Escolar Documentos
Profissional Documentos
Cultura Documentos
INTRODUCTION: The term cyber crime is a misnomer. This term has nowhere been defined in any statute /Act passed or enacted by the Indian Parliament. The concept of cyber crime is not radically different from the concept of conventional crime. Both include conduct whether act or omission, which cause breach of rules of law and counterbalanced by the sanction of the state.Before evaluating the concept of cyber crime it is obvious that the concept of conventional crime be discussed and the points of similarity and deviance between both these forms may be discussed. CONVENTIONAL CRIME Crime is a social and economic phenomenon and is as old as the human society. Crime is a legal concept and has the sanction of the law. Crime or an offence is a legal wrong that can be followed by criminal proceedings which may result into punishment.The hallmark of criminality is that, it is breach of the criminal law. Per Lord Atkin the criminal quality of an act cannot be discovered by reference to any standard but one: is the act prohibited with penal consequences. A crime may be said to be any conduct accompanied by act or omission prohibited by law and consequential breach of which is visited by penal consequences. CYBER CRIME Cyber crime is the latest and perhaps the most complicated problem in the cyber world. Cyber crime may be said to be those species, of which, genus is the conventional crime, and where either the computer is an object or subject of the conduct constituting crime . Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime. A generalized definition of cyber crime may be unlawful acts wherein the computer is either a tool or target or both(3) The computer may be used as a tool in the following kinds of activity- financial crimes, sale of illegal articles, pornography, online gambling, intellectual property crime, e-mail spoofing, forgery, cyber defamation, cyber stalking. The computer may however be target for unlawful acts in the following cases- unauthorized access to computer/ computer system/ computer networks, theft of information contained in the electronic form,
Their work is motivated by the colour of money. These kinds of hackers are mostly employed to hack the site of the rivals and get credible, reliable and valuable information. Further they are ven employed to crack the system of the employer basically as a measure to make it safer by detecting the loopholes. 4. Discontented employees-
This group include those people who have been either sacked by their employer or are dissatisfied with their employer. To avenge they normally hack the system of their employee.
KUALA LUMPUR, 14 JUNE 2011-Malaysian government agency CyberSecurity Malaysia and the country's Attorney General's Chambers is to hold an inaugural seminar to help dissolve barriers between legal and IT technical professionals in the fight against cyber crime, said the agencies. The AGCSM [Attorney General's Chambers] 2011 Seminar, called 'Bridging Barriers: Legal and Technical of Cyber Crime Case', is the first of its kind in Malaysia, which combines legal and technical aspects pertaining to cyber crime cases, according to CyberSecurity Malaysia chief executive officer, Lt. Col. Dato' Husin Jazri (Retired). "The Seminar will be held on 5-7 July 2011 at the Dewan Sri Endon, Puspanitari, Putrajaya, Malaysia. It will be officiated by YAB Dato' Seri Mohd Najib bin Tun Hj Abdul Razak, the Prime Minister of Malaysia and will be graced by YB Datuk Seri Dr. Maximus Johnity Ongkili, Minister of Science, Technology and Innovation (MOSTI) as well as YB Tan Sri Abdul Gani Patail, the Attorney General of Malaysia, which is under the PM's Department."
Husin said the objectives of the seminar included the raising of awareness of the legal issues connected to the investigation and prosecution of cyber crime cases. "In addition, the discussion will include the technical aspects such as real-time evidence gathering and computer forensics because cyber-related legal issues are tied up closely with the technical issues and finally to discuss the possibilities in bridging the gap between legal and technical aspects in cyber crime cases."
"Cyber security is a very important component of today's national security, public safety and privacy," he said. "With the advancement of technology, Internet usage in the country has increased tremendously and at the same time, we are all exposed to threats in the cyberworld. This Seminar will certainly be an excellent platform for all parties concerned to address and explore possibilities of bridging the gaps between the legal and technical aspects of cyber crime
5
"Prosecutors today need to be familiar not just with the laws of evidence and procedure," said the Attorney General of Malaysia, YB Tan Sri Abdul Gani Patail, during a recent regional conference. "If they are to successfully prosecute a cyber crime, they also need to be 'IT-savvy'. In this regard, all States need to train specialist cyber crime investigators, prosecutors and judges on the use of the available legislative framework and in particular on the technical elements involve in prosecuting cyber crime cases. This is undoubtedly a resource-a heavy endeavour and a big financial investment for any law enforcement agency." Registration (www.agcsm,my) is open to law enforcers, regulators, prosecutors, policy makers, IT officers, industrial analysts, lecturers, researchers and academicians. Bernama) - THE Information, Communications and Culture Ministry has opened 20 investigation papers on cyber crimes in the first three months of this year. The crimes comprised dissemination of lies, misuse of information, defamation, sedition and pornography.Deputy Minister Datuk Joseph Salang Gandum said investigations were carried out under Section 211 and 233 of the Communications and Multimedia Act 1998 (Act 588) which provided a jail term not exceeding a year, or a fine up to RM50,000, or both, upon conviction. He said this in reply to Datuk Zaitun Mat who wanted to know how far the government would go to fight cyber crime threats. "Last year, 582 investigation papers were opened and probed, 422 of which were under Section 211 and 233 of the act. Apart from the act, those found to have abused the internet can also be charged under the Banking and Financial Institutions Act 1989, Capital Markets and Services Act 2007, Sedition Act 1948, Defamation Act 1957 or even under the Penal Code.
"Besides taking the culprits to court, the Malaysian Communication and Multimedia
6
The MCMC had also set up a bureau to receive complaints to identify and probe those responsible for providing and disseminating such content. -- Bernama
The bureau has also taken steps to improve information sharing with other federal, state, and local agencies. So far, Mueller has set up three joint FBI-Secret Service cybercrime task forces and recently created a computer forensics laboratory in San Diego, with plans to establish additional labs throughout the country. The labs will include the participation of various agencies, including the Customs Department and the Immigration and Naturalization Service. Working Together Although it is "absolutely critical" that the private sector and the government work together, Harris Miller, president of the ITAA acknowledged that "the reality is that our interests are not always in alignment." However, the chances of successfully battling e-crime and cyberterrorism without government help "are literally zero," he said. Given the increasingly organized nature of cybercrime syndicates and various other "technogangs," it is critically important for companies to come forward when they are the victims of a crime, said Paul McNulty, U.S. Attorney for the Eastern District of Virginia. Without that cooperation, there is a real chance that "cyberspace could become an economic blighta?|where people are afraid to go." There remains, however, a "huge gulf between industry as vendor and industry as customer," said Marty Stansell-Gamm, chief of the Computer Crime and Intellectual Property Section at the Justice Department. Discussions have not yet taken place that would enable industry to speak with one voice, she said.
10
11
12