Presentation is loading. Please wait.

Presentation is loading. Please wait.

All Malaysian people must concern. Deposit Forged Notes, Withdraw Genuine Ones Charles Ramendran KUALA LUMPUR (July 8, 2010): Inserting fake banknotes.

Similar presentations


Presentation on theme: "All Malaysian people must concern. Deposit Forged Notes, Withdraw Genuine Ones Charles Ramendran KUALA LUMPUR (July 8, 2010): Inserting fake banknotes."— Presentation transcript:

1 All Malaysian people must concern

2 Deposit Forged Notes, Withdraw Genuine Ones Charles Ramendran KUALA LUMPUR (July 8, 2010): Inserting fake banknotes into cash-deposit machines and withdrawing genuine ones from automated teller machines -- that appeared to be an easy way for a couple to make money. Until the law caught up with them late last month. It is learnt the couple, who are in their late 20's, had used high-tech scanners and equipment to produce fake RM50 and RM100 banknotes which they deposited into their bank accounts through cash-deposit-machines (CDM) of a bank in Johor Baru.This went on almost daily for a month and the couple withdrew RM23,000 before they were nabbed by police.Federal Commercial Crimes Investigations Department assistant director of operations ACP Rohaimi Md Isa said soon after the couple banked in the dud notes, they would withdraw amounts of between RM1,000 and RM2,000.He said the couple had used three bank branches but on June 29, when they turned up at another, a police detectives from the federal CCID who had gone to Johor to investigate the case arrested them at the bank premises. In an unrelated case involving scams hatched by Africans here, Rohaimi said in eight raids in the Klang Valley over the past two weeks, 21 suspects comprising of 16 Nigerian men, three from other African countries, a Filipino and a Malaysian woman were arrested in connection with four cases involving losses of about RM500,000.He said the latest arrest was on Wednesday where six Nigerians and the Malaysian woman were caught in Cheras.All were involved in the "African parcel" scam which begins with the conmen befriending local women at social network sites on the internet.He said the suspects would pretend to be wealthy American or British men and preyed on widows and single women. After several weeks of exchanging emails and winning the hearts of the women, the suspects would claim they are sending their victims a parcel containing cash, gems or other valuables worth thousands of ringgit as a gift.The women ended up giving them tens of thousand of ringgit when accomplices of these conmen cooked up a story that the parcel was detained at the Customs and money was needed as a "pay-off" to claim the items.Rohaimi said in the first half of the year, 253 suspects, mostly Africans, were arrested for such scams which cost Malaysians close to RM5 million in losses.He said last year, 591 suspects were caught for allegedly fleecing Malaysians of more than RM16 million.. Ethical issue - People should not use a computer program (CDM&ATM) to steal. Using a computer to break into the accounts of a company or a bank and transferring money should be judged the same way as robbery Facebook a 'tool' for cheating spouses, some say A recent survey by the American Academy of Matrimonial Lawyers found that 81 percent of divorce attorneys have seen an increase in the number of cases using social networking evidence during the past five years. More than 66 percent of those attorneys said the No. 1 site most often used as evidence is Facebook with its 400 million registered users. Facebook a 'tool' for cheating spouses, some say A recent survey by the American Academy of Matrimonial Lawyers found that 81 percent of divorce attorneys have seen an increase in the number of cases using social networking evidence during the past five years. More than 66 percent of those attorneys said the No. 1 site most often used as evidence is Facebook with its 400 million registered users. Article’s Source : http://www.sun2surf.com/article.cfm?id=49164 (The Sun newspaper)

3 Example of ATM Image’s Source: http://moneyextender.blogspot.com/2010/11/google-marketing.html

4 SAN FRANCISCO: A federal judge sided with Google Inc in a US$1bil (RM3.4bil) copyright lawsuit filed by media company Viacom Inc over YouTube videos, saying the service promptly removed illegal materials as required under federal law. The ruling in the closely watched case further affirmed the protections offered to online service providers under the 1998 Digital Millennium Copyright Act. Viacom Inc had alleged that YouTube, which Google bought for US$1.76bil (RM6bil at today's rate) in 2006, built itself into the world's largest video-sharing site by promoting the unlicensed use of video taken from Viacom cable channels such as MTV, Comedy Central and Nickelodeon. Facebook, eBay Inc and Yahoo! Inc were among the Internet powerhouses that had rallied on Google's behalf in saying that the company should not be liable because the 1998 law offers immunity when service providers promptly remove illegal materials submitted by users once they are notified of a violation. In his 30-page ruling, US District Judge Louis Stanton in New York said massive volumes of evidence submitted in the case had convinced him that YouTube did what it needed to do to fall under the "safe harbour" provisions of the copyright law. In dismissing the lawsuit before a trial, Stanton noted that Viacom had spent several months accumulating about 100,000 videos violating its copyright and then sent a mass takedown notice on Feb 2, 2007. By the next business day, Stanton said, YouTube had removed virtually all of them. Stanton said there's no dispute that "when YouTube was given the (takedown) notices, it removed the material." Viacom said it will appeal, calling the ruling "fundamentally flawed." - AP Google Wins Copyright Lawsuit Ethical issue - We should not use or copy software for which we have not paid. Software is an intellectual product. In that way, it is like a book. Obtaining illegal copies of copyrighted software is as bad as photocopying a copyrighted book. There are laws against both. Information about the copyright owner can be embedded by a process called watermarking into pictures in the digital format. Article’s Source: http://techcentral.my/news/story.aspx?file=/2010/6/24/it_news/20100624093045&sec=it_news

5 Image’s Source: http://en.wikipedia.org/wiki/Copyright_symbol Copyright Symbol

6 Malaysian Victims in Online Scam HONG KONG police busted an international online scam syndicate which has conned at least 160 people, including Malaysians, of some RM8.7mil, reported Nanyang Siang Pau. Authorities nabbed 13 men, aged between 20 and 60 years, who were also involved in money laundering activities. The syndicate, which has been operating for a year, is based in Hong Kong with several members still at large in China, Taiwan and South-East Asian countries. Sin Chew Daily reported that police also seized 17 bank account books, 38 ATM cards, and HK$107,000 (RM45, 000) during the two-day operation. Investigations showed that the syndicate would first notify the victims in an e-mail that they had won a huge sum of money. However, they would first have to deposit 1% of the winning prize money as processing fee in order to collect the sum, with one victim having paid up to RM1.25mil. Ethical issue - They should not use email to spread untruth information or notification. Putting out false "information" to the world is bad. After realizing that they had been cheated, they will see that email cannot be trust anymore. Top Five Online Scams 1. Auction Fraud 2. Phishing Scams 3. Nigerian 419 Letter 4. Postal Forwarding/Reshippi ng Scam 5. Congratulations, You've Won an Xbox (IPod, plasma TV, etc.)" Top Five Online Scams 1. Auction Fraud 2. Phishing Scams 3. Nigerian 419 Letter 4. Postal Forwarding/Reshippi ng Scam 5. Congratulations, You've Won an Xbox (IPod, plasma TV, etc.)" Article’s Source: http://thestar.com.my/news/story.asp?file=/2010/6/29/nation/6 564256&sec=nation (The Star on Tuesday June 29, 2010

7 Microsoft Promotion Award Lottery Scam PLEASE NOTE: The persons, companies or organisations mentioned in the example(s) below are not responsible for these e-mail scams. Organisations and individuals, pretending to act on behalf of these institutions/persons, initiate these scams and abuse the reputable names of these well-known institutions/persons, to add a false sense of security to these fraudulent e-mails. Also note that some scammers act on behalf of certain organisations that do not even exist. Date: 26 October 2007 From: Microsoft Award Team Subject: CONGRATULATION**YOU JUST WON Microsoft Award Team 20 Craven Park, Harlesden London NW10,United Kingdom. Ref: BTD/747/07 Batch: 462890CE Dear Lucky Winner, WINNING NOTIFICATION This is to inform you that your email has won a consulation prize of the Microsoft Corporation EMAIL DRAW held 26rd october 2007. Your email has won you 1,500,000.00 Great British Pounds. To claim your prize, please contact your fiduciary agent Mr.[DELETED] with your Batch:462890CE and Ref: BTD/747/07 and contact him via email immediately within 24hrs. Mr.[DELETED] Microsoft Promotion Award Team Head Winning Claims Dept. Email:[DELETED]@yahoo.co.uk Tel:TEL: +44[DELETED] +44[DELETED] For security reasons, you are advised to keep your winning information confidential till your claims is processed and your money remitted to you in whatever manner you deem fit to claim your prize.This is part of our precautionary measure to avoid double claiming and unwarranted abuse of this program. Please be warned!!!. Provide the following information needed to process your winning claim to your Claims Agent. 1.FULL NAMES:____________________ 2.ADDRESS:_______________________ 3.SEX:__________ 4.AGE:__________ 5.MARITAL STATUS:____________________ 6.OCCUPATION:_______ 7.TELEPHONE NUMBER:______________ 8.AMOUNT WON:____________________ 9.COUNTRY________________________ 10.BATCH NUMBER:_____ 11. REF NUMBER:______ Example of Online Scam (Lottery Scam) Source: http://www.cybertopcops.com/lottery-scams-microsoft.php

8 China Court Accepts 'Avatar' Plagiarism Case BEIJING – A Beijing court will hear a case filed against "Avatar" director James Cameron by a Chinese man who claims the idea for the sci-fi film came from a novel he published, state media said Saturday. After throwing out the case in March due to insufficient evidence, the court agreed to the hearing after Zhou Shaomou dropped a demand for as much as 147 million dollars in compensation, the China Daily said, citing the author. "Avatar", the top-grossing movie of all time, has raked in some 2.7 billion dollars worldwide since its release. "I was told to go to the court next Monday to provide more material," Zhou said, without providing details of the new evidence. Zhou has reserved the right to seek compensation before the Beijing Number One Intermediate Court rules on the case, the state-run newspaper said. A court official told the China Daily that it could take six months before the case is heard. "Due to the fact that some accused parties are foreigners or foreign companies it takes time to send the indictment through diplomatic channels," the official Lu Yao said. Besides Cameron, Zhou is also suing 20th Century Fox Film Corporation, two Chinese movie distributors and Haidian Theatre where he watched the film. Zhou said the plot of "Avatar" -- the story of a paraplegic former US Marine who is sent to live with a race of blue aliens on the Earth-like moon Pandora -- closely resembled that of a novel he wrote in 1997. The novel, "The Legend of the Blue Crow", was published on two Chinese websites in segments in 1999, previous state media reports have said. However, the official website for the film says Cameron first developed the idea 15 years ago -- a few years before Zhou's novel was completed. "Avatar" has been wildly popular in China, quickly becoming the highest- grossing film in the country's history after its January 4 release in both 2D and 3D versions. Ethical issue - We should not use or copy software for which we have not paid: Software is an intellectual product. Obtaining illegal copies of copyrighted software is as bad as photocopying a copyrighted book. There are laws against both. Source: http://www.abs-cbnnews.com/entertainment/07/10/10/china-court-accepts- avatar-plagiarism-case

9 Avatar “Most pirated film of 2010″ Posted on Dec 22nd, 2010 by Martin Bryant 1 Avatar – 16,580,000 downloads 2 Kick-Ass – 11,400,000 downloads 3 Inception - 9,720,000 downloads 4 Shutter Island – 9,490,000 downloads 5 Iron Man 2 – 8,810,000 downloads 6 Clash of the Titans – 8,040,000 downloads 7 Green Zone – 7,730,000 downloads 8 Sherlock Holmes – 7,160,000 downloads 9 The Hurt Locker – 6,850,000 downloads 10 Salt – 6,700,000 downloads Source: http://thenextweb.com/media/2010/12/22/avatar-most-pirated-film-of-2010/

10 Hack Attack Hits ATM Jackpots (AFP) – Jul 31, 2010 LAS VEGAS — Computer security researcher Barnaby Jack jokes that he has resorted to hiding cash under his bed since figuring out how to crack automated teller machines remotely using the Internet. The New Zealand native on Saturday demonstrated his "ATM jackpotting" discovery for an overflow crowd of hackers during a presentation at the infamous DefCon gathering in Las Vegas. "You don't have to go to the ATM at all," Jack told AFP after briefing fellow software savants. "You can do it from the comfort of your own bedroom."Jack proved his findings using two kinds of ATMs typically found in corner stores, bars or other "stand-alone" venues in the United States but said the flaw likely exists in machines at banks.Banks use "remote management" software to monitor and control their ATMs, and Jack used a weakness in that kind of code to take control of machines by way of the Internet. He found a way to bypass having to submit passwords and serial numbers to access ATMs remotely. Once in the machines, he could command them to spit out cash or transfer funds. He could also capture account data from magnetic strips on credit or bank cards as well as passwords punched in by ATM users."When you think about ATM security you generally think about the hardware side; is it bolted down and are the cameras in position," Jack said."This is the first time anyone has taken the approach of trying to attack the underlying software. It is time to find software defenses rather than hardware defenses."Jack did his research on ATMs he bought on the Internet. He also found master keys for stand-alone machines available for purchase online, meaning hackers could walk up and tinker with ATM software, he added."We shouldn't dwell on the walk-up attack, because no physical access is required," Jack said. "They have a flaw that lets me bypass all authentication on the device on the Internet, and I am the ATM at that stage."He didn't reveal specifics of the attack to hackers even though the ATM makers were told of the flaw and have bolstered machine defenses."I might get my butt in hot water if I released the code," said the IO Active software security researcher who did the ATM hack 'as a hobby.'"I was careful not to release the keys to the kingdom."Jack said he doesn't know if criminals have exploited the software flaw "in the wild" but that it is tough to be certain."It is not an easy attack to replicate but I am not naive enough to think I am the only one who can do it," Jack said, admitting he has grown wary of ATMs. "I just keep my cash under the bed now, mate." Ethical issue - We should not use other people's computer resources or program like ATM machine program without authorization.ATM machine use user id’s and passwords to enforce their memory and time allocations, and to safeguard information. We should not try to bypass this authorization system. For example, hacking a system to break and bypass the authorization is unethical. Article’s Source: http://www.google.com/hostednews/afp/article/ALeqM5hE4jANboYfDqMGpcGjsjJTBVWJSw

11 Trivia for Hackers… The movie Legends tell that the Hacking of the website was the real deal. Not a spoof by the web admins Source: http://koldfusion.ca/wp/2007/06/trivia-for-hackers-the-movie

12 JAKARTA, July 16, 2010: Indonesian police on Friday arrested a music engineer for allegedly uploading to the Internet a popular rock singer's private sex videos featuring two television starlets. Police said the suspect identified only as "RJ" had worked in the studio with singer Nazril Ariel, 28, who was detained last month over the explicit videos which have shocked the country. "RJ is a technician who edited songs where Ariel made the records," national police spokesman Edward Aritonang said. "The clips were taken from Ariel's laptop. We believe he's the first one who spread the clips." Ten people have been detained under Indonesia's tough anti-pornography law in connection with the "Peterporn" scandal, named after Ariel's band Peterpan. They face up to 12 years in jail. Models and television personalities Luna Maya, 26, and Cut Tari, 32, who appear separately in the videos, have been questioned but have not been arrested. Ariel, a divorcee, and Tari, who is married, could also face up to nine months in prison for alleged adultery. The communications minister, a conservative Muslim, has announced plans to restrict websites containing "negative" material in response to the sex scandal.-AFP- Ethical issue – We should not upload other video without permission Indonesia Arrests 'Distributor' Of Celebrity Sex Clips Article’s Source: http://www.deccanchronicle.com/international/indonesia-arrests-distributor-celebrity- sex-clips-441

13 KUALA LUMPUR: Mobile phone users will no longer receive unsolicited SMSes, said Malaysian Mobile Content Providers Association (MMCP) president Azli Paat. “It was possible before for content providers to send such SMSes to consumers without them asking for it, but telcos have since installed preventive gateways. “These gateways prevent unsolicited SMSes from getting through. When consumers receive these SMSes, they should not be charged for it,” he said after attending a prize-giving ceremony for a contest. He added that if unsolicited SMSes still got through the gateways, the fault lay with the telcos. The Star reported on Nov 28 last year that consumers were frustrated at being charged for receiving unsolicited SMSes from external content providers. Consumers complained that their monthly bills had spiked from these charges with each SMS costing between RM2 and RM5 Unsolicited SMSes - Spamming is not illegal in South Africa, according to Melamed Telcos Set Up Filter to Stop Spam Smses Ethical issue – We should not sent spam sms because it is not ethical ways since it is unsolicited sms Article’s Source: http://thestar.com.my/news/story.asp?sec=nation&file=/2010/8/1/nation/6776667 (The Star)

14 An example of a spam text message: 'VIP Ticket: Congratulations U can claim 2 VIP row A2C Blu in Concert in November or Blu gift Guaranteed. Call 090XX XXXXXX to claim Ts&Cs www.xxxxxxxxxx.co.uk £3.75max' Example of Spam Sms Source: http://www1.orange.co.uk/about/contact/spam/

15 We must use internet in ethical ways so that it is not only can beneficial to us, but to all Malaysian people from all level of ages, all religions or faiths, and also from all races in Malaysia. Conclusion

16 Other References 1.http://www.cmpe.boun.edu.tr/~say/c150/intro/lit10.html 2.http://edition.cnn.com/2010/TECH/social.media/07/14/faceboo k.cheating/index.html#fbid=Y9FfF9ZLzu7&wom=false 3.http://www.pcworld.com/article/119941/top_five_online_scams.html 4.http://www.zdnet.com/blog/btl/google-prevails-in-viacom- youtube-copyright-lawsuit-appeals-on-deck/36229 5.http://www.wisegeek.com/what-is-facebook.htm 6.http://www.newssafety.org/index.php?option=com_content&vi ew=article&id=18891:paraguayan-journalists-condemn- threats-and-censorship&catid=51:americas-media- safety&Itemid=100519 7.http://en.wikipedia.org/wiki/Kaixin001 8.http://www.insidecrm.com/features/15-sites-make-break- brand-070808/ 9.http://entertainment.oneindia.in/bollywood/news/2010/peepli- live-plagiarism-controversy-120810.html 10.http://www.thefreedictionary.com/civil+suit 11.http//www.iol.co.za/index.php?set_id=1&click_id=115&art_id= vn20050520075836741C770595#more 12.Refer to assignment from ITS610 course

17 The End


Download ppt "All Malaysian people must concern. Deposit Forged Notes, Withdraw Genuine Ones Charles Ramendran KUALA LUMPUR (July 8, 2010): Inserting fake banknotes."

Similar presentations


Ads by Google