CYBER CRIMES IN MALAYSIA AND U.S.A.: WHAT SHOULD WE DO IN MALAYSIA?

Embed Size (px)

Citation preview

  • 8/9/2019 CYBER CRIMES IN MALAYSIA AND U.S.A.: WHAT SHOULD WE DO IN MALAYSIA?

    1/17

    OUMH1203

    PENDIDIKAN DAN BAHASA

    SEPTEMBER 2011 (SMP KHAS)

    OUMH1203

    ENGLISH FOR WRITTEN COMMUNICATION

    NO. MATRIKULASI : 751225031!001

    NO. KAD PENGNEALAN : 751225031!

    NO. TELEFON : 01" 270137

    E#MEL : $%&'&*+%&%,-%./

    PUSAT PEMBELAARAN : KELANTAN LEARNING CENTRE

  • 8/9/2019 CYBER CRIMES IN MALAYSIA AND U.S.A.: WHAT SHOULD WE DO IN MALAYSIA?

    2/17

    OUMH1203

    1. INTRODUCTION

    Over the last fifteen years, the increase in technology and the use of computers in both

    the personal and business sector has increased remarkably. This increase has bought

    changes in all areas of society including such areas as telecommunication, banking and

    finance, insurance, electric power, oil and gas, human health, transportation, education

    system etc. These industries have not only improved but are now more and most fully

    dependants on information technology for routine daily operation. This rapid technology

    progress advance has well and truly ensured that in future everything is in a single finger.

    The rapid growth of the internet and computer technology over the past few years has led

    to the growth in new forms of crime-dubbed cyber crime- throughout the world.

    Cyber crime could be defined as a new variety of crime, which is either perpetrated using

    computers, or is something which related to them. Its origin can be traced to the growing

    dependence on computers in modern life. Cyber crime has assumed creepy implications

    today as everything from washing machine and water supply to nuclear power plants is

    being run on computers. owadays, the world is stirring towards a solution where most

    of it is relying on information through the IT. This e!ponential growth, and the increase

    in the capacity and accessibility of IT align with the drop off in cost, has brought aboutinnovative changes in every aspect of human evolution, inclusive crime.

    "s a result, the increased capacities of knowledge management today through IT come at

    the cost of increased vu Inerrability. Information technology has begun to produce

    criminal opportunities of a variety that the brightest criminals of yore could not even

    begin to dream about. The criminal of this uses computer to cyber crime against persons,

    against property and against government. ational #esearch Council in their paperwork

    $Computers at #isk%, &''& (uoted as $The modern thief can steal more with a computer

    than with a gun. Tomorrow)s terrorist may be able to do more damage with a keyboard

    than with a bomb%. In addition, this statement in other word could be defined as a

    challenge and risk with the technology if wrongly used could provide more disaster rather

    than benefits to human kind. *ost importantly, this disaster could affect anything and the

    &

  • 8/9/2019 CYBER CRIMES IN MALAYSIA AND U.S.A.: WHAT SHOULD WE DO IN MALAYSIA?

    3/17

    OUMH1203

    role of computer as the ob+ect to create a crime, as a tool to commit the crime and as an

    environment or conte!t to play as a non substantial role in the act of crime.

    In history the first recorded cyber crime in the world took place in the year &0 where

    oseph-*arie ac(uard, a te!tile manufacturer in /rance, produced the loom. This device

    allowed the repetition of a series of steps in the weaving of special fabrics. This resulted

    in a fear amongst ac(uard)s employees that their traditional employment and livelihood

    were being threatened. They committed acts of sabotage to discourage ac(uard from

    further use of the new technology.

    "ccording to Online ikipedia, computer crime, or cyber crime, refers to any crime that

    involves a computer and a network. The computer may have been used in the commission

    of a crime, or it may be the target. "nother definition provided by Online 1earch 1ecurity,

    cyber crime is a term for any illegal activity that uses a computer as its primary means of

    commission. /afinski, 2 *inassian 3004 (uoting all 30054, define cyber crime as

    $the transformation of criminal or harmful behaviors by networked technology%, while

    ilson 30054 puts it simply as a $crime that is enabled by, or that targets computers%.

    Cyber 1ecurity of *alaysia stated that there is no comprehensive definition of cybercrime. "ccording to *alaysia Cyber 1ecurity, they have defined the cyber crime into

    three categories as below6

    hen information and communications technology 3ICT4 systems and intellectual

    property become targets of e!ploitation, intrusion, identity and information theft.

    hen ICT devices are used as means to commit crimes. /or e!ample, computers

    at home are used to run malicious programs to intrude other computers to steal

    money, identity and passwords.

    here the ICT devices are used as mediums of committing crimes. /or e!ample,

    sedition, disharmony or unrest, slandering and instigating at higher scale come

    under this category.

  • 8/9/2019 CYBER CRIMES IN MALAYSIA AND U.S.A.: WHAT SHOULD WE DO IN MALAYSIA?

    4/17

    OUMH1203

    *eanwhile, the 7.1. 8epartment of ustice 38O4 broadly defines computer crimes as

    $any violations of criminal law that involve knowledge of computer technology for their

    perpetration, investigation, or prosecution.% "nother definition by 9avan 8uggal who is

    9resident of www.cyberlaws.net and consultant define cyber crime as $"ny criminal

    activity that uses a computer either as an instrumentality, target or a means for

    perpetuating further crimes comes within the ambit of cyber crime.%

    It would be concluded that the cyber crime definition as a utili:ing computer technology

    or any related to it for unlawful acts as a tool or target to provide damaging and loss to

    personal belongs.

    2. CONTENT

    2.1. CBER CRIME CLASSIFICATION

    "ccording to 9avan 8uggal who is 9resident of www.cyberlaws.net and consultant to

    7CT"8 and 7;1C"9 on Cyber law and Cyber crime, cyber crime basically

    could be divided into < ma+or categories as below6

    %. C-4 /+4 %%+&6 846&6

    This category also so called as cyber harassment. =arious type of cyber

    harassment occur or getting through the cyberspace. It committed of various

    crimes such as transmission of child-pornography, trafficking or posting or

    distributing and dissemination of obscene material via internet, email

    spoofing, cyber defamation 3someone publishes defamatory matter about

    someone on a website or sends e-mails containing defamatory information4

    and cyber stalking 3spying and individual)s activity over the internet4.

  • 8/9/2019 CYBER CRIMES IN MALAYSIA AND U.S.A.: WHAT SHOULD WE DO IN MALAYSIA?

    5/17

    OUMH1203

    . C-4 /+4 %%+&6 884-

    The suitable definition for this category is any crime against all form of

    property. /or instance computer vandalism such as leaking of confidential

    data, transmitting computer virus, unauthori:ed control or access to computer

    system, credit card fraud, intellectual property crimes 3software piracy,

    copyright infringement, trademark violation4 and internet time theft.

    /. C-4 /+4 %%+&6 94&4&

    The growth of internet has shown that the medium of cyberspace is being used

    by individuals and groups to threaten the international governments as also to

    terrori:e the citi:ens of a country. "nother e!ample for these types is forgery,

    cyber terrorism, web +acking, I#C crime, 1alami attack and denial of service

    attack.

    *eanwhile, outer Teepe 30054 in his research $Centre for Cyber crime

    1tudies Technological, organi:ational and legal e!pertise united% provides an

    initial classification of cyber crime and could be depicted as figure below6

    F+4 1: C;%66+

  • 8/9/2019 CYBER CRIMES IN MALAYSIA AND U.S.A.: WHAT SHOULD WE DO IN MALAYSIA?

    6/17

    OUMH1203

    2.2. COMPARISON OF CBER CRIMES IN MALASIA AND USA

    There are lots of similarities between cyber crime in *alaysia and 71" and the basic

    fundamental of this still in the corner. In fact, compare to 71, there are not many laws

    governing the cyberscape in *alaysia. 1ince &''5 the *alaysian parliament has

    developed few cyber laws which reasons to prevent and control of this crime. The

    enacted law which has been released by *alaysian *ultimedia and Communication

    1ecurity as below6

    F+4 2: M%;%-6+%& C-4 L%$

    *alaysian Computer Crime "ct &''5 essentially covers crimes resulting in violation

    against any of the $three 3

  • 8/9/2019 CYBER CRIMES IN MALAYSIA AND U.S.A.: WHAT SHOULD WE DO IN MALAYSIA?

    7/17

  • 8/9/2019 CYBER CRIMES IN MALAYSIA AND U.S.A.: WHAT SHOULD WE DO IN MALAYSIA?

    8/17

    OUMH1203

    F+4 5: P6++& %&* O4 I;;4%; C-4 S4?%; A/+9++46=

    C-4 T4+6= S8% %&* C66 B*4 %&* +6*+/+&%; I6646

    In *alaysia, the *alaysian 9olice formed the Technology Crime Investigation

    Aranch 3TCIA4 in October &'' and this team has been positioned under Commercial

    Crime Investigation 8ivision. The officers in the TCIA are specially trained in

    cybercriminal investigation methods and also lend its assistance to overseas

    enforcement agencies in investigating online gambling, hacking and illegal

    distribution of pirated software. Bovernment role not only to ensure but also to aware

    that technological innovation and the deviousness of human minds would mean that

    the law as well as enforcement must not only keep up with cybercriminals, but it

    re(uire their officers are one step ahead of cybercriminals, ready to catch them if the

    cybercriminals perform their dirty deeds. 8uring the arvard Ausiness 1chool

    "lumni Club luncheon in /ebruary 000, 8eputy 9rime *inister 8atuk 1eri "bdullah

    "hmad Aadawi 3during that period4 stated that6

    5

  • 8/9/2019 CYBER CRIMES IN MALAYSIA AND U.S.A.: WHAT SHOULD WE DO IN MALAYSIA?

    9/17

    OUMH1203

    The development of the Multimedia Super Corridor and the creation of a pioneer

    legal and regulatory framework encompassing, amongst other things, the

    Communications and Multimedia Act, the Computer Crimes Act and the Digital

    Signatures Act is indicative of the Governments commitment towards the creation of

    a knowledge!"ased economy#$

    In addition to this Cyber1ecurity *alaysia who is the national cyber security

    specialist centre, and an agency under the purview of the *inistry of 1cience,

    Technology and Innovation 3*O1TI4 has been established to look after the ICT

    security specialist services and continuously monitors threats to national security.

    Instead of that, this centre also assists in cyber forensics and analysis which related to

    analy:ing evidence and providing e!pert witnesses for relevant cases. There are lots

    of cases that have been reported to Cyber1ecurity in such making losses to the

    national economical growth. "ccording to Cyber1ecurity there is a +umped in cyber

    crime cases by &5 per cent in 0&0 in which e(uivalent ,0'0 cases compared to

    cases in 00'. The increasing number of the cases means the high profit could

    not gain to the country during the period. This has been supported by 8eputy 1cience,

    Technology and Innovation *inister 8atuk /adillah Dusof statement that based onpolice reports, the government suffered losses totaling #*.< million in 00' and

    the sum increased to #*@ million in 0&0.

    *eanwhile, in 71 they have primary federal law enforcement agencies that

    investigate domestic crime on the Internet include6 the /ederal Aureau of

    Investigation 3/AI4, the 7nited 1tates 1ecret 1ervice, the 7nited 1tates Immigration

    and Customs ;nforcement 3IC;4, the 7nited 1tates 9ostal Inspection 1ervice, and the

    Aureau of "lcohol, Tobacco and /irearms 3"T/4. ;ach of these agencies has offices

    conveniently located in every state to which crimes may be reported

  • 8/9/2019 CYBER CRIMES IN MALAYSIA AND U.S.A.: WHAT SHOULD WE DO IN MALAYSIA?

    10/17

    OUMH1203

    #eferring to *yC;#T Incident 1tatistics for the year 0&0, ,0'0 general incidents

    classification were reported to the Cyber''' 1ecurity Incident elp Centre.

    F+4 : R484* I&/+*4&6 %64* & 4&4%; I&/+*4& C;%66+

  • 8/9/2019 CYBER CRIMES IN MALAYSIA AND U.S.A.: WHAT SHOULD WE DO IN MALAYSIA?

    11/17

    OUMH1203

    *eanwhile, in 71 as stated by /ederal Aureau of Investigation 3/AI4 based on /AI

    Cybercrime statistic in collaboration with their agency Internet Crime Complaint

    Centre 3IC

    /AI-#elated scams &

  • 8/9/2019 CYBER CRIMES IN MALAYSIA AND U.S.A.: WHAT SHOULD WE DO IN MALAYSIA?

    12/17

    OUMH1203

    "mongst the figures it could be concluded that most of the cases related to online

    shopping where retailer who provide services did not get payback on their deals.

    /urther to this it also showed that several types of fraud e!ists in 71 environment.

    Aased on given figures above the fraud percentage most likely covered almost

  • 8/9/2019 CYBER CRIMES IN MALAYSIA AND U.S.A.: WHAT SHOULD WE DO IN MALAYSIA?

    13/17

    OUMH1203

    though the comparison given above was not fair due to few technical that should be

    considered. The comparison above only could be fair if6

    a. The total number of citi:en between country is the same

    b. The country development and IT infrastructure between each others are

    acceptable

    c. The knowledge and user)s awareness is on par

    F+4 10: C-4 C+4 N4 < /%646 2000 # 2010

    owever, it could be said that the total number of complaints increases constantly

    towards the number of years as showed by diagram above. /or 71 there is a slightly

    reduce in a few years shown in the graph. In year 00? it drop almost >E and rise

    back to increase in year 00@. In fact also in year 0&0 3

  • 8/9/2019 CYBER CRIMES IN MALAYSIA AND U.S.A.: WHAT SHOULD WE DO IN MALAYSIA?

    14/17

    OUMH1203

    /or *alaysia, the numbers of complaint also have a constant increasing starting from

    year 005 until now. There is a drop in year 00? where complaints reduce about

    '>.?E compare to 00> 3&?,?4. To summari:e this *alaysia has a highest

    complaint for cyber crime so far in 0&0 3,0'04 and the lowest were recorded in

    000 3?0

  • 8/9/2019 CYBER CRIMES IN MALAYSIA AND U.S.A.: WHAT SHOULD WE DO IN MALAYSIA?

    15/17

    OUMH1203

    provide them with guideline for defensive and a self-help measure for them to

    comply

    d. *alaysia government should provide an effective global system to deal with the

    cyber crime. The approach should be a multi faceted and multi pronged which

    combining both legally coercive and non legislative measures

    3. CONCLUSION

    Cyber crime is a persisting international concern that transcends national boundaries in a

    behavior that renders organi:ed crime as a global apprehension. "s known it may take

    several form of classification in which could provide adversity to personals, property and

    government.

    ;ither in *alaysia or in 71, cyber crime has adversely affected the economical growth

    for the country returns. In sense it also endows with challenge to government agency and

    public sector to have e!cellent methods practices to comply with. "nd in other hand it

    also create an awareness to community to prevent from being affected and involved to

    cyber crime.

    TOTAL COUNT # 25"5

    &>

  • 8/9/2019 CYBER CRIMES IN MALAYSIA AND U.S.A.: WHAT SHOULD WE DO IN MALAYSIA?

    16/17

    OUMH1203

    ATTACHMENT

    REFERENCES

    Computer Crime 8efinition H ikipedia.org. 3n.d.4. #etrieved October 0, 0&&,

    3http6FFen.wikipedia.orgFwikiFComputercrime4

    Cyber Crime 8efinition H 1earch1ecurity.com. 3n.d.4. #etrieved October 0, 0&&, from

    http6FFsearchsecurity.techtarget.comFdefinitionFcybercrime4

    Centre for Cybercrime 1tudies H Cycris.nl. 3n.d.4. #etrieved October , 0&&, from

    http6FFwww.cycris.nlFuploadsFCyCri1-versie05?-05&0?.pdf

    *DCert Incident 1tatistic 0&0. 3n.d.4. #etrieved ovember

  • 8/9/2019 CYBER CRIMES IN MALAYSIA AND U.S.A.: WHAT SHOULD WE DO IN MALAYSIA?

    17/17

    OUMH1203

    Cyber Crime Increased by &5 per cent in 0&0. 3n.d.4. #etrieved October 5, 0&&, from

    http6FFwww.themalaysianinsider.comFmalaysiaFarticleFcyber-crime-increased-by-&5pc-in-0&0F

    1camfraudalert Alog - /AI 0&0 Cybercrime 1tatistics. 3n.d.4. #etrieved October 0,

    0&&, from http6FFscamfraudalert.wordpress.comF0&&F0F5Ffbi-0&0-cybercrime-statisticsF

    Cyber Crime. 3n.d.4. #etrieved October 0, 0&0,http6FFwww.slideshare.netF#an+ana"dhikariFcyber-crime-'05

    Cyber Crime /ull #eport. 3n.d.4. #etrieved ovember &, 0&&, fromhttp6FFwww.seminarpro+ects.comFThread-cyber-crime-full-reportJpageK