Sei sulla pagina 1di 10

1.0.

INTRODUCTION People often talk about cyber crime, in Malaysia cyber crime activities has enhanced to 127 percent in 2010 (http://www.themalaysianinsider.com; February 9 2011). The rising of percentage of cyber crime in Malaysia shown that it is the time to people or community in Malaysia takes a serious approach to prevent such activities to make sure it will not threaten our nations security. Cyber crime is not the latest news. It does not happen only in Malaysia but it has become an international issues. Many cases involving cyber crime had been detected, furthermore many Malaysian citizen had also affected by the crime activities using the cyber space as its medium (http://www.utusan.com.my; October 15 2006). People have different definition of cyber crime. Before we take further step to discuss about cyber crime, firstly, lets see what the definition of cyber crime is. Crime means activities such as stealing, scamming, corruption and black mailing. In the other hand, cyber crime means crimes including every activities that usually done such as robbery, scamming, piracy, black mailing and any illegal activities that done out of law. Although, a more appropriate and comprehensive definition has been done by Mr. Donn B. Parker, a researcher in cyber crime and safety for SRI International in Menlo Park, California. He say that, cyber crime is any action done with intention and connected to the computer through any ways or method and therefore suffered the victim or causing the suffering, losses and many more. US Judge Association confirmed this definition by mentioning that cyber crime is any illegal activities where the knowledge of computer technology is used to make it a reality (http://ms.wikipedia.org; May 1998). Nowadays, cyber crime encompasses any criminal act dealing with computers and internet/networks (called hacking). This includes anything from downloading illegal music files to stealing millions of ringgits from online bank accounts. Cyber crime also

includes non-monetary offenses, such as creating and distributing viruses on other computers or posting confidential business information on the internet. Additionally, cyber crime also includes traditional crimes conducted through the internet. For example, hate crimes, telemarketing and internet fraud and credit card account thefts are considered to be cyber crimes when the illegal activities are committed through the use of a computer and the internet. Perhaps the most prominent form of cyber crime is identity theft, in which criminals use the internet to steal personal information from other users (http://www.techterms.com; 2011). Because cyber crime covers such a broad scope of criminal activity, the examples above are only a few of the thousands of crimes that are considered cyber crime.

2.0 CONTENT 2.1 CLASSIFICATION OF CYBER CRIMES All level of computer usage is always facing criminal activities. Whether as a victim or tool for the crime or both. Input operation, data processing, output operation and data communication has been used in detail for unhealthy purpose. Cyber crime classification that we usually heard are scamming, data corruption, stealing information, illegal access to system, illegally copying, cyber gambling, pornography, hacking and virus problem and maybe many more that we will soon be facing as the growth of the computer technology. Computer crime encompasses a broad range of activities. Generally, however, it may be divided into two categories; (1) crimes that target computers and directly; (2) crimes facilitated by computer networks or devices, the primary target of which is independent of the computer or device (http://www.cybercrime.gov; United States Department of Justice).

Crimes that primarily target computer networks or devices include computer viruses, denial-of-service attacks and malware (malicious code), while the crimes that use computer networks or devices to advance other ends include cyber stalking, fraud and identity theft, information warfare and phishing scams. 2.1.1 Internet Banking One of the most popular cyber crimes these days is internet banking. Everything is just on the tip of your fingers is a phrase that may be the most famous now. The development of information technology makes us choose something that can be done a lot easier and faster. Time and place had become the factors that support more to choose this type of online banking. Even though, the bank frequently confirmed that safety is always their priority but the fact is, still there are users who losses their money due to the transaction that has been done, aware or unaware. 2.1.2 Virus Another type of cyber crime is virus infection. This dealt with threats coming from and infecting through the internet. Often, if someone or some company affected by this crime, it will cause millions of ringgit worth of damage. One thing to learn from this case is that fighting computer criminals, especially those which leverages on the internet as a medium of attack, requires collaboration between multiple parties. 2.1.3 Hacking Another famous type of crime is hacking. Although, this crime is not big enough as USA, but, it still considered high profile. The level of the defense system in a website, sometimes attract or trigger the passion of some hackers to hack the web site. Usually, back door strategy used to break into the website. They are the computer genius, so when facing a strong defenses system, the passion increases to test their ability to break into the system. Their primary target always the place that will make them rich

such as bank (online banking). For example, the latest issue is with Bank Simpanan Malaysia and their customers, Amanah Ikhtiar Malaysia (AIM). They are waiting for the AIM to bank-in their approved loan into their account. Suddenly, the sum of money reported as already bank-in and they already make the withdrawal, the very same day the money being deposited. But, the fact is, there are no withdrawal transaction been done by the customers. So, whose fault is this? Who knows about the account information? 2.1.4 Obscene or Offensive Content and Harassment I would like to share another crime that called obscene or offensive content and harassment. The content of website and other electronic communications may be distasteful, obscene or offensive for a variety of reasons. In some instances these communications may be illegal. Over 25 jurisdictions place limits on certain speech and ban racist, blasphemous, politically subversive, libelous or slanderous, seditious, or inflammatory material that tends to incite hate crimes. The extent to which these communications are unlawful varies greatly between countries, and even within nations. It is a sensitive area in which the courts can become involved in arbitrating between groups with strong beliefs. If you remember, once a long time ago, most of our famous artists in Malaysia have the same nightmare. The photo of somebody else became their photo in a nude action or use in porn video. But, one are of internet pornography that has been the target of the strongest efforts at curtailments is child pornography. Whereas content may be offensive in a non-specific way, harassments direct obscenities and derogatory comments at specific individuals focusing for example on gender, race, religion, nationality and sexual orientation. This often occurs in chat rooms, newsgroups and by sending hate email to interested parties. Any comment that may be found derogatory or offensive is considered harassment. This is what happened between our two most favorite singer of all time (Datuk Siti Nurhaliza and Datuk Sharifah Aini) about 5 years ago.

2.2 COMPARISON OF CYBER CRIMES IN MALAYSIA AND USA We should acknowledge that there is different definition about cyber crime between countries. For Islamic country, such as Malaysia considered gambling, pornography, sex advertisement is a crime but not a crime in other countries. For example, in USA, issues like this are not taken seriously; only child pornography is considered crime in their country. They focus more on safety and business transaction. Many laws related closely about safety and commerce built such as trademark low, copyright low, law against hackers and virus spreading etc. With this differentiation in cyber crime definition, it is hard to authorize the cyber law. Malaysia, which tied with the promise not to layer internet had to agree to this type of crime. The internet ability as a long distance communication device became the most preferred way instead of the other communication device that we all had had before. Printing, telephone and television had long become the most important tool in the media to send the message, knowledge and information to people all over the world. But, these media only transfer its information in one way unlike the interactive internet. This enables to control the information in effect. Therefore, many countries have a law to control printing and television programmes. In Malaysia, for example, any printed papers that being spread to community need a legal permit. Cyber crime and Internet security breach in Malaysia has increase in 5 years ago with the average of 500 cases reported every year, says Ministry of Resource, Communication and Multimedia recently (http://www.myuitm.com). A lot of criminals in Malaysia involves in social website such as facebook.com, friendster.com, tagged.com and myspace.com. Unlike USA, Malaysian hackers only committed a low level of crime which surrounding hacking personal website, some government website that they really wanted to acknowledge either aware or unaware. But, in USA, their hackers are genius. They really trained and learned about hacking, that is why they are so hard to control. One of the cases in USA, is about an ex-employee who intentionally damaging his companys computers through collusion with internal or trusted employees. Another

case is about an employee on his last day of duty, copies out propriety information and was caught. Or this case where a computer security expert was found guilty of computer hacking and electronic eavesdropping. This case only confirmed that internet threat can come from within an organization. Three of the cases I mentioned above are considered an internal threat. Another example is something we called telecommunication fraud and computer hacking. It includes the use of stolen access devices, PIN obtained from other hacking organization and stolen card credit information. With access to these equipment and information, the criminal could make free teleconferences at the expense of the Telecommunication Service Provider (SANS Institute; 2002). This is what I called genius, I think Malaysia has not yet reach this level of hacking. Another factor that has to be taken seriously is the teenager behavior. Most teenagers behavior is unpredictable. They are not matured enough to think about the effect from the crime they had committed. More unfortunate, is the advancement of technology failed to detect intruder. For example, on February and March 2000, more than 500 army computer system, government officer and NGO sector in USA had been breach. At that time, USA army ready with their battalion because of the controversy between Iraq and UN (United Nation). When the breach happened, the USA suspected that Iraq is behind the act but later the responsible criminal are two juvenile from Cloverdale, California and some Israel. Another comparison of cyber crime between Malaysia and USA is because the advance of information technology of both countries makes the different between the quantity of criminals and the type and the level of crime they done. The more advance of security system in a country, the more difficult the criminals to commit crime. I believe, USA has enhanced their security system in order to protect their company or government from being hacked. But, the more sophisticated the technology, the more brilliant the hackers became. In Malaysia, we usually do not care more about the hackers because often the hackers who hacked into the system tracked to overseas criminals. Meanwhile the

criminals mind in Malaysia only focuses on email fraud, recreating the same personal website as the actual one, corruption of data etc. This is why the criminals of cyber crime in Malaysia are easier to control than in USA. This is because, Malaysian do not learn about how to hack into a system, there are no institution who teach hacking. In USA, I believe there are one or more places to learn how to hack and furthermore there are website where they can learn how to hack into a system. The USA citizens also have high level of education about IT. Therefore, even without the study about hacking, the people always have the knowledge about it. This is why the Pentagon now only exists as a unique building and not the important organization anymore. Before, all the states issues are linked into Pentagon, or should I say the centre of government rules. This is because even though there are many method used to control or solve this crime, there are still thousands criminals born every second. What I feared most is identity theft. Thankfully, in Malaysia there still no report of such crime existed except the criminal just steal the person purse or bag to take their important belonging such as ID, account number, Automatic Transfer Machine (ATM) card, card credit or anything valuable to the person in order to fake his identity and make some money from it whether from the bank or elsewhere. In USA, identity theft is considered highly dangerous crime, because it will cause the victim to lose identity, loss and suffered in many ways. 2.3 SUGGESTIONS In my point of view, what we should do to curb or reduce those cyber crimes, I would like to propose to all Malaysian citizens to learn or study more about IT. This is because the more you learned and understand about IT, you will acknowledge that cyber crime happened through the internet. So, the first thing you have to know about computer defenses is Firewall. Generally, every windows had a built in Firewall in all their operating system (OS). Activate the Firewall and protect your computer by installing antivirus. For example Kaspersky, Avira, AVG and Sophos.Then, activate the spam

blocker to avoid unneeded messages such as spam and email phishing into inbox. Encryption method also important where every primary data must get through an encryption process to use any software on the internet. Be extremely careful when you faces a website that asking for your personal details. This is a common case that often happened in Malaysia cyber crime. The website you are opening must be confirmed 200% before you give any personal details. Malaysian Communications and Multimedia Commission (SKMM) are responsible in managing and controlling the cyber safety aspect. If you are buying or paying online, the payment transaction must be safe. Do not be fooled into accepting any competition and lucky draw who offers money and special gift as bait. The women always had been victim in this case. Just leave the email spam in your inbox. Believing the email spam is really an unbrilliant way. Do not install any toolbar or software that downloaded from the internet without knowing the usage of the Ad ware that try to steal our personal investigation. Other than what have I mention above, Malaysian Government should make more effected security system to enhance the computer ability to protect or to control hackers into breaking the companys system or any individual personal space. I already read about the Cyber Security Malaysia (Utusan Malaysia Online; 2010) that controls the computers networking. This is the most recent technology to solve cyber crime. They already make an effort to help the authorized association by holding a seminar or courses about cyber safety. They already step ahead by making a speech to the IPTA and IPTS students in the awareness on cyber crime threat to community. Parents should also acknowledge about what type of site their children are surfing. They must put limited access in their children computer in order to avoid them to surf unneeded website such as gambling online, watching or downloading porn photo or video or making their own sex advertisement. This is considered a crime in Malaysia. As

an advice, do not engaged in any cyber crime because it is the same as you commit any other crime. 3. CONCLUSION Computer crime definitely must be taken seriously. Attacks can come from computer across the room or computers located in another country. The threat could be external or internal. It may have financial impact, it may deal with child pornography or it may be related to cyber terrorism. Because of the number of computer crime cases that has increased over the years, the development of computer crime laws and policing initiatives must grow in tandem. By reading my article above, I believe you must understand now how Malaysian orientates surrounding cyber crime. Tackling computer crime must be starting from the basics and address one thing at a time. As long as there is a system in place to punish the wrongdoers, as long as there is public awareness of the potential seriousness of such crimes, I believe that there will be much headway in computer crime law and investigation in the coming years in Malaysia and around the world. One important element that I found to be similar between most of the cases was the strength of the investigation team and the support that received from its counterparts whether locally or internationally. With that, I would like for you to understand one thing that is a computer can be a source of evidence. Even when a computer not directly used for criminal purposes, may contain records of value to criminals investigator.

(Words Count: 2,874 words)

4. REFERENCES 1. (http://www.themalaysianinsider.com; February 9 2011) 2. (http://www.utusan.com.my; October 15 2006). 3. (http://ms.wikipedia.org; May 1998). 4. (http://www.techterms.com; 2011). 5. (SANS INSTITUTE ; 2002)

Potrebbero piacerti anche