Wednesday, December 16, 2009

POSTER





Title: Elements of cyber crimes

Size: A4 portraits and landscape

Description: Reason I'm choosing cyber crime is because it relate with my previous topic in my blog...Most of my topic are showing about what is a type of cyber crime...From the poster it shows about element of cyber crime like fraud, spam, phishing, cyberstalking and hacker... All the definition has been explain in my previous blog...It also shows someone who is trying to do a crime with his computer with a annoying expression...With a picture below to support my poster about cyber crime for those who not familiar with it...As we know cyber crime is a illegal thing to do, please avoid it before being caught...

Tutorial exercise

a. Linda was stunned in front of her PC when she received an electronic mail, in a chain of senders and receivers, telling bad things about herself, her crazy shopping habits, her domestic problems and her involvement in superstitions activities with a bomoh (magician) allegedly for gaining her more wealth and fortunes. She is now thinking to pursue legal actions for this unfavorable email against her. With reference to the above case, explain the meaning of online defamation, and discuss the legal remedies available for Linda.

**Online defamation is a person express words that may lower another person's reputation in the eyes of public. Online defamation can be classified in to two which are libel and slander. Libel occur when such word are expressed in a permanent form which is usually visible to the eye, like in a book, email or picture and slander is when such words are expressed in a temporary form, usually when spoken or made by body movements.

What are the laws governing defamation?

In civil cases of defamation, when a private person sues another private person for defamation, the Defamation Act 1957 is applicable.

In criminal cases of defamation, when the state prosecutes a private person for defamation, Section 499 to Section 502 of the Penal Code is applicable.

In the Linda's case, if the person who did this crime to her found guilty, he or she may be sued in court, and also face jail sentence.


b. Tommy, a Multimedia student at MMU, was caught by University authority after it was found that he had cracked the University's information system, defaced the front page of University's office website and stolen a buck of confidential data regarding student's academic records. It was also discovered that he had attempted to break several lecturers' computer system but without avail. On the investigation he said that all his action was just for fun exploring the system's weaknesses and without any criminal intention. In this case, advise the University regarding Tommy's liabilities arising from his actions with reference to the law of computer crimes in Malaysia.

**
THE COMPUTER CRIMES ACT 1997
The Act aims to provide for offenses relating to the misuse of computers . Amongst other things, it deals with unauthorized access to computer material, unauthorized access with intent to commit other offenses and unauthorized modification of computer contents. It also makes provisions to facilitate investigations for the enforcement of the Act. The Act criminalizes some acts and provides for punishment as follows :

Offenses:
Unauthorized access to computer material
Penalty:
Fine not exceeding RM50,000 or imprisonment not exceeding 5 years or both

Offence:
Unauthorized access with intent to commit or facilitate commission of further offense
Penalty:
Fine not exceeding RM150,000 or imprisonment not exceeding 10 years or both

Offenses:
Unauthorized modification of the contents of any computer
Penalty:
(a) Find not exceeding RM100,000 or imprisonment not exceeding 7 years or both
(b) Find not exceeding RM150,000 or imprisonment not exceeding 10 years or both if the act done is with intention of causing injury as defined in the Penal Code.

Offenses:
Wrongful Communication
Penalty:
Fine not exceeding RM25,000 or imprisonment not exceeding 3 years or both.

Offenses:
Abetments and attempts
Penalty:
Fine to be as for the principal offense but imprisonment not to exceed one half of the maximum term for the principal offense.

In Tommy's case, he had cracked the University's information system and this has put him guilty because unauthorized access to computer material and he can be fine not exceeding RM50,000 or imprisonment not exceeding 5 years or both.

Next, he also has defaced the front page of University's official website and stolen a student's data. With this, he can be charge of unauthorized modification of the contents of any computer and can be fine not exceeding RM100,000 or imprisonment not exceeding 7 years or both or find not exceeding RM150,000 or imprisonment not exceeding 10 years or both if the act done is with intention of causing injury as defined in the Penal Code.

HACKER


From searchsecurity.techtarget.com, it said that Hacker is term used by some to mean "a clever programmer" and by others, especially those in popular media, to mean "someone who tries to break into computer system."

There are possible characteristics that qualify as a hacker which are like

- A person who enjoys learning details of a programming language or system
- A person who enjoys actually doing the programming rather than just theorizing about it
- A person capable of appriating someone else hacking
- A person who picks up programming quickly
- A person who is an expert at a particular programming language or system, as in "Unix Hacker"

There is few ways to prevent this problem to be happen, this are taken from www.detroiteronline.com

1. Implement a firewall -- A firewall is a barrier that keeps hackers and viruses out of computer networks. Firewalls intercept network traffic and allow only authorized data to pass through.

2. Develop a corporate security policy -- Establish a corporate security policy that details practices to secure the network. The policy should direct employees to choose unique passwords that are a combination of letters and numbers. Passwords should be changed every 90 days to limit hackers' ability to gain possession of a functioning password. When someone leaves company, immediately delete the user name and password. The corporate policy should outline consequences for network tampering and unauthorized entry.

3. Install anti-virus software -- All computers should run the most recent version of an anti-virus protection subscription. Ideally a server should be configured to push virus updates out periodically to all client systems. Employees should be educated about viruses and discouraged from opening e-mail attachments or e-mail from unknown senders.

4. Keep operating systems up to date -- Upgrade operating systems frequently and regularly install the latest patches or versions of software, which are often free over the Web. If you use Microsoft Windows, check www.windowsupdate.com periodically for the latest patches.

5. Don't run unnecessary network services -- When installing systems, any non-essential features should be disabled. If a feature is installed but not actively used, it is less likely to be updated regularly, presenting a larger security threat. Also, allow only the software employees need to do their job effectively.

6. Conduct a vulnerability test -- Conducting a vulnerability test is a cost-effective way to evaluate the current security program. This test highlights flaws and limitations in the program, and experts can offer suggestions for improvement. The best method for conducting a vulnerability test is to contact a computer consulting company and provide access to your system for a day or two. This will provide ample time for network appraisal and follow-up discussion and planning.

7. Keep informed about network security -- Numerous books, magazines and online resources offer information about effective security tools and "lessons learned." Also, the Web provides ample and very current information about security - type in the key words "network security."

FRAUD


What does fraud mean?

According to the Oxford Advanced Learner’s Dictionary, it is the crime of deceiving somebody in order to get money or goods illegally. It also refers to a person who pretends to have qualities or abilities that he does not really have, in order to deceive other people. At times, it refers to something that is not as good or useful as claimed.

In commercial transactions, fraud vitiates what would otherwise be a valid and enforceable contract. This involves considerations relating to burden of proof which would be better understood in the context of a real-life situation.

This definition of fraud is taken from www.thestar.com.my

**
There are many kinds of fraud that can be found, example like insurance fraud, affinity fraud, wire fraud, intrinsic fraud, affiliate fraud, constructive fraud, consumer fraud or credit card fraud...

Civil fraud is misrepresentation of a material fact which unlawfully causes damage. In some situations it can be the failure to disclose a fact (an omission) which the law requires to be disclosed. Civil fraud is divided into statutory violations (e.g. federal or state securities fraud) and common law violations (fraud, misrepresentation, and deceit). It overlaps other areas of civil law such as consumer protection, investor protection, and business regulation. Criminal fraud is theft or embezzlement in violation of a specific statute. (edirectory.business.com.my)

Tuesday, December 15, 2009

Drug trafficking news

Saturday December 5, 2009
Four drug trafficking rings crippled, say police

KUALA LUMPUR: Police believe they have crippled four drug trafficking syndicates in the Klang Valley with the arrest of six men including a foreigner and two women.

They were detained in four separate raids recently and drugs worth about RM155,000 were seized from them.

City Narcotics chief Asst Comm Kang Chez Chiang said one of those arrested was a man who allegedly tried to give the policemen a RM15,000 bribe for the release of his gang member.

“We pretended to agree to his offer and lured him to a restaurant at Jalan Bukit Bintang before arresting him,” he told a press conference at city police headquarters yesterday.

He added the man has been handed over to the Malaysian Anti-Corruption Commission for investigations.

In another case, police found RM21,540 cash along with 1,320g of ketamine and syabu when they raided two condominiums at Kuchai Entrepreneurs Park, Kuchai Lama at 12.30pm last Thursday.

“We believe the group had been a condominium as a packaging centre as we found weighing tools and small plastic bags,” he said.

Article above are taken from www.thestar.com.my


**
As I mentioned from the last blog, drugs trafficking are one of the criminal crime...
I just want to share with others about one of the example of the criminal crime which also happen in Malaysia...

And of course there will be a law regarding this matter, which it is state under 'Dangerous Drugs Act 1952' or for further info can click at this link http://www.pharmacy.gov.my/html/publications/new_government_gazette/gazette228.htm...

Same with any other criminal case, person who found guilty will be put on probation, sent to prison, be ordered to pay a fine,capital punishment or death penalty...

So, please stay away from drugs...!!!

If anyone interested to read a funny story about drugs trafficking...here is the link that i suggest which I read it from others blog....http://www.alexallied.com/what-the/drug-trafficking-in-malaysia

CCTV towards crime...


Dec 15, 2009
496 CCTVs to be installed in high crime rate districts

LUMUT: A total of 496 closed circuit television (CCTV) cameras will be installed in 25 crime-prone districts in the country, Housing and Local Government Minister Datuk Seri Kong Cho Ha said.

Kong said the cameras would be installed as soon as the Finance Ministry appoints the contractor.

“The submission of tenders for the installation project had just ended. We are now waiting for the Finance Ministry to hire the contractor and work will begin as soon as possible,” he told reporters here yesterday.

Among the districts that will have CCTV cameras are Langkawi, Ipoh, Seri Manjung and Port Dickson.

He said the relevant local councils and district police had also identified various crime hotspots.

On another matter, Kong said the RM20mil incinerator on Pangkor Island would be operational in March 2010.

Construction of the incinerator, which began in 2008, was now 80% complete, he said, adding that it was capable of handling up to 22 tonnes of garbage daily.

The new incinerator was built to replace an old one that had not been functioning for several years.

Kong also said that four other incinerators in Cameron Highlands, Langkawi, Labuan and Tioman, are also nearing completion.

Article above is taken from www.starproperty.my

**
As the crime scene in Malaysia has increase and never stop, I 100% agree with the article above which is the government plan to install more CCTV... Even though by placing CCTV can't stop the criminal, at least police, government or any responsible parties can detect or recognize the person who did the criminal or the victim so that they can't get away from punishment...

With help of the CCTV, criminal can be prevent more effective and law for criminal can be applied...

Example of criminal case that can be involve are like murder, drug trafficking and robbery... In criminal case, action is taken by either the state, federal or local government against an individual or organization for the violation... A person who is found guilty can be put on probation, sent to prison or be ordered to pay a fine, be punish or death penalty... All this punishment has be implement to prevent such persons and others from acting in the same illegal manner in the future...

Monday, December 14, 2009

Law & Government

Federal Constitution of Malaysia is the supreme law of Malaysia... The 1957 Constitution of the Federation of Malaya is the basis of this document... It established Malaysia as a constitutional monarchy having the Yang di-Pertuan Agong as the head of State whose roles are largely ceremonial...
It provides for the establishment and the organization of three main branches of the government which are

- The bicameral legislative branch called the Parliament, which consists of the House of Representatives and the Senate. It makes law applicable to the Federation as a whole. Parliament passes federal laws, make amendments, examines the government's policies, approve government expenditures and approves new tax.

- The executive branch led by the Prime Minister and consists of Cabinet Minister. It implement the law.

- The judicial branch headed by the Federal Court. They hear civil disputes, criminal case or other that is type of proceeding as prescribed by the constitution.

;;