Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 25

Lecture 12

October 23rd, 2012

Ethics, Cyber Laws


& Cyber Crime

Dr. Lee Kuok Tiung


lee@ums.edu.my
Introductions
 Ethics – a set of moral principles or values.
 ICT ethics - Moral principles or guidelines that govern
practices associated with the use of information and
information systems. In this study students need to
consider the moral standards or ethics applied when
creating electronic publications, when storing,
communicating and disposing of data and information.
 Cyber crime - computer is hottest crime tool.
 Losses through cyber crime – over $110 billion worldwide
in 2004
 Abuse of Internet and computer – hacker or hooligan
 Corporate espionage - - $70 million range of proprietary
information
3 Questions
1. What is the role of social media in
social/political change?
2. If social media is so important, why should not
governments simply cut it in times of crisis?
3. What happens if you cut communications?
By(from):
Professor Dr. Ang Peng Hwa
Director, Singapore Internet Research Centre,
Wee Kim Wee School of Communication and Information,
Nanyang Technological University.
MENTION 2011 Conference. 11-12 October 2011

]
Continues ….
Malaysia’s strategy for moving into the
Information Age was announced in 1996
 ICT-related activities would be at the core of
the new engine of growth.
 A number of cyber-laws were proposed. The
Malaysian Communications and Multimedia
Act 1998 (CMA 98) was a key legislation to
facilitate the growth of convergence
activities.
What is “CYBER”
 No standard definition.
 Used to describe the virtual world of computers e.g. an
object in cyberspace refers to a block of data floating
around a computer system or network.
 The word "cyberspace" is credited to William Gibson, who
used it in his book, Neuromancer, written in 1984.
(source http://www.sharpened.net)
 cyberspace: The impression of space and community
formed by computers, computer networks, and their users;
the virtual "world" that Internet users inhabit when they are
online.
(source : http://www.atis.org/tg2k/_cyberspace.html)
What is “Cyber crime”?
 “Crime committed over the Internet” – The Oxford
Reference Online
 “Crime as any crime that is committed by means of
special knowledge or expert use of computer
technology” - The Encyclopedia Britannica
 “Any illegal act involving a computer, its systems, or
its applications” - Kelly R. Burke, District Attorney,
Houston Judicial Circuit
 “Any illegal act committed using a computer network
(especially the Internet)” – Debra Littlejohn Shinder,
MCSE.
 Any crime committed through the computer networks
using software, application, network service and know
how – Ashwar Aziz LL.B
Types of Cyber Crime
 Network unauthorized access & penetration
 Theft of proprietary information
 Financial fraud using computers, internet
 Sabotage of data or networks
 Disruption of network
 Creation and distribution of computer viruses
 Software, intellectual property piracy
 Identity theft
 Terrorism
CYBERLAW
“…REFERS TO ALL THE LEGAL AND
REGULATORY ASPECTS OF Internet and
the World Wide Web. Anything concerned
with or related to or emanating from any
legal aspects or issues concerning any
activity of netizens in and concerning
Cyberspace comes within the ambit of
Cyberlaw.”
Continues ….
OBJECTIVES
 To provide a comprehensive framework of societal
and commerce - enabling laws which encompass
aspects concerning security of information and
network integrity and reliability
 To create the right development of the
communication and multimedia industry and to
position Malaysia as a major hub for the
communications and multimedia information and
content services
MALAYSIA’S ICT LEGAL FRAMEWORK
The The Computer The
Telemedicine Crimes Act 1997 Communication
Act 1997 and Multimedia
Act (1998)

The Copyright MALAYSIAN Digital


(Amendment) Act Signature Act 1997
1997 CYBERLAWS

The Electronic The Electronic Personal Data


Transactions Government Protection
legislation (ETA) Activities Legislation
legislation (EGA)
THE NEED FOR CYBER LAWS

 Existing laws do not always sufficiently


cover new multimedia applications
 Uncertainty about legal framework stifles
development of business and hinders the
development of Malaysia as a knowledge-
based society and knowledge-based
economy.
Existing Cyber Laws Purpose
The Computer Crimes Act 1997 Covers offences relating to misuse
(01/06/2000) of computers

The Copyright (Amendment) Act Scope of Copyright protection


1997 widened to cover communications
to public through wire or wireless
means
The Telemedicine Act 1997 To facilitate the practice of
Telemedicine

Digital Signature Act 1997 To regulate the use of Digital


(01/10/1998) signatures and provide its legal
status for electronic transactions
The Communications & To regulate and facilitate the
Multimedia Act 1998 development of converging
(01/04/1999) communications and multimedia
industry.
MALAYSIAN TECHNOLOGY/ COMPUTER
CRIME CASES
 E-Mail Abuse (Malicious/ False/
Harassment/ Impersonation)
 Hacking/ Cracking. Identity Theft.

 Forgery of Valuable Documents (Currency/


Cheques/ Passports/ I.D.s
 E-commerce Cheating

 Telecommunication Line Theft


Categories of Computer Crime
 Computer assisted crime
 Computer specific or targeted crime

 Computer is incidental

e.g. Equity funding


414 Gang
Kevin Mitnick
The Cuckoo’s Egg
Today’s Cyber-crime
 Serious Criminals
• More organized
• Possibly socially isolated
• Knowledgeable
• Increasing use by Organized Crime

 Motivation
• Greed
• Revenge
• Ego

 Method
• Can strike from ANYWHERE
• Information only commodity that can be stolen without being
taken!
TREND- New Millenium
 The new millennium has created big challenges to
enforcement agencies whereby the modus of operation
(M.O) has become more sophisticated.

 Evolution of transnational crime in a globalize world:


- Crime committed through internet
- Cyber terrorism
- Money laundering
- Hacking skills being combined with criminal intent
(Syndicates)
- Economic sabotage
MCMC Cyber Crime Enforcement
 2005 – 13 cases investigated
–Web defacement
–Websites containing offering illegal
activities & obscene materials
–Web blogs containing annoying comments
– Emails abuse
–Service, network hacking
Nature & Characteristics of Cyber Crime
 Anonymous
 Enormous range

 Occurs at high velocity

 Cross border

 Multi threats and impact – economic, social,


religious, racial, terrorism
 Technology oriented

 Age group – 16 – 40 years old


THE EXTENT OF CRIMINAL ACTIVITIES
ON CYBER CRIME
1. Downloading/ Distribution of child/ adult pornography
2. The spreading or incitement of hate propaganda/ seditious matters
3. Pyramid/ Book making schemes
4. On-line gambling/ betting.
5. Credit Card/ E-Commerce Fraud.
6. Advance fee fraud
7. Evasion of sales tax
8. Extortion and information theft/ warfare
9. Cyber attack of key industries/ installations
10.Hacking/ illegal intrusions
11. Spreading of viruses/ worms/ mailbombs, now botnets
12. Spamming.
13.Online money laundering
WHY?
 Just for fun ! Suka-suka !!
 Test of skills

 Anonymity

 Nature of internet – fast and immediate

 Easy money

 Trans-border
Benefits of enacting cyber laws
 Business can operate within framework that
specifies the legal status of digital transactions
and property rights and minimize conflict
 Consumer obtain protection against new types of
infringements of their consumer and privacy rights,
and thus build the necessary trust to use new
applications
 Government can maintain the necessary amount
of control over “cyberspace” to ensure that public
interest objectives are met and that cyber crime is
minimized.
FUTURE CHALLENGES
 Hacking skills being combined with criminal intent
(Syndicates) such as website sabotage/ database
‘kidnapping’ or even cyber-terrorism. Eg. Botnets
 E-Banking Fraud, on a more wider and systematic
scale. Attack on E-commerce websites.
 Telecommunication line theft.
 Criminals linked via networks, worldwide. Eg.
Cryptography
 Wi-Fi implementation. Identification issue.
 3G (next 3.5G) digital telephone technology The wider
and more rapid online distribution of illegal material .
 Phone Viruses: Lasco.A, Cabir.H etc.
CONCLUSION
 Threats of cyber crime is left unchecked will
be disastrous on the nation, society,
economy and security.
 It is the collective responsibility of all to
ensure that technology is not abused.
 Be a disciplined user.
Case Study
 Negarakuku 我爱我的国家 by
NAMEWEE - www.namewee.com
Isu
 Bidang kuasa statut Malaysia
tertakhluk dalam Malaysia sahaja.
 Lagu Negaraku di duplicate dari
lagu “Mamula Moon”

You might also like