Introduction
Everything is at your fingertip. The ICT is the order of the day. One either jumps on the bandwagon or gets left behind. The sophisticated ICT motivates us to to go for the easy ways wa ys in doing doing our works from running running daily daily errands, errands, paying paying bills, bills, banking transacti transactions ons and international trades. Everything is done in one place or even in the cosy and convenience of our own home. owever, beware of the danger that lurks around each corner of the cyber world. Cyber crime rate is increasing and poses a menace to internets users worldwide. Online banking for e!ample, has become a prime target to cyber criminals. "any cases have been reported r eported where bank customers lost their money through banking transaction. #lthough internet brings brings opportunities, opportunities, it also brings threat threat to us. It is e!tremely crucial crucial for the world commu communit nity y to devel develop op a highly highly secure secured d cyber cyber syste system m that that will will prote protect ct their their criti critica call infor informa mati tion on agains againstt intrud intruders ers and and viola violator tors. s. Th This is is becaus becausee in the the age age of infor informa matio tion n technology, almost all the countries in the world rely on the computer and the internet to manage important things such as their administration, internal security, military, business, education and the economy. Definition of Cyber Crime
$nlike other types of crime, cyber crime is still in its infancy considering the cyber space has just come into our lives relatively recently, that is in the %&&'(s. )erhaps to many people in countries where the computer and the internet are just a lu!ury, the term cyber crime is rather uncommon. *hat e!actly is cyber crime+ There are many different definitions provided by diff differ erent ent author authorit itati ative ve bod bodie iess regard regarding ing the the mean meaning ing of the term term.. Th Thee Merriam-Webster Merriam-Webster relating to, or involving computers computers or computer computer Online Dictionary defines the term cyber as relating networks such as the Internet. The Cambridge Dictionaries Online defines the term as crime or illegal activity that is done using the Internet. The Oxford Reference Online ( '%%'%%- defines cyber cyber crime as crime crime committed committed over the Internet Internet.. The online online Encyclopedia Britannica '%%'%%- defines cyber crime as any crime that is committed committed by means of special knowledge or e!pert use of computer technology. #ccording #ccording to the Cyber/ecurity "alaysia "alaysia website, website, an authorit authoritativ ativee body under under the "alays "alaysia ia "inistr "inistry y of /cienc /cience, e, Technol echnology ogy and Innovati Innovation on "O/TI-, there is no comprehensive comprehensive definition of cyber crime. owever cyber crime can be divided into three categories. •
•
•
The first is when information and communications technology ICT- systems and intellectual property become targets of e!ploitation, intrusion, identity and information theft. The second is when ICT devices are used as means to commit crimes. 0or e!ample, computers at home are used to run malicious programs to intrude other computers to steal money, identity and passwords. The third category is where the ICT devices are used as mediums of committing crimes. 0or e!ample, sedition, disharmony or unrest, slandering and instigating at highe higherr scale scale come come und under er this this cate categor gory y. /ome /ome people people say these these cases cases mu must st be prosecuted under cyber laws. 1ut there are already laws that can be used to handle these cases. 0or e!ample, for sedition and slander, one can be charged under the )enal Code.
Cyber crime or computer related crime includes a wide variety of criminal offences and activities done on the internet with various motives. /chjolberg ''2-, states that in %&34 the Council of Europe appointed an e!pert committee in order to discuss the legal issues of computer5related crime. # summary of the guidelines for national legislatures with liability was presented in the 6ecommendation of %&3& and included computer fraud and forgery as follows7 a- Computer fraud. The input, alteration, erasure or suppression of computer data or computer programs, or other interference with the course of data processing, which influences the result of data processing thereby causing economic or possessory loss of property of another person with the intent of procuring an unlawful gain for himself or for another person alternative draft7 with the intent to unlawfully deprive that person of his property-. b- Computer forgery. The input, alteration, erasure or suppression of computer data or computer programs, or other interference with the course of data processing, in a manner or under such conditions, as prescribed by national law, that it would constitute the offence of forgery if it had be en committed with respect to a traditional object of such an offence. In The United Nations Manal on t!e "re#ention and Control of Compter-Related Crime %&&2-, it is specified that computer crime can involve criminal activities that are traditional in nature, such as theft, fraud, forgery and mischief, all of which are generally subject everywhere to criminal sanctions. The computer has also created a host of potentially new misuses or abuses that may, or should, be criminal as well. Cyber space brings opportunities and hope as well as threat and despair for the whole global community. #s the cyber space and the ICT is the central nerve for cyber crime, cyber criminal finds that the cyber space is their safe haven because they have the advantage of eluding law enforcement efforts. Classification of Cyber Crime
#ccording to The Internet Crime Complaint Center IC8-, a partnership between the 0ederal 1ureau of Investigation 01I- and the 9ational *hite Collar Crime Center, $/#, cyber crime can be generally categori:ed into different types. )artly this categori:ation is done based on the types of reports and complaints received by the organi:ation. Cyber crime can be categori:ed as follow7 Non-Delivery Payment/Merchandise (non-auction) 5 )urchaser did not receive items purchased, or seller did not receive payment for items sold. • FI-!elated "cams 5 /cams in which a criminal poses as the 01I to defraud victims. • Identity #heft 5 $nauthori:ed use of victim(s personally identifying information to commit fraud or other crimes. • Com$uter Crimes 5%- Crimes that target computer networks or devices directly or - Crimes facilitated by computer networks or devices. • Miscellaneous Fraud 5 ;ariety of scams meant to defraud the public, such as work
• %uction Fraud 5 0raudulent transactions that occur in the conte!t of an online auction site. #uction fraud involves fraud attributable to the misrepresentation of a product advertised for sale through an Internet auction site or the non
1ased on the statistics above, we ca see that the common online frauds include auction fraud, non
i.
/tatistics of Cyber Crime in the $/#
#ccording to The Internet Crime Complaint Center 5hereforth known as IC8< '%%-, a special task force under the 01I, the most common cyber crime victim complaints in '%' were non01I< related scams?- and identity theft. ;ictims of these rimes reported losing hundreds of millions of dollars. The website received @4,32 complaint submissions. This is a 88.%A- increase when compared to ''3 when 'B,332 complaints were received. The $/# overnment #ccountability Office ''@- announces that the loss due to computer crime was estimated to be DB@. billion for $./. organi:ations, according to a ''4 0ederal 1ureau of Investigation 01I- survey. 1ased on this figure alone it is clearly discernible that loss of fund, from the $/ public in general and the business community especially, to different forms of cyber crime is very high. IC8 Internet Crime 6eport '%'- shows a stunning number of online crimes. early complaints received by the organi:ation shot from %B,383 in the year ''' to 8'8,3'& in the year '%'. In '%', the top ten types of crimes reported to the website are as follow7 %. 9on
4. "iscellaneous 0raud 3.BA B. #dvance 0ee 0raud @.BA @. /pam B.&A 3. #uction 0raud 4.&A &. Credit Card 0raud 4.8A %'. Overpayment 0raud 4.8A The figures show that non
/tate
)er %'',''' )opulation
%. #laska 4BB.4@ . Colorado %82.&& 8. Fistrict of Columbia %&.& 2. 9ew Gersey %.3B 4. 9evada %%&.%& B. "aryland %%@.& @. *ashington %'3.'B 3. 0lorida %'4.@ &. #ri:ona %'2.@ %'. ;irginia &8.@B
In terms of the complainants demographic, IC8 reported that the age of the complainants ranges from under ' years of age to B' years old. "ost complainants were in the $./., male, between 2' and 4& and a resident of California, 0lorida, Te!as or 9ew ork. "ost foreign complainants were from Canada, the $nited Hingdom, #ustralia or India. "en reported greater dollar losses than women at a ratio of D%.4 to every D%.''-. Individuals of B'
/tatistics of cyber crime in "alaysia
Cybersecurity "alaysia website published a piece of news entitled Cybercrimes contine to rise reported by The /tar 8 /ept '%%- in which the chief e!ecutive officer of Cybersecurity "alaysia, t Col 6td- )rof Fatuk usin Ga:ri said the "alaysian cyber threat landscape is no less alarming with over %',''' cases reported every month up till #ugust this year. ast year, Cybersecurity "alaysia received over 3,''' reports about cybercrime via its cyber&&& hotline. Its Cyber Early *arning /ystem has also detected over 4,''',''' security threats up until #ugust. In another report published by teh same website entitled "roacti#e ta$e on cybercrime released by The 9ew /traits Times, October ''@, t Col 6- usin
Ga:ri said the current threats are a compromise of systems through automated tools and ofline fraud, including identify theft. 0orty
Cyber crime is very elusive to law and enforcement because it operates in the cyber space. Iin order to combat the crime, a relentless efforts need to be taken in a concerted manner between nations all over the world. ere are some suggestions on useful measures to be taken by governments and organi:ations in the world to curb cyber crime7 %. Improving the Cyber /ecurity "anagement /ystem The public increasingly relies on the internet to carry out many important in day
dinamics of ICT advances rapidly which reJuires the law enforcement agencies to be provided with e!pertise to deal with the technical aspects of cyber crimes. The law enforcer, prosecutors and jurisdiction bodies must be able to understand security technologies well so that prosecution cases cannot be manipulated by defence lawyers and cyber criminals. 8. Educating the /ociety The world community in general should be more aware of the threats of various types of cyber crimes. The general public should be well informed about the danger they face everytime they use the internet. Internet users should be informed about the importance of protecting confidential personal information such as personal data, bank account and also credit cards against cyber criminals. They should not reveal these informations to any unknown person, organi:ation or websites because these informations e!pose the person to financial and identity frauds. Once a person(s personal information is obtained by a cyber criminal, the person will be e!posed to all sorts of cyber crime. Internet users should know that it is crucial to keep their passwords a secret and that they should not reveal their passwords to any unknown person. Each time they are reJuired to give out their personal information in any online transaction, they should first clarify the identity and the status of the respective person or organisation they are dealing with. In computer subjects in schools, children can be taught about the danger of cyber crime and how to protect themselves from fallinf prey to the crime. Other internet users should also be e!posed to information about cyber crimes through available media. In carrying out online transaction, they should always ascertain the identity of the person or organisation they are dealing with. Conclusion 1ased on the above discussion, it can be concluded that cyber crime cannot be downplayed because it has become a major threat to the international community. # coorinated effort should be carried for the benefit of internet users so that they are protected from cyber crime. # strong support and cooperation from members of society and the government is crucial in order to establish a coordinated effort to combat cyber crime effectively. "embers of society should work together to contribute in the fight against cyber crime. They should also take precautions when using the internet to avoid becoming cyber crime victims. #n international effort should be geared towards fighting cyber crime. 9egative and erroneous attitude should be eradicated as ther only makes it easier for cyber criminal to strike.
!F!NC"
Cyber/ecurity "alaysia. Crime contines to rise in Malaysia.LOnlineM. #vailable at http7==www.cybersecurity.my=en=knowledgeNbank=news='%%=main=detail='3'=inde!.html Laccessed 3 9ov, '%%M Cyber/ecurity "alaysia. "roacti#e ta$e on cybercrime .LOnlineM. #vailable at http7==www.cybersecurity.my=en=knowledgeNbank=news='%%=main=detail='3'=inde!.html Laccessed 3 9ov, '%%M
Cyber /ecurity "alaysia '%%-. LOnlineM W!at abot cyber crime. #vailable at7 http7==www.cybersecurity.my=en=mediaNcentre=mediaNfaJs=mediaNfaJs=main=detail=%B&%=inde !.html L#ccsessed 4 9ov '%%M /cholberg ''2- Compter-Related Offences% & presentation at t!e Octops 'nterface ))* Conference on t!e C!allenge of Cybercrim e, %4<%@ /eptember ''2, Council of Europe, /trasbourg, 0rance. LOnlineM #vailable at7 http7==www.cybercrimelaw.net=documents=/trasbourg.pdf The Cambridge Fictionaries Online. #vailable http7==dictionary.cambridge.org=dictionary=british=cybercrime+Jcybercrime L#ccessed 9ov '%%M
at7 4
+!e Encyclopedia Britannica (),, LOnlineM #vailable at7 http7==www.britannica.com= L#ccessed on 3 9ov. '%%M
The "erriam<*ebster Online Fictionary . LOnlineM #vailable at http7==www.merriam< webster.com=dictionary-. L#ccessed on 4 9ov. '%%M The O!ford 6eference Online '%%-. LOnlineM #vailable http7==www.o!fordreference.com=pub=views=home.html L#ccessed on @ 9ov. '%%M
at7
+!e United Nations Manal on t!e "re#ention and Control of Compter-Related Crime. %&&2LOnlineM #vailable at7 http7==www.bcbkuwait.com=english=intNregulations=$9=CompCrimsN$9Nuide.pdf . L#ccessed on ' 9ov. '%%M