"The law isn't justice. It's a very imperfect mechanism. If you press exactly the right buttons and are also lucky, justice may show up in the answer. A mechanism is all the law was ever intended to be."
Thursday, December 17, 2009
- tAkE hOmE tUtOr!aL -
Question:
a) Andrew is a computer science attached with Microhard Corporation in Cyberjaya as a practical trainee. One day he managed to crack the company's information system but did not do anything afterwards. The following day he also managed to intrude into Microhard Corporation's website system and then posted his picture on the front page of the website and left his mobile number below his picture, hoping that someone will call him and make friends. Subsequently his phone rang, but unfortunately it was his training manager who called and later warned him that actions will be taken. Upon investigations, it was also revealed that Andrew had previously leaked the company's system access code to his friend at University, to whom he also sent emails telling bad things about his manager. Advise Microhard Corporation on various potential liabilitites of Andrew from the above incident, with reference to various cybercrime laws applicable in Malaysia.
Answer:
Issue 1
Crack the company's information system but did not do anything afterwards.
Cracking is also known as hacking.It is also can be define as unauthorize access.
According to Computer Crime Act 1997 under section 3(1):
A person shall be guilty of an offence if (a) he causes a computer to perform any function with intent to secure access to any program or data held in any computer; (b) the access he intends to secure is unauthorized; and (c) he knows at the time when he causes the computer to perform the function that that is the case.
A person shall be guilty of an offence if (a) he causes a computer to perform any function with intent to secure access to any program or data held in any computer; (b) the access he intends to secure is unauthorized; and (c) he knows at the time when he causes the computer to perform the function that that is the case.
By virtue of this provision, the following acts are prohibited:
–Unauthorized access to computer, computer system and computer network
–Recreational hacking!
–Computer cracking to explore loopholes in the system
–System intrusion
–System and e-mail spoofing
The section also stating that if a person found guilty under this section,he or she can be fine maximum RM50,000 or 5 years imprisonment or both.
Issue 2
Intrude into Microhard Corporation's website system and then posted his picture on the front page of the website and left his mobile number below his picture.
By posting his picture and left his mobile number on the front page of the Microhard Corporation's website,he had done an unauthorized modification to the company's website.
According to the section 5(1) under CCA 1997:
A person shall be guilty of an offence if he does any act which he knows will cause unauthorized modification of the contents of any computer.
By virtue of this provision, the following acts are punishable offences:
–Unauthorized alteration, amendment and modification of data
–System intrusion and sabotage
–Website defacing
–System and website destruction
–Spreading virus that may cause data alteration or system destruction
Person who found guilty under this section will be fine maximum RM100,000 or 7 years imprisonment or both.However,if the act is done with further intention of causing injury,the guilty person can be fine up to RM150,000 or 10 years imprisonment or both.
Issue 3
Leaked the company's system access code to his friend.
Sharing company's system code to a friend who is outside the company can also be defined as wrongful communication of access code.
According to section 6(1) under CCA 1997:A person shall be guilty of an offence if he communicates directly or indirectly a number, code, password or other means of access to a computer to any person other than a person to whom he is duly authorized to communicate.
With this provision, it is clearly an offence for any person to let unauthorized people know any means of access to a computer system (in the form of number, code, PIN, passwords, etc.). This provision is very important to ensure the confidentiality and integrity of an information and data stored in the computer system.
Person who found guilty under this section can be fine maximum RM25,000 or 3 years imprisonment or both.
Issue 4
Sent emails telling bad things about his manager.
It is not good to talk bad about other people.As a human being,no one likes to be talked badly about themself.
According to the Communication & Multimedia Act 1998 under section 211:
It is an offense for any person who by means of any network facilities or network services or applications service knowingly
–makes, creates or solicits; and
–initiates the transmission of,
–any comment, request… which is offensive in character,
–with intent to annoy, abuse, threaten or harass another person.
It is an offense for any person who by means of any network facilities or network services or applications service knowingly
–makes, creates or solicits; and
–initiates the transmission of,
–any comment, request… which is offensive in character,
–with intent to annoy, abuse, threaten or harass another person.
Person who found guilty under this section can be fine RM50,000 or 1 year imprisonment or both.
source: Cyber Crime powerpoint slide by Sir Sonny Zulhuda
Wednesday, December 16, 2009
- mY pOsTeR -

Below are the ways how a password can be stolen:-
•Neglected unsafely
•‘Borrowed’ by colleagues…
•Shoulder surfing…
•‘Borrowed’ by colleagues…
•Shoulder surfing…
It is discouraged to act as follow:-
- Writing down a password in an insecure and easily accessible place (e.g. on a small paper pasted to PC monitor or left on the office desk)
- Keeping passwords unchanged for a long period of time.
- Keeping passwords unchanged after communicating them to others in the events of emergency.
password sharing can cause many harm such as identity thief..so,beware everyone..remember..DON'T SHARE YOUR PASSWORD!!!
source:BBL 3014 powerpoint slide
- tYpEs oF cYbErCr!Me -

Spam
1. The most common type of cyber crime is spam. While email spam laws are fairly new, there have been laws on the books regarding "unsolicited electronic communications" for many years.
Fraud
2. Credit fraud is another common form of cyber crime. Certain computer viruses can log keystrokes on your keyboard and send them to hackers, who can then take your Social Security number, credit card number and home address. This information will be used by the hacker for his own means.
2. Credit fraud is another common form of cyber crime. Certain computer viruses can log keystrokes on your keyboard and send them to hackers, who can then take your Social Security number, credit card number and home address. This information will be used by the hacker for his own means.
Cyber Bullying
3. Harassment, or cyber bullying, is a growing problem among teenagers. Many countries in Europe and several states in the United States have laws to punish those who consistently harass somebody over the Internet.
3. Harassment, or cyber bullying, is a growing problem among teenagers. Many countries in Europe and several states in the United States have laws to punish those who consistently harass somebody over the Internet.
Drug Trafficking
4. Believe it or not, drug trafficking is happening over the Internet. Many traffickers use encrypted email or password-protected message boards to arrange drug deals.
4. Believe it or not, drug trafficking is happening over the Internet. Many traffickers use encrypted email or password-protected message boards to arrange drug deals.
Cyberterrorism
5. There are many forms of cyberterrorism. Sometimes it's a rather smart hacker breaking into a government website, other times it's just a group of like-minded Internet users who crash a website by flooding it with traffic. No matter how harmless it may seem, it is still illegal.
5. There are many forms of cyberterrorism. Sometimes it's a rather smart hacker breaking into a government website, other times it's just a group of like-minded Internet users who crash a website by flooding it with traffic. No matter how harmless it may seem, it is still illegal.
Piracy
6. Far and away the most talked about form of cyber crime is thievery. Yes, downloading music from peer-to-peer websites is illegal and therefore a form of cyber crime.
6. Far and away the most talked about form of cyber crime is thievery. Yes, downloading music from peer-to-peer websites is illegal and therefore a form of cyber crime.
- CyBeRcR!mE -

Cybercrime is criminal activity done using computers and the Internet. This includes anything from downloading illegal music files to stealing millions of dollars from online bank accounts. Cybercrime also includes non-monetary offenses, such as creating and distributing viruses on other computers or posting confidential business information on the Internet.Perhaps the most prominent form of cybercrime is identity theft, in which criminals use the Internet to steal personal information from other users. Two of the most common ways this is done is through phishing and pharming. Both of these methods lure users to fake websites (that appear to be legitimate), where they are asked to enter personal information. This includes login information, such as usernames and passwords, phone numbers, addresses, credit card numbers, bank account numbers, and other information criminals can use to "steal" another person's identity. For this reason, it is smart to always check the URL or Web address of a site to make sure it is legitimate before entering your personal information.Because cybercrime covers such a broad scope of criminal activity, the examples above are only a few of the thousands of crimes that are considered cybercrimes. While computers and the Internet have made our lives easier in many ways, it is unfortunate that people also use these technologies to take advantage of others. Therefore, it is smart to protect yourself by using antivirus and spyware blocking software and being careful where you enter your personal information.
Tuesday, December 15, 2009
- uNsOuNd m!nD -
Accused to be sent for mental tests
" Tan, 53, was charged in the Sessions Court with causing grievous hurt by splashing acid on his daughter Tan Hui Linn, 17, in a house at Jalan Batu Lanchang at 3am on Oct 24.
Tan is also facing another charge of murdering his wife Chong Swee Lin, 50, by splashing acid on her at the same place and day. "
Saturday December 5, 2009
This article is about a man who was faced two charges after causing a serious injuries to her daughter and murdering her wife by splashing acid to their face and body.He was charged under Section 326 of the Penal Code which carries a maximum 20 years’ jail and a fine or whipping for the first charged and under Section 302 of the Penal Code which carries the mandatory death sentence upon conviction for the second charged.The case had been heard at the session court in George Town on December 4.However,he is allowed by the session court to be sent for psychiatric observation after the session judge allowing the application by the man charged.The first case will be mention again on Jan 4 and the second case will be mention on December 11.
Nowadays,anything can happen anywhere.How can we feel safe even in our own home with our own family?
Sunday, December 13, 2009
- f!sHiNg oR pH!sHiNg -

(fish´ing) (n.) The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user’s information.

Phishing, also referred to as brand spoofing or carding, is a variation on "fishing," the idea being that bait is thrown out with the hopes that while most will ignore the bait, some will be tempted into biting.
case 1
2003 saw the proliferation of a phishing scam in which users received e-mails supposedly from eBay claiming that the user’s account was about to be suspended unless he clicked on the provided link and updated the credit card information that the genuine eBay already had. Because it is relatively simple to make a Web site look like a legitimate organizations site by mimicking the HTML code, the scam counted on people being tricked into thinking they were actually being contacted by eBay and were subsequently going to eBay’s site to update their account information. By spamming large groups of people, the “phisher” counted on the e-mail being read by a percentage of people who actually had listed credit card numbers with eBay legitimately.
case 2
In one fairly typical case before the Federal Trade Commission (FTC), a 17-year-old male sent out messages purporting to be from America Online that said there had been a billing problem with recipients' AOL accounts. The perpetrator's e-mail used AOL logos and contained legitimate links. If recipients clicked on the "AOL Billing Center" link, however, they were taken to a spoofed AOL Web page that asked for personal information, including credit card numbers, personal identification numbers (PINs), social security numbers, banking numbers, and passwords. This information was used for identity theft.
sources:
Monday, December 7, 2009
- DrUg tRaFf!cKiNg -
Indonesian gets death for drug trafficking
"In his defense, Alan had testified that the plastic bag containing the compressed ganja belonged to his friend Udin who had asked him to come to the warehouse for a job.Alan claimed that Udin dumped the bag and ran away upon seeing the police. However, according to witnesses, it was Alan who was holding the bag, which he threw away upon seeing the police."
Saturday December 5, 2009
This article is about an indonesian labourer,Alan Setiawan,38,from Sumatra,who was nabbed by police at a fertelizer warehouse at Port Klang for trafficking 1.7kg of ganja. He was found guilty and sentenced to death by the High Court.K.A. Ramu represented Alan while DPP Mohd Nordin Ismail appeared for the prosecution.
What is maen by trafficking?In one of our tutorial section,Sir Sonny had mentioned about trafficking.Trafficking mean tranportation.If I'm not mistaken,the punishment for guilty of drug trafficking is more strict than the punishment for guilty of being drug addict.So,beware everybody,do not ever get close to whatever kinds of drugs,whether as a drug addict,drug tranporter,drug dealer or etc.As long as you dealing with drug in illegal way,you will be punish!
Subscribe to:
Posts (Atom)