Sei sulla pagina 1di 3

Soft CYBER-CRIME

1. In which of the following areas does your country have existing cyber-crime legislation
in place?

a. Substantive cyber-crime laws (e.g., laws prohibiting online identity theft, hacking,
intrusion into computer systems, child pornography): Yes ___ No ___

If yes, please list and attach copies of all such legislation, preferably in electronic format
if possible:
Computer Crimes Act 1997
Child Act 2001

b. Procedural cyber-crime laws (e.g., authority to preserve and obtain electronic data from
third parties, including internet service providers; authority to intercept electronic
communications; authority to search and seize electronic evidence): Yes ___ No ___

If yes, please list and attach copies of all such legislation, preferably in electronic format
if possible:
Computer Crimes Act 1997
Communications and Multimedia Act 1998
Electronic Government Activities Act 2007
Penal code

c. Mutual legal assistance related to cyber-crime: Yes ___ No ___

If yes, please list and attach copies of all such legislation, preferably in electronic format
if possible:
Mutual Assistance in Criminal Matters Act 2002

2. a. Please identify whether the following forms and means (1) occur frequently, (2) occur
infrequently, or (3) have not occurred, by placing an X as appropriate in the following
table:

Forms and Means of Cyber-Crime Occur Occur Has not


Frequently Infrequently Occurred
Online identity theft (including phishing and X
online trafficking in false identity information)
Hacking (illegal intrusion into computer systems; X
theft of information from computer systems)
Malicious code (worms, viruses, malware and X
spyware)
Illegal interception of computer data X
Online commission of intellectual property X
crimes
Online trafficking in child pornography X
Intentional damage to computer systems X
or data
Others X
2

b. In addition, to the above, if there are there any other forms and means of cyber-crime that
have occurred (either frequently or infrequently) in your country, please identify them as
well as the frequency with which they occur in the following table.

Forms and Means of


Occur Frequently Occur Infrequently
Conduct
Hacking (illegal intrusion into After becoming increasingly
computer systems; theft of popular during the first years
information from computer of the 21st century, gaining
systems) access to a machine through
clandestine virus installation
has become one of the most
widespread hacking vehicles
ever recorded.
Malicious code (worms, The malware problem
viruses, malware and spyware) continues to grow rapidly. For
instance, Symantec created
2,895,802 new malicious code
signatures in 2009. This
represents 51 percent of all
malicious code signatures ever
created by Symantec.
Online identity theft More than 50 of the reported
(including phishing and online data breaches in the last year
trafficking in false identity have been attributed to
information) computer hacking.

Scams An Internet Scams study


shows that the top three scams
in Malaysia are work from
home fraud (30%); internet
auction scams; (22%) and
online dating scams (20%).

3. Does your country have any concrete experiences with respect to strengthening the
relationship between the authorities responsible for investigating and/or prosecuting cyber-
crimes, and internet service providers that may be shared with other States as a best practice
in this area?
Yes ___ No ___

If yes, please explain:


One important element that I found to be similar between most of the cases was the
strength of the investigation team and the support it has received from its counterparts
whether locally or internationally.

4. Has your country identified, created, or established a unit or entity specifically charged with
directing and developing the investigation of cyber-crimes? Yes ___ No ___
3

If yes, please provide the following information: The CCID role is tracking down all the
cybercrimes in Malaysia to capture crime. The mission Committed to Undertaking
Professional Investigations to Increase the Communitys Confidence and Remain Relevant.

i. The exact name of the unit/entity:


Commercial Crime Investigation Department

ii. The institution to which the unit/entity belongs:


Malaysia CP Dato' Wira Syed Ismail bin Dato 'Hj. Syed Azizan

iii. The number of officers or investigators in the unit/entity:


36 officers

If such a unit/entity has been created or established, are its functions dedicated exclusively to
the investigation of cyber-crimes? Yes ___ No ___

If no, what other types of offenses or crimes is this unit/entity responsible for investigating
and/or prosecuting?
Cyber Security Malaysia

5. Has your country identified, created, or established a unit or entity specifically charged with
directing and developing the prosecution of cyber-crimes? Yes ___ No ___

If yes, please provide the following information:


During NITC meeting No. 1/2006, the Government decided to begin the implementation
process of the National Cyber Security Policy (NCSP). NISER was given the mandate to
provide technical support to the Government for the implementation of the NCSP. To reflect
the wider mandate and larger role, NISER was renamed Cybersecurity Malaysia.

i. The exact name of the unit/entity:


Cyber Security Malaysia

ii. The institution to which the unit/entity belongs:


YB Datuk Seri Panglima Wilfred Madius Tangau

iii. The number of prosecutors or judicial officials in the unit/entity:


4752

If such a unit/entity has been created or established, are its functions dedicated exclusively to
the prosecution of cyber-crimes? Yes ___ No ___

If no, what other types of offenses or crimes is this unit/entity responsible for prosecuting?
Malaysian Communications and Multimedia Commission

Potrebbero piacerti anche