Thursday, December 17, 2009

poster : cyber crime

Internet Use Raises Privacy Concerns


The Internet brings us great websites full of information and entertainment, and email and chat have revolutionized communication.

But there's a dark side, too, as Internet users are increasingly concerned about how much of their personal information they're giving up in exchange. VOA's Art Chimes reports on the debate over Internet privacy.

As more and more people are realizing, we often reveal a lot of information about ourselves when we go online, information we may not realize we're disclosing, but which advertisers and commercial websites can use to sell us goods and services.

Sometimes the information is openly requested: you register on a website and you fill out a form. Next time you log into the site, you find ads for sporting equipment if you registered as a young man, or maybe cosmetics if you're a woman. Other times, websites and advertisers seem to magically know our interests.

They can do this because of cookies, little text files created on your computer that contain information left there by the websites you visit.

U.S. Internet service provider AOL explains the process with an online animation featuring a penguin who visits a fictional website called AnchovyGourmet. The company's chief privacy officer Jules Polonetsky explains what happens next.

"He's reading about anchovies. You sort-of see him getting this cookie that labels him an anchovy-liker. He then goes to PenguinTimes.com. He wants to know about global warming. He's worried; he's a penguin. Boom! There he gets the anchovy ad. The ad company reads the cookie to display an ad."

The advertiser may not know the penguin's name or address, just that he likes anchovies. The penguin animation invites viewers to check out AOL's privacy site, where visitors can read the company's privacy policy and learn more about how targeted, or behavioral advertising works.

Critics, however, point to surveys that indicate web users don't understand privacy policies, even when they are clearly stated.

One reason for that, says privacy advocate Marc Rotenberg of the Electronic Privacy Information Center, is that so-called privacy policies often aren't about preserving privacy at all.

"I don't think people are wrong to believe that [the existence of] a privacy policy means that their personal information won't be disclosed to others," Rotenberg says. "I think businesses are wrong to post a privacy policy and then believe that it provides a basis for them to disclose the information to others. That's where the problem arises."

The biggest Internet company of them all, Google, has a slogan, "don't be evil," but privacy advocates have criticized some of its policies, such as retaining some identifying information along with your search query. Google recently launched a YouTube channel with short videos explaining privacy policies in plain English.

"To improve our search results, as well as maintain security and prevent fraud, we remember some basic information about searches," explains a Google software engineer in one video. "So what information does Google collect? Let's find out, starting with a simple search...."

Representatives from Google and AOL, plus scholars and critics, gathered in Washington recently for a symposium on Internet privacy. It was sponsored by the communications schools of the University of Pennsylvania and the University of Southern California.

Academic researchers are starting to take an interest in Internet privacy. At Northwestern University in Chicago, Dr. Eszter Hargittai has been surveying students about their understanding of key Internet concepts. You would think if anyone would be knowledgeable about the Internet and some of the pitfalls of surfing the web, it would be university students. But that's not what she found.

"Even among young people, there's a lot of lack of understanding," she said. "And age is a predictor of skills, so if you go into older populations it's only going to get worse. But this is already pretty bad, right?"

This is an issue that government regulators are also studying. The U.S. Federal Trade Commission, whose members are all Bush appointees, has favored industry self-regulation, which is to say requiring disclosure but not banning the collection of personal data from visitors to websites. That's despite the fact that surveys indicate that Internet users don't want their personal information collected, as FTC commissioner Pamela Harbour acknowledged.

"Consumers are concerned about behavioral advertising even if they do not know the practice by name. Implicitly, we can also conclude that present consumer education efforts are lacking. Policies alone can not cure the overall discomfort that consumers express toward the practice," Harbour said.

The advance of technology is making the collection and analysis of personal information easier for advertisers and commercial websites. The process continues, even though consumers may not know their information is being collected, or that their web activities are being tracked by advertisers.

sources: http://www1.voanews.com/english/news/science-technology/a-13-2008-04-29-voa44.html

Wednesday, December 16, 2009

tutorial

QA. Andrew is a computer science student attached with Microhard Corporation in Cyberjaya as a practical trainee. One day he managed to crack the company’s information system but did not do anything afterwards. The following day he also managed to intrude into Microhard’s Corporation’s website system and then posted his picture in the front page of the website and left his mobile number below his picture hoping that someone will call him and make friends. Subsequently his phone rang, but unfortunately it was his training manager who called and later warned him that actions will be taken. Upon investigation, it wad also revealed that Andrew had previously leaked the company’s system access code to his friends at University, to who he also sent emails telling bad things about his manager. Advise Microhard Corporation on various potential liabilities of Andrew from the above incidents, with reference to various cybercrimes laws applicable in Malaysia.

answer A.

Andrew manage to cracks the company’s information system but did not do anything afterwards.
- this case falls under unauthorized access to computer materials. even though he doesnt do anything on the company's information, but still accessing without authorized are consider criminal. Andrew are against the Computer Crimes Act 1997 (section 3(1) and can be punish as maximum RM 50,000.00 fine or to 5 years imprisonment or to both.

Andrew managed to intrude into Microhard’s Corporation’s website system and then posted his picture in the front page of the website and left his mobile number
- this case falls under unauthorized modification of the content of any computer. The applicable law would be CCA s.5 (1) which the punishment will be fined up to RM 100000 or up to 7 years imprisonment or both.

Andrew had previously leaked the company’s system access code to his friends at University, to who he also sent emails telling bad things about his manager
- falls under wrongful communication, leaking private data to third party CCA s.6(1) which the punishment will be fined up to RM 25000 or up to 3 years imprisonment or both.

QB. Meera has been receiving emails from travel companies that keep offering her holiday packages to various places in the world She replied to the senders to stop emailing her, but only to find that the emails keep coming and flooding her inbox. She came to you to on the legal aspects that may arise out of this practise by the travel company. Advise her on both criminal and data protection aspects.

Answer B.

spamming or misuse customer data is one of the crime that falls under Communications & Multimedia Act 1998. If found guilty, the travel companies would face fine up to RM50000 or imprisonment up to 1 year or both.

cybertracker: is it legal?

almost every MMU students know about cybertracker, and almost every hostel resident and even MMU staff use cybertracker as a medium to share file, info/news, advertisement and many more.
I can say that cybertracker is the only way for hostel resident in MMU to get some entertainment. A lot of stuff uploaded such as software, games, movies, mp3 songs, tv series and many more. however, is it legal to share all those stuff in one server for free or there is an exceptional for MMU student?

image below shows some of file uploaded to be share on cybertracker..

plenty of softwares available to be download

latest movies

mp3 songs. full album in highest quality.

latest games

cybertracker already serves and entertain MMU students for many years. almost everything you want are available on cybertracker. wheather cybertracker is actually legal or not, we just dont care, but please dont shutdown the server if not we(hostel resident) will bored to death~


Tuesday, December 15, 2009

copyright on flickr

Flickr is one of the largest photo sharing web resource. It hosts millions of images taken my amateur and professional photographers.
currently i am a flickr user. So some of my favourite photos will be uploded and share through the site. When dealing with photos or artwork through flickr, several rules you need to follow and take it serious especially the copyright issue.

Understanding different License conditions as per Creative Commons:

Attribution

Means you can copy, distribute and display the images(or any other piece of work). Also you can create derivative of the image. You can alter and modify the image at your will.. All you need to do is provide proper credit to original owner (Like linking back to the profile of uploader or direct flickr image page).

Noncommercial

Means you can copy, display and distribute the work but only for non commercial purpose.

No Derivative Works

Means you can copy, display and distribute the work as it is. You can not modify the work in any form.

Share Alike

Means you can use the image or work and distribute or display it under the same license to this one.

Flickr and CC License:
Images on flickr are either strictly copyrighted or fall under six CC license. Images marked as copyrighted (All Rights Reserved) are not meant to be copied or used in any any form. You cannot display or use these images until and unless you have prior permission from original author. Rest, other images are uploaded under following sic license.

Attribution License

Images uploaded under this license are best to use for your blog or site. You can modify these images and use it in any form you like. All you need to do is provide a proper credit and linkback to original owner.
Click here to search Images under Attribution License

Attribution-NoDerivs License

You can use these images as long as you credit the photographer and do not modimy the image. Images under this license are also a fair good deal for your blog or site.
Click here to search Images under Attribution-NoDerivs License

Attribution-NonCommercial License

You are free to modify and use these images by providing proper credit to photographer (or uploader). These images cannot be used for any commercial purpose. So if your blog or site is monetized by any paid advertising like Google Adsense, better not to use these type of images.
Also while using these type of images, its necessary to look into future possibilities of monetizing your blog/site. Your site/blog may not be displaying any paid advertisements right now, but in future you may change your mind and start monetizing the ad spaces. So better avoid these type of images on your webpage.
Click here to search Images under Attribution-NonCommercial License

Attribution-NonCommercial-NoDerivs License

Same as above one. But you are restricted to modify the images in any form and use them as it is.
Click here to search Images under Attribution-NonCommercial-NoDerivs License

Attribution-ShareAlike License

You are free to use and modify the images until you credit the photographer release the work under same license.
Click here to search Images under Attribution-ShareAlike License

Attribution-NonCommercial-ShareAlike License

Same as above. But the images cannot be used for any commercial purpose. You cannot use these type of images if your webpage as any paid ad space (like banners, text links or Contextual ads like Google adsense).

one of the cases involving plagiarism on flickr:

Photographer Gets Plagiarized then Censored

Rebekka Guðleifsdóttir is heralded as one of the top photographers on the photo-sharing site Flickr. Guðleifsdóttir, a native of Iceland, is well known for her self-portraits as well as her surreal landscapes.

However, she recently discovered that a photo printing site had not only posted several of her works under a false name (Yahoo! Cache Version), but was selling prints of those photos in their store. A search through their Ebay store turned up approximately £2,500 (about $5,000) in sold prints, all with her work.

Seeking repayment, Guðleifsdóttir turned to a local attorney who sent the company a stern letter. The company removed the works from their site and then fell quiet. No future correspondence was returned and Guðleifsdóttir, a single mother and a college student, was left footing the bill for the lawyer.

Understandably upset at this outcome, Guðleifsdóttir vented her frustration in her Flickr account.

The story struck a chord with the Flickr community. It quickly reached the front page of Digg (earning over 4000 Diggs) and the entry generated well over 400 comments.

However, the original entry was to be short lived. Only hours after it hit the front page of Digg, Yahoo!, who owns Flickr, removed the post. According to Guðleifsdóttir, Yahoo! cited alleged terms of service violations.

That, in turn, has kicked off another storm of controversy with many criticizing Yahoo!’s move as censorship.

But in addition to being an interesting case of plagiarism gone awry, the story also serves to illustrate many of the challenges that arise when trying to protect your works on the Web.

for full article click here

reference:
http://www.meetarpit.com/understanding-copyright-on-flickr/
http://www.plagiarismtoday.com/2007/05/16/photographer-gets-plagiarized-then-censored/

Indonesian Hackers Claim Web Attack on Malaysian Sites

A ring of Indonesian hackers on Monday claimed to have attacked scores of Malaysian Web sites, one more in a series of flashpoints threatening tenuous ties between neighbors.

The two countries have been embroiled in a string of spats over alleged misappropriation of cultural icons, reports of migrant worker abuse and territorial disputes.

A statement posted on a blog titled “Terselubung” says that a number of Malaysian Web sites had been hacked and defaced to “celebrate” Malaysia’s Independence Day, which was celebrated on Monday.

“Today, Aug. 31, 2009, an uncreative country, a country who likes to steal Indonesian culture, a country whose citizen is the mastermind of bombings in Indonesia, a country who has tortured many of our sisters — the migrant workers who worked there, a country who abused our national anthem, a country who harassed Indonesia on the Internet, a country that has stolen Sipadan and Ligitan islands, a country which has trespassed our water illegally, a country which received their independence from Britain, is celebrating its anniversary,” the Web site statement read.

“As good Indonesian citizens, we will celebrate their independence in our own way. We are celebrating by undertaking a mass attack on the country’s Web sites,” the statement continued.

The site then listed more than 120 Internet addresses, including domains for Malaysian education and tourism pages. But checks on a sample of the mentioned sites revealed only a few of them remained defaced, or that many had recovered from the attacks.

Official Malaysian sites were back to normal, and only a few private Web sites, including that of Leafyard, an Internet marketing company, still displayed the hacker’s message while others could not be opened for various reasons.

With the Indonesian national anthem playing in the background, the hacked Leafyard Web site was signed by M364tron and said: “One by one you take our culture, but we will not be silent. You will always be my main target.”

Teuku Faizasyah, spokesman of the Indonesian Foreign Ministry, expressed “regret” over the move by local hackers and called on both sides to keep cool.

“I think they have responded in an inappropriate manner that will only harm both sides,” Faizasyah said. “We don’t believe that the attacks on Malaysian Web sites will to a larger extent disturb bilateral relations, but they could somehow lead to the psychological state of being irritated, so everyone must cool down.”

Musni Umar, an Indonesian member of the Eminent Persons Group, an organization of experts and former leaders from the two countries, said the hackers were overreacting and the incident involved only young people who tended to act emotionally instead of rationally.

“I’m not worried about today, I’m worried about when this younger generation takes their turn to lead this country with a bad impression toward their neighbor,” said Umar, who is also a spokesman for the EPG.

“Yes, we must do something about it. Bilateral communications must involve youths to help them understand the importance of maintaining good relations with our neighbor.”

Irritation with Malaysia boiled over again last week after allegations that a Balinese dance had been used to promote a television show about Malaysia, though it was revealed soon afterward that no Malaysian government agency had a role in making the advertisement.

A screenshot of one of the Malaysian sites attacked by a ring of Indonesian hackers.

A screenshot of one of the Malaysian sites attacked by a ring of Indonesian hackers.



source: Kinanti Pinta Karana & Heru Andriyanto

Phishing attacks: No one is safe

Users of most of the top email services were targeted in a large-scale phishing attack. First to be hit was Microsoft's Live Hotmail. Microsoft also confirmed that a phishing attack was to blame for the 10,000 Hotmail passwords posted online.

Hotmail, Google and Yahoo! have joined a growing number of email service providers whose users have been duped by hackers into giving over their passwords in phishing attacks.

The British network said it has seen a list of some 20,000 hijacked e-mail accounts that included accounts from Gmail, Yahoo! Mail, AOL, Comcast and EarthLink. The latter two are major US Internet service providers.

The intrusions, which fool users into giving their details to a dummy website, come amid a sharp rise in the number of phishing attacks. According to the Anti-Phishing Working Group some 50,000 mass attacks took place in June 2009, almost double the number recorded in January.

Cyber criminals obtained the passwords by setting up fake websites identical to the main amail services and tricking users into giving their username and password information on the site.

It is widely feared that the stolen information will be used by to access email accounts and steal personal information.

What is Phishing?

Phishing is a criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.

How can internet users avoid falling prey to Phishing scams?

a) A user should not have the same username and password for multiple accounts as once a cyber thief has access to one account, it will be easy for him to access the other accounts.

b) Avoid clicking on weird requests to click on URLs or download software links

c) Get an antivirus software installed for your PC and keep your operating system up-to-date

d) Be on the guard and look out for URLs that divert you to other websites

e) Never follow links in an email claiming to be from your bank. Ignore these types of emails.

f) Adjust you browser settings to tighten up security especially if you use web based email. (Inputs from Agencies)

source: http://in.news.yahoo.com/242/20091008/1360/ttc-phishing-attacks-no-one-is-safe.html

Sunday, December 13, 2009

Friendster’s Fate: Sold to Malaysian E-commerce Giant

http://www.edopter.com/images_user/ideas/200809/NWgt68
Just a few days ago we heard rumours about the imminent sale of Friendster, one of the first-generation social networks that originally kicked off the craze. Through self-reinvention the site has managed to stay relevant to a large audience in Asia, although its influence has notably diminished in the West over the years since its founding in 2002 and heydey in 2003-4.

There aren’t too many details emerging yet, but Business Times is reporting that the deal is finalized with a sale to MOL Global, a Malaysian e-commerce company that Friendster has been working with since October to power its payments platform. MOL Global CEO Ganesh Kumar Bangah took the stage at a signing ceremony today in Kuala Lumpur to announce an expected influx of $110 million yearly revenue from the acquisition.

This deal makes sense given Friendster’s audience and the current playing field for social networking in Asia, where Friendster has more monthly uniques than any other network. We expect this combination of assets to lead Friendster deeper into a microtransaction-type revenue strategy, perhaps involving a greater focus on social gaming moving forward.

Social gaming is becoming a significant revenue play for social networks worldwide, in the U.S. with companies like Zynga, EA’s Playfish and Playdom pulling down multimillions in annual revenues from games on Facebook and MySpace , and in Latin America where hi5 is aggressively pursuing its successful social gaming strategy as well.

It’s difficult to judge just how much the deal makes sense until we see the actual financial numbers, but it could be a decent exit for Friendster after a long and challenging road.

source: Dec 9th, 2009 | by Barb Dybwad


A Cyberwar In Malaysian Politics

FEB 19 — Once upon a time, before the Internet became as common as the television in Malaysian homes, public figures made local speeches that were tailored to suit the audience that was physically present.

This worked well for politicians wishing to entertain the parochial tendencies of the audience of the day without jeopardising their prospects of becoming nationally relevant.

Today, however, such speeches quickly leak into the wired world of the Internet, putting things into a different context, and revealing the speakers' supposed real values to the world.

Playing local politics with the awareness that the audience is always the whole wide world is no easy task, especially for those who have been in politics and in power long before the Internet changed everything.

The dominant Umno learned this the hard way three years ago when it decided to telecast "live" its national assembly. The parochialism and racism expressed by its candidates on that occasion for the nation to hear soon forced it to backtrack.

Defensive arrogance does grow out of the inability to evolve.

The attempt to block access to Raja Petra Kamarudin's controversial Malaysia Today website last year managed to stop traffic going to that site, but did not stop access to its contents. Mirror sites sprung up immediately to nullify the censorship.

The police decision in September 2008 to use the Internal Security Act to jail Raja Petra, along with prominent opposition politician Teresa Kok and journalist Tan Hoon Cheng, merely backfired. The de facto minister of law, Datuk Zaid Ibrahim, soon resigned in protest.

Publicly calling female bloggers liars, as then Tourism Minister Tengku Adnan Tengku Mansor did in March 2007, is also not a very smart thing to do. The negative reaction on the web on that occasion was tremendous.

Opinions expressed for local consumption becoming national news is part and parcel of a revolution in information technology which carries enormous consequences for the near future. Some are positive, and some will certainly not be.

Through the Net, you can sell old useless books you have under the stairs on the world market; you can get to know strangers on the other half of the world merely by being on chat sites; and you can arrange an entire holiday to the south of France without talking to any salesperson at all.

In Malaysian politics, we have witnessed how SMSes, videos and phone cameras have come into play. While these can uncover abuse of power, as in the case of the woman forced to do ear-squats naked while detained by the police in December 2005; reveal dubious practices, as in the case of the Lingam Tapes released in 2007 showing a prominent lawyer boasting about his ability to fix top judge appointments through political connections; and contribute to court cases, as in SMSes supposedly sent by Deputy Prime Minister Datuk Seri Najib Razak to a lawyer, discussing the detention of a close associate then charged with involvement in the murder of a Mongolian woman.

The latest political incident involving IT innovations concerns the circulation of nude pictures of prominent opposition politician Elizabeth Wong, secretly taken on a phone camera.

The case of Wong (also a blogger), who has offered to resign from her position as state assemblywoman for the opposition-held Selangor, adds worrying dimensions to the political use of modern IT.

First, it is not only the line between the local and the national that is being erased. The line between the private and the public is fading fast as well.

That is worrying indeed. Most urbanites in Malaysia of all races, especially in the Klang Valley where Wong lives, would undoubtedly consider Wong the victim. Mass media attempts to class the case as a "sex scandal" — and this happened on both sides of the Causeway — smack of shameless sensationalism, journalistic amateurism and political opportunism.

In the sanctity of her home, surely she is allowed to walk scantily dressed, sleep half-naked, even shower nude, and yes, have sex without clothes on. The culprits deserving punishment are those who facilitated the publicising of those pictures, regardless of whether they were taken with her permission or not.

The fact that she is an unmarried woman, and not a man, has had a serious impact on how the incident is being interpreted. Should a male politician, married or not, such as former Selangor Menteri Besar Datuk Seri Dr Khir Toyo, for example, have been photographed in the nude while asleep, the fallout would have been minimal, even comical.

The Wong case also shows the disturbing shrinkage of moral space when the private and the local are technologically subsumed under the public and the national.

Moral values do differ geographically, individually, culturally and according to lifestyle. This diversity is denied when such a case gets politicised, and here, the supposed sensitivities of the vocally most religious, most parochial, most traditional and most rural are allowed to define the national public norm. Wong is being sacrificed to appease illiberal elements within the opposition. Surely, this is not what the Pakatan Rakyat is fighting for.

A political cyber war has started in Malaysia. While we thought that the old would be at the mercy of the new in such a showdown, it is time to realise that, in truth, the more desperate and more immoral has the edge.

sources: Ooi Kee Beng, Institute of Southeast Asian Studie. (themalaysianinsider.com)

Russia and US in secret talks to fight net crime

Young man at computer 460

The potential for online warfare has become a hot topic after a string of major incidents in recent years.

American officials have been holding secret talks with Russia and the United Nations in an attempt to strengthen internet security and rein in the growing threat of cyberwarfare.

The effort, first reported in the New York Times, is a virtual version of the nuclear arms talks being held between the two nations in Geneva – but rather than focusing on bombs and missiles, the discussions are aimed at curbing the increasing level of attacks taking place online.

With a rising tide of strikes by hackers on major institutions – including banks, businesses, government agencies and the military – diplomats are attempting to forge an international consensus on how to deal with cybersecurity problems.

"Both sides are making positive noises," James Lewis, a senior fellow at the centre for strategic and international studies and a cyber security expert, told the Guardian. "We've never seen that before."

The potential for online warfare has become a hot topic in recent years, after a string of major incidents. Large-scale cyberattacks took place during last year's conflict between Russia and Georgia while the Estonian government came grinding to a halt after an internet assault in 2007.

Critics have said the scale and impact of such incidents may be overstated, but experts accept there are serious dangers from criminal gangs operating online – as well as the rapid growth of state-sponsored espionage conducted over the internet.

Earlier this year, some of the plans for a new £2bn fighter aircraft being developed by the US, UK, Netherlands and Israel were stolen when hackers broke into American computers. Two years ago, it was revealed that hackers thought to be linked to the Chinese People's Liberation Army had breached computer security systems at the Pentagon and Whitehall.

The latest discussions are thought to be an attempt to broker some sort of cross-border agreement over a number of issues related to internet security. Russia is said to be seeking a disarmament treaty for cyberspace, while the US hopes to use the talks to foster greater international cooperation on cybercrime.

Lewis confirmed that a Russian delegation met with officials from the US military, state department and security agencies in Washington about five weeks ago. Two weeks later, the White House agreed to meet representatives from the UN committee on disarmament and international security, the New York Times reported.

There are numerous sticking points however, not least the fact both the US and Russia – as well as most advanced militaries around the world – have sophisticated cyber warfare capabilities they are reluctant to document. Although the dangers of virtual conflicts are recognised, neither country is keen to hinder any future deployment by revealing the technologies they have developed, Lewis said.

Despite that, the talks mark a distinct turnaround from the approach of the Bush administration, which had resisted engaging with Russia and the UN over the prospect of a treaty on cyber weapons. Instead, it focused on dealing with cyber threats by economic and commercial means, rather than through the military.

Earlier this year, however, President Barack Obama identified cyber attacks as a "national security priority" and pledged to appoint a top-level White House adviser to co-ordinate responses..

"Cyberspace is real, and so is the risk that comes with it," he said in May. "From now on, our digital infrastructure will be treated as a strategic asset."

However, the post remains unfilled six months after the announcement., with disagreement inside the administration over how to coordinate the appropriate level of response. While some presidential advisers want the White House to take oversight of the issue, other top Obama aides prefer to let the commercial market handle cybersecurity. The US military and intelligence officials, meanwhile, prefer to pursue their own security programmes without direction from the White House.

Many American experts are more concerned with the financial threat of cybercrime and internet-based fraud, particularly since international enforcement efforts have been weakened by an inability to track and arrest the hackers responsible, many of whom are based in Russia and China.

Online crime is now a multibillion pound business worldwide, with criminal gangs across the globe conducting sophisticated cyber attacks to steal money from banks and disrupt commercial websites.

Last year, hackers broke into the Royal Bank of Scotland, using information gathered from to create cloned bank cards that were then used to withdraw more than £5m from cash machines in dozens of cities.

This August, an American man, Albert Gonzalez, pled guilty to his role in an attack that netted millions when an international hacking ring – largely based in Russia and the Ukraine - stole 130 million credit and debit card numbers from some of America's biggest retailers.

Despite knowing the identities of several individuals linked to Gonzalez, however, the lack of international cooperation means that the other culprits remain beyond the reach of US prosecutors.

source: Daniel Nasaw, Bobbie Johnson. (guardian.co.uk)

Monday, December 7, 2009

cybercrime cases

More than 4,000 cybercrime cases reported in Malaysia within two years

JOHOR BARU: More than 4,000 cyber complaints, mostly concerning cyber crimes have been lodged with Cybersecurity Malaysia in the past two years.

Its chief executive officer Lieutenant-Colonel Husin Jazri said that the complaints, mostly consisted of hack threats, fraud, denial of services and other computer problems such files lost or corrupted by viruses.

“We have received about 2,000 complaints in 2007.

“Last year, a total of 2,123 cases were lodged with us,” he told pressmen after the presentation of five computers to a school in the Kampung Simpang Arang Orang Asli settlement.

Science, Technology and Innovation secretary-general Datuk Abdul Hanan Alang Endut presented the computers on Saturday.

Lt-Col Husin explained that the agency’s services catered for individuals, as well as companies, who faced computer related problems.

“Our consultation services are free but we will charge any work that needs to be done such as repairs.

“The charges varies on a case by case basis,” he said adding that the agency rarely charged students or those from the lower-income group.

He said that the agency’s 150-strong staff was dedicated to solving computer problems as they aimed to serve the needs of the public.

“We have an emergency response team that caters to the complaints.

“Among our other services are digital forensics, security assurance, security management and best practices,” he said.

He added that the agency’s main objective is to be a one-stop coordination centre for all national cyber security initiatives.

“Among the initiatives are reducing vulnerability of ICT systems and networks and nurture a culture of cyber security among users and critical sectors,” he said.

Lt-Col Husin said the public could contact the agency at 03-89926888, fax at 03-89453205 or email at info [at]cybersecurity.my.

“People can also contact our hotline at CYBER999 to report any problems.

“Our office in Seri Kembangan is open from Monday to Friday,” he said.

He said that the agency was also working closely with enforcement agencies such as the police in solving and curving cybercrimes in the country.

By FARIK ZOLKEPLI in Star online

WHITE-COLLAR CRIME IN MALAYSIA

definition of white collar crime in malaysia:

Sutherland (1949:9) first coined the term “white-collar crime”. According to
him, white-collar crime may be defined approximately as a crime committed by a person of respectability and high social status in the course of his or her occupation’. He went on to say that white-collar crime referred to crime committed by business managers and executives.

there were several influential attempts by criminologists to expand the definition beyond a narrower focus on the high- status criminals. Edelhertz (1970: 3) suggested that Sutherland’s definition was far too restrictive. In his definition, Edelhertz not only dropped any reference to social status, but also the restriction that these offences must occur in an occupational setting. He defined white-collar crime as ‘an illegal act or series of illegal acts committed by non-physical means and by concealment or guile, to obtain money or property, to avoid the payment or
loss of money or property, or to obtain business or personal advantage’.

The most influential attempt to distinguish among different forms of white-collar crime has been that of Clinard and Quinney (1973: 188). They divided white-collar crime into 2 types: occupational crime and corporate crime. Occupational crime consists of offences committed by individuals for themselves in the course of their occupations and offences of employees against their employers. Corporate crime, on the other hand, is defined as the offences committed by corporate officials for their corporation and the offences of the corporation itself’.

Terms like economic crime, commercial crime and business crime are used interchangeably to denote a variety of white-collar offences, though they are rarely defined. However, economic crime has been defined by the Interpol to cover business and commercial crime and in fact, all
fraudulent operations conducted to the detriment of individuals or society in general, and constitutes a form of crime which seriously affects the economy of many countries.

CRIMINOLOGICAL THEORIES AND WHITE-COLLAR CRIME:

When Sutherland first wrote about white-collar crime, he maintained that it was best explained by his theory of differential association. For Sutherland, the law-breaking behaviour of businessmen, professionals and politicians (as well as all other law violators) was the product of a learning process. Violators encountered examples of law-breaking among those with whom
they worked and they drifted or jumped into such patterns of behaviour as part of their routine indoctrination into the requirements of their job. In time, they found that the definitions they encountered favourable to violation of the law overruled those encouraging law-abiding behaviour (Brown et al. 2004:533).

There are some empirical supports for Sutherland’s argument, in respect of corporate crime. Geis (1967) examined evidence given during hearings of illegal price-fixing activities of The Heavy Electrical Equipment Antitrust cases in 1961 in America, and found that people taking up new posts tended to find price-fixing to be an established practice, and picked it up themselves as part of learning their job. Baumhart (1961) found that businessmen’s unethical behaviour was influenced by superiors and peers. Both studies suggest that learning process is reinforced by rewards and punishments, which are the characteristics of corporate culture.

Some criminologists have tried to explain white-collar crime in terms of the concept of “anomie’ of Merton (1949) which stated that the disjuncture between cultural goals of success and legitimate means to achieve these goals as a possible source of crime. The cultural system of
society enjoins upon all men to strive for goals by means of normatively regulated or approved forms of behaviour. However, opportunities to reach these goals through socially approved means are unequally distributed. Crime or deviant behaviour ensues when social structure restricts or completely closes a person’s access to the approved modes of reaching
these goals. Corporate fraud, insider trading and criminal breach of trust are some notable examples. In relation to this, Neil Shover (1998) states that some white-collar crimes are committed as a result of the pressure to meet self-defined or externally imposed standards of successful performances. When medical scientists experience pressure to produce research
breakthroughs, or when business owners see their profits decline, the odds are increased that they will resort to criminal resolutions.

The “Techniques of Neutralization” described by Sykes and Matza (1957) can also be used to explain white-collar crime. The criminals may claim that no one was actually harmed, either physically or financially, to rationalize their acts. Embezzlers typically insist that they were only
borrowing the money and that they intended to repay it after they dealt with other financial demands that were vexing them. Antitrust violators may maintain that they are seeking to stabilize an out-of-control market situation when they conspire with others to fix prices. Rarely will there appear a white-collar offender with the refreshing honesty to admit: “I was deliberately engaged in crooked business dealings” (Brown, 2004: 528). Rather, they blame their violations on personal problems such as alcoholism, drug addiction, financial speculations or marital difficulties.

CAUSES OF WHITE-COLLAR CRIME

According to Dr. Yusof Nook (1993) and Joseph Eby Ruin (1996), there are 3 main causes of white-collar crime:

1. Opportunities to commit crime,
2. Situational pressures on the individuals, and
3. Issues pertaining to integrity.

A decision to commit fraud is known to be influenced by the interaction of all these three causes. Opportunities include increasing individual knowledge of a company’s operations, advancing to a position of trust, and becoming the only individual who knows a particular procedure (for example, correcting or modifying a computer programme). An organization could also provide opportunities for its staff to commit fraud by having a complex structure, allowing related party transactions; condoning weak internal control systems policies and procedures; or by frequently
switching its legal or accounting firms.

Situational pressures refer to the immediate pressures a person experiences within his environment, and the most overwhelming of all situational pressures are the unusually high personal debts or financial losses. Situational pressures might also be generated by official directives from leaders in the organization to achieve unrealistic performance objectives at any cost, or even by strong peer group influences. There are times when situational pressures encourage people to perpetrate fraud for their corporation rather than against their corporation such as the threat of losing a business license, delisting from the stock exchange, loss of employment or a cash shortage.

Personal integrity factors refer to each individual’s personal code of ethics. While this element appears to be a straightforward determination of a person’s honesty, the issue is actually more complex than it seems. A person ought to acquire a general definition of honest and dishonest
behaviour, and know which principles to adopt when developing a general trait of honesty. On top of that, a person needs to be consistently reinforced for honest behaviour before internalizing a standard of honesty and being intrinsically rewarded for honest conduct.


source: http://mpk.rmp.gov.my/jurnal/2005/whitecollarcrime.pdf
Supt Lim Hong Shuan