Professional Documents
Culture Documents
MALAYSIA
By
DSP MAHFUZ BIN DATOAB. MAJID
Head of Internet Crime Investigation Unit
(Cyber & Multimedia Investigations Branch)
CP
DEPUTY DIRECTOR I
DEPUTY DIRECTOR II
DCP
SAC I
SAC II
SAC II
ASST. DIRECTOR
INVESTIGATION I
ASST. DIRECTOR
FORENSIC
INVESTIGATION
NORTHERN ZONE
FORENSIC
ACCOUNTING
INVESTIGATION
EASTERN ZONE
ASST. DIRECTOR
INVESTIGATION II
ASSET TRACING
FORFEITURE
ASST. DIRECTOR
FINANCE
INSURANCE
FINANCE
FORGERY
COOPERATIVE
MISCELLANEOUS
BANKING
ASST. DIRECTOR
CORPORATE
ACP
SAC II
ACP
ASST. DIRECTOR
OPS / TECH. ASSISTANCE
ASST. DIRECTOR
ADMIN./ INTERANTIONAL
COOPERATION
ASST. DIRECTOR
ADMINISTRATION
INSPECTORATE
OPERATIONS /
TECH. ASSISTANCE
CASE FILE
INVESTIGATION
COUNTERFIET CURRENCY
INTERNATIONAL
COOPERATION
EXHIBIT
PHOTOGRAPHY
ASST. DIRECTOR
CYBER CRIME &
MULTIMEDIA
ASST. DIRECTOR
LEGAL
LEGAL ADVISOR
MACM
COMPUTER CRIME
CREDIT CARD
SHARES/ COMMODITIES
CENTRAL ZONE
SOUTHERN ZONE
ASST. DIRECTOR
OTHER FORGERY
CORPORATE
BUSINESS
ASSOCIATION
INTERNET CRIME
COMPUTER FORENSIC
PATENT / MUSIC / FILM
COMPUTER SOFTWARE
OTHER FRAUD
OPTICAL DISK
ASST. DIRECTOR
RESEARCH/
INTELLIGENCE
HEABEAS CORPUS
INTERNATIONAL LAW
INTELLIGENCE
CRIME STATISTIC
ANALYST
LIBRARY
VISION
To investigate all Commercial
Crime Cases
Through Professional Approach,
Effective,
Fair and Trustworthy.
in enforcement of cyberlaws
z Succeeding the former Technology Crime
Investigation Unit, which existed from 1998
to December 2004.
z Combination of Computer Crime, Internet
Crime, Optical Disk and Intellectual
Property Units
Bill Of Guarantees
z
z
z
z
z
z
z
z
z
z
Date of
Publication in
Gazette
Date of
Enforcement
No
ACTS
Computer Crimes
Act 1997
June 1, 2000
Communications &
Multimedia Act 1998
Sept.23 1998
April, 1999
Digital Signature
Act 1997
Oct. 1, 1998
Telemedicine
Act 1997
Copyright
(Amendment) Act
1997
June 10,1997
April 1, 1999
Cyber Laws
SEC.4
SEC.5
SEC.6
Wrongful communication
SEC.7
SEC.11
Obstruction of search
Imprisonment
Fine
Others
Or both
Or both
Or both
Or both
Or both
Or both
11
ENFORCEMENT
Section
10-Powers of
search, seizure
& arrest
Search &
Seizure
Arrest
SIMPLE HACKING
Section 3
Actus reus
Causes a
computer to
perform any
function
Mens rea
1st limb:
Intent to secure access
to any program or data
held in any computer
2nd limb:
Knows at the time
when he causes the
computer to perform
the function that
access which he
intends to secure is
unauthorised
SECTION 2(5)
UNAUTHORISED ACCESS
if
(a). he is not himself entitled to control access of
the kind in question to the program or data; and
(b). he does not have consent or exceed any right
or consent to access by him of the kind in
question to the program or data from any person
who is so entitled.
(b)
(c)
(d)
(b)
SECTION 2(7)
MODIFICATION
Of the content of any computer take place if, by
the operating of any function of the computer or
any other computer (a).
(b).
(c).
SECTION 2(8)
MODIFICATION
Any modification referred to in subsection (7) is
unauthorised if (a).
(b).
MALAYSIAN TECHNOLOGY/
COMPUTER CRIME CASES
z E-Mail
CURRENT CHALLENGES
Advancement of ICT in the Economic Sector
Society high expectation of RMP
CCID has to change mindset in order to stay relevant
CCID to stay ahead of economic criminals
Technology becomes a tool to the criminal as well
Difficult to detect / conduct
Perishable nature of digital evidence . Paperless environment
Jurisdiction constraint
MO keeps changing
Economic activities in a globalised world are not
confined to state borders, time and distance anymore.
Criminals use this fluidity and flexibility to avoid detection
Variety/ Assortment of peripherals from different time
period (Eg. Windows 98 Windows XP etc.) including
devices
INTERNATIONAL COOPERATION
Need for the following measures in order to limit
the proliferation of high-tech and computer
crime
z
(Continue)
zA
FUTURE CHALLENGES
z
z
z
z
z
z
Current Employees
With program access/ loose or non-existent internal
security policy
Soon to be leaving employees, whether resigning or
being retrenched, with network access
z
Outsiders
Program/ System vendors, unhappy with contract
payments/ terms.
Maintenance crew.
Hackers, now using their knowledge to make a profit .
(Ex) Friends, as in the case of harassment and
blackmails
Individuals, who gain access and make unauthorized
changes through dishonest IT staff.
THANK YOU
Terima Kasih
(Questions?)