Isu dan Cabaran dalam Usaha Menghadapi Jenayah Siber di Malaysia
List of Authors
  • Mahyuddin Daud

Keyword
  • Jenayah siber, definisi jenayah siber, penyiasatan rentas sempadan, forensik digital, rangka kerja undang-undang, keselamatan digital

Abstract
  • Keadaan jenayah siber di Malaysia makin membimbangkan dengan pelbagai kes yang melibatkan penggodaman, penipuan dalam talian, serangan perisian hasad dan kebocoran data. Walaupun terdapat lebih daripada 30 undang-undang yang berkaitan dengan aktiviti siber, pelaksanaan undang-undang ini masih kurang berkesan untuk menangani ancaman yang makin kompleks. Dalam kajian ini, analisis data dilakukan secara kualitatif. Oleh itu, pengkaji menganalisis isu dan cabaran untuk mengatasi jenayah siber di Malaysia. Antara cabaran utama yang ditemukan termasuklah perubahan pesat teknologi, definisi jenayah siber yang terus berkembang, isu bidang kuasa dalam siasatan rentas sempadan dan kekurangan keterangan digital. Di samping itu, kesukaran untuk mengenal pasti lokasi sebenar penjenayah siber dan masalah pemeliharaan data digital turut menjadi penghalang utama bagi siasatan dan pendakwaan yang berkesan. Menerusi kajian ini, pengkaji mencadangkan penambahbaikan terhadap undang-undang siber sedia ada, termasuklah pindaan Akta Komunikasi dan Multimedia 1998, Akta Jenayah Komputer 1997 dan Akta Perlindungan Data Peribadi 2010 untuk memperkukuh penguatkuasaan dan penyiasatan jenayah siber. Dengan adanya pendekatan yang lebih dinamik, undang-undang ini menjadi lebih responsif ke arah mengurangkan risiko terhadap ancaman siber yang berkembang pesat.

Reference
  • 1. Brenner, S. W. (2006). At light speed: Attribution and response to cybercrime/terrorism/warfare. The Journal of Criminal Law & Criminology, 97(2), 379–475.
    2. Caragliano, D. A. (2013). Real names and responsible speech: The cases of South Korea, China and facebook. Yale Journal of International Affairs. https://www.yalejournal.org/publications/real-names-and-responsible-speech-the-cases-of-south-korea-china-and-facebook
    3. Caral, J. (2004). Lessons from ICANN: Is self-regulation of the Internet fundamentally flawed? International Journal of Law and Information Technology, 12(1), 1–31. https://doi.org/10.1093/ijlit/12.1.1
    4. Cloudfare. (2024). How to prevent DDoS attacks. Methods and tools. Cloudfare. https://www.cloudflare.com/learning/ddos/how-to-prevent-ddos-attacks/
    5. CyberSecurity Malaysia. (2023). Mid-year report threat landscape 2023. CyberSecurity Malaysia. https://www.cybersecurity.my/data/content_files/26/2511.pdf
    6. Donna L. B. (1998). Malaysia’s “Computer Crimes Act 1997” gets tough on cybercrime but fails to advance the development of cyberlaws. Pacific Rim Law and Policy, 7(2), 26.
    7. Duryana Mohamed. (2012). Investigating cybercrimes under the Malaysian cyberlaws and the criminal procedure code: Issues and challenges. Malayan Law Journal, 6, i--ix. http://irep.iium.edu.my/27926/
    8. Duryana Mohamed. (2013). Combating the threats of cybercrimes in Malaysia: The efforts, the cyberlaws and the traditional laws. Computer Law & Security Review, 29(1), 66–76. https://doi.org/10.1016/J.CLSR.2012.11.005
    9. Dustin Volz, J. F. (2016, 24 Mac). U.S. indicts Iranians for hacking dozens of banks, New York dam. Reuters. https://jp.reuters.com/article/us-usa-iran-cyber-idUSKCN0WQ1JF
    10. Freedom House. (2014). Freedom on the Net: Canada. https://freedomhouse.org/report/freedom-net/2014/canada
    11. Freedom House. (2016). Freedom on the Net 2015. https://freedomhouse.org/sites/default/files/FOTN 2015 Full Report.pdf
    12. Helmi Noman. (2013). Saudi Arabia to impose restrictions on online content production, including on YouTube. OpenNet Initiatives.https://opennet.net/blog/2013/12/saudi-arabia-impose-restrictions-online-content-production-including-youtube
    13. Home Office UK Government. (2013). Cyber crime: A review of the evidence. Home Office UK Government. https://www.gov.uk/government/publications/cyber-crime-a-review-of-the-evidence
    14. Interpol. (2021). National cybercrime strategy guidebook. Interpol. https://www.interpol.int/content/download/16455/file/Cyber Strategy Guidebook.pdf
    15. Irene Tham, Rachel Au-Yong, Tin May Linn & Rodolfo Pazos. (2018). SingHealth cyber attack: How it unfolded. Strait Times. https://graphics.straitstimes.com/STI/STIMEDIA/Interactives/2018/07/sg-cyber-breach/index.html
    16. Janaletchumi Appudurai & Chitra L. Ramalingam. (2007). Computer crimes: A case study of what Malaysia can learn from others? Journal of Digital Forensics, Security and Law, 2(2).
    17. Joli-Coeur, F. (2014). Canada’s approach to intermediary liability for copyright infringement: The notice and notice procedure. Berkeley Technology Law Journal. http://btlj.org/2014/03/canadas-approach-to-intermediary-liability-for-copyright-infringement-the-notice-and-notice-procedure/
    18. Mahyuddin Daud & Ida Madieha Abd Ghani Azmi. (2021). Digital disinformation and the need for Internet co-regulation in Malaysia. Pertanika Journal of Social Sciences and Humanities, 29(S2), 169–183. https://doi.org/10.47836/pjssh.29.s2.12
    19. Mahyuddin Daud. (2021). Freedom of Misinformation and the relevance of co-regulation in Malaysia: A cross-jurisdictional analysis. IIUM Law Journal, 29(2), 27–54. https://doi.org/10.1016/j.clsr.2019.105373
    20. Majlis Keselamatan Negara. (2024, 15 Mac). Deepfake dikesan semakin banyak digunakan dalam aktiviti penipuan. Majlis Keselamatan Negara. https://www.mkn.gov.my/web/ms/2024/03/15/deepfake-dikesan-semakin-banyak-digunakan-dalam-aktiviti-penipuan/
    21. Malaysian Communications and Multimedia Commission. (2020). FAQs on online content problems. Malaysian Communications and Multimedia Commission. https://www.mcmc.gov.my/en/faqs/online-content-problems/what-are-the-steps-required-for-me-to-lodge-compla
    22. Maleen Balqish Salleh. (2023, 17 Jun). PDRM: Over RM5.2 billion lost to scams in two years. The Edge. https://theedgemalaysia.com/article/pdrm-over-rm52-billion-lost-scams-two-years
    23. Marsden, C., Meyer, T., & Brown, I. (2020). Platform values and democratic elections: How can the law regulate digital disinformation? Computer Law & Security Review, 36, 105373. https://doi.org/10.1016/j.clsr.2019.105373
    24. Mohamad Rizal Abd Rahman. (2020). Online scammers and their mules in Malaysia. Jurnal Undang-undang dan Masyarakat, 26, 65–72. https://doi.org/10.17576/juum-2020-26-08
    25. Nazli Ismail Nawang. (2017). Combating anonymous offenders in the cyberspace: An overview of the legal approach in Malaysia. International Conference on Anti-Cybercrime (ICACC). https://doi.org/10.1109/Anti-Cybercrime.2017.7905255
    26. Nehaluddin Ahmad & Norulaziemah Zulkiffle. (2022). Jurisdiction issues in cyberspace: An overview in respect of Brunei and Malaysia Compared to the United States’ system. Journal of Southeast Asian Research, 1–12. https://doi.org/10.5171/2022.384427
    27. Norton. (2021). 2021 Norton cyber safety insights report. Norton Life Locks. https://www.nortonlifelock.com/us/en/newsroom/press-kits/2021-norton-cyber-safety-insights-report/
    28. Nurkhairina Noor Sureani, Atikah Shahira Awis Qurni, Ayman Haziqah Azman, Mohd Bahrin Othman & Hariz Sufi Zahari. (2021). The adequacy of data protection laws in protecting personal data in Malaysia. Malaysian Journal of Social Sciences and Humanities (MJSSH), 6(10), 488–495. https://doi.org/10.47405/mjssh.v6i10.1087
    29. OpenNet Initiatives. (2012). ONI country profile: China. OpenNet Initiatives.
    30. Prasad Jayabalan, Roslina Ibrahim & Azizah Manaf. (2014). Understanding cybercrime in Malaysia: An vverview. Sains Humanika, 2(2), 109–115. https://doi.org/10.11113/sh.v2n2.424
    31. Wall, D. S.(2007). Cybercrime: The transformation of crime in the information age. https://ssrn.com/abstract=1066922
    32. Wimmer, K., & Pogoriler, E. R. (2006). International Jurisdiction and the Internet. Covington & Burling LLP. http://euro.ecom.cmu.edu/program/law/08-732/Jurisdiction/InternationalJurisdiction.pdf