cyber crime[1]

Upload: azilawati77

Post on 03-Apr-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/28/2019 Cyber Crime[1]

    1/13

    FAKULTI BAHASA MELAYU

    SEMESTER SEPTEMBER TAHUN 2011

    KOD KURSUS

    OUMH1203

    TAJUK KURSUS

    ENGLISH FOR WRITTEN COMMUNICATION

    NO. MATRIKULASI : 670813035503001

    NO. KAD PENGNEALAN: : 670813035503

    NO. TELEFON : 0129621147

    E-MEL : [email protected]

    PUSAT PEMBELAJARAN : OPEN UNIVERSITI

    MALAYSIA, KELANTAN

    1

    mailto:[email protected]:[email protected]
  • 7/28/2019 Cyber Crime[1]

    2/13

    Course Title:

    OUMH1203 ENGLISH FOR WRITTEN COMMUNICATION

    1.Introduction

    1.0 Definitions

    Cyberis defined as crimes committed on the internet using the computer as either

    a tool or a targeted victim. It is very difficult to classify crimes in general into distinct

    groups as many crimes evolve on a daily basis. Even in the real world, crimes like rape,

    murder or theft need not necessarily be separate. However, all cybercrimes involve both

    the computer and the person behind it as victims, it just depends on which of the two is

    the main target.Cybercrime encompasses any criminal act dealing with computersand

    networks (called hacking). Additionally, cyber crime also includes traditional crimes

    conducted through the Internet.

    Crime is a social and economic phenomenon and is as old as the human society.

    Crime is a legal concept and has the sanction of the law. Crime or an offence is a legal

    wrong that can be followed by criminal proceedings which may result into

    punishment.The hallmark of criminality is that, it is breach of the criminal law. Per Lord

    Atkin the criminal quality of an act cannot be discovered by reference to any standard

    but one: is the act prohibited with penal consequences.

    2

    http://www.webopedia.com/TERM/C/cyber.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/N/network.htmlhttp://www.webopedia.com/TERM/H/hacker.htmlhttp://www.webopedia.com/TERM/I/Internet.htmlhttp://www.webopedia.com/TERM/C/cyber.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/N/network.htmlhttp://www.webopedia.com/TERM/H/hacker.htmlhttp://www.webopedia.com/TERM/I/Internet.html
  • 7/28/2019 Cyber Crime[1]

    3/13

    1.1 Fact on cybercrime

    Many of the cyber crime articles available on the Internet today can appear

    outdated as they fall short of a uniform categorization or specific steps on methods for

    fighting cybercrime or even how to support cyber crime victims. These barriers also

    create difficulty for those attempting to report cybercrime. With today's rapid growth of

    technology, as well as updates to cyber law cannot stop cyber crime from growing and

    updating in kind. Internet fraud is certainly the area that most personal computer (PC)

    users are concerned about, and cyber crime study, continues to be left to amateurs or

    veteran criminologists. The cyber criminals constitute of various groups/ category. This

    division may be justified on the basis of the object that they have in their mind. The broad

    meaning of cybercrime can be narrowed down by looking at specific crimes that are most

    common.Cyber Identity Theft and Computer Hacking, considered by experts as the most

    common forms of cybercrime, involve the theft of personal information that is attainable

    through computer systems and computer networks. Cyberspace crime involves much

    more than Identity Theft, and, today, does not even require Internet use. The growth of

    interest in topics such as cyberbullying, commonly perpetrated through the use of cell

    phones, is on pace to achieve Identity Theft's level of notoriety. Current Wiki Leak and

    Hactivist news items have also shown the Global nature of cybercrime, while broadening

    the cyber crime definition.Certain other offenses, including trade secret theft and

    manufacturing or economic espionage are on occasion believed to be cybercrimes when

    networks or computers are used. The Department of Justice classifies computer offenses

    in three ways:

    3

  • 7/28/2019 Cyber Crime[1]

    4/13

    a. The computer as a target - assaulting other computers (for example, scattering

    viruses)

    b. The computer as a weapon - committing conventional crimes by using a

    computer such as illegal gambling and scams

    c. The computer as a storage unit - using a computer to store stolen or unlawful

    data

    Crime and criminality have been associated with man since his fall. Crime

    remains elusive and ever strives to hide itself in the face of development. Different

    nations have adopted different strategies to contend with crime depending on their nature

    and extent. One thing is certain, it is that a nation with high incidence of crime cannot

    grow or develop. That is so because crime is the direct opposite of development. It leaves

    a negative social and economic consequence. Cybercrime is also defined as crimes

    committed on the internet using the computer as either a tool or a targeted victim. It is

    very difficult to classify crimes in general into distinct groups as many crimes evolve on

    a daily basis. Even in the real world, crimes like rape, murder or theft need not

    necessarily be separate.

    2.0 Classification of on cybercrime

    Cyber crime is the latest and perhaps the most complicated problem in the cyber

    world. Cyber crime may be said to be those species, of which, genus is the conventional

    crime, and where either the computer is an object or subject of the conduct constituting

    crimeAny criminal activity that uses a computer either as an instrumentality, target or a

    4

  • 7/28/2019 Cyber Crime[1]

    5/13

    means for perpetuating further crimes comes within the ambit of cyber crimeA

    generalized definition of cyber crime may be unlawful acts wherein the computer is

    either a tool or target or both( The computer may be used as a tool in the following kinds

    of activity- financial crimes, sale of illegal articles, pornography, online gambling,

    intellectual property crime, e-mail spoofing, forgery, cyber defamation, cyber stalking.

    The problem encountered in guarding a computer system from unauthorised access is that

    there is every possibility of breach not due to human error but due to the complex

    technology. By secretly implanted logic bomb, key loggers that can steal access codes,

    advanced voice recorders; retina imagers etc. that can fool biometric systems and bypass

    firewalls can be utilized to get past many a security system. The computers work on

    operating systems and these operating systems in turn are composed of millions of codes.

    Human mind is fallible and it is not possible that there might not be a lapse at any stage.

    The cyber criminals take advantage of these lacunas and penetrate into the computer

    system.Negligence is very closely connected with human conduct. It is therefore very

    probable that while protecting the computer system there might be any negligence, which

    in turn provides a cyber criminal to gain access and control over the computer

    system.Loss of evidence is a very common & obvious problem as all the data are

    routinely destroyed. Further collection of data outside the territorial extent also paralyses

    this system of crime investigation.

    The computer may however be target for unlawful acts in the following cases-

    unauthorized access to computer/ computer system/ computer networks, theft of

    information contained in the electronic form, e-mail bombing, data didling, salami

    attacks, logic bombs, Trojan attacks, internet time thefts, web jacking, theft of computer

    5

  • 7/28/2019 Cyber Crime[1]

    6/13

    system, physically damaging the computer system.This includes login information, such

    as usernames and passwords, phone numbers, addresses, credit card numbers, bank

    account numbers, and other information criminals can use to "steal" another person's

    identity. For this reason, it is smart to always check the URL or Web address of a site to

    make sure it is legitimate before entering your personal information.Because cybercrime

    covers such a broad scope of criminal activity, the examples above are only a few of the

    thousands of crimes that are considered cybercrimes. While computers and the Internet

    have made our lives easier in many ways, it is unfortunate that people also use these

    technologies to take advantage of others. Therefore, it is smart to protect yourself by

    using antivirus and spyware blocking software and being careful where you enter your

    personal information.However, all cybercrimes involve both the computer and the person

    behind it as victims, it just depends on which of the two is the main target.

    Hence, the computer will be looked at as either a target or tool for simplicitys sake. For

    example, hacking involves attacking the computers information and other resources. It is

    important to take note that overlapping occurs in many cases and it is impossible to have

    perfect classification system.The computer has unique characteristic of storing data in a

    very small space. This affords to remove or derive information either through physical or

    virtual medium makes it much more easier.

    3.0 Comparison of cyber crimes in Malaysia and Usa

    In Malaysia to be a world leading country in ICT development and be a global

    centre and hub for communication and multimedia information and content services.

    They are the Official Secret Act Act 1976, Patent Act 1983, Prison Act 1995, Akta Arkib

    6

    http://www.techterms.com/definition/loginhttp://www.techterms.com/definition/urlhttp://www.techterms.com/definition/loginhttp://www.techterms.com/definition/url
  • 7/28/2019 Cyber Crime[1]

    7/13

    Negara 44/146 and other relevant legislations. This set of Acts has made Malaysia as one

    of the first countries to enact a comprehensive set of cyber laws. The above Acts were

    formed for the purpose of safeguarding consumer and service providers besides on-line

    businesses and owners of intellectual property. Computer Crime Act 1997 (CCA 97) The

    CCA 97 was given its Royal Assent on June 18, 1997 but was only enforced on June 1,

    2000 (9). CCA 97 main concerns are offences due to the misuse of computers and

    complement the existing criminal legislation. The three other offences included in CCA

    97 are wrongful communication, abetment and attempts punishable as offences and

    presumptions. Besides that, it also covers on obstruction of search. We will start by

    taking a closer look at the CCA 1997, which is one of the many cyber laws enacted in

    Malaysia. The following is a summary of the offences relating to misuse of computers as

    extracted from the Explanatory Statement of the CCA1997:

    a) Seeks to make it an offence for any person to cause any computer to perform

    any function with intent to secure unauthorised access to any computer material.

    b) Seeks to make it a further offence if any person who commits an offence

    referred to in item (a) with intent to commit fraud, dishonesty or to cause injury as

    defined in the Penal Code.

    c) Seeks to make it an offence for any person to cause unauthorised modifications

    of the contents of any computer.

    d) Seeks to provide for the offence and punishment for wrongful communication

    of a number, code, password or other means of access to a computer.

    e) Seeks to provide for offences and punishment for abetments and attempts in the

    commission of offences referred to in items.

    7

  • 7/28/2019 Cyber Crime[1]

    8/13

    f) Seeks to create a statutory presumption that any person having custody or

    control of any program, data or other information when he is not authorised to have it

    will be deemed to have obtained unauthorized access unless it is proven otherwise.

    The CCA 97 also gives more severe punishment compared to CMA 1990

    (UK).According to CyberSecurity Malaysia, cyber security specialist, there is need for a

    dedicated "cyber court" in the country given that cyber crimes increased tremendously

    during 2008.

    In addition to that, the Act also allows that any police officer arrest without a

    warrant any person whom he reasonably believes to have committed or to be committing

    an offence against this Act. Further to this, the Act also allows police officers above the

    rank of Inspector to conduct search at premises without warrant should the officer believe

    that delays may effect them obtain necessary evidence. Both these provisions greatly

    empower the police officer and allow them to put the law in their own hands. Imagine

    this scenario, a 20-year old student had been arrested by mistake because the police

    officer had reasonable reasons to believe that the student made an attempt to have

    unauthorized access to a computerized system. The incident can be both embarrassing for

    the authority and traumatic for the student in question. In terms of computer

    crime, most investigation and arrest would occur after the first attack/attempt of attack,

    and thus it would be sensible for the police or relevant authority to conduct search or

    arrest upon gaining the proper warrants and evidence .

    3.1 Comparison of cyber crimes in USA

    Lt. Col. (retired) Husin Jazri, Chief Executive Officer of CyberSecurity, said that the total

    number of Internet crimes reported in 2008 by the security firm had grown more than

    8

  • 7/28/2019 Cyber Crime[1]

    9/13

    twice the previous estimates. Moreover, the situation might get worse this year (2009), as

    reported by thestaronline on January 16, 2009. According to Jazri, in 2008, the

    organization dealt with 2,123 incidents of cyber crime, more than 100% increase in

    comparison to 2007 when the company dealt with 1,038 incidents. The reports received

    from the organization revealed that nearly 50% of the incidents reported were related to

    fraud, while the rest to malicious code and intrusions like malware infections, spam,

    online harassment, malicious websites, intrusions etc. Moreover, over 4,000 cyber

    complaints, majority of them relating to cyber crimes, were filed with CyberSecurity

    Malaysia between 2007 and 08. The complaints comprised fraud, hack threats, Denial-of-

    Service conditions and other PC problems like viruses corrupting files or data getting

    exposed. Further, as the Internet usage in the country grows, the total number of online

    transactions along with other activities is likely to increase, which, in turn, increase the

    number of online crime incidences. Besides, growth in broadband and wireless capacity

    makes the Internet more convenient and quicker to use. But unfortunately, these utilities

    could be used as means for Internet crimes. In addition, the ongoing economic crisis

    across the world will also boost cyber crimes. The problem of insufficient awareness

    about cyber security or Internet-safety practices among Malaysians surfing on the Web

    continues to pose a big challenge. For example, some users do not own a distinct

    password while many are not updating their security software. Commenting on this,

    Malaysian Police said that to an unwary person, a fraudulent website appears to be the

    bank's real website. Similarly, an innocent recipient thinks that an e-mail announcing a

    'prize win' is genuine. Therefore, it is hardly surprising that online crimes involving

    banking fraud andphishing rose 619% in 2008 over 2007.

    9

    http://www.spamfighter.com/SPYWAREfighter/http://www.spamfighter.com/Phishing.asphttp://www.spamfighter.com/SPYWAREfighter/http://www.spamfighter.com/Phishing.asp
  • 7/28/2019 Cyber Crime[1]

    10/13

    3.1.1 Techniqueas

    The global nature of criminal activities requires that strong ties be forged between

    enforcement agencies around the world.United States Attorney General Janet Reno gave

    a good example of how complicated a crime investigation could be when technology

    involved in the case resides in another part of the world. An officer may quickly find

    himself or herself in the middle of a case with international implications. For example,

    during the raid of a drug dealer's home, an officer might download data from the suspect's

    network account only to find out later that the data was stored in a foreign country and

    the download violated that country's law.Bruce Schneier in his book Secret and Lies

    also brings up the point that the global nature of the Internet complicates criminal

    investigation and prosecution. Bruce raises the question of which state or countrys law

    should be used for prosecution, will it be from where the data/attack originated from or

    where the data/target is located or even where the data/transmission passes through?

    Personally, it really depends on two things.

    3.1.2Financial -Even greater ambiguities surface when we consider

    what it means for access to be without authorization. The concept of authorization

    seems clear in the case of traditional trespass statutes, which presume that people have a

    right to be where they are, and often require posted notice in that place instructing them

    that they cannot enter or remain there. The statutes also require that the trespasser knows

    that she is without license or privilege to enter or remain on the premises. The first

    consideration is the effectiveness of the laws in a particular country and the second

    consideration would be how easy would it be to bring the suspect to trial in the preferred

    country.The Malaysian Parliament website that was hacked on December 2000 was

    10

  • 7/28/2019 Cyber Crime[1]

    11/13

    traced to IP addresses .The relevant authorities in those countries were contacted for

    assistance in the investigation. This clearly shows the importance of strong working

    relationships between authorities in countries around the world.

    3.1.3 RacialTheir work is motivated by the colour of money. These kinds

    of hackers are mostly employed to hack the site of the rivals and get credible, reliable and

    valuable information. Further they are ven employed to crack the system of the employer

    basically as a measure to make it safer by detecting the loopholes.This group include

    those people who have been either sacked by their employer or are dissatisfied with their

    employer. To avenge they normally hack the system of their employee.

    4.0 Suggestion

    Cybercrime is criminal activity done using computers and the Internet. This

    includes anything from downloading illegal music files to stealing millions of dollars

    from online bank accounts. Cybercrime also includes non-monetary offenses, such as

    creating and distributing viruses on other computers or posting confidential business

    information on the Internet.Perhaps the most prominent form of cybercrime is identity

    theft, in which criminals use the Internet to steal personal information from other users.

    Two of the most common ways this is done is through phishing and pharming. Both of

    these methods lure users to fake websites (that appear to be legitimate), where they are

    asked to enter personal information.Hart in his work The Concept of Law has said

    human beings are vulnerable so rule of law is required to protect them. Applying this to

    the cyberspace we may say that computers are vulnerable so rule of law is required to

    11

    http://www.techterms.com/definition/virushttp://www.techterms.com/definition/phishinghttp://www.techterms.com/definition/pharminghttp://www.techterms.com/definition/virushttp://www.techterms.com/definition/phishinghttp://www.techterms.com/definition/pharming
  • 7/28/2019 Cyber Crime[1]

    12/13

    protect and safeguard them against cyber crime. We could say that access hinges on

    whether the user has made a virtual entrance into the computer

    5.0 Conclusions

    Undoubtedly the Act is a historical step in the cyber world. Further I all together

    do not deny that there is a need to bring changes in the Information Technology Act to

    make it more effective to combat cyber crime. I would conclude with a word of caution

    for the pro-legislation school that it should be kept in mind that the provisions of the

    cyber law are not made so stringent that it may retard the growth of the industry and

    prove to be counter-productive.Capacity of human mind is unfathomable. It is not

    possible to eliminate cyber crime from the cyber space. It is quite possible to check them.

    History is the witness that no legislation has succeeded in totally eliminating crime from

    the globe. The only possible step is to make people aware of their rights and duties (to

    report crime as a collective duty towards the society) and further making the application

    of the laws more stringent to check crime.

    12

  • 7/28/2019 Cyber Crime[1]

    13/13

    Reference

    1. Brenner, S. (2007) Law in an Era of Smart Technology, Oxford: Oxford

    University Press

    2. Csonka P. (2000) Internet Crime; the Draft council of Europe convention on

    cyber-crime: A response to the challenge of crime in the age of the internet? Computer

    Law & Security Report Vol.16 no.5.

    3. Morris, Daniel A. Tracking a Computer Hacker. Last updated July 10, 2001.

    http://www.usdoj.gov/criminal/cybercrime/usamay2001_2.htm

    4. Puvaneswary, S. Police Seek Help From The Two Countries To Track Down Those

    Responsible. 17 January 2001. http://www.niser.org.my/news/2001_01_17.html

    5. Schneier, Bruce. Secret and Lies. John Wiley & Sons, 2000.

    6. Stafford, Ned. Sudan Bank Hacked, Bin Ladden Info Found Hacker, Newsbytes.

    27 September 2001. http://www.newsbytes.com/news/01/170588.html.

    13

    http://en.wikipedia.org/wiki/Oxford_University_Presshttp://en.wikipedia.org/wiki/Oxford_University_Presshttp://www.usdoj.gov/criminal/cybercrime/usamay2001_2.htmhttp://www.niser.org.my/news/2001_01_17.htmlhttp://en.wikipedia.org/wiki/Oxford_University_Presshttp://en.wikipedia.org/wiki/Oxford_University_Presshttp://www.usdoj.gov/criminal/cybercrime/usamay2001_2.htmhttp://www.niser.org.my/news/2001_01_17.html