Lecture 12 - Ethics, Cyber Laws & Cyber Crime

25
Lecture 12 October 23 rd , 2012 Ethics, Cyber Laws & Cyber Crime Dr. Lee Kuok Tiung [email protected]

Transcript of Lecture 12 - Ethics, Cyber Laws & Cyber Crime

Lecture 12 October 23rd, 2012

Ethics, Cyber Laws & Cyber

Crime Dr. Lee Kuok Tiung

[email protected]

Introductions Ethics – a set of moral principles or values. ICT ethics - Moral principles or guidelines that govern practices associated with the use of information and information systems. In this study students need to consider the moral standards or ethics applied when creating electronic publications, when storing, communicating and disposing of data and information.

Cyber crime - computer is hottest crime tool. Losses through cyber crime – over $110 billion worldwide in 2004

Abuse of Internet and computer – hacker or hooligan

Corporate espionage - - $70 million range of proprietary information

3 Questions1. What is the role of social media in

social/political change?2. If social media is so important, why

should not governments simply cut it in times of crisis?

3. What happens if you cut communications?By(from): Professor Dr. Ang Peng HwaDirector, Singapore Internet Research Centre,Wee Kim Wee School of Communication and Information,Nanyang Technological University.MENTION 2011 Conference. 11-12 October 2011

]

Continues …. Malaysia’s strategy for moving into the Information Age was announced in 1996

ICT-related activities would be at the core of the new engine of growth.

A number of cyber-laws were proposed. The Malaysian Communications and Multimedia Act 1998 (CMA 98) was a key legislation to facilitate the growth of convergence activities.

What is “CYBER” No standard definition. Used to describe the virtual world of computers e.g. an object in cyberspace refers to a block of data floating around a computer system or network.

The word "cyberspace" is credited to William Gibson, who used it in his book, Neuromancer, written in 1984.

(source http://www.sharpened.net) cyberspace: The impression of space and community formed by computers, computer networks, and their users; the virtual "world" that Internet users inhabit when they are online. (source : http://www.atis.org/tg2k/_cyberspace.html)

What is “Cyber crime”? “Crime committed over the Internet” – The

Oxford Reference Online “Crime as any crime that is committed by means of special knowledge or expert use of computer technology” - The Encyclopedia Britannica

“Any illegal act involving a computer, its systems, or its applications” - Kelly R. Burke, District Attorney, Houston Judicial Circuit

“Any illegal act committed using a computer network (especially the Internet)” – Debra Littlejohn Shinder, MCSE.

Any crime committed through the computer networks using software, application, network service and know how – Ashwar Aziz LL.B

Types of Cyber Crime Network unauthorized access & penetration Theft of proprietary information Financial fraud using computers, internet Sabotage of data or networks Disruption of network Creation and distribution of computer viruses

Software, intellectual property piracy Identity theft Terrorism

CYBERLAW“…REFERS TO ALL THE LEGAL AND REGULATORY ASPECTS OF Internet and the World Wide Web. Anything concerned with or related to or emanating from any legal aspects

or issues concerning any activity of netizens in and concerning Cyberspace comes

within the ambit of Cyberlaw.”

Continues …. OBJECTIVES To provide a comprehensive framework of societal and commerce - enabling laws which encompass aspects concerning security of information and network integrity and reliability

To create the right development of the communication and multimedia industry and to position Malaysia as a major hub for the communications and multimedia information and content services

MALAYSIA’S ICT LEGAL FRAMEWORKThe

TelemedicineAct 1997

The ComputerCrimes Act 1997

TheCommunicationand MultimediaAct (1998)

The Copyright(Amendment) Act

1997

MALAYSIANCYBERLAWS

DigitalSignature Act

1997

The ElectronicTransactions

legislation (ETA)

The ElectronicGovernmentActivities

legislation (EGA)

Personal DataProtection Legislation

THE NEED FOR CYBER LAWS

Existing laws do not always sufficiently cover new multimedia applications

Uncertainty about legal framework stifles development of business and hinders the development of Malaysia as a knowledge-based society and knowledge-based economy.

Existing Cyber Laws

Purpose

The Computer Crimes Act 1997(01/06/2000)

Covers offences relating to misuse of computers

The Copyright (Amendment) Act 1997

Scope of Copyright protection widened to cover communications to public through wire or wireless means

The Telemedicine Act 1997 To facilitate the practice of Telemedicine

Digital Signature Act 1997(01/10/1998)

To regulate the use of Digital signatures and provide its legal status for electronic transactions

The Communications & Multimedia Act 1998(01/04/1999)

To regulate and facilitate the development of converging communications and multimedia industry.

MALAYSIAN TECHNOLOGY/ COMPUTER CRIME CASES E-Mail Abuse (Malicious/ False/ Harassment/ Impersonation)

Hacking/ Cracking. Identity Theft. Forgery of Valuable Documents (Currency/ Cheques/ Passports/ I.D.s

E-commerce Cheating Telecommunication Line Theft

Categories of Computer Crime Computer assisted crime Computer specific or targeted crime

Computer is incidental e.g. Equity funding 414 Gang Kevin Mitnick The Cuckoo’s Egg

Today’s Cyber-crime Serious Criminals

• More organized• Possibly socially isolated• Knowledgeable• Increasing use by Organized Crime

Motivation• Greed• Revenge• Ego

Method• Can strike from ANYWHERE • Information only commodity that can be stolen without being taken!

TREND- New Millenium The new millennium has created big challenges to enforcement agencies whereby the modus of operation (M.O) has become more sophisticated.

Evolution of transnational crime in a globalize world:

- Crime committed through internet - Cyber terrorism - Money laundering - Hacking skills being combined with criminal intent (Syndicates)

- Economic sabotage

MCMC Cyber Crime Enforcement

2005 – 13 cases investigated–Web defacement–Websites containing offering illegal activities & obscene materials–Web blogs containing annoying comments– Emails abuse –Service, network hacking

Nature & Characteristics of Cyber Crime

Anonymous Enormous range Occurs at high velocity Cross border Multi threats and impact – economic, social, religious, racial, terrorism

Technology oriented Age group – 16 – 40 years old

THE EXTENT OF CRIMINAL ACTIVITIES ON CYBER CRIME

1. Downloading/ Distribution of child/ adult pornography

2. The spreading or incitement of hate propaganda/ seditious matters

3. Pyramid/ Book making schemes4. On-line gambling/ betting. 5. Credit Card/ E-Commerce Fraud.6. Advance fee fraud7. Evasion of sales tax8. Extortion and information theft/ warfare9. Cyber attack of key industries/ installations10.Hacking/ illegal intrusions11. Spreading of viruses/ worms/ mailbombs, now botnets12. Spamming.13.Online money laundering

WHY? Just for fun ! Suka-suka !! Test of skills Anonymity Nature of internet – fast and immediate

Easy money Trans-border

Benefits of enacting cyber laws

Business can operate within framework that specifies the legal status of digital transactions and property rights and minimize conflict

Consumer obtain protection against new types of infringements of their consumer and privacy rights, and thus build the necessary trust to use new applications

Government can maintain the necessary amount of control over “cyberspace” to ensure that public interest objectives are met and that cyber crime is minimized.

FUTURE CHALLENGES Hacking skills being combined with criminal intent (Syndicates) such as website sabotage/ database ‘kidnapping’ or even cyber-terrorism. Eg. Botnets

E-Banking Fraud, on a more wider and systematic scale. Attack on E-commerce websites.

Telecommunication line theft. Criminals linked via networks, worldwide. Eg. Cryptography

Wi-Fi implementation. Identification issue. 3G (next 3.5G) digital telephone technology The wider and more rapid online distribution of illegal material .

Phone Viruses: Lasco.A, Cabir.H etc.

CONCLUSION Threats of cyber crime is left unchecked will be disastrous on the nation, society, economy and security.

It is the collective responsibility of all to ensure that technology is not abused.

Be a disciplined user.

Case StudyNegarakuku 我我我我我我 by NAMEWEE - www.namewee.com

IsuBidang kuasa statut Malaysia tertakhluk dalam Malaysia sahaja.

Lagu Negaraku di duplicate dari lagu “Mamula Moon”