1. ASSIGNMENT QUESTION
CYBER CRIMES IN MALAYSIA AND U.S.A.:
WHAT SHOULD WE DO IN MALAYSIA?
1. INTRODUCTION
- In pursuit modernity current now, Malaysia always expanding as a country that is developed
towards year 2020. For realise that Vision 2020, various efforts that has been undertaken by
government in pass over modernity current so Malaysia continue to developed rapidly
parallel with other developing country. Hence, use of modern technology played an important
part. So exist new generation known as cyber society.
Internet usage also unable run for achieve this goal. Malaysia itself generally had
appropriated budget that is large to build area of Multimedia Super Corridor (MSC) that high-
tech and rapid developing.Here there was various investments from within and overseas was
being conducted for economic development of the country. Hence, this world usage was very
important.
However, in achieving this desire, there are still a few society do not know or a lack
of knowledge related internet.Due to this technological sophistication and knowledge
constraint, many society that cheated in this cyber world bring about cybercrime that may not
be realized. Situation this difficult to be prevented because cybercrime carried out in world
which encompasses borderless world. However, the implication can in see in nature real. My
writing will discuss with much further related this issue.
According to KamusDewanBahasa Dan Pustaka (EdisiEmpat), crime bring act
meaning or evil (such as steal, rob, murder and others) with no beside law or wrongful act
(beside law) or kriminil act. As phrase example of use in sentence, police consider the matter
as a criminal act that is determined. While cyber meaning on the other hand is everything
related to internet. For example internet like giant market that discover buyers and sellers in
cyberspace.
Generally cybercrime may be classified as an act that is wrong or evil that carried out
through internet which is known as cyber world. Crime this very difficult dam and haunt the
authorities in eradicating this cybercrime.
There is no definition that right that can imagine cybercrime. Some parties give
definition “cybercrime” are referring to “computer crime”. This based on computer's capacity
capable of discharging conventional criminal activities such as fraud, theft, extortion, and
invasion which could cause adverse impact on individual property or organization.
According to Donn B. Parker, a researcher in computer crime and security to from
SRI International California, computer crime definable as any performance that have the
2. intention and associated with computer through any way and creating victim suffering or can
cause suffering, loss and continuously. This statement is supported by Department of
JusticeU.S.A which said that computer crime is any illegal activity use computer
technological knowledge as tool to realize.
2. CONTENT
2.1 Classifications Cybercrime
- All computer usage level is always encounter with crime activity. Whether as victim to
crime or equipment to crime or both. Input operation, data processing, output operation and
data communication was invoked closely for purpose that is unhealthy. Our cyber type of
crime that is usual listen and categorised as following:
1) Fraud
- Phishing namely impersonated legal website and consequently persuade victim clicks link
through which in turn e-mail will be bringing with consumer confidential information.
Usually Phishing carried out through email or short message and usually direct consumer to
pocket details in certain webpages, however telephone relationship also have been used
before. Phishing is social an example engineering technique that used to deceive consumer.
2) Damage or upper modification programme or computer data.
- Refering to software that designed to escape or damage computer system unauthorized
clearly from owners. This term often used by computer professional class as umbrella term to
code forms software that is able detrimental to computer without the consumer knowledge or
most do not upset that consumer privacy.
Most usual computer user still not used with that term and mostly never used. On the
other hand, computer virus term often used including in the media announce to reflect all pest
types of software, although not all malware is computer virus. Other term that were created
for pest software is malicious software (badware), the possibility due to anti-malicious
software.
Software regarded as based on malware based on inventor purpose presumption and
not based on certain characteristics. It including computer virus, computer worm, horse
Trojan, most rootkit, spyware (spyware), advertisement software (adware) cheating, and
malicious software and that unwanted other. Legal, pest software sometimes regarded as
computer pollution.
3. Information theft.
- In Internet, there were some unhealthy activity. Among them wasidentity theft incident. It
is crime which is done by certain parties where they steal personal data and later lodged
purchase by using other person's name.
3. Criminal involved may be solicited and receive credit card on other person's name, or
cheating identity by convince online seller that he is true owner something data. That seller
are going to sell the product and applied cost to others.
Incident this will be trouble you those involved and would be destroying reputation,
credit card record that is good and creating you facing financial problems that should not. We
understand that personal data theft incident not only occur in cyberspace,in fact in real life
also this incident happen.
4. By void access on system
- Computer intrusion was upper access computer system without state or imagine that
computer system owner's permission. Individual which involved with this activity known as
computer intruders and had powerful interests to break security system that there was in that
computer. Intruder can obtain by access control by using the computer in his own house or
office that connects to network telecommunication. Desire to get by void access upper
computer system may be obtained because some motive or purpose. Among them just
because curious, such as which done by hackers (computer intruders) until computer sabotage
or espionage.
By void access or without intention by individuals that were not allowed by owners or
system administrator will be brought before as crime behavior. By void access create
opportunity to produce in addition to data damages that unintended, data collision or valuable
information theft.
In the refractivity access can be implemented through control location during
telecommunication network because either between many reason. Intruder will probably
capable to cash in on from weakness of security system to get access or can get back channel
in security measure or procedure. Usually it also done by obtaining password to enter into
something system.
The usual password protection not a method that is safe to protect system from access
by individuals that were not allowed. This is because, in the refractivity, computer intruders
can overcome this protection easily him through one of three methodologies. If computer
intruders afford to get keyword access truth. Then, Trojan software Horse will be placed to
get other keyword for other users.
Usually this type software can operate continuously with security system that is
present and a bit hard to be detected. Eventually, computer intruders get software to get
keyword that had been stolen through control access. Third method that commonly used to
achieve system-is "trapdoor" where access that were not allowed reached through point
access, or trapdoor that created for particular purpose such as to keep something system.
5. Copy by void software.
- Piracy (or copyright violation) mean material utilisationprotege copyright law without
permission, so violate either natural owner exclusive right copyright, such as authority to
4. reissue or conduct work that in copyright, or produce works products that based on work that
in the copyright.
6. Get rich quick scheme
- Get rich quick scheme is a scheme where certain amount of money will be deposited or
invested to organizer of get rich quick scheme with promise and condition that deposit money
that will be returned back with interest or profit that promised for money that is deposited
usually higher from what offered by licensed finance institutions. There is various get rich
quick scheme type, among them is Skim pyramid and Skim Ponzi.
In Malaysia get rich quick scheme that is most famous is Pak Man Telo scheme. In
that scheme beginning, organiser used money deposit received from new depositor to pay
return or depositor capital predecessor. In the mass, get rich quick scheme organisers not
investing deposit received into investments or industry that cause profit that is same or
higher.
Due to this, they cannot continue to bear return payment that is high to investor that is
present. If no deposit recently accepted by organiser or this scheme cancelled, it would be
failing and investors or depositor will lost their money.
Between get rich quick scheme that there was in Malaysia is Pak Man Telo,
LabuPeram (around 1980 an), LinggamTelo (1990 Klang Valley), Skim 350 (1980 an Kulim,
Kedah), Platinum Lane SdnBhd (PLSB) (1991 Kulim Kedah), and Sri Emas Enterprise.
7. Hacker
- Hacker is one that create and modify computer software and hardware including computer
programming, administration and business related to security. This term usually carry strong
connotation, but may be good or bad depend on to cultural context.
In computer programming, hacker was a programmer that hack or achieving goals by
use one modification serial to exploit or extend code or source. Hacker was the person which
specialises in work related computer systems security mechanism and network. Even though
it including those try to strengthen that mechanisms, it more often used, are mainly in mass
media, to consult to those are trying to get in pass that mechanisms.
In fields different techniques, hacker also meant people which made things function
outside limit shows through their technical skill such as hardware hacker or reality hacker. In
hacker culture, hacker is one that has attained certain social status and known among that
cultural expert for his commitment on cultural value and technical know-how certain amount.
8. Virus transmission
- Computer virus was the name that taken from biological virus, is computer program that
able copy himself and infecting computer unauthorized or consumer knowledge. However the
simple virus word used to refer to various pest types of software that is different. Virus
original may be modifying the copy or copy itself that modify himself, as in metamorphic
virus. Virus only diffusible when the host reach to different computer, for example through
network or portable intermediary such as floppy disk, compact disc or flash drive USB. Apart
5. from that, virus also could be spread by infect file in network file system or any filing system
that achieved different computer.
Some virus designed to be affected computer by damage program, wipe out file, or
formatting again hard disk, while viruses that is other designed not to damages any, but only
to change self and perhaps to push the existence through text broadcasting, video, or audio
message. Although virus that is second harmless, it also can cause a problem to computer
user because it swallowing computer memory that used by program that is legal. Due to this,
it often causing action that uncertain and could result in system failure. Apart from that, many
virus also contains bug which could cause system failure and loss of data.
The occasionally computer virus confounded with computer worm and Trojan. Both
this differ with respect to that computer worm could be spread to different computers without
need evacuate as part of host file, while Trojan is file that seemingly harmless until
implemented. Contrasts with virus, Trojan also excludes the code into computer files that is
other.
Most personal computer currently connected with internet and local area network
thereby, facilitate virus transmission. It cash in on that administered by network service such
as World Wide Web's systems, e-mail, and file sharing to spread thereby, obscure difference
between virus with computer worm. Furthermore, some resources use terminology alternative
that define virus as any form self reproduction malicious software.
2.2 Compares Cybercrime in Malaysia and USA
- As much as 8,090 criminal case cyber reported in this country in two months time this year
compared 3,064 cases during last year. CyberSecurity Malaysia chairman, Jeneral (B) Datuk
Seri Mohd. Azumi Mohamed said, increase more 100% very worrying and it could be
generating new threat on otherwise national security dam. He stresses, among the causes that
increase is consumer attitude that not considerate on current security surfing Internet.
“We will increase awareness campaign in ensuring cyber security so that public and
student unexposed to danger when surfing Internet,” he said in Perak Wifi launching
ceremony and KarnivalSiber 2011 by MenteriBesar, Datuk Seri Dr. ZambryAbd. Kadir here,
today.
Also present Perak Chief Executive Officer, Dr. Ahmad KamilMahmood.
Mohd.Azumi said, as agency that accountable for in matters related cyber security,
CyberSecurity take seriously that development and drafting specific plan to handle.
He said, most people unconscious they are exposed to cyber threat including attack by
hacker, virus threat and password stolen when surfing Internet.
In accordance with that , he ask consumer so that more cautious and be careful to
avoid their personal information invaded when using Internet.
(Utusan Online - domestic, April 2, 2011)
6. Computer security firm, Symantec report about two-thirds from Internet users in the
world become cyber crime victim. According to cybercrime survey report Norton, consumer
in China occupying highest position become victims when 83% users attacked computer
virus, credit card forgery, identity fraud and various other criminal on the Internet. Brazil and
India occupying second position with 76%, while United States on the other hand record 73%
crime victim cyber in third grade.
Although feeling cheated victim and angry, however they hesitate to take up action
because consider the effort would not be fruitful, report Norton consumer unit.
Hard cybercrime reported because sometimes police found case involved has no solid
proof. Deliberately cyber criminal steal in total that a little to avoid being detected , said
Adam Palmer, cyber security adviser chief, Norton. If you failed to report, you may be
protecting cyber criminal continue doing things them , said Palmer more.
According to associate professor in Loyola Marymount university, Joseph LaBrie on
the other hand, lack of awareness on cybercrime among Internet users caused it getting
rampant. The state same when you do not know much matter on your car will be submitting
all matter to mechanics if your vehicle break down , said LaBrie.
Research showed most consumers think downloading song or film on the Internet
without making any payment is not wrong. About 24% from research findings on the other
hand state read secretly other people e-mail also not a crime. (Harian Metro, September 9,
2010)
Generally cyber criminal is knowledgeable or professional group. Perhaps our friend,
might be students, may be professor or whoever. They will commit crime on their own party
or competitor or they waged by certain parties for example. Business organization may
become the competitor target, employee or former employee. Bank and financial institution
by robber and professional criminal.While, university become student target or former
student. Government agency on the other hand may become terrorist victim and computer
may be sabotaged. If people that commit crime not in get to know law that in framework to
prevent would not be meaningful.
In America that sophisticated the technology also fail to track event mastermind
September 11. During event September 11 2001, 19 aircraft hijackers enter the United States
of America by using visa that is legal. Apart from personally , they relating over Internet or
making phone calls by using prepaid card to draw attack on New York and Washington.
2.3 Recommendations Prevent Cybercrime
- By right, all parties played an important part in overcoming this problem. Apart from the
authorities, member of the community also played role in giving information, awareness and
also lesson to teenagers on risk and also danger cyber world. Parents, teacher and the school
should also played important role in oversee their children or their student which carried out
7. activity on-line and their behaviour. There is various computer software that staying in
market can be used to check and oversee activities that is potential appear danger to
teenagers. This including limit access on content characterized by porn graphic, and limit
their period staying on-line.
Psychological approach such as youth guidance program such as motivation
programme, awareness programme, individual development programme, healthy youth
programme without aids (Prostar) was held and can help teenagers in overcoming crime
problem and social problem. Apart from that with crime prevention club establishment in
school nationwide, is hoped able to decrease teenagers involvement such as school student in
criminal activity such as damage property, bully, gambling and so on.
Government has enacted various laws to protect society especially society young
members such as teenagers from social problem and also crime related cyber world, such as
JenayahKomputer Act 1997, Tandatangan Digital Act 1997, Komunikasi Act and Multimedia
1998 and present law which allocates normal criminal offence and sentence for her such as
penal code, law which allocates protection to users, PerlindunganPengguna Act 1998,
Perlindungan Data Peribadi Act (still deep legislation), and Telekomunikasi Act and Hakcipta
Act.
With Act legislation KanakKanak 2001 and PencegahanPemerdaganganManusia Act
2008, can set aside protection that is sufficiently to children and youth from
commercialization children, pornography, pornographic, incest barrier, and sexual
exploitation. In overcoming pornographic dumping materials, danger and immoral that occur
in internet, a law that is strict need to be created to inflict punishment that heavier to internet
service provider for example so that more responsible with what displayed in websites.
3. Conclusion
- In world borderless, attack could be done the thousands of miles away or from people that
beside we and very unlucky we difficult to recognize who are they and from where they
attack us. However we have to take move to protect our own computer system. Complete
ourselves with knowledge on computer and perhaps we can protect our computer system with
software that there is in market such as anti-virus, firewall, pop-up blocker, anti- spyware and
anything security software that is other.
In conclusion, technology nowadays increasingly sophisticated, but at the same time
there was also the lack, namely cybercrime also increasingly sophisticated. Most cyber
criminal could not be caught because difficult to be traced. As such, we should cautious at
every time . Save something for a rainy day, we should protect our computer system with
software that is best and be careful while using internet network .