Thursday, December 17, 2009

- Today's Quote -

"The law isn't justice. It's a very imperfect mechanism. If you press exactly the right buttons and are also lucky, justice may show up in the answer. A mechanism is all the law was ever intended to be."

Raymond Chandler (1888-1959) U.S. writer of detective fiction.

- tAkE hOmE tUtOr!aL -

Question:
a) Andrew is a computer science attached with Microhard Corporation in Cyberjaya as a practical trainee. One day he managed to crack the company's information system but did not do anything afterwards. The following day he also managed to intrude into Microhard Corporation's website system and then posted his picture on the front page of the website and left his mobile number below his picture, hoping that someone will call him and make friends. Subsequently his phone rang, but unfortunately it was his training manager who called and later warned him that actions will be taken. Upon investigations, it was also revealed that Andrew had previously leaked the company's system access code to his friend at University, to whom he also sent emails telling bad things about his manager. Advise Microhard Corporation on various potential liabilitites of Andrew from the above incident, with reference to various cybercrime laws applicable in Malaysia.
Answer:
Issue 1
Crack the company's information system but did not do anything afterwards.
Cracking is also known as hacking.It is also can be define as unauthorize access.
According to Computer Crime Act 1997 under section 3(1):
A person shall be guilty of an offence if (a) he causes a computer to perform any function with intent to secure access to any program or data held in any computer; (b) the access he intends to secure is unauthorized; and (c) he knows at the time when he causes the computer to perform the function that that is the case.

By virtue of this provision, the following acts are prohibited:
Unauthorized access to computer, computer system and computer network
–Recreational hacking!
–Computer cracking to explore loopholes in the system
–System intrusion
–System and e-mail spoofing
The section also stating that if a person found guilty under this section,he or she can be fine maximum RM50,000 or 5 years imprisonment or both.
Issue 2
Intrude into Microhard Corporation's website system and then posted his picture on the front page of the website and left his mobile number below his picture.
By posting his picture and left his mobile number on the front page of the Microhard Corporation's website,he had done an unauthorized modification to the company's website.
According to the section 5(1) under CCA 1997:
A person shall be guilty of an offence if he does any act which he knows will cause unauthorized modification of the contents of any computer.

By virtue of this provision, the following acts are punishable offences:
Unauthorized alteration, amendment and modification of data
–System intrusion and sabotage
–Website defacing
–System and website destruction
–Spreading virus that may cause data alteration or system destruction
Person who found guilty under this section will be fine maximum RM100,000 or 7 years imprisonment or both.However,if the act is done with further intention of causing injury,the guilty person can be fine up to RM150,000 or 10 years imprisonment or both.
Issue 3
Leaked the company's system access code to his friend.
Sharing company's system code to a friend who is outside the company can also be defined as wrongful communication of access code.
According to section 6(1) under CCA 1997:A person shall be guilty of an offence if he communicates directly or indirectly a number, code, password or other means of access to a computer to any person other than a person to whom he is duly authorized to communicate.
With this provision, it is clearly an offence for any person to let unauthorized people know any means of access to a computer system (in the form of number, code, PIN, passwords, etc.). This provision is very important to ensure the confidentiality and integrity of an information and data stored in the computer system.
Person who found guilty under this section can be fine maximum RM25,000 or 3 years imprisonment or both.
Issue 4
Sent emails telling bad things about his manager.
It is not good to talk bad about other people.As a human being,no one likes to be talked badly about themself.
According to the Communication & Multimedia Act 1998 under section 211:
It is an offense for any person who by means of any network facilities or network services or applications service knowingly
–makes, creates or solicits; and
–initiates the transmission of,
–any comment, request… which is offensive in character,
–with intent to annoy, abuse, threaten or harass another person.
Person who found guilty under this section can be fine RM50,000 or 1 year imprisonment or both.
source: Cyber Crime powerpoint slide by Sir Sonny Zulhuda

Wednesday, December 16, 2009

- mY pOsTeR -




This is my poster titled " STOP! Don't share your PASSWORD" .
Below are the ways how a password can be stolen:-

Neglected unsafely
•‘Borrowed’ by colleagues…
Shoulder surfing…

It is discouraged to act as follow:-
  • Writing down a password in an insecure and easily accessible place (e.g. on a small paper pasted to PC monitor or left on the office desk)
  • Keeping passwords unchanged for a long period of time.
  • Keeping passwords unchanged after communicating them to others in the events of emergency.

    password sharing can cause many harm such as identity thief..so,beware everyone..remember..DON'T SHARE YOUR PASSWORD!!!

source:BBL 3014 powerpoint slide

- tYpEs oF cYbErCr!Me -

As Internet usage continues to rise throughout the world, the threat of cyber crime also grows. While some of these crimes are relatively harmless and commonplace, others are very serious and carry with them felony charges. Here are a few of the more common forms of cyber crime.

Spam
1. The most common type of cyber crime is spam. While email spam laws are fairly new, there have been laws on the books regarding "unsolicited electronic communications" for many years.

Fraud
2. Credit fraud is another common form of cyber crime. Certain computer viruses can log keystrokes on your keyboard and send them to hackers, who can then take your Social Security number, credit card number and home address. This information will be used by the hacker for his own means.

Cyber Bullying
3. Harassment, or cyber bullying, is a growing problem among teenagers. Many countries in Europe and several states in the United States have laws to punish those who consistently harass somebody over the Internet.

Drug Trafficking
4. Believe it or not, drug trafficking is happening over the Internet. Many traffickers use encrypted email or password-protected message boards to arrange drug deals.

Cyberterrorism
5. There are many forms of cyberterrorism. Sometimes it's a rather smart hacker breaking into a government website, other times it's just a group of like-minded Internet users who crash a website by flooding it with traffic. No matter how harmless it may seem, it is still illegal.

Piracy
6. Far and away the most talked about form of cyber crime is thievery. Yes, downloading music from peer-to-peer websites is illegal and therefore a form of cyber crime.



- CyBeRcR!mE -


Cybercrime is criminal activity done using computers and the Internet. This includes anything from downloading illegal music files to stealing millions of dollars from online bank accounts. Cybercrime also includes non-monetary offenses, such as creating and distributing viruses on other computers or posting confidential business information on the Internet.Perhaps the most prominent form of cybercrime is identity theft, in which criminals use the Internet to steal personal information from other users. Two of the most common ways this is done is through phishing and pharming. Both of these methods lure users to fake websites (that appear to be legitimate), where they are asked to enter personal information. This includes login information, such as usernames and passwords, phone numbers, addresses, credit card numbers, bank account numbers, and other information criminals can use to "steal" another person's identity. For this reason, it is smart to always check the URL or Web address of a site to make sure it is legitimate before entering your personal information.Because cybercrime covers such a broad scope of criminal activity, the examples above are only a few of the thousands of crimes that are considered cybercrimes. While computers and the Internet have made our lives easier in many ways, it is unfortunate that people also use these technologies to take advantage of others. Therefore, it is smart to protect yourself by using antivirus and spyware blocking software and being careful where you enter your personal information.






Tuesday, December 15, 2009

- uNsOuNd m!nD -

Accused to be sent for mental tests
" Tan, 53, was charged in the Sessions Court with causing grievous hurt by splashing acid on his daughter Tan Hui Linn, 17, in a house at Jalan Batu Lanchang at 3am on Oct 24.
Tan is also facing another charge of murdering his wife Chong Swee Lin, 50, by splashing acid on her at the same place and day. "
Saturday December 5, 2009
This article is about a man who was faced two charges after causing a serious injuries to her daughter and murdering her wife by splashing acid to their face and body.He was charged under Section 326 of the Penal Code which carries a maximum 20 years’ jail and a fine or whipping for the first charged and under Section 302 of the Penal Code which carries the mandatory death sentence upon conviction for the second charged.The case had been heard at the session court in George Town on December 4.However,he is allowed by the session court to be sent for psychiatric observation after the session judge allowing the application by the man charged.The first case will be mention again on Jan 4 and the second case will be mention on December 11.
Nowadays,anything can happen anywhere.How can we feel safe even in our own home with our own family?

Sunday, December 13, 2009

- hAve a BrEaK -


- Today's Quote -

"successful lawsuit is the one worn by a policeman."

Robert Frost (1875-1963) American Poet.
any comments?

- f!sHiNg oR pH!sHiNg -


(fish´ing) (n.) The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user’s information.
Phishing, also referred to as brand spoofing or carding, is a variation on "fishing," the idea being that bait is thrown out with the hopes that while most will ignore the bait, some will be tempted into biting.
case 1
2003 saw the proliferation of a phishing scam in which users received e-mails supposedly from eBay claiming that the user’s account was about to be suspended unless he clicked on the provided link and updated the credit card information that the genuine eBay already had. Because it is relatively simple to make a Web site look like a legitimate organizations site by mimicking the HTML code, the scam counted on people being tricked into thinking they were actually being contacted by eBay and were subsequently going to eBay’s site to update their account information. By spamming large groups of people, the “phisher” counted on the e-mail being read by a percentage of people who actually had listed credit card numbers with eBay legitimately.

case 2
In one fairly typical case before the Federal Trade Commission (FTC), a 17-year-old male sent out messages purporting to be from America Online that said there had been a billing problem with recipients' AOL accounts. The perpetrator's e-mail used AOL logos and contained legitimate links. If recipients clicked on the "AOL Billing Center" link, however, they were taken to a spoofed AOL Web page that asked for personal information, including credit card numbers, personal identification numbers (PINs), social security numbers, banking numbers, and passwords. This information was used for identity theft.

sources:



Monday, December 7, 2009

- hAve a BrEaK -


- Today's Quote -


"The trouble with law is lawyers. "

Clarence S. Darrow (1857-1938) American lawyer
hahahaha...
do you guys agree?

- DrUg tRaFf!cKiNg -

Indonesian gets death for drug trafficking
"In his defense, Alan had testified that the plastic bag containing the compressed ganja belonged to his friend Udin who had asked him to come to the warehouse for a job.Alan claimed that Udin dumped the bag and ran away upon seeing the police. However, according to witnesses, it was Alan who was holding the bag, which he threw away upon seeing the police."
Saturday December 5, 2009
This article is about an indonesian labourer,Alan Setiawan,38,from Sumatra,who was nabbed by police at a fertelizer warehouse at Port Klang for trafficking 1.7kg of ganja. He was found guilty and sentenced to death by the High Court.K.A. Ramu represented Alan while DPP Mohd Nordin Ismail appeared for the prosecution.
What is maen by trafficking?In one of our tutorial section,Sir Sonny had mentioned about trafficking.Trafficking mean tranportation.If I'm not mistaken,the punishment for guilty of drug trafficking is more strict than the punishment for guilty of being drug addict.So,beware everybody,do not ever get close to whatever kinds of drugs,whether as a drug addict,drug tranporter,drug dealer or etc.As long as you dealing with drug in illegal way,you will be punish!

Monday, November 23, 2009

- k!dNaPpEd & rApEd By fOrMeR cOnV!cT -

Victim’s dad nab kidnapper
"The suspect kidnapped the victim on Friday evening, by forcing her to ride pillion on his motorcycle, about 500m from her home near here.
She said the suspect was convinced by her story and dropped her at the doorstep of her house. She then got her father and neighbors to nab the man."
Sunday November 22, 2009
By C.A. ZULKIFLE
This article is about a year five pupil who been kidnapped by an ex-convict on one friday evening.At that evening,the victim was forced by the suspect to ride on his motorcycle,500m from her home.She was then been taken to a house at Ketereh.She was also raped by the suspect.She then cried throughout the night and pleaded the suspect to send her home.The suspect was convince by her story and sent her home but warn her not to tell her parent or police.However,after reached her home and enter her house,she quickly inform her father who was home.Her father and other neighbors then nab the suspect.According to the State CID Chief ACP Mazlan Lazim,police was investigating the case under section 363 and section 376 of Penal Code for kidnap and rape.
Crime can happen anyway,even near our own home.Kidnap and rape cases have increase lately as we can hear many such cases in our country.
My advice to all the girl out there,do not walk alone even during the day because criminal can be anywhere and unexpected.Do not talk to strangers.Do not simply except anyone invitation to ride his or her car.As for parent,always make sure that your child reach home safely.If possible,fecth your child from school or work place.
As for the kidnapper and raper,they should be punish with suitable punishment so that they learn the lesson.

Sunday, November 22, 2009

- Today's Quote -

"If there were no bad people,
there would be no good lawyers."

Charles Dickens (1812-1870) British novelist.
In my opinion,I agree with this quote.This is because lawyers is one whose profession is to conduct lawsuits for clients, or to advise as to prosecution or defence of lawsuits, or as to legal rights and obligations in other matters.If there is no bad people,how can a lawyer has a job to do,and how can they measures their job performance?Do you agree?

- uNeXpEcTeD pErSoN -

Girl and stepmum held over bid to kill first

"Police have arrested a 15-year-old
girl for allegedly trying to
kill her mother by smothering her with a sarong
laced with formic acid or cuka getah.
The woman fended off her attacker and was shocked to discover that it was her own daughter. "

Sunday November 22, 2009
By RUBEN SARIO

http://thestar.com.my/news


This news is about a young girl age 15-year-old who tried to kill her own mother.On 9th Nov,her stepmother gave her a formic acid and order her to kill her mother.Her stepmother was jelous about her husband's first wife.
After reading thid news,I was really shocked.How can a daugther kill her own mother.Did she not felt pity on her own mother?
Nowadays,people are becoming more daring.Some people are not afraid of committing crime.Even a minor are not afraid of commtting crime.We can hear many crime happens nowadays.Sometimes,the crime happened in their own home and committed by their own family members.For example,the case above where a daughter tried to kill her own mother,the mother who gave birth to her.Home suppose to be a safe place for us people to stay.However,nowadays,we can seem to be safe even in our own home,even with our own family members.Why is this happening?Are your home safe?


- iN tHe PaSt -

During our 2nd tutorial class..Sir Sonny had mentioned about a few methods of determining a guilty person that had been used in the past,they may be sound ridiculous,but Sir Sonny said they are really being implemented in the past..and as i remember,the methods that Sir Sonny had mentioned is as follow :-

(1) The guilty person's hand will be tight and his/her body with be covered with a big 'karung' and the 'karung' will also be tight,then the guilty person will be throw into the water,if the guilty person sink,then that person is to be said not guilty because the water accept him/her,however,if the person do not sink,then that person is said to be guilty because the water do not accept him/her.

(2) A few accused person will be bring together,then they will be ask to put their hand in the hot oil or hot water,if a person is guilty,his/her hand will feels hot,and if a person is not guilty,his/her hand would not feels hot.

(3) A few accused persons will be bring into a room and a witch will be called into the room,after reading a mantra,the witch will determine which person is guilty.

In my opinion,all of these methods are not suitable in determining a guilty person,besides,it is also unfair..and luckily,now,all these methods had been abolished..

- 1st tUtOr!aL cLaSs -

in our 1st tutorial class..Sir Sonny ask us to form a group of 5 person,and each group is requires to bring an article that related to any legal issues and present it..1 of the group had mentioned about adultery..at first,i really do not know the meaning of adultery,after being translated by one of the student,then i know 'adultery' means someone having affair with another person who is married..before this,i though only for Muslim that it is wrong to commit adultery,i had never know that adultery is against the law in Malaysia,even for non-Muslim..and more suprising me is that if someone is caught of commiting adultery,that person can be put into prison..so,watch out everyone!!

- iNtrOduCt!oN -

hello everyone welcome to a new sem..this sem is short sem and it will only be 8 weeks of classes plus 1 week for exams..in this sem..i had register for 3 subject which include a subject called 'Legal Framework for Multimedia'..as it has the term 'Legal' and 'Multmedia',in my mind,it must be something related to the legal issues and something related to cyber world..my lecturer for this subject is Sir Sonny Zulhuda..at first i though he is Malaysian..but after attending my first class with him,i notice that the way he talk just not like Malaysian,and when i know his name,then i guess he maybe from Indonesia..anyway,i like the way he teach and he always make the sutdent laugh during the classes..plus,he also always smile which make us feel comfortable..i hope this class will not be boring because before this,in my opinion,learning about law is boring..however,after attending classes with Sir Sonny,i realize that learning about law is quite interesting and i'm quite exited..i hope we will have fun in learning this subject..GOODLUCK EVERYONE!!