Wednesday, December 16, 2009

POSTER





Title: Elements of cyber crimes

Size: A4 portraits and landscape

Description: Reason I'm choosing cyber crime is because it relate with my previous topic in my blog...Most of my topic are showing about what is a type of cyber crime...From the poster it shows about element of cyber crime like fraud, spam, phishing, cyberstalking and hacker... All the definition has been explain in my previous blog...It also shows someone who is trying to do a crime with his computer with a annoying expression...With a picture below to support my poster about cyber crime for those who not familiar with it...As we know cyber crime is a illegal thing to do, please avoid it before being caught...

Tutorial exercise

a. Linda was stunned in front of her PC when she received an electronic mail, in a chain of senders and receivers, telling bad things about herself, her crazy shopping habits, her domestic problems and her involvement in superstitions activities with a bomoh (magician) allegedly for gaining her more wealth and fortunes. She is now thinking to pursue legal actions for this unfavorable email against her. With reference to the above case, explain the meaning of online defamation, and discuss the legal remedies available for Linda.

**Online defamation is a person express words that may lower another person's reputation in the eyes of public. Online defamation can be classified in to two which are libel and slander. Libel occur when such word are expressed in a permanent form which is usually visible to the eye, like in a book, email or picture and slander is when such words are expressed in a temporary form, usually when spoken or made by body movements.

What are the laws governing defamation?

In civil cases of defamation, when a private person sues another private person for defamation, the Defamation Act 1957 is applicable.

In criminal cases of defamation, when the state prosecutes a private person for defamation, Section 499 to Section 502 of the Penal Code is applicable.

In the Linda's case, if the person who did this crime to her found guilty, he or she may be sued in court, and also face jail sentence.


b. Tommy, a Multimedia student at MMU, was caught by University authority after it was found that he had cracked the University's information system, defaced the front page of University's office website and stolen a buck of confidential data regarding student's academic records. It was also discovered that he had attempted to break several lecturers' computer system but without avail. On the investigation he said that all his action was just for fun exploring the system's weaknesses and without any criminal intention. In this case, advise the University regarding Tommy's liabilities arising from his actions with reference to the law of computer crimes in Malaysia.

**
THE COMPUTER CRIMES ACT 1997
The Act aims to provide for offenses relating to the misuse of computers . Amongst other things, it deals with unauthorized access to computer material, unauthorized access with intent to commit other offenses and unauthorized modification of computer contents. It also makes provisions to facilitate investigations for the enforcement of the Act. The Act criminalizes some acts and provides for punishment as follows :

Offenses:
Unauthorized access to computer material
Penalty:
Fine not exceeding RM50,000 or imprisonment not exceeding 5 years or both

Offence:
Unauthorized access with intent to commit or facilitate commission of further offense
Penalty:
Fine not exceeding RM150,000 or imprisonment not exceeding 10 years or both

Offenses:
Unauthorized modification of the contents of any computer
Penalty:
(a) Find not exceeding RM100,000 or imprisonment not exceeding 7 years or both
(b) Find not exceeding RM150,000 or imprisonment not exceeding 10 years or both if the act done is with intention of causing injury as defined in the Penal Code.

Offenses:
Wrongful Communication
Penalty:
Fine not exceeding RM25,000 or imprisonment not exceeding 3 years or both.

Offenses:
Abetments and attempts
Penalty:
Fine to be as for the principal offense but imprisonment not to exceed one half of the maximum term for the principal offense.

In Tommy's case, he had cracked the University's information system and this has put him guilty because unauthorized access to computer material and he can be fine not exceeding RM50,000 or imprisonment not exceeding 5 years or both.

Next, he also has defaced the front page of University's official website and stolen a student's data. With this, he can be charge of unauthorized modification of the contents of any computer and can be fine not exceeding RM100,000 or imprisonment not exceeding 7 years or both or find not exceeding RM150,000 or imprisonment not exceeding 10 years or both if the act done is with intention of causing injury as defined in the Penal Code.

HACKER


From searchsecurity.techtarget.com, it said that Hacker is term used by some to mean "a clever programmer" and by others, especially those in popular media, to mean "someone who tries to break into computer system."

There are possible characteristics that qualify as a hacker which are like

- A person who enjoys learning details of a programming language or system
- A person who enjoys actually doing the programming rather than just theorizing about it
- A person capable of appriating someone else hacking
- A person who picks up programming quickly
- A person who is an expert at a particular programming language or system, as in "Unix Hacker"

There is few ways to prevent this problem to be happen, this are taken from www.detroiteronline.com

1. Implement a firewall -- A firewall is a barrier that keeps hackers and viruses out of computer networks. Firewalls intercept network traffic and allow only authorized data to pass through.

2. Develop a corporate security policy -- Establish a corporate security policy that details practices to secure the network. The policy should direct employees to choose unique passwords that are a combination of letters and numbers. Passwords should be changed every 90 days to limit hackers' ability to gain possession of a functioning password. When someone leaves company, immediately delete the user name and password. The corporate policy should outline consequences for network tampering and unauthorized entry.

3. Install anti-virus software -- All computers should run the most recent version of an anti-virus protection subscription. Ideally a server should be configured to push virus updates out periodically to all client systems. Employees should be educated about viruses and discouraged from opening e-mail attachments or e-mail from unknown senders.

4. Keep operating systems up to date -- Upgrade operating systems frequently and regularly install the latest patches or versions of software, which are often free over the Web. If you use Microsoft Windows, check www.windowsupdate.com periodically for the latest patches.

5. Don't run unnecessary network services -- When installing systems, any non-essential features should be disabled. If a feature is installed but not actively used, it is less likely to be updated regularly, presenting a larger security threat. Also, allow only the software employees need to do their job effectively.

6. Conduct a vulnerability test -- Conducting a vulnerability test is a cost-effective way to evaluate the current security program. This test highlights flaws and limitations in the program, and experts can offer suggestions for improvement. The best method for conducting a vulnerability test is to contact a computer consulting company and provide access to your system for a day or two. This will provide ample time for network appraisal and follow-up discussion and planning.

7. Keep informed about network security -- Numerous books, magazines and online resources offer information about effective security tools and "lessons learned." Also, the Web provides ample and very current information about security - type in the key words "network security."

FRAUD


What does fraud mean?

According to the Oxford Advanced Learner’s Dictionary, it is the crime of deceiving somebody in order to get money or goods illegally. It also refers to a person who pretends to have qualities or abilities that he does not really have, in order to deceive other people. At times, it refers to something that is not as good or useful as claimed.

In commercial transactions, fraud vitiates what would otherwise be a valid and enforceable contract. This involves considerations relating to burden of proof which would be better understood in the context of a real-life situation.

This definition of fraud is taken from www.thestar.com.my

**
There are many kinds of fraud that can be found, example like insurance fraud, affinity fraud, wire fraud, intrinsic fraud, affiliate fraud, constructive fraud, consumer fraud or credit card fraud...

Civil fraud is misrepresentation of a material fact which unlawfully causes damage. In some situations it can be the failure to disclose a fact (an omission) which the law requires to be disclosed. Civil fraud is divided into statutory violations (e.g. federal or state securities fraud) and common law violations (fraud, misrepresentation, and deceit). It overlaps other areas of civil law such as consumer protection, investor protection, and business regulation. Criminal fraud is theft or embezzlement in violation of a specific statute. (edirectory.business.com.my)

Tuesday, December 15, 2009

Drug trafficking news

Saturday December 5, 2009
Four drug trafficking rings crippled, say police

KUALA LUMPUR: Police believe they have crippled four drug trafficking syndicates in the Klang Valley with the arrest of six men including a foreigner and two women.

They were detained in four separate raids recently and drugs worth about RM155,000 were seized from them.

City Narcotics chief Asst Comm Kang Chez Chiang said one of those arrested was a man who allegedly tried to give the policemen a RM15,000 bribe for the release of his gang member.

“We pretended to agree to his offer and lured him to a restaurant at Jalan Bukit Bintang before arresting him,” he told a press conference at city police headquarters yesterday.

He added the man has been handed over to the Malaysian Anti-Corruption Commission for investigations.

In another case, police found RM21,540 cash along with 1,320g of ketamine and syabu when they raided two condominiums at Kuchai Entrepreneurs Park, Kuchai Lama at 12.30pm last Thursday.

“We believe the group had been a condominium as a packaging centre as we found weighing tools and small plastic bags,” he said.

Article above are taken from www.thestar.com.my


**
As I mentioned from the last blog, drugs trafficking are one of the criminal crime...
I just want to share with others about one of the example of the criminal crime which also happen in Malaysia...

And of course there will be a law regarding this matter, which it is state under 'Dangerous Drugs Act 1952' or for further info can click at this link http://www.pharmacy.gov.my/html/publications/new_government_gazette/gazette228.htm...

Same with any other criminal case, person who found guilty will be put on probation, sent to prison, be ordered to pay a fine,capital punishment or death penalty...

So, please stay away from drugs...!!!

If anyone interested to read a funny story about drugs trafficking...here is the link that i suggest which I read it from others blog....http://www.alexallied.com/what-the/drug-trafficking-in-malaysia

CCTV towards crime...


Dec 15, 2009
496 CCTVs to be installed in high crime rate districts

LUMUT: A total of 496 closed circuit television (CCTV) cameras will be installed in 25 crime-prone districts in the country, Housing and Local Government Minister Datuk Seri Kong Cho Ha said.

Kong said the cameras would be installed as soon as the Finance Ministry appoints the contractor.

“The submission of tenders for the installation project had just ended. We are now waiting for the Finance Ministry to hire the contractor and work will begin as soon as possible,” he told reporters here yesterday.

Among the districts that will have CCTV cameras are Langkawi, Ipoh, Seri Manjung and Port Dickson.

He said the relevant local councils and district police had also identified various crime hotspots.

On another matter, Kong said the RM20mil incinerator on Pangkor Island would be operational in March 2010.

Construction of the incinerator, which began in 2008, was now 80% complete, he said, adding that it was capable of handling up to 22 tonnes of garbage daily.

The new incinerator was built to replace an old one that had not been functioning for several years.

Kong also said that four other incinerators in Cameron Highlands, Langkawi, Labuan and Tioman, are also nearing completion.

Article above is taken from www.starproperty.my

**
As the crime scene in Malaysia has increase and never stop, I 100% agree with the article above which is the government plan to install more CCTV... Even though by placing CCTV can't stop the criminal, at least police, government or any responsible parties can detect or recognize the person who did the criminal or the victim so that they can't get away from punishment...

With help of the CCTV, criminal can be prevent more effective and law for criminal can be applied...

Example of criminal case that can be involve are like murder, drug trafficking and robbery... In criminal case, action is taken by either the state, federal or local government against an individual or organization for the violation... A person who is found guilty can be put on probation, sent to prison or be ordered to pay a fine, be punish or death penalty... All this punishment has be implement to prevent such persons and others from acting in the same illegal manner in the future...

Monday, December 14, 2009

Law & Government

Federal Constitution of Malaysia is the supreme law of Malaysia... The 1957 Constitution of the Federation of Malaya is the basis of this document... It established Malaysia as a constitutional monarchy having the Yang di-Pertuan Agong as the head of State whose roles are largely ceremonial...
It provides for the establishment and the organization of three main branches of the government which are

- The bicameral legislative branch called the Parliament, which consists of the House of Representatives and the Senate. It makes law applicable to the Federation as a whole. Parliament passes federal laws, make amendments, examines the government's policies, approve government expenditures and approves new tax.

- The executive branch led by the Prime Minister and consists of Cabinet Minister. It implement the law.

- The judicial branch headed by the Federal Court. They hear civil disputes, criminal case or other that is type of proceeding as prescribed by the constitution.

Saturday, December 12, 2009



Homeless elderly man beaten to death

2009/12/12

KUALA LUMPUR, Sat: A homeless septuagenarian was found beaten to death on the sidewalk of an electronics shop in Jalan Pudu here today.

So Jin Fat, 76, sustained head injuries, believed to have been caused by a piece of wood which was found near his body. His wallet was missing.

A passer-by found the body about 7am, and alerted the police.

Dang Wangi police chief ACP Zulkarnain Abdul Rahman said the case was classified
as murder. The body sent to the Kuala Lumpur Hospital for post-mortem.
-- Bernama

*
This article are taken from www.nst.com.my...After read this article, something came out from my mind, "what happens to Malaysia now days?"...We can see that criminal are everywhere and the victims involves all type of human even elders, pregnant women or children.

Septuagenarian in the article meaning elders with age between 70-80... The 1st issue in this article are the old man has been murdered by someone who did not been trace yet...Police suspect the old man murdered because there is a wood that has been used to hit the old man...2nd issues that has been recovered by the police are the old man's wallet has been steal...From my point of view, might be a same person who kill him steal the wallet...

From what i have learned in class, this case is under criminal law which the old man has been killed and stolen. This case will be hearing in the criminal court as well.
As the decision has been made, an accused may be convicted if he (person who kill) is guilty and acquitted if he innocent...and the sanction will be imprisonment, fine or both...

Monday, December 7, 2009

Digital signature software (sometimes referred to as Advanced or Secure Electronic Signatures) is the result of a cryptography operation. The digital signatures software technology guarantees data integrity and non-repudiation of transaction.

Electronic signature software contains electronic images that are physically or logically attached to the signed data. Example like adding a sentence "I, John Doe, sign this document" is good enough to be considered as an electronic signature.

*Definition for both signature are taken from www.arx.com

Difference between both of this signature are digital signature cannot be copied, altered or corrupted but electronic signature are easy to forge or copy. From here we can see that digital signature is more restricted in term of security. In Malaysia, the matter concerning the authentication of electronic data message is addressed by introducing the Digital Signature Act 1997.

www.arx.com also state that digital signature and electronic signature can be merge by using CoSign® digital and electronic signature solution

By using CoSign, both signature will be secure and easily organize. The signature can also be validated ensuring the authenticity of the user.





Saturday, December 5, 2009

Sticker-Spam


As appeared in The Star's Opinion Page of Saturday April 8, 2006

Is there no law against sticker spam?

I AM an owner-occupant of a shoplot in Sri Sentosa, Kuala Lumpur.

Like many other commercial areas in the Klang Valley, the walls of our shoplots and common passageways are pasted with sticker advertisements.

By this I mean the multi-coloured palm-sized sticker adverts offering mainly loan-shark credit, pawnshop gold trading, plumbing works, renovation services and tuition.

Like Internet spam, these junk advertisements are becoming more frequent and more obnoxious by the day.

There is no respect for private property, with even shop windows pasted over with these stickers. Small PVC pipes and tree trunks are also not spared.

If there is an unoccupied shoplot, the roller shutter becomes an immediate poster board for this trash.

Unlike Internet spam, there is no junk mail software for this nuisance.

Stickers require physical labour to remove and often leave persistent glue and paper stains.

If someone were to methodically sprinkle our shoplot walkways with litter daily, he would be arrested because there are laws against littering.

Is there no law against sticker spam?

Weitten to The Star by:

SHOPKEEPER, Kuala Lumpur.


* This article is taken from thestar.com.my.... after read this article and few other articles, i become one of those people who have doubt regarding this problem. Many of them complaining that person who has responsibility towards this problem ignore this situation. They also said that they have to peel the sticker-spam by themselves especially to those owners of the shop.

Even though there is a term said that if anyone posts notices all over the place without MPSJ permit, can be taken down. But with the exception of course for those who seek lost pets and the like due to humanitarian reasons. Hmmm...why there is still unwanted stickers all over the wall?

Is it because lack of enforcement and so these people do just about anything they want to attract business. Hope the responsible parties will think the solution towards this problems...



Tuesday, December 1, 2009


In cyber crime, we said sexual harassment as cyberstalkers or cyberstalking. Cyberstalking is a crime in which the attacker harasses a victim using electronic communication like email, instant messaging or messages posted to a Web site.

We can see that majority of cyberstalkers are men and the majority of their victim are women. In many cases, the cyberstalker and the victim had a past relationship, and the cyberstalking begins when the victim attempts to break off the relationship. But, there is also have cyberstalking by strangers.

A stalker may post a controversial or tempting message on the board under the name, phone number, or email address of the victim, resulting in consequent responses being sent to the victim. Message from cyberstalker will have the intended effect on the victim, but the cyberstalker's effort is the least and the lack of direct contact between the cyberstalker and the victim can make it difficult for law enforcement to identify, locate and arrest the offender.

Law of Cyberstalking

In Malaysia, the issue of cyberstalking is governed by Communications and Multimedia Act 1998. Any contravention with this provision is criminal offense where on conviction, the accused may be liable to a fine not exceeding fifty thousand ringgit or to imprisonment for a term not exceeding one year or to both and shall also be liable to a further fine of one thousand ringgit for everyday or part of a day during which the offence is continued after conviction. This taken from Ahmad Shamsul bin Abd. Aziz, Zainal Amin bin Ayub articles, lecturers Faculty of Public Management & Law, University Utara Malaysia, Sintok, Kedah.

Tuesday, November 24, 2009


From tutorial lesson today, we were given a task by the lecturer. In a group, we have to give our point of view regarding the assessment, evaluation and comment about a company given which our view must related to 9 principles of data protection. The 9 principles of data protection are

  1. The personal data shall be collected fairly and lawfully.
  2. Purpose of collection of personal data.
  3. Use of personal data.
  4. Disclosure of personal data.
  5. Accuracy of personal data.
  6. Duration of retention of personal data.
  7. Access to and correction of personal data.
  8. Security of personal data.
  9. Information to be generally available.
For my group, we have to discover an airline company whether we agree or disagree with the security policy of the company. But most of it we disagree, example like
  • They did state that there is no limitation of collecting customer personal data. (principle 1)
  • Disclosure of customer personal data to third parties like agents and hotel. (principle 4)
  • They did not take any responsibility if there is a spam or phishing mail that need customer to update their personal data. (principle 5)

Monday, November 23, 2009

Phishing??? or Fishing???

Don't get confuse with the word phishing or fishing...
First time i heard the word phishing when i were in a Legal framework class which i learned it in the Data Protection Regulation...
Webopedia.com said phishing is a act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a web site where they are asked to update personal information, such as password and credit card, social security, and bank account numbers, that the legitimate organization already has. The web site however is set up only to steal the user's information.

It's happened to me before where i got an unwanted e-mail or spam from ----site. In the e-mail, they ask me to renew password and certain information about my personal details. Lucky that I'm a type of person who always ignores this kind of information or e-mail, or i will be one of the victim that has been cheated. After learned this phishing term, now i know how to recognize the phishing e-mail by looking at the url or the sender.

Sunday, November 22, 2009

Multimedia Law



Since I'm taking Media Innovation & Management subject which my subject are related more on media terms, I have to learn and expose myself with Multimedia Law. From research that I have done from "www.mampu.gov.my/mampu/pdf/MyMIS/chapter5.PDF", there are few Acts that have been introduced...

  1. Digital Signature Act 1997
  2. Computer Crime Act 1997
  3. Telemedicine Act 1997
  4. Copyright (Amendment) Act 1997
  5. Communications & Multimedia Act 1998
  6. Malaysian Communications & Multimedia Comission Act 1998
Multimedia law is a set of rules that govern the patterns of behavior in a given society in relation with the invention, design, development, usage, maintenance, management, content, communication and exploitation of multimedia tools and technologies.

LAW




Law..Law..Law..
What is Law???
People will related anything like rules, regulation, criminal, banking, industrial, medical or even family with law..
Law requires the existence of three things: rules, sovereignty, and enforcing power which usually include with punishment.
Law is a any set of uniform principles. Examples like laws of science, laws of economics, laws of nature, laws of success, etc.
From Wikipedia it said that law of science are sometimes called physical laws, are considered universal and invariable facts of the physical world. The law are differs from hypothesis, theories, postulates, principles, etc.
For the Economic Development and the Rule of Law, - Henry Horbacszewski, Corporate General Counsel, Reed Elsevier said "
The Rule of Law can generate economic reform and unlock the social, political and economic potential that exists in societies."
This are the examples of law that we can learn and there are more to be learn too...

Thursday, November 12, 2009

Hye, Hello, Olla...

Let me begin myself with... My name is Qurratu Syaza, call me Syaza... I'm 22 and i stay with my family in Kuala Lumpur.

This is my final year degree in Multimedia University (MMU) which is located in Cyberjaya, Selangor, Malaysia... In MMU, I'm doing my study in Media Innovation & Management... For information, my majoring consist of media subject like Photoshop, 3D, Dreamweaver and for management of course include account, human resource, culture, marketing and much more... It is interesting but sometimes can be a little bit complicated because we need to divide our brain into two different courses.

I am a new comer and this is my first time in writing a blog. I'm here because i have to complete my assignment for Legal Framework subject which is one of the management subjects. Thanks to my lecture, because now i have my own blog site.

In Legal Framework, I discover many things and terms regarding LAW...examples like types of law, types of legal action, government and contract in Malaysia. It is an interesting subject to be learning because it exposes me to a real life related to what can or cannot be done.

;;