Quantcast

Commentary

Real need for cyberlaw unaddressed by RA 10175

By

As an IT/cybersecurity practitioner for 16 years, I had foreseen the possible catastrophic impact should malicious hackers launch an attack against our critical cyberinfrastructure. So if you ask me whether we need a cybercrime law or not, my answer is “yes,” definitely. In fact we needed it 10 years ago. However, I agree with the view that libel by ICT shouldn’t be considered a crime.

I believe that the Cybercrime Prevention Act of 2012 (Republic Act No. 10175) was passed with some provisions that deviate from its original objective—that is, to prosecute cybercriminals. A definitive answer as to what constitutes a cybercrime is very crucial in the implementation of the law. From a “cyberperspective,” cybercrimes include (but are not limited to) the following: identity theft, compromised confidentiality and integrity of information, distribution of worms and Trojans, disruption of online services (DOS/DDOS), systems intrusions, unauthorized modification of data and other online information, information theft, and installation and distribution of unlicensed software.

As we all know, the libel provision in RA 10175 prompted some of our cybercitizens or netizens to attack government-owned websites, an act which is in itself a crime under the new law. Unfortunately, their overreaction to the law’s libel provision has taken away the spotlight from the real reason we need a cybercrime law. The “hackattacks” should have shown to all and sundry how vulnerable our systems are and how easy it is to disrupt online services.

Beyond libel, what we should worry about and focus on more is the risk of cyberwar, which is a bigger threat. In a cyberwar, the main actors would no longer be mere “hacktivists” but cyberterrorists and state-sponsored hackers whose objective would be not just to deface websites and steal Facebook accounts, but to disrupt and compromise economic security.

By definition, one of the pillars of national security is economic security. In cyberwar, the enemy can successfully take down the economy of a nation or state by merely pressing the “Enter” key. A cyberterrorist can cause havoc without necessarily blowing anything or himself up. A cyberspy can steal and gather vital information about a target country without being physically present there. In this modern and technology-driven world, the war has shifted from guns and bombs to bits and bytes. A cyberwar can be won without firing a single bullet.

Others claim that it is easy and possible to trace the real source of an attack and identify the real perpetrator, I disagree. Having been exposed to the defensive and offensive areas of cybersecurity, I can categorically say it is very difficult and almost impossible to trace the real source of an attack, much more identify the real identity of the perpetrators. Using various hacking tools, hackers may launch cyberattacks while sitting in an Internet café or coffee shop in Manila, Philippines, yet make it appear like the attack is coming from other cities or countries. I believe this is exactly the reason why the hackers responsible for the cyberattacks were so defiantly aggressive—they are certain that they cannot be traced or they know government is not equipped enough to trace and identify them. Make no mistake, cyberspace is a borderless world and the Internet provides a perfect cover and refuge to everyone, and these hackers have almost perfected the skills of anonymity.

Angel Redoble, a certified ethical hacker and computer hacking forensic investigator with a master’s degree in Information Security Management from UPSAM-ASIMILEC in Madrid, Spain, is president and CEO of ARMCI Solutions and Consultancy.


Follow Us


Follow us on Facebook Follow on Twitter Follow on Twitter


More from this Column:

Recent Stories:

Complete stories on our Digital Edition newsstand for tablets, netbooks and mobile phones; 14-issue free trial. About to step out? Get breaking alerts on your mobile.phone. Text ON INQ BREAKING to 4467, for Globe, Smart and Sun subscribers in the Philippines.

Short URL: http://opinion.inquirer.net/?p=43129

Tags: angel redoble , column , Cybercrime Prevention Act , cyberterrorism , online libel



Copyright © 2014, .
To subscribe to the Philippine Daily Inquirer newspaper in the Philippines, call +63 2 896-6000 for Metro Manila and Metro Cebu or email your subscription request here.
Factual errors? Contact the Philippine Daily Inquirer's day desk. Believe this article violates journalistic ethics? Contact the Inquirer's Reader's Advocate. Or write The Readers' Advocate:
c/o Philippine Daily Inquirer Chino Roces Avenue corner Yague and Mascardo Streets, Makati City, Metro Manila, Philippines Or fax nos. +63 2 8974793 to 94
Advertisement
Advertisement

News

  • Save the queen? Aide takes fall for Enrile, Gigi Reyes
  • Napoles turnaround alarms whistle-blowers
  • Palace prepared to charge its allies
  • 12 senators on Napoles ‘pork’ list, says Lacson
  • PNP chief on plunder raps: ‘Amateurish’
  • Sports

  • Mixers trim Aces, force do-or-die tiff
  • Donaire junks Garcia as coach, taps father
  • ’Bye Ginebra: No heavy heart this time
  • UAAP board tackles new rules
  • Baguio climb to decide Le Tour de Filipinas
  • Lifestyle

  • Entering the monkhood a rite of passage
  • Haneda International Airport: A destination on its own
  • Wanted: Beauty queen with a heart that beats for the environment
  • Kim Atienza: At home with art and design
  • Life lessons I want to teach my son
  • Entertainment

  • Return of ‘Ibong Adarna’
  • Practical Phytos plans his future
  • In love … with acting
  • From prison to the peak of success
  • ‘Asedillo’ location thrives
  • Business

  • Philippine Airlines to stop shipment of shark fins
  • PH banks not ready for Asean integration
  • Stocks down on profit-taking
  • Banks allowed to use ‘cloud’
  • SMIC to issue P15-B bonds
  • Technology

  • ‘Unlimited’ Internet promos not really limitless; lawmakers call for probe
  • Viber releases new design for iPhone, comes to Blackberry 10 for the first time
  • Engineers create a world of difference
  • Bam Aquino becomes Master Splinter’s son after Wiki hack
  • Mark Caguioa lambasts Ginebra teammates on Twitter
  • Opinion

  • Editorial cartoon, April 24, 2014
  • Talking to Janet
  • Respite
  • Bucket list
  • JPII in 1981: walking a tightrope
  • Global Nation

  • China and rivals sign naval pact to ease maritime tensions
  • What Went Before: Manila bus hostage crisis
  • Obama arrives in Tokyo, first stop of 4-nation tour
  • Believe it or not: Filipinos love US more than Yanks
  • PH, HK end bitter row; sanctions lifted
  • Marketplace