains unknown about one of the best-known cyber weapons, the
Stuxnet computer virus that sabotaged some of Iran's nuclear centrifuges. While
some experts suspect it was an Israeli attack, because of coding
characteristics, possibly with American assistance, that hasn't been proven.
Iran was the location of only 60% of the infections, according to a study by the
computer security firm Symantec. Other locations included Indonesia, India,
Pakistan and the U.S.
Officials from Israel and the U.S. have declined to comment on the
allegations.
Defense officials refuse to discuss potential cyber adversaries, although
military and intelligence officials say they have identified previous attacks
originating in Russia and China. A 2009 government-sponsored report from the
U.S.-China Economic and Security Review Commission said that China's People's
Liberation Army has its own computer warriors, the equivalent of the American
National Security Agency.
That's why military planners believe the best way to deter major attacks is
to hold countries that build cyber weapons responsible for their use. A
parallel, outside experts say, is the George W. Bush administration's policy of
holding foreign governments accountable for harboring terrorist organizations, a
policy that led to the U.S. military campaign to oust the Taliban from power in
Afghanistan.


Chief News Editor: Sol Jose Vanzi
© Copyright, 2012 by PHILIPPINE HEADLINE NEWS ONLINE
All
rights reserved




PHILIPPINE
HEADLINE NEWS ONLINE [PHNO] WEBSITE


[Non-text portions of this message have been removed]



------------------------------------

-------------------------------------------------------------
Follow us on Twitter: http://twitter.com/phnotweet

This is the PHILIPPINE HEADLINE NEWS ONLINE (PHNO) Mailing List.

To stop receiving our news items, please send a blank e-mail addressed to: phno-unsubscribe@yahoogroups.com

Please visit our homepage at: http://www.newsflash.org/

(c) Copyright 2009. All rights reserved.
-------------------------------------------------------------Yahoo! Groups Links

<*> To visit your group on the web, go to:
http://groups.yahoo.com/group/phno/

<*> Your email settings:
Individual Email | Traditional

<*> To change settings online go to:
http://groups.yahoo.com/group/phno/join
(Yahoo! ID required)

<*> To change settings via email:
phno-digest@yahoogroups.com
phno-fullfeatured@yahoogroups.com

<*> To unsubscribe from this group, send an email to:
phno-unsubscribe@yahoogroups.com

<*> Your use of Yahoo! Groups is subject to:
http://docs.yahoo.com/info/terms/
Backlinks
 

PH Headline News Online. Copyright 2011 All Rights Reserved