Lecture 12 - Ethics, Cyber Laws & Cyber Crime
Transcript of Lecture 12 - Ethics, Cyber Laws & Cyber Crime
Introductions Ethics – a set of moral principles or values. ICT ethics - Moral principles or guidelines that govern practices associated with the use of information and information systems. In this study students need to consider the moral standards or ethics applied when creating electronic publications, when storing, communicating and disposing of data and information.
Cyber crime - computer is hottest crime tool. Losses through cyber crime – over $110 billion worldwide in 2004
Abuse of Internet and computer – hacker or hooligan
Corporate espionage - - $70 million range of proprietary information
3 Questions1. What is the role of social media in
social/political change?2. If social media is so important, why
should not governments simply cut it in times of crisis?
3. What happens if you cut communications?By(from): Professor Dr. Ang Peng HwaDirector, Singapore Internet Research Centre,Wee Kim Wee School of Communication and Information,Nanyang Technological University.MENTION 2011 Conference. 11-12 October 2011
]
Continues …. Malaysia’s strategy for moving into the Information Age was announced in 1996
ICT-related activities would be at the core of the new engine of growth.
A number of cyber-laws were proposed. The Malaysian Communications and Multimedia Act 1998 (CMA 98) was a key legislation to facilitate the growth of convergence activities.
What is “CYBER” No standard definition. Used to describe the virtual world of computers e.g. an object in cyberspace refers to a block of data floating around a computer system or network.
The word "cyberspace" is credited to William Gibson, who used it in his book, Neuromancer, written in 1984.
(source http://www.sharpened.net) cyberspace: The impression of space and community formed by computers, computer networks, and their users; the virtual "world" that Internet users inhabit when they are online. (source : http://www.atis.org/tg2k/_cyberspace.html)
What is “Cyber crime”? “Crime committed over the Internet” – The
Oxford Reference Online “Crime as any crime that is committed by means of special knowledge or expert use of computer technology” - The Encyclopedia Britannica
“Any illegal act involving a computer, its systems, or its applications” - Kelly R. Burke, District Attorney, Houston Judicial Circuit
“Any illegal act committed using a computer network (especially the Internet)” – Debra Littlejohn Shinder, MCSE.
Any crime committed through the computer networks using software, application, network service and know how – Ashwar Aziz LL.B
Types of Cyber Crime Network unauthorized access & penetration Theft of proprietary information Financial fraud using computers, internet Sabotage of data or networks Disruption of network Creation and distribution of computer viruses
Software, intellectual property piracy Identity theft Terrorism
CYBERLAW“…REFERS TO ALL THE LEGAL AND REGULATORY ASPECTS OF Internet and the World Wide Web. Anything concerned with or related to or emanating from any legal aspects
or issues concerning any activity of netizens in and concerning Cyberspace comes
within the ambit of Cyberlaw.”
Continues …. OBJECTIVES To provide a comprehensive framework of societal and commerce - enabling laws which encompass aspects concerning security of information and network integrity and reliability
To create the right development of the communication and multimedia industry and to position Malaysia as a major hub for the communications and multimedia information and content services
MALAYSIA’S ICT LEGAL FRAMEWORKThe
TelemedicineAct 1997
The ComputerCrimes Act 1997
TheCommunicationand MultimediaAct (1998)
The Copyright(Amendment) Act
1997
MALAYSIANCYBERLAWS
DigitalSignature Act
1997
The ElectronicTransactions
legislation (ETA)
The ElectronicGovernmentActivities
legislation (EGA)
Personal DataProtection Legislation
THE NEED FOR CYBER LAWS
Existing laws do not always sufficiently cover new multimedia applications
Uncertainty about legal framework stifles development of business and hinders the development of Malaysia as a knowledge-based society and knowledge-based economy.
Existing Cyber Laws
Purpose
The Computer Crimes Act 1997(01/06/2000)
Covers offences relating to misuse of computers
The Copyright (Amendment) Act 1997
Scope of Copyright protection widened to cover communications to public through wire or wireless means
The Telemedicine Act 1997 To facilitate the practice of Telemedicine
Digital Signature Act 1997(01/10/1998)
To regulate the use of Digital signatures and provide its legal status for electronic transactions
The Communications & Multimedia Act 1998(01/04/1999)
To regulate and facilitate the development of converging communications and multimedia industry.
MALAYSIAN TECHNOLOGY/ COMPUTER CRIME CASES E-Mail Abuse (Malicious/ False/ Harassment/ Impersonation)
Hacking/ Cracking. Identity Theft. Forgery of Valuable Documents (Currency/ Cheques/ Passports/ I.D.s
E-commerce Cheating Telecommunication Line Theft
Categories of Computer Crime Computer assisted crime Computer specific or targeted crime
Computer is incidental e.g. Equity funding 414 Gang Kevin Mitnick The Cuckoo’s Egg
Today’s Cyber-crime Serious Criminals
• More organized• Possibly socially isolated• Knowledgeable• Increasing use by Organized Crime
Motivation• Greed• Revenge• Ego
Method• Can strike from ANYWHERE • Information only commodity that can be stolen without being taken!
TREND- New Millenium The new millennium has created big challenges to enforcement agencies whereby the modus of operation (M.O) has become more sophisticated.
Evolution of transnational crime in a globalize world:
- Crime committed through internet - Cyber terrorism - Money laundering - Hacking skills being combined with criminal intent (Syndicates)
- Economic sabotage
MCMC Cyber Crime Enforcement
2005 – 13 cases investigated–Web defacement–Websites containing offering illegal activities & obscene materials–Web blogs containing annoying comments– Emails abuse –Service, network hacking
Nature & Characteristics of Cyber Crime
Anonymous Enormous range Occurs at high velocity Cross border Multi threats and impact – economic, social, religious, racial, terrorism
Technology oriented Age group – 16 – 40 years old
THE EXTENT OF CRIMINAL ACTIVITIES ON CYBER CRIME
1. Downloading/ Distribution of child/ adult pornography
2. The spreading or incitement of hate propaganda/ seditious matters
3. Pyramid/ Book making schemes4. On-line gambling/ betting. 5. Credit Card/ E-Commerce Fraud.6. Advance fee fraud7. Evasion of sales tax8. Extortion and information theft/ warfare9. Cyber attack of key industries/ installations10.Hacking/ illegal intrusions11. Spreading of viruses/ worms/ mailbombs, now botnets12. Spamming.13.Online money laundering
WHY? Just for fun ! Suka-suka !! Test of skills Anonymity Nature of internet – fast and immediate
Easy money Trans-border
Benefits of enacting cyber laws
Business can operate within framework that specifies the legal status of digital transactions and property rights and minimize conflict
Consumer obtain protection against new types of infringements of their consumer and privacy rights, and thus build the necessary trust to use new applications
Government can maintain the necessary amount of control over “cyberspace” to ensure that public interest objectives are met and that cyber crime is minimized.
FUTURE CHALLENGES Hacking skills being combined with criminal intent (Syndicates) such as website sabotage/ database ‘kidnapping’ or even cyber-terrorism. Eg. Botnets
E-Banking Fraud, on a more wider and systematic scale. Attack on E-commerce websites.
Telecommunication line theft. Criminals linked via networks, worldwide. Eg. Cryptography
Wi-Fi implementation. Identification issue. 3G (next 3.5G) digital telephone technology The wider and more rapid online distribution of illegal material .
Phone Viruses: Lasco.A, Cabir.H etc.
CONCLUSION Threats of cyber crime is left unchecked will be disastrous on the nation, society, economy and security.
It is the collective responsibility of all to ensure that technology is not abused.
Be a disciplined user.
Case StudyNegarakuku 我我我我我我 by NAMEWEE - www.namewee.com
IsuBidang kuasa statut Malaysia tertakhluk dalam Malaysia sahaja.
Lagu Negaraku di duplicate dari lagu “Mamula Moon”