Cyber Crimes 1
Cyber Crimes 1
Cyber Crimes 1
THEFT
-Information
e.g. lists, records, private emails
popular words : hacking & cracking
THEFT
-Property
e.g. transfer of money from one account to another
popular words: salami slicing, stamming
THEFT
-Service
e.g. illegal access to paid websites, line stealing
popular words : wardriving
DISHONEST MISAPPROPRIATION OF
PROPERTY S. 403
Whoever dishonestly misappropriates, or converts to
his own use, or causes any other person to dispose of,
any property, shall be punished with imprisonment for
a term which shall not be less than six months and not
more than five years and with whipping and shall also
be liable to fine.
DISHONEST MISAPPROPRIATION OF
PROPERTY S. 403
Property in s. 403 is much more general compared to
s. 378.
E.g., copying information or data from another person's
computer without consent cannot be regarded as theft
under s. 378 because information or data is not
moveable, but can be regarded as dishonest
misappropriation of property under s. 403.
CHEATING / FRAUD
multilevel marketing/ pyramid system, business opportunities,
auctions, credit card offers, loans, job vacancies.
popular word : Spear phishing
CHEATING S.415
Whoever by deceiving any person, whether or not
such deception was the sole or main inducement,-(a) fraudulently or dishonestly induces the person so
deceived to deliver any property to any person, or to
consent that any person shall retain any property; or
CHEATING S.415
b) intentionally induces the person so deceived to do
or omit to do anything which he would not do or omit to
do if he were not so deceived and which act or
omission causes or is likely to cause damage or harm
to any person in body, mind, reputation, or property,is
said to "cheat".
CHEATING S.415
- if a computer is cheated, can the person who cheats
be charged under this section?
-section 415 provides that cheating can only be
directed to 'person'
- section 11: The word "person" includes any
company or association or body of persons,
whether incorporated or not.
- is computer a 'person'?
CHEATING S.415
In Aman Shah case, he was charged for criminal
breach of trust by using computer and convicted under
s. 408.
Although there was an element of cheating, he was not
charged under section 415, because he cheated
nobody but the computer.
CHEATING S.415
- however, for online cheating committed against
person, the person who commits it can be charged
under this section. For example, cheating people
through websites or emails about fake get rich
schemes or free/discounted products
FORGERY
modifying online documents to mislead others
FORGERY S.463
Whoever makes any false document or part of a
document with intent to cause damage or injury to the
public or to any person, or to support any claim or title,
or to cause any person to part with property, or to enter
into any express or implied contract, or with intent to
commit fraud or that fraud may be committed, commits
forgery.
FORGERY S.463
S. 29
FORGERY S.463
People v. Avila P.2d 1330 (Colorado Court of Appeals
1988)
MISCHIEF
cyber vandalism : modifying public websites and denial of
service attack
Rv
Wimbledon
David Youth Court
Lennon 23/08/2006
MISCHIEF
spyware, adware, tracking cookies, identity theft
By Downloading Music
Sharing photos
Free programs that you install
Email attachments sent to you
Chat rooms where you exchange files
Clicking on Pop-up ads
Browsing Websites
Adult-related web sites
Downloading games
MISCHIEF
spreading virus
MISCHIEF S.425
Whoever, with intent to cause, or knowing that he is
likely to cause, wrongful loss or damage to the public or
any person, causes the destruction of any property, or
any such change in any property, or in the situation
thereof, as destroys or diminishes its value or utility, or
affects it injuriously, commits "mischief".
MISCHIEF S.425
Explanation 1--It is not essential to the offence of
mischief that the offender should intend to cause loss or
damage to the owner of the property injured or
destroyed. It is sufficient if he intends to cause, or
knows that he is likely to cause, wrongful loss or
damage to any person by injuring any property, whether
it belongs to that person or not.
MISCHIEF S.425
Property in section 425 is also much more general than s. 378.
e.g. cyber vandalism, creation and dissimination of virus and
other malicous software
TRESPASS
trespass to server
trespass to personal computer
HACKERS AND
CRACKERS
Nowadays,
hacking
activities
became more complex and
difficult to be traced.
Hackers have discovered new
methods and techniques, far more
advanced than the enforcement
agencies.
Once beloved
Adrian Lamo
Free Adrian Lamo!!!
Now hated
Adrian Lamo
"world's most hated hacker"
Albert Gonzalez
170 million credit & ATM card info theft
in two years
causes
the
program
to
be
(b)
executed;
or
WRONGFUL COMMUNICATION
S. 6 (1)
A person shall be guilty of an offence if he communicates
directly or indirectly a number, code, password or other
means of access to a computer to any person other than
a person to whom he is duly authorized to communicate.
WRONGFUL COMMUNICATION
S. 6 (2)
A person guilty of an offence under this section shall on
conviction be liable to a fine not exceeding twenty-five
thousand ringgit or to imprisonment for a term not
exceeding three years or to both.
PREPARATION
S. 7 (2)
A person who does any act preparatory to or in furtherance
of the commission of any offence under this Act shall be
guilty of that offence and shall on conviction be liable to the
punishment provided or the offence:
Provided that any term of imprisonment imposed shall not
exceed one-half of the maximum term provided for the
offence.
OBSTRUCTION OF SEARCH
S. 11 (1)
A person shall be guilty of an offence if he-(a) assaults, obstructs, hinders or delays any police officer
in effecting entrance to any premises under this Act or in
the execution of any duty imposed or power conferred by
this Act; or
(b) fails to comply with any lawful demands of a police
officer acting in the execution of his duty under this Act.
OBSTRUCTION OF SEARCH
S. 11 (2)
PRESUMPTION
S. 8
A person who has in his custody or control any program,
data or other information which is held in any computer or
retrieved from any computer which he is not authorized to
have in his custody or control shall be deemed to have
obtained unauthorized access to such program, data or
information unless the contrary is proved.
(this can be categorized as strict liability)
S. 10 (1)
(a) have access to any program or data held in any
computer, or have access to, inspect or check the
operation of, any computer and any associated apparatus
or material which he has reasonable cause to suspect is or
has been in use in connection with any offence under this
Act;