Professional Documents
Culture Documents
s1)
University of Stirling
for a degree of
Doctoral of Philosophy
by
July 1993
This research is dedicated to
Chong Fook, Khadzir Awang, Datuk Yahya Yeop Ishak, Dato Teo Ah
Khiang, Azman Abu Bakar, Mustapha Hamat, Ismail Adam, Hamka
interviews.
questionnaires in Malaysia.
continued through 1985 and 1986. During this period, there was
expand; yet our legal and business systems cannot cope with
They are:
operation of companies;
DEDICATION (1)
ACKNOWLEDGEMENT S (ii)
ABSTRACT (iii)
LIST OF TABLES
LIST OF FIGURES
LIST OF CHARTS
6.4.5 Investigations
184
6.5 Computer Crime 187
6.5.1 New laws needed
for computer crime 190
6.6 A reme'ial analogy 191
be emphasis
on civil as well as criminal
action 231
8.3.4 The manner of disposing of cases 232
8.3.5 The combination of non-economic crimes
functions with the economic crime unit 233
8.4 Initial operations 233
8.5 Liaison 234
8.6 Investigation 236
8.7 Performance evaluation 240
8.8 Evaluation 241
8.8.1 Evaluation needs of the Department
- Financial Administrato 241
8.8.2 Evaluation needs of the Treasury Department 242
8.8.3 Evaluation needs of the Economic Crime unit 242
8.9 Design of self evaluation 243
8.9.1 Determination of goals 244
8.10 Establishment of performance criteria 250
8.11 Development of data collection and analysis plan 251
8.12 Statement of expectations 251
8.13 Training for investigators 253
8.13.1 Informal training 254
8.13.2 Informal cross-agency training 255
8.13.3 Formal training for economic crime
investigator 257
8.13.3.1 Investigative accounting 258
8.13.3.2 Tracing of money 260
8.13.3.3 Use of newspaper 260
8.13.3.4 Computer fraud 260
8.13.3.5 Shopping and decoys 261
8.13.3.6 Interviewing victims,
informants and witnesses 262
8.13.3.7 Interrogation of suspects 264
8.13.3.8 Organisation investigative
information 265
8.13.3.9 Decision-making in the course of
an investigation 266
8.14 Conclusions 267
References 394
LIST OF TABLES
LIST OF FIGURES
LIST OF APPENDICES
Appendix I Types of economic crime 403
Appendix II Comparative Procedure 409
Appendix III List of 325 cases of interest for the
year 1987-1989 420
Appendix V List of variables 428
Appendix VI Example of International Affidavit 431
Appendix VII Example of questions by the Police 432
Appendix VIII : Map of Malaysia 434
Appendix IXa-c : Organisacion of the Royal Police
of Malaysia 435
TOPIC
of the Police.
BY YJSOFF NOOK
-2-
CHAPTER ONE
1.1 INTRODUCTION
definitions;
.Analysis
perpetrators;
* the main causes of the crimes.
* investigators;
* victims;
* perpetrators;
* professionals.
crime;
explanations.
* situational pressures;
* opportunities to commit an offence;
* personal integrity.
company directives to
cash shortage.
$4.00 million has been recovered out of which $3.00 million was
from Swiss Bank and Australia-New Zealand Bank: both banks are
from fellow Muslims for the whole State. He was charged with
hearing.
The facts remain that, by being the head of a religious
institution for a State, he should by his designation be
binding on the researcher, all the cases studied are cases that
questionnaire.
1.5 rYPOTHESIS
influence by politicians.
organisational debt.
Directors.
* situational;
* opportunity;
* personal.
1.7 CONCLUSION
of their organisations.
concerned.
CHAPTER TWO
* introduction;
* investigative strategies;
- 19 -
* problems of jurisdiction;
2.2 INTRODUCTION
prosecution;
* the lenient legal and social sanctions.
- 20 -
is Islam.
dimensions:
* social;
* political;
* economical.
7) as:
- 23 -
of crime.
Leigh (1980, page 15)). West German law for example specifies
business).
* money laundering;
* tax evasion;
- 26 -
* securities fraud;
* commodity and real estate fraud;
* insurance and shipping fraud;
* criminal action in relation to specific product.
crime".
activities.
* bribery;
* corruption;
* espionage;
* arson;
* price fixing;
* tax evasion;
* fraud;
* false labelling;
* misleading adverting;
* paying less than the legal minimum wage;
* not complying with health and safety laws and
disorders.
activities.
developing country.
* fraud;
* theft;
* forgery
* perjury;
- 29 -
* cheating;
* corruption;
* manipulation and abuses relating to securities,
* insider trading;
* marine fraud;
* cube-cutting;
* computer fraud;
* revenue and custom frauds;
or unconcealed;
* concealment, that is, hiding the loss or
commercial fact;
* conversion, that Is, converting benefits to any
credit or goods.
2.5.1 Introduction
bankrupt;
the criminal(s).
2.5.2 Detection
There are obviously instances where the complaints made are not
where the complainants who had found out that he or she had
VI);
2.5.3 Investigation
are:
* power to arrest;
admitted as evidence;
* power of search;
* power to detain;
and witnesses.
- summary of evidence
- list of exhibits
- list of witnesses
Procedure Code).
- 37 -
the scale, there are a great many economic crimes which require
resource implications.
in:
- 38 -
* blood samples;
* fibres;
* fingerprints;
* footprints;
documents;
signatures;
* the identification of the make of the typewriter that
written;
* the reproduction of writing and printing on charred
documents;
of photocopies;
specify:
account;
* the name of the bank;
Bank Negara).
Code).
2.5.4 Prosecution
the police.
based. He did not behave prudently most of the time. From the
authorities.
- 45 -
investigation.
26 INVESTIGATIVE STRATEGIES
Malaysia).
* statutory amendments and new guidelines for
example,
* in the United States, the success in the field only
investigations.
" fte rtxwlshn of jtxlidal aLstare in tfinijii4l nettei to ax)(1 adte dNia1y
involv a miir of Tft1Th IIdi tin 1.wy is ally rtly giilifl& to
ctetnth. t fran xii 1 Ji'1fr1im cxx1b±kin11ty, iznr lie ad
ecrithre, t±B ate 1xffirk't1 ail dip1nniI1 I1yz ' fth nay iel l in zjticp
tiii be of grt (1 ome at l±e hrt of nay of tin nfL%-idJiTh
is of 1iiliti1 au 11 9)Bity"...
and
move to Taiwan. They are not only safe from arrest due to the
wealth which was derived from crime. There are two main Issues
to address:
Nal.aysia.
in lieu of a summons;
and 34, and, once satisfied, he can issue an order for the
following circumstances:
offence.
committed are ever brought into the open, leaving 85 per cent
business crime.
* customs offences, sale tax offences, offences related to
Hough and Mayhew (1983 and 1985) conducted Crime Surveys for
conducted.
recession.
viewed that the victim surveys could be the means by which gaps
and flaws can be partially corrected.
them.
1981 2, 6,816,151.81 2,977.78 52,361 88,156,615.93 1,683.63
2,172 28,6a,179,35 13,176.87 59,577 83,598,91.0.07 1,/c13.a
1983 3,163 38,1D4,486.03 12,0(i6.94 54,1148 IJ.3,X)4,730.78 2,CY9.88
4,91i6 U,CEQ.85 31,688 137,069,O.O3 4,.58
1985 8,157 88,976,052.71 10,907.93 63,691 1f17,a)3,897.99 2,634.65
1986 3,373 73,701,725.95 21,850.149 ,3L4 138,954,ff1.51. 1,688.10
1987 4,813 153,9X,OJO.00 31,975.89 73,927 168,711,4JY) 2,21?..1 I
1988 4,256 2L4,156,AD.14 50,31.8.77 68,O€4 ]87,2h4,919.0 2,715.10
1989 4,591 167,314,732.c8 36,444.07 69,133 157,899,553.87 2,3.99
far, there have been nine major cases that could have
against the decision has been lodged and the case Is still
and Directors.
CHAPTER THREE
rationale why this research has been pursued along the line of
* Introduction;
* traditional explanations;
* multi-factor explanation;
* understanding fraud;
* conclusions.
3.2 INTRODUCTION
Sutherland's hypothesis did not cover all cases and was not a
aspiration.
pages 1-2).
immunity If caught;
crimes have been produced (Gels and Meler, 1977; Gels and
Ermann and Lundman (1982), and Pearce (1976) have proposed some
* industrial espionage;
* illegal competition from price fixing to arson.
TRADITIONAL CRIME
BIOLOGICAL
PSYCHOLOGICAL
SOCIO-CtJLTURE
ECONOMIC CRIME
- 71 -
* facial asymmetry;
* eye defects;
* ear peculiarities;
* excessive long arms;
* other abnormalities.
et.al,l966).
There are a number of continuing research projects in this area
Family trees and hereditary aspects were linked with crime and
* the Id;
* the ego;
* the super-ego.
cost he will probably have taken the money. But if his past
experiences show that It would be morally wrong to take a
T+ S
c=
Include:
* opportunity;
* no risk.
approval.
1978):
criminal behaviour;
* a nonsharable problem;
* an opportunity for trust violation;
* a set of rationalizations that define behaviour as
appropriate in given situation.
Malaysia Chinese Association Party, Mr. Tan Koon Swan, who was
honesty or dishonesty.
- 84 -
or worse;
* temptation is the father of dishonesty;
* greed, not need, triggers temptation.
expedient.
dishonesty;
* the verbal labelling of situations, that it is wrong
to steal or wrong to disrespect the elders, to
dishonest.
they have had, both as children and during their earlier work
SER
= LSER
cP
throughout life.
state
expanding markets;
conditions of work/employment;
corporate practice;
* Ideology;
* law enforcement;
* opportunity.
* Differential of Opportunity;
* Theory of Concealment;
* Theory of Deviation;
* Theory of Minimal and General Collusions.
- 96 -
RE fP1
ri11m1 1i*frn 1Vth1T tsIIy___
to
-,iThljjXB 1di QXXIBtkfl ad afu" i'.
u1Y
__ of ztixei Ui*&ite vletbn 1,-ffth I xWare
liiiii N lifIPR jJ an ndame fi + mhv of crhnfml
IUEthlexO vidim, ad trivial. irLn i&'ii 1 iL
aIy1i fF1 wlth = little 4rf1nim1iHm + to the
h nrvlity of bii iHcitfm = lak of rrb1 1.
a fr nxe (iti11 ad
7rifie) -urhmjnys:
2T11ft4 of lie nfiu1 inully rtLtI m
ed sx1i1 n1jm +
little nsMa _rn*n
= a1]i'e mTi1
hui1diPs ffPL
Q1tRE DE
- 97 -
- Access
- Skills
- Time
- Ranks
Number with opportunity
- 98 -
with suspects.
figure 3.5):
-100-
skill levels: although they may not account for the largest
minimum specialist
skills
skill
level
•.;t,:.;t\
/
• S
p
- • _'4 •, •'. .•.•
maximum low
:' '' .
level
of skill
-101-
3.11 CONCLUSION
* mental problems;
* bad socialisation;
* poverty;
* recession;
* unemployment
* generic status;
* pressing event.
business'.
-103-
CHAPTER FOUR
4. RESEARCH METHODOLOGY
* definition of research;
* types of research;
* collection of data;
* sample;
* summary.
-105-
4.2 INTRODUCTION
variables.
sub-classified into:
* inferential,
* experimental,
* simulation.
-111-
in committing crimes;
* national security and political implications.
From these cases, the main variables were derived and validated
and used in formulating questions for the questionnaire.
* Situational pressures;
* Opportunity pressures;
* Personal pressures.
Malaysia.
that not only reduce bias and increase reliability, but will
permit drawing inferences about causality. In this research,
analysis of co-variance(ANOCOVA).
were collected for the secondary purposes for which they will
now be applied.
-117-
Reviewing concepts
- --ti
Reviewing the literature
I
Reviewing previous
and theories research findings I
JL -
- ' - - - - --
Forniilating hypotheses
Designing research
(including sample design)
--I
I
Collecting Deta (Execution)
____ -
Analysing the data
and testing hypotheses
cooperating;
* it has the possibility of ambiguous replies or omission of
replies altogether to certain questions; Interpretation of
omissions is difficult;
* it is difficult to know whether willing respondents are
truly representative;
* this method is likely to be slow.
carried out;
* personal follow-up by the researcher of key people, such
attention;
* Interviews were carried out on the perpetrators when the
4.5.3 QuestIonnaire
* questionnaire length;
* questionnaire content;
* anonymity.
making It only six sheets (see Appendix V). The first page is
study.
countries;
All but three questions were close ended. Two of the close-
ended questions, were based on a six point scale:0 (No
importance) to 5 (Extremely important). The background of the
respondent comprises page 2 to 4 of the questionnaire
-126-
embezzlement.
The amended version of the questionnaire was used In
estimated;
* the suitability of the methods to collect data with their
costs, accuracy and response rates;
* the adequacy of the questionnaire In terms of the ease of
handling them In the field, the efficiency of its layout,
the clarity of its definitions, wording, and so on.
As the result of the pilot survey, changes and alterations were
-128-
the word 'annual' was added before the word 'income' as some
were sent out (20 for each targeted group, that Is,
still held some 'command' over the unit even though he was
away from It for about three years. Also the researcher
are also available from the records for the year 1985 to
March, 1990;
from the study carried out on 325 cases of interest which are
107 SUMMARY
considerations are:
* clarity of words;
Above all, the nature of this research (where the data is often
'hidden', secretive and sensitive), the perspective taken, its
CHAPTER FIVE
all the cases have been dealt with by the Court. Statistical
The possible causal variables are analysed and listed. This has
assisted the researcher in formulating hypotheses and the
framework for the questionnaires in this research. The main
offence disclosed from this study is Criminal Breach of Trust
(CBT), thus a discussion of the elements and ingredients that
constitute CBT is considered to be helpful for this research.
This chapter will consists of the following:
* introduction;
* conclusions.
5.2 INTRODUCTION
5.3.1 case_i
5.3.2 Case 2
5.3.3 Case 3
-140-
Both Chow Fook Leng and Loo Slew Kwong were, at the
material time, Directors and employees of Aero-Lelsure
Corporatjon(M) Sdn Bhd. The accused was Chairman of this
company. He and his family company, Hew Thai & Sons Holdings
Sdn BHd. held a sum of 180,000 shares out of a total of 500,000
shares.
1.7.82 $40,000.00
13.7.82 $10,000.00
15.7.82 $50,000.00
On the instructions of the accused, 8 further payments
totalling $325,000.00 were made in 1982 and 6 further payments
totalling $334,000.00 were made in 1983 to Chow Fook Leng
although the latter did not submit any new loan applications.
Rather,these further 14 payments were made in pursuance of the
same loan application dated 1st July,1982 in respect of which
$100,000.00 had already been disbursed. This money amounting to
$659,000.00 was channelled Into Aero-Lelsure Corporation (N)
Sdn. Bhd.
-141-
5.3.4 Case 4
5.3.5 Case 5
* power abuse;
* incompetence of staff and directors;
* political influence;
* recession has affected their organisation.
factors for the Research. Only In cases where they were dealt
with by the Courts (as in the above five cases,) could the
researcher elaborate in detail without being subject to
contempt of Court or an offence under the Official Secret Act
-146-
5.4.1 Offences.
Cooperative Act and 1 case each under the Commodity Act and
Company Act.
-147-
5.4.2 Organisations
3Z5 1W 41322,fJiL43 1X
From Table 5C, the 5 types of companies that have the highest
number of cases are property (35), financial (22), Service
(17), Trading (11), Manufacturing (9). Leasing companies have
4 cases, but the losses total $20,221,855.60 making an average
-148-
5.4.3 Victims
this research the victims are those who have came forward to
5.4.3.1 Race
victims. 28.86% (90) are Nalays and 10.78% (37) are Indians.
This is understandable as the Chinese are the majority in
business in Malaysia.
5.4.3.2
BELOW 21 Years 0 0
21 - 29 Years 14 4.08%
30 - 39 Years 144 41.99%
40 - 49 Years 133 38.78%
50 - 59 Years 36 10.49%
60 and above 16 4.66%
5.4.3.3 Occupation
complaints.
5.4.3.4 Education
54.3.5 Income
5.4.4 Perpetrator
5.4.4.1 Race
1985 1986 1987 1985 1966 1987 1985 1986 1967 1985 1986 1987
}tilay 8,lifO 9,665 9,3.B 3 .7 2 8,743 1Q,(P2 9,6W 36.9 1.0.3 36.62
(hfm 5,362 5,95 5,9W 87 107 124 5,449 6,C152 6,(B4 23.1 24.3 24.
3,(X() 3,(Y3 2,662 44 55 54 3,C84 3,148 2,716 13.1 12.6 10.86
(ts(Mi1aysiai)1,215 ) 715 25 43 371,Z0 863 752 5.5 3.5 3.CX)
cis(Rxeigi) 4,623 3,?96 4,655 449 l,UY. 1,148 5,069 4,ax) 5,ax3 21.4 19.3 Z3.2)
IDThL 22,747 23,31.9 23,ax) 888 1,566 1,715 23,635 24,88525,015 1(X) 1(i) 1(X)
x: n Se fr Yr 1985-1967
rErBI ly th Ivisim,ftin 1put,
layia.
-154-
5.4.4.2 &2
to 29 years old.
5.4.4.3 Occupation
Senior Executive
and above 246 55.53%
Middle Executive 57 12.87%
Executive 65 14.67%
Clerical and below 52 11.74%
Not known 23 5.19%
From the Table 5M, most of the perpetrators are from the Senior
5.4.4.4 Income
-156-
Unemployed 5 1.13%
BELOW $500.00 7 1.58%
$500 -$749.00 13 2.94%
$750 -$999.00 21 4.74%
$1000-$1,499.00 53 11.96%
$1500-$1,999.0O 67 15.13%
$2000-$2,499.O0 58 13.09%
$2500-$2,999.O0 70 15.80%
$3000.00 and above 126 28.44%
Not known 23 5.19%
5.4.4.4 R1r,iin
UiLity 52 16.(X
(h11 107
S*r Oittr 138
0ti 1 tim 28 8.6
tta1
1985 1986 1987 1985 1986 1987 1985 1986 1987 1985 1986 1987
N) frrn1 aliolfrg 2,174 1,27 3,1i27 3J0 )7 981 2,564 2,724 4.103 10.8 U.O 17.62
aaihd 1-3 4,174 4,11i8 3,8 Th) 178 217 4,344 4, 3,725 18.4 17.4 14.)
aaihtd 4-6 5,11i6 4,&X) 6,867 7 5 3)5 5,373 5,175 7,172 .7 2).8 28.67
Ithn 1-3 6,622 7,122 6,371 61 11)5 133 6,683 7,227 6,ø. 28.3 2).0 2E.W
Run 4-5 4,414 5,147 2,998 2) (0 13 4,4345,2)7 3,O!i6 18.8 2).9 12.1.8
Run 6Xb11 1) 177 121 15 31 26 224 ZJB 147 0.9 0.8 0.59
tbtsity 28 18 8 5 0 5 33 18 13 0.1 0.1 0.(75
fir 1985-1987
ara1 ly th in,in tJa thlaysfa.
5.7 CONCLUSIONS
CHAPTER SIX
* insurance;
* definition of insurance;
* reinsurance;
* stock-exchange;
* regulating laws;
* legislative trend;
* investigations;
* computer crime;
* new laws needed for computer crime;
* a remedial analogy.
-163-
be submitted to members.
because the law under Section 57A protects those who claim
to be carrying out the aims of the Act and have acted In
the 'economic Interest of the members'.
deposit taking.
are:
* over-investment in land and property;
6.3 INSURANCE
6.3,1 Definition
Insurance as:
* a benefit;
uncertainties;
* an insurable interest;
the insurer.
of funds of just over M$1 billion, 20% more than the corporate
equity held by the life and general insurance companies as a
group. Thus, the insurance companies, which as a group is
potentially one of the most important institutional investors
the risk pool. It holds the premiums in trust for the policy
holders and pays the policy holders in the event of the Insured
loss occurring.
offices. For them, there is only the need to have a good sales
the resulting influx of the claims for losses could only be met
Income for 1987, for both life and general companies. There
these are blatant examples which had led the Malaysian consumer
to become increasingly disenchanted with the industry, as
reflected in more than 2,000 complaints being received in 1987
lost ratios are likely to increase not only from motor theft,
but also from accidents, fraud and rising costs of spare parts.
6.3.10 Reinsurance
April 1988 making the Governor of the bank the Director General
of Insurance. Since taking over its supervision, a number of
number of companies;
Industry are:
regulation;
companies.
6.4 STOCK-EXC1IMGE
funds.
-180-
was primarily for the tin and later the rubber industries. Now
single board and a second board has just been introduced to the
public.
The 290 counters Quoted on the Board of KLSE are divided into
* Industry;
* finance;
* hotels;
* properties;
* oil palms;
* tins;
* dollar rubbers;
* debenture/loan/stock/bond.
1983. This new Act replaced the 1973 Act but all matters
binding.
exchange;
the stock exchange after consulting the CIC and the stock
exchange' s Committee;
investigations.
-182-
* investor protection;
* conflict of interest;
* short-selling.
stock markets all over the world, and the same is true in
Under the new Securities Act, two new provisions have been
6.4.5 InvestigatIons
be gazetted.
growing need for the Kuala Lumpur Stock Exchange (KLSE) and
and Petaling Jaya, for the year 1987-1989, only five cases were
time records for each and then inputting this data mixed with
out pay cheques for the non-existent employees along with the
real ones. The financial clerk changed the name of the "hired"
* the amount of loss per incident will rise from the present
figure of US$500,000;
investigation of crime.
-190-
American Computer Fraud and Abuse Act 1987. Under the American
to the earth. Thus, Information and data could come under the
System. The accused, a 25 years old Peter Chow Pee Teck, was
$64,084.13
companies;
business, Levi (Levi M., 1988, pages 11-15) suggested that the
because some of them may not realise that they have special
networks are:
management;
* confidentiality
* integrity and
* availability.
levels of security.
necessary to consider:
followed up;
* subjec€ing the security controls to regular
-19 7-
constantly occurring.
/
'1 7r7- '/ / ^ /
/ / / //!
/\/
E
SPEct ( C.
COkJTQOLS
U
BsE
SEC.,U P.,iT'/
.O1POLS
1•
Po L I
SPOS(BIL ITh/
Aw AEIJE^S
CHAPTER SEVEN
* introduction;
* police powers;
* police organisation;
* conclusions.
7.2 INTRODUCTION
to the year 1806 when the first police force was raised in
1970s, 4.9% p.a. in the period from 1980-1986 and picked again
to 6.7% p.a. for the period from 1987-1988 and 8.5% p.a. for
rate during the period that is much more rapid than for the
United States, Japan and Europe. The prospects for the long-
average of about 1 per cent from the base trend. (In 1991
per annum, Malaysia's real GDP per capita should reach US $3638
attain this GDP growth rate and reach NIC status by year 2000,
10th of July, 1991 the Sixth Malaysia Plan (SMP) has been
N$ 6 ,400 at present;
Section 21 (1)
It shall be the duty of police officers -
(a) to regulate, control and divert any traffic;
-206-
later on, the communist party of Malaysia since June 1948 and
with the situation, and the Internal Security Act 1967 has
to act accordingly.
police:
force. They are all placed together with the four directors
structures for the federal and the state levels of the Royal
Malaysia Police).
-208-
the nation, this branch has priority over all other branches of
their investigations.
1985, a new unit for fraud and such ' white collar crime' was
7.5.4 The Internal Security and Public Order Branch (B- branch)
following units:
fifth brigade would have been formed had the security threat
vice versa, the field force as a whole has very good record for
responsible to:
of the nation.
follows:
Section 7:
Section 10 (1):
this has been more emphasised mainly due to the need to fight
research has been done In this area, it has been long felt that
and patrol has to face the need to use his discretion and to
are as follows:
syndicates;
-216-
* promotion of tourism.
crimes
activities.
crime syndicates
among juveniles.
Police have formed a new unit called the Tourist Police. The
7.8 CONCLUSIONS
considers practicable;
CHAPTER EIGHT
in:
to he reviewed;
* training proratns.
These three areas seem to be lacking within the unit and affect
* policy planning;
* initial operation;
* liaison;
* investigation;
* performance evaluation;
* evaluation;
* statement of expectation;
* conclusions.
-224-
Research/Recor
T(YAL STREN
1 Senior Asst. Coiriniss loner
4 Superintendent of Police
17 Deputy Superintendent of Police
22 Asst.Superintendent of Police
41 Chief/Inspector of Police
22 Constables
1 Extra-Constable
9 Steis/recorders.
117
-225-
APPROVED STRF2UE
1 Superintendent
2 Deputy Superintendent
1 Asst. Superintendent
13 Inspectors
12 Sargeants
13 Corporals
4 Constables
7 Civilian
53
Deposit-taking Institutions. 37
Corporate Sectors 45
fold from 260 cases In 1987 to 982 cases in 1988. In 1989 thls
the way in which the unit was set up. These are:
public;
-2 29-
TABLE 8.4 VALUE OF PROPERTL LOST OF SrNGAPORE POLICE FORCE
1984-1988
1983 190,746,200
79,845,837 ( 41.9% )
1984 121,966,639 47,296,642 ( 38.8% )
1985 196,348,295 126,771,267 ( 64.6% )
1986 127,811,157 62,778,340 C 49.1% )
as criminal action;
crime unit.
and skills the staff will need, office space to he assigned and
the economic crime for the previous years, it was concluded the
* Prosecution;
their offices, should try their own cases, or whether the trial
opposed trial by the unit argue that economic crime cases are
trial work requires familiarity with the case in which the unit
business degree are preferably selected for this unit and those
will enhance the ability of the unit to develop more and better
the unit. The unit has dealt with cases of prominence where
such cases can come to light from the press, from other
-234-
which the unit has followed which has increased its abilities
8.5 LIAISON
task for a new unit was to establish working contacts with such
case.
ICAC.
8.6 INVESTIGATION
economic crime unit. Only rarely does the unit prosecute cases
for which they have not conducted their own investigations, and
never will they prosecute a major case in which they have not
crimes:
-23 7-
* interrogation;
resulted from greed for wealth and are motivated by the same
-23 9-
Table 8.5 Net-worth And Expenditures Computation
Mi1LhB1 - s:
in of 1988
5,01)
IUrAL rs $37,8:J) $123,(XD
14,375
fton Pbxe Sbxe 16,250 11,750
INflE R14 1.NffFNIIEFD s1KS $13,950 $lcB,625
-2 40-
innovativeness.
8.8 EVALUATION
such a posture will prove beneficial to the unit Head and unit
budget.
attainment.
that mission.
can be done well with the staff, resources, and the time
frequency?
The unit should review carefully the major abuses affecting its
the expertise.
-2 47-
the Cooperatives.
misappropriation;
offences selected.
-2 48-
By
specialist;
by the unit;
Malaysia).
BY
-250-
invesLigative skills;
conclusions;
-2 52-
IX R Th-CllRfl
iuirrtw 1J1N) si cF
adra
1a affi rxz
will help the unit's day to day operations and could assist in
type of policing.
interrogating suspect;
namely:
* formal training.
team up with the trainee so that they can work complex cases
-255-
training.
is to train the unit as a whole on the job - that is, the new
are many and are more likely to be a host of agencies which are
training are:
mentioned above;
cooperation;
training.
programme with other trainees. The squad can get to know and
for the unit not only higher echelon persons in the unit but to
* investigative accounting;
* tracing of money;
* use of newspapers;
* computer fraud;
witnesses;
* Interrogation of suspect;
accounting at least:
-259-
needed;
cases.
the ways in which money and cheques are processed through and
helpful to investigators
* importance of computers,
* definition of computers,
hoodwinked;
scheme;
questionable;
collecting agency;
information;
relevant documents;
investigation;
They should give special concerns for the issues involved with
strength in advance.
manoeuvrers.
is a vital one, not only when the schemes are complex, crossing
between and among businesses and people, but also when a number
the scheme and the information about the scheme are Link
8.14 CONCLUSIONS
CHAPTER NI NE
are two cases in 1987 where the Malaysian police applied the
introduction;
* conclusions.
9.2. INTRODUCTION
nation.
The other law which has such sweeping power is the Emergency
diminished.
The present laws that are commonly used on such offenders where
the normal laws are inadequate to deal with the situation are
under emergency rule and the other is laws during peace time.
The essence of the above laws is that all have provisions for
Nithin the periods specified by the law, the police can then
which shows the highest Increase by more than 146% over the
laws are inadequate to deal with the situation, and some of the
authorised by law.
-2 74-
criminal proceeding.
For economic crime cases to date, the police have made a test
case by detaining one Raja Khalid bin Raja Harun the ax-
the said Raja Khalid bin Raja Harun was a threat to security of
detention before any case file was put up on him. The High
According to the appeal Court, the Court did not have the
Affairs (1969)2 MU 129 and The Minister of Home Affairs & Anor
allegations of fact, the Court held that they were not a threat
the defect so that the question of the Court going into the
Mohd Haniff Hj. Omar has suggested to the Government that laws
9.5 CONCLUSIONS
the powerful are both the most harmful and the least
CHAPTER 10
10. ANALYSIS
FREQUENCY PERCENT
INVESTIGATOR 72 26.5
VICTIM 64 23.5
PERPETRATOR 48 17.6
PROFESSIONAL 88 32.4
272 100.0
10.1 INVESTIGATORS
and relevant for this study. They are from all over Malaysia. A
-282-
10.2:
10 1 to 5 years
13 5 to 10 years
49 10 years and over
Chart 10.1. -
-283-
10.2 VICTIMS
The victims are the people who have come forward to lodge
26
24
22
20
16
16
14
12
10
0
11-20 31-40 51-60 71-80 91-100
Number of Investigating Paper.
5 7.8% Individuals
7 10.9% Cooperatives
5 7.8% Government Bodies
11 17.2% Financial Institutions
9 14.1% Property-based companies
9 14.1% Services Companies
6 9.4% Manufacturing Companies
7 10.9% Banks
5 7.8% Others
Total 64 100.0%
-285-
6 9.4Z Between 1 to 5 years.
7 l0.9 Between 5 to 10 years
51 79.7 More than 10 years
64 100
64 100.0%
-286-
10.3. PERPETRATORS
1 (2.1%) Theft
17 (35.4%) Cheating
6 (12.5%) Fraud
5 (10.4%) Forgery
19 (39.6%) Criminal Breach of Trust
years.
10.4. PROFESSIONALS
-289-
namely:
7 8.0% Lawyers
4 4.5% Prosecutors
7 8.0% Academicians
6 6.8% Politicians
12 13.6% Accountants
2 2.3% Magistrates
6 6.8% Senior Government Servant
38 43.2% Senior Executives
6 6.8% Others
88 100.0%
5 5.7% Individuals
11 12.5% Cooperatives
16 18.2% Government Bodies
10 11.4% Financial Institutions
9 10.2% Properties
6 6.8% Services
8 9.1% Manufacturing
10 11.4% Banks
13 14.8% Others.
88 100.0%
eXI)lOre and analyse the data obtained from the survey. They
are:
standard deviations:
Coefficients.
but also 'how much 3 more than 1? (Herbert, 1990, page 81).
measurement.
measurement;
variables.
mentioned above three tests were used after taking the detail
Chi-square;
* Pearson Correlation;
sanple. size and table size have such an influence upon Chi-
10.6.1 AGE
10.14. and Bar Chart 10.2, It is observed that the age of the
1985 to 1897 are concentrated with more than 50% between the
-29 5-
60
40
30
I
0.
20
10
0
20-24 30-34 40-44 60-64 60 ABOVE
Age-group (Year.)
InvesUgator Vlcttm Perpetrator Proffeslonal
ULR 20 IRS.
23-24 IRS. 9( 3.3%) 8(11.1%) - - 1( 1.1%)
25-29 IRS. 29(10.7%) 9(12.5%) 6( 9.4%) 3( 63/a) 11(12.5%)
33-34 IRS. 51(18.8%) 11(15.3%) 7(10.9%) 23(47.9%) 10(11.4%)
35-39 IRS 50(18.4%) 11(15.3%) 13(20.3%) 10(20.8%) 16(18.2%)
L)-44IRS 64(23.5%) 17(23.6%) 16(25.C) 5(10.4%) 26(29.5%)
45-49 IRS 38(l4.C) 10(13.9%) 11(17.2%) 2( 4.2%) 15(17.C)
50-541R5 22( 8.1%) 6( 8.3%) 7(10.9%) 2( 4.2%) 7( 8.()
55-59 IRS. 7( 2.6%) 2( 3.1%) 3( 6.3%) 2( 2.3%)
3- IRS. 2( .7%) 2( 3.1%)
-29 7-
FRFQNY AND
90
50
70
60
g
I 50
I 40
30
20
10
0
<1 1-5 5-10 >10
10.6.3. EDUCATION
From Table 10.16A and Bar Chart 10.4A, perpetrators have more
the year 1985 to 1987 shows that 98% of the total prisoners
100
90
80
70
g 60
&
50
40
30
20
10
0
MaIc'ula Overasa.
Rectev.d education In
Investigator Victim Perpetrator ProfessIonal
-300-
FRENLY PD ENL
80
70
60
';L 6 7 8 9 10
ki1
Yars of education
11 12 13 14 15+
10.6.4. INCOME
From Table 10.17. and Bar Chart 10.5, the group with
FNX AND if
90
80
70
60
lnetltution of learning
Investigator Victim Perpetrator 1S] Professional
-303-
45
40
35
30
25
10
0
Education tommerce __.-. -
Stream of study
Victim Perpetrutor ] ProfessIonal
hwestlgato(
-304-
As such with that salary one can expect you to have your own
of convicted prisoners for the year 1985 to 1987, more than 98%
these prisoners more than 80% come from low income group (i.e.
-305-
FRBtY IENr
40
35
30
I
- <5 Fio-is
5-i 0
__
15-20
20-25
25-30
30-35
Annual Income (x 141,000)
35-40
40-45
45-50
)50
with 4.5, vIctims with 4.6 and professionals with 4.7. The
economic crime are well educated, have good income and from
crimes who are most under poverty line, and not educated.
-308-
MEAN MEAN MEAN
4.0 4.0 4.5
VICTIM 3.8 4.1 4.4
PERPA1R 3.2 4.3 4.6
PROFESSIONAL 3.4 3.9 4.5
F!Ii1I
INVFIGATOR 4.2 4.3 4.5
VICTIM 4.1 4.5 4.6
PERPETRATOR 2.8 4.1 4.4
PROFESSIONAL 3.9 4.5 4.7
OThER
INVESTIGATOR 4.9 4.9 4.9
VICTIM 4.8 5.1 5.3
PPETRXIX)R 4.3 4.9 5.2
PROFESSIONAL 5.0 5.4 5.6
Value labels 1=Hlghest 2=Very High 3IJtgh 4=Niddle 5Low 6Very Low
-309-
Howe K. R. and Rornney N.B., 1984 and Bologna J. 1984 ] and and
desk study of 325 economic crime cases of interest for the year
Circumstances;
Circumstances;
* power abuse;
* incompetence;
-310-
* excessive gambling;
* high debt;
such as woman;.. -.
* underpaid.
* mismanagement by staff;
* mismanagement by directors;
to industry.
* in position of trust;
* very familiar with operations (including
cover-up capabilities);
staff;
accounting practices.
emotionally unstable;
Question 35 " Please grade the possible steps that can be taken
* improve on auditing;
* personnel screening;
respondents
categories named as ranks and group ranks. The ranks show the
means of 3.4;
3.0;
4.1;
follows:
3.3;
-. .-315-
means of 3.6;
3.3;
means of 3.2;
3.1;
2.0.
4.3;
of 4.3;
4.2;
4.2;
3.8;
From the result laid out in Table 10.19, the first 6 highest
Va r lab 1 e s Means
Situational Personal
Situational-Business Circumstances
Opportunity-Personal
capabilities) (V54)
Opportunity-Business Circumstances
trust(V57)
Personality
(V64).
"close associations with key cohorts and key people" are three
pressures, "a person who is too greedy", "a person who enjoys
variables.
environment".
-320-
VARIABLES MEANS 5Th DEV MIN MAX VALID NO. RANKS GROUP
RANKS
srEUATI0NAL PRESSURES
PERS(AL
2V35 4.419 .709 2 5 272 1
v36 3.176 1.129 0 5 272 24 7
V37 3.301 .813 1 5 272 18 5
V38 3.066 .970 0 5 272 26 8
V39 3.460 .900 1 5 272 15 3
V40 3.908 .942 1 5 272 10 2
V41 2.989 .951 0 5 272 31 9
V42 2.926 1.084 0 5 272 32 10
V43 3.360 .973 0 5 272 17 4
V44 3.243 .... .917 0 5 272 21 6
V45 2.092 1.067 0 5 272 36 12
V46 2.728 1.259 0 5 272 33 11
BUSINESS CIRCUMSTANCES
V48 4.136 1.009 0 5 272 6 3
V49 4.309 .754 0 5 272 3 1
V50 . . 4.143 .. .818 2 5 272 5 2
V51 3.577 .877 1 6 272 13 4
OPPORTUNITY
PERSONAL
V53 4.507 .682 3 5 272 1 1
V54 4.066 .700 2 5 272 8 2
V55 3.956 .767 2 6 272 9 3
BUSINFSS CIRCUMSTANCES
V57 3.467 .819 0 5 272 14 3
V58 3.287 .960 0 5 272 19 4
V59 3.062 .872 0 5 272 27 5
V60 3.051 .887 0 5 272 29 6
V61 . 3.680 .916 0 5 272 11 2
V62 4.279 .848 0 5 272 4 1
-321-
PERSONALITY
V64 3.441 .959 0 5 272 16 3
V65 3.636 .865 1 5 272 12 2
V66 3.213 .854 0 5 272 23 6
V67 2.250 1.092 0 5 272 35 11
V68 3.059 .963 0 5 272 28 8
V69 2.029 1.030 0 5 272 37 12
yb 3.261 .973 0 5 272 20 4
vu 3.044 .963 0 5 272 30 9
viz 4.110 1.036 0 5 272 7 1
V73 3.110 1.091 0 5 272 25 7
V74 3.224 .887 0 5 272 22 5
Vi5 2.599 1.072 0 5 272 34 10
1SSIBLE RF4EDIES
vu 4.228 .758 2 5 272 4
via 4.316 .756 2 5 272 1
V79 3,662 . 770 2 5 272 9
V80 3.743 .797 1 5 272 8
V81 3.824 .733 1 5 272 7
V82 3.842 . 754 1 5 272 6
V83 4.224 .767 2 5 272 5
V84 4.265 .799 2 5 272 2
V85 4.246 .699 2 5 272 3
* underpaid(V46);
* lncompetence(V36);
* high debt(V39);
(V51);
practices (V62);
unstable (V67).
* incompetence (V36);
* underpaid (V46);
(v51)
-327-
practices (V62);
(V66);
unstable (V67);
* Incompetence (V36);
* Underpaid (V46);
* Recession (V51);
practices (V6'2);
-331-
(V66);
unstable (V67);
rank are:
* Incompetence •(V36);
* Underpaid (V46);
rank are:
practices (V62);
are:
(V66);
unstable (V67)
business circumstances.
practices (V62);
are:
practices (V62);
perpetrators are:
practices (V62);
capabilities) (V54);
capabilities) (V54).
practices.
practices.
From the tests in this study it can be concluded that the three
C R
All AU (ko AU AU Qn AU
IIL WR
2 1 21 21 41 21
*IrmqIp 24 7 17 6 133 ) 7 10
*1tjrtI tBfl 18 5 248 19 6 27 6 18 4
* Fte giib1ir 2.6 8 3111 185 9 277
*fl1 15 3 19 7 16 4 15 3 16 3
* Iivir 1xyxxI u 10 2 82 122 72 92
* ]ta •L've stod nBdcet
11atJ1xTL 31 9 2710 2810 3) 8 288
* Jiz nrk iiM1VtN1I!IL 10 259 258 331) 9
* cXiqmy-1vy
ai c±s eg.w1 17 4 14 3 23 7 16 4 ai 5
* thiE fanily a]nnth11s 21 6 154 269195 256
36 12 3712 35 12 37 12 3512
33 11 16 5 z. 11 35 II 34 ii
am cirs
*t4tQT 3E1 T 5taff 6 3 51 42 21 133
* Ili3IRBIH1 Ijr dinxrs 3 1 73 11 93 31
* Ibivy inEhre by y1irki 5 2 62 63 62 82
* 1btcn tft 1xIr
uifairth1e aiditia to
iiáitry 134 12 4 15 4 23 4 15 4
JMRIINrLY
1 1 3 1 31 11 11
* 'ky fiid1iRr with
da (ir1ixui
cx'-p iiI1ii-hs) 8 2 U 3 7 2 52 6 3
* Ck Jciatkn with. •. -
(thIts ad oth 1y pIe 9 3 10 2 9 3 14 3 5 3
IIED
-33 9A-
* D rirL e apnte -
IØBIR1 1X)11d2S
n hidr r eipk to
fill ttE p6itim of tn 14 3 234 10 2 ) 3 17 3
* I a cx Tplpz hii
19 4 223 214214 214
* ft
dkxe air! enftntbx 27 5 336 316132 225
* hi 1re of explicit air!
inffrrm axm1. rx1lii 29 6 295 245 6 246
* r tn ai effiti
fitermi axIit1r staff 11 2 92 113225 122
* 1 a pxr axniling
raxds ad inhly 1i1al
aniztlrg rrrri1 4 1 11 51 31 71
WIlY
* A ii 1adrg in t1
the1qmt of xnl
naals 16 3 9 17 3 10 2 11 3
mjs filir
of p infhme, axlal
Bt1, at p i1t&iiiiL •-
data! with rpd fiimial
da in 1ar
inofnary 12 2 3) 4 14 2 ii 3 10 2
* A jern withut a U-
thfixal ax of pxn1
etht 23 6 7 22 5 31 10 14 4
*Apjii ix Is niudc,
naiic-x3im cr enJtkfl-
ally iirth1e 35 U 3712 36113411 3611
* A jjau u is arLt1gu x
exBric 8 308 3)8186 236
* A p&n with pcyiqiithic
iam1Ity 3712 34 10 37 12 36 12 3712
* A ptaii with tIe t1zira1
a1f-tam a) 4 18 3 33 9 17 5 95
Is ilrigRIty
fBXBldnhiOf.
btIrg a systtiizs of
uiLuii 3) 9 215 297269 319
* A ifl io is too giIy 7 1 41 81124 41
cimfm1
histxry 25 7 266 3)4258 3)8
* A pi X) Is a qim-
iri1e aciate(s) 22 5 13 2 27 6 24 7 267
*AwjtJi pcfi 34 10 35 11 34 10 8 1 33 10
-341-
From the last statistic, it was found that the following causal
* greed;
* power abuse;
* position of trust;
* mismanagement by Directors;
• practices.
* in position of trust;
* power abuse;
practices.
level) with:
* underpaid;
* in position of trust;
capabilities);
practices;
* emotionally unstable;
system of control;
* threatened self-esteem;
* power abuse;
* power abuse;
* threatened self-esteem;
variables:
* high debt;
greedy.
-344-
* mismanagement by directors;
practices;
capabilities);
unstable;
the following:
* incompetence;
* in position of trust;
* incompetence;
* underpaid;
* mismanagement by staffs;
* in position of trust;
* excessive gambling;
-34 7-
* high debt;
industry;
unstable.
* incompetence;
* underpaid;
* mismanagement by staffs;
* In position of trust;
system of control;
* incompetence (0.001)
* underpaid (0.001);
industry (0.001)
* underpaid;
* Incompetence (.001);
* underpaid (.001);
* underpaid;
namely
politicians.
a system.
accounting practices.
organisational debt.
-352-
Directors.
difference amongst more than two sample means at the same time.
Test 1
position of Trust
Test 2
Power Abuse
In position of trust
=Io.000 ieveij
Greedy
Test 3
=[o.000 levelI
In position of trust
significance.
-3 54-
test. The test shows that the null hypothesis economic crime
significance.
control (V71) and beating the system (V37) were put to ANOCOVA
Test. The test shows that the null hypothesis economic crime
put to ANOCOVA test. The test shows that the null hypothesis
(V53) WITH living beyond means (V40) were put to ANOCOVA test.
debt (V39) were put to ANOCOVA test. The test shows that the
-356-
level of significance.
directors (V49) were put to test. The test shows that the null
greedy (V72) WITH person who has poor referee(s) (V75) were put
significance.
From all the tests of this rese arch, it can be concluded the
following:
-35 7-
circumstances grouping;
respondents are:
* "power abuse";
practices".
system of controls".
associates".
be rejected.
-3 60 -
Crinie
years' jail.
That officer was convicted of CBT. The sentence was ten years'
years' Imprisonment.
loan facility.
shares, which it did not actually own. But the very next day,
when the money was credited to Company X's bank account, it was
ffRII1flY
iLiait ly drmzsC,9)
, \ id1)
/ \ 1h iti.cxi of tnt V53)
R V35)
in t1ot of j1 &za1sV
CHAPTER ELEVEN
other crimes.
aspiration.
such as:
* political instability;
* recession;
* greed
it all depends on
* their ski.11;
crimes are:
* opportunity;
* restrict opportunities;
* personnel screening;
variables are:
as follows:
family incegrtty.
economic crime.
or other persons;
* development of a code of ethics governing the
international capacity;
* establishment of a bilateral and multilateral law
possible.
the validated red flag list which is created from this study
trials.
are determined not only by the total scores hut by the groups
immediately.
under 112 and 113 of the Criminal Procedure Code are usable and
This will save time without waiting for the victtm(s) to make
an official complaint.
-380-
Iitlivithil cn ta1f/aJ3inst
ca
arL
1. Iker 10 . . . . . . . .
2.Ltvk teyaxl n 8
3.HLiJt 7
4. 1h1 axit.ay-hwy
iioxtI ai odors e.g.11a1 7
5.JitirtJsysten 6 I -
7. fret 5
8.1ki giibling 4
il.urç1d 3
zth1ei 2
GU
1.NLsiaegimt ty dirtsxs 9
ll1Y-L
1. In jxitiai of trit 10
ff-ff GI
1. I a px arxxxiitir
nxxL an ixni1y liberal 10
3I -
2. Des rut tne ai ef1ti' inrerra]. 8
axhux staffs
3.esmceaIezn1
llcs i hiring
sipks to fill de ixitlai 7
of trwt
5. D rut rm excal±ve
di&.kxe ad exaBimtim 5
6. Pn xe of explicit au inifrtm 4
- hei2S
InY
1.'Jbo gt1y 10
6.Witlt,jt a il-cfül ax of 5
- ed
1UThL
Lfr tS
Fxs Sxe
A: LSiiintinn1-Ersm1 t9Jtes = I I
2.Sittkn1-1hñre g aes9xes = I I
B: Lcruiaty-rsxn]. Iesaires = I ]
2.qoruxifty-11dress 1ea91res = II I
C: rr9xn]ity Pzes = [ ]
cnhIlIrNa?aIRE Al J-i-B[ ]+c[ ]=[ ]
AL I ]
I0111S JDrAL cF S[L DIN
A+B+C
to 2J 1I itigfIrt1girLwIOfficial 1rts
-383-
the Treasury.
review.
proved.
tested by cross-examination.
Malaysia.
arrangement.
-387-
examinations.
subjects.
in the country. Thus being the first, it has now paved the way
data.
will only reveal 'on the need to know basis'. Unless they
when they are not sure whether the data could he released,
authorities In time.
undertaken:
crime.
some suspicion that some unaccepted norms and ethics have been
party.
as follows:
evidence;
offences;
enforcement;
sanctions;
irregularities.
jurisdiction;
REFERENCES
Henry S., 1978, The Hidden Economy - The Context and Control
of Borderline Crime, Martin Robertson and Co., London.
Herbert N.,1990, Planning a Research Project- A guide for
practitioners and trainees In the helping professions,
Cassel Educational Ltd., London.
Hood R. and Sparks R., 1972, Key Issues in Criminology, World
University Library, London.
Ilooton, E.A., 1939, The American Criminal: An Anthropological
Study, Greenwood Press, New York.
Howard, K. and Sharp, J.J., 1985,The Management of a Student
Research Project, Gower Publishing, p.6
Huckle, Theodore D., 1985, Mutual Judicial Assistance And
Economic Crime Special Study For Commonwealth Commercial
Crime Unit (Unpublished paper), Jesus College, Cambridge.
Independent Commission Against Corruption (ICAC) of Hong
Kong, 1988, Annual Report on the Activities of ICAC for
1987, Government Printer Hong Kong.
Jabatan Perhubungan Awam, 1987, POLlS DI RAJA MALAYSIA:
PERANAN DAN CABARAN (History, Role and Challenge of The
Royal Malaysia Police), Kumpulan Karangkraf Sdn. Bhd.,
Kuala Lumpur, pp: 118-127, 130, 135,145 & 179.
Jabatan Perkidmatan Penerangan Malaysia, 1988, Siaran Akhbar,
5th September, Kuala Lumpur.
Jabatan Perkhidmatan Penerangan Malaysia, 1988, Siaran Akhbar,
26th August, Kuala Lumpur.
Jabatan Siasatan Jenayah, 1982, Royal Malaysian Police Annual
Crime report for year 1981, Ibu Pejabat Polls, Kuala Lumpur.
Jabatan Siasatan Jenayah, 1983, Royal Malaysian Police Annual
Crime report for year 1982, Ibu Pejabat Polls, Kuala Lumpur.
Jabatan Siasatan Jenayah, 1984, Royal Malaysian Police Annual
Crime report for year 1983, Ibu Pejabat Polls, Kuala Lumpur.
Jabatan Slasatan Jenayah, 1985, Royal Malaysian Police Annual
Crime report for year 1984, Ibu Pejabat Polls, Kuala Lumpur.
Jabatan Siasatan Jenayah, 1986, Royal Malaysian Police Annual
Crime report for year 1985, Ibu Pejabat Polls, Kuala Lumpur.
Jabatan Siasatan Jenayah, 1987, Royal Malaysian Police Annual
Crime report for year 1986, Ibu Pejabat Polls, Kuala Lumpur.
Jabatan Slasatan Jenayah, 1988, Royal Malaysian Police Annual
Crime report for year 1987, Ibu Pejabat Polls, Kuala Lunipur.
Jabatan Siasatan Jenayah, 1989, Royal Malaysian Police Annual
Crime report for year 1988, Ibu Pejabat Polls, Kuala Lumpur.
Jabatan Siasatan Jenayah, 1990, Royal Malaysian Police Annual
Crime report for year 1989, Ibu Pejabat Polis, Kuala Lumpur.
Jacoby N.H., Nehemkis P., and Eells R., 1977, Bribery and
Extortion in World Business, A Study of Corporate Political
Payments Abroad, Collier Macmillan, London.
Jupp V., 1989, Methods of Criminology Research, Unwin Hyman,
London.
Rian, Catherine T.S. and Chim T.S., 1985, Directorst Duties
and Liabilities, including Insider Trading, Times Book
International, Singapore.
Kothari C.R., Research Methology Methods and Techniques, 1986,
Wiley Eastern Ltd, New Delhi.
Leigh L.H., 1980, Economic Crime 1 in Europe, Macmilan Press Ltd,
-397-
London.
Leigh L.H., 1982, The Control of Commercial Crime, Heineman,
London.
Legal Research Board, 1986, Companies Act,1965 (Act 125),
International Law Book Services, Kuala Lumpur, Malaysia.
Legal Research Board, 1987, Insurance Act, 1963 (Act 89) and
Regulations, Orders and Rules, International Law Book
Services, Kuala Lumpur.
Legal Research Board, 1986, Essential (Protection of
Depositors) Regulation , International Law Book Services,
Eagle Trading, Kuala Lumpur.
Legal Research Board, 1988, Cooperative Societies Act,
1948 (Act 287) & Rules and Regulations, International Law
Book Services, Menang Sdn. Bhd., Kuala Lumpur.
Legal Research Board, 1987, Extradition Ordinance, 1958,
International Law Book Services, Eagle Trading, Kuala
Lumpur.
Legal Research Board, 1987, Insurance Act, 1963 (Act 89) &
Regulations, Orders & Rules, International Law Book
Services, Eagle Trading, Kuala Lumpur.
Legal Research Board, 1987, Banking Act, 1973 (Act 102) &
Regulations, 1968, International Law Book Services, Eagle
Trading, Kuala Lumpur.
Levi N., 1981, The Phantom Capitalists: the organisation and
control of long-firm fraud, Heinemann, London.
Levi N., 1983, The Prevention of 1'raud, Home Office Crime
Prevention Unit, London.
Levi N.,, 1987, Regulating Fraud: White-Collar Crime and the
Criminal Process, Tavistock, London.
Lieberman, David A., 1974, Learning and the Control of
Behavior, Some Principles, Theories, and Applications of
Classical and Operant Conditioning, Holt, Rinehart and
Winston,Inc., USA.
Lloyed I, 1990, Computer Crime in Chris Reed, Computer Law,
Blackstone Press Ltd, London, PP: 163-177.
Malayan Law Journal 176 Vol.2, 1981, p.180
Malayan Law Journal 180 Vol.1, 1977, p.196
Marshall, Enid A., 1983, Scots Mercantile Law, W.Green and Son,
Edinburgh.
Ministry of Trade and Industries, 1987, Copyright Guidebook,
1st edition, Dewan Bahasa dan Pustaka, Kuala Lumpur.
Nerton, Robert, K., 1957, Social Theory and Social Structure,
Free Press, New York.
National Police Agency Government of Japan, December 1988,
White Paper on Police, Published by Police Association.
Me, Norman H., Hull C.H., Jenkins J.G., Steinbrenner K. and
Bent D.H., 1975, SPSS, McGraw-Hill, USA.
Nook Y., 1986, Effective Policing the Community-Malaysian
Experience (Unpublished MBA dissertation paper), Brunel
University).
Parker, Donn B., 1976, Crime by Computer, Scrlbner, New York.
Parker, Donn B., 1978, Ethical Conflicts in Computer Science
and Technology, A FIPS Press, Montvale NJ.
Parker, Donn B., 1983, Manager's Guide to Computer Security,
-398-
Art I ci e s
APPENDIX I
Perpetrators buy stolen cheques and credit cards and used them
to obtain cash and goods. Careful planning may be involved, so
the stolen cheques and cards are transported quickly to another
part of the country, and people or businessman of previous good
character are engaged to cash the cheques or claim the credited
card.
"Cube-cutting"
Cheque "cross-firingt'
Marine fraud
APPENDIX II
COMPARATIVE PROCEDURE
SCOTLAND
Some Scottish police forces have their own fraud squads, and
Scottish forces have their own training facilities, including
training In fraud. They are able to use the information
service provided by Metropolitan and City Police Company Fraud
Department.
NORTHERN IRELAND
The police (The Royal Ulster Constabulary) have their own fraud
squad. Serious offences of all description are prosecuted by
the Director of Public Prosecutions for Northern Ireland, and
the discretion whether to prosecute, and If so for what
offences, lies with him rather than the police. There is no
equivalent of the Fraud Investigation Group as in England.
(ii) Trial
HONG KONG
The Royal Hong Kong Police Force has a Commercial Crime Bureau.
The total number of the police officers working for the Bureau
in 1985 was 230, with 54 support staff, of whom 9 were
accountants. There has been a large increase since 1980 (97
officers with 34 support staff) reflecting a sharp increase in
fraud under investigation.
(ii) Trial
The more serious offences (including those which come under the
heading of fraud) may be tried either in the District Court,
where a judge sitting alone has power to impose up to seven
years' imprisonment, or In the High Court where the judge sits
with a jury of seven. Save for the exceptional offences, which
must be tried in the High Court, the Attorney-General is free
to choose the court of trial.
Many economic crimes are punishable under Federal law and may
thus be dealt with by the Federal authorities. The Federal
Bureau of Investigation will deal with investigation, and the
prosecution will be conducted by the US Department of Justice,
the Criminal Division of which has a section responsible for
economic crime including fraud. Federal agencies enjoy a
number of advantages, including the ability to operate across
State boundaries.
(ii) Trial
WEST GERMANY
(ii) Trial
AUSTRALIA
(Ii) Trial
CANADA
(ii) Trial
FRANCE
(ii) Trial
DENMARK
(ii) Trial
NEW ZEALAND
(ii) Trial
There are a two-tier system of courts. Magistrates have a more
extensive jurisdiction than their English counterparts, and can
impose up to three years' imprisonment. More serious offences
are dealt with in the Supreme Court. Here all offences may be
tried before a judge and jury ( in which cases the verdict must
_419_
SINGAPORE
(Ii) Trial
Prosecution Is normally carried out by Deputy Public Prosecutor
from Attorney General's office who supervised the investigation
at a very early stage. Cases are heard both at District
Criminal Court and High Court depending on the severity of the
offences.
- 420 -
NRX Itt
vk1n1
(BE
r aatxt cb.
Thter ct.
TmlBie W.
cttrm.
QBlit W.
chTtr.cb.
(BE
(BE
(BE
th
t±g cFrcb
Iprçb
(BE
z1ir
B.ctrait.
ividRl
irg ct.
Fin. 15.
Ein.cb.
Fin.cb.
]dtviinl
pg Lcb.
-,421_
33tfrg
b
ctfr Ffn. G.
ivJd1
ftgD
pLcb
cr
Grg
Rrgy GtLv
Rtgy iiM1nl
Q ivd1
QE BiJdirgcb
Qg
sr.cb
Q3t1rg Ffn.O
th Gt
Qtfrg Fin.cb
ar
ui w.
Gaitfrg .Eb.
1mtfrg .W.
c1t rTh
0th
Q He1
ftg
htJ xrt th.
cr Iav w
cr kdidBi
ar w.
Qr Inhi\ddBl
p.
Gg vk1nl
QtIrg a.w
v IiUvil1
cr Rerty
Fhme kt Fin.cb
Qdrg t
air Sr.cb
Fin.W
c1-tfrg Fin.W
air brCb
'flatjxt b
cr vidnl
air
-422-
ar
Qirg ]*
Qtg kdivid1
Qmd *
Ot divila1
iix1ity k07t
Qh I1 Ern
c1tirg BkI1cb
Qthg EW
ac
BxøtyW
d111 ertycb
c1tir co
Bxty
DF5nn
RttyW.
ar
cur BxtyW
cur
Rxgy IrüLvkInl
Qtirg Ein.W
cur rW.
tfrt
Qxp
cnr
Rrgy Imitate Cb
Riv Ireiaie 0
cur
cur
czu cb
cur Fin.cb
cur
Er
c
cr
cp
cur
cnr
c
cr
cu Oxp
cur
cur c
cur
cur c
cur Gxp
cur Gxp
Qr cb
ar
cbp
ktGXp
ar
-423-
I 47,c,U 7,cEo.co
f4T,u
aOdt.1J/87 cEr f,45,i,a
18
ar
rmecb
ar GD
frgGD
ar cb
Jdnl
hhILvirIEl
llrgcb
acçertyco
h1ivid1
p
tfr
tfrg
Ftii
Qr
GD
GD
F
porair
air
-424-
,cbl
,Thr,3:
JTh8 , ,Thr,3:
2O.It.2854L3 CQl c38,rr,co1
8Bc,cbl
3:
C'33,Ek,1
b.
275.89i N4J,BU
276Jt.42J3 Fin.cb NLOU
277Jt. Izw/ r Iirgcb
Gt y
DBLt b :,., , -
iv11B1
hh-gcb
Gtiy
itcb
attt3rcb
Bxertycb
cb
rg
cb
r'thi.cb
cr
ar
tfi i.cb
rOD
ttycb
tli
vkhDcb c'4k'cbl
Qt aL1J1ycb O,5L$,OD1
Rcçertycb
]smre b
ty cb
tfr 33m,co1
Ithicb 'U
Fin.cb
1g31Finn
p Ithi.W
]divid1
iJivid1
kdivid1
I
dividB1 ,
Bertycb
cb
hIL
thtrcb
Iiivi1
IbL/Pattv
hfrOD 7J,W1GJ
-425-
vInt
=
= R. =
:gn. =
N=
C=
I =
T= ad rt
A =
=
f=
=
=
1k____
Qhm_____
WwIi Hxd
U thheBity
01 Rtxxxfry
-, = Th xIihyEth1-icn j
- 426—
APPENDIX IVA
CRIMINAL NEGLIGENCE
PRISON's SPECIAL TREATMENT TO ABDUTJLAR ANG
(STRAITS TIMES REPORT ON 13th AUGUST,1989).
::negligence
tA'
• , •.• ...
-..
. . ...
:THE Malaysian prison system has been c. The fact that'the prison authorities
revising its character in recent years 1n cannot immediately present an authorl-
• keeping with modern theories of peno- tative Version, the fact that there are
tiogy. A convincing argument can be :various and-contradictory accounts
made for a more humane regime in pri- Abdullah :Ang's movements (placing
sons, particularly for prisoners whose; him at an orchid farm in Mantin, at his
cr1ms are of a comparatively less ser- !famlly's factory In Kuala Lumpur to.
,ious nature Incarcerated amidst har.' .plck up fertilisers or to settle personal
.sdened criminals, enduring a dull routine matters,
4'plants), ; another - office to. pick up
that does not engage idle minds or hands, the fact that the prisoner was
such prisoners may be conditioned to ex- .seen moving about freely without being
1 .pect nothing and will leave prison with a .. accompanied by any prison warden, all.
sullen rage. This rage may be corn-: ?.. point to a gross negligencc or very trust-.
- pounded by the stigma of a criminal re• :.lng natures."-- :- •
cord which may prompt rejection from ' . f It is hoped our prison authorities have
family, friends and possible employers, not misinterpretedthe concept of an
and the prisoner may be compelled to, open prison, system to mean one that Is
:. conflrrn society's suspicions by resorting :: open to the smuggling in of dadah, open..'.
to crime again; .to the wishes of peripatetic prisoners.
;i This was the reasoning that led to the -Criminals must pay. Crime shouldn't.
; pre.release rehabilitation programme, a
programme designed to allow prisoners
wIth just a few months left to their jail
terms to acquire potentially useful job
skills and to contribute to the community:
in useful projects. The current brouhaha
: over the unsupervised movements of Ab..
dullah Ang In the months before his re.,
lease yesterday should not call into ques.
tion the validity of such a programme.
What Is in question is the lmplementa-.
tion of it. Are all the other prisoners in.
the programme allowed such privileges
as has been accorded to this one pri..
soner? If not, why was this one prisoner:
.granted such generous freedom?
-427—
APPENDIX IVB
co s' !
'
i's
2
ijjJ. h I•
II
s_ - °: I
ass a- _ SOOI S -
(I)
0
z'n c_.
. •=•L-
rI
0.
Cr Lu C
S
SQ
- ._____
Zz _-
•.O. 5
D',E . .°:
'2 S
Ca
cr (.? I
0,
. UJtLJ
S.
S.
_6_c 'o o
c4-J
0,
w
0
w
.
- .)Ca'00L Oa ScSc-5-
C1)CS,
0S
0,
II
w
Ui
0 'a
Ui
U,
'a
0
C',
Cr
U
-428-
APPENDIX V
LIST OF VARIABLES
SITUATIONAL PRESSURE
RHII
* ixr atuse * rxr abise at tte tcp naeiat
* imirçetere * lixxxrçet& of tFe flLretxs arti
nat
* 1ting 1± systan * 1vfly infli.maI by pfluicians
* eyressiie ithUng * raeasfrri
* bi rermlts * cxiiçaiy c1bts
* 1 te5n1 * la± of wxking cajxital
* ei\e stock rrari<at sçeiilatlm * tvy :Investhmt
* kai sIrk irwo1reat * Iavy losses
* tal cxxTriy exçes ixrurrei * taD ceçatht al cre or t ixoicts
atars ad trtkrs
* ir fariLly xximitheits * r'apihflity
* exosss±ve i of drugs tiith re:1 * vere ate]3a
vy srthng * e trarely hii cebt
* ixesxe to fire exosim thrai
* reitnits of apriors arreit earnings rader thra bt or rLty
* frj iiaUy with jc±s * tL Tt cralit, higJi interest ratas ad ability
* t friss fM lure to ai1re creUt
* e trerely rapid exçerisicn thrtu rEw
treiress or rrixt lires
* (xsts ad exes rising
hir ad faster U ' sales ad re
* diffai1ty in o]Jtlr rivables
* ieliy teavy curçetitlrn (iniixlirg lcw
inpxts)
* existing ican agraeiits with little
fledbiJity ad th restrictirre
* pogrsie detedrratkn :Iri qinlity of
* sigiificant tax a'iisthmt
* lcng-tenn f:lrarial kxssas
* f of irerr
* açaiici or deleting fran stcxk exdengs
* DfltiCaUy notivated
* edstare of revocable ad psthly lirçerllle:I
licaTes rassary for tte *xntirretkn of
bi1Ess
* 1mg bress cle
* jgLficarit lititiai, esçeiially 1ti
*
stock hdrs ad aet
to gloss over a teipxary tad silxetim
-429-.
OPPORTuNITY PRESSURE
PERSONAL BUSINESS CIRCUNSTANCES
PERSONALITY PRESSURE
PERS ONAL
APPENDIX VI
AND
[ In the matter of the Return of ABC from
XDY country to Malaysia under the
Extradictjon ( Commonwealth Countries
Act No.-- of ADY Country I
BETWEEN
ABC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .RESPONDENT
AFFIDAVIT
Before me,
I....... .......... .............. ............... ... . .
certify that this is the original affidavit/true copy of the
affidavit of......... .. . .. . . .. .•... .comparising . .. . . .pages and
exhibits t•••1t to't ...." which were tendered in evidence.
. .... S5S S•S.S• S..S.SSS
-432 -
APPENDIX VII
—.434—
APPENDIX VIII
NAP OF MALAYSIA
-
REDM , / BaI
I
F F,
'-'I / 1
I
PEN P*J
PERM( '1ELAMTA1'
F u9
I
I
/ - _' 1E&EMGAtt''
IpcI' o
1 1
/)
I
.'
ORUL
SEL.PiN&OR N.
-S
UALA '
LuMPU tEQt' 'r\
/
'I
MLAA
I OHOR
a
ffrJ&A pQg
-435- -
APPENDIX IXa
1 I I
püri 1E1N& I ]I. QRAL'S INII
I I
flh11.11R UIREiILR UllHI(I( DnM:11
tAL
fflRALK FRftLDH
Ri Pd
0i QT-fr GID
Ri r Ut
-436-
APPENDIX IXb
I__ I __
U1Y flflK:IU IUUI I1ilMI(I( I}IUIY flKI(I
kn/&en P1aBdm Ati ac
( I r.Dil3tJx It) (ir.Ditjxr I) I
I I
I I
I I I
ly
f tmT &. . Qiiin.I
I I I
I I I
______________ I I
I 1 I I I I I I
Ii 12& IQB lB li 115 D7L8
ñniitradm ('zludml of th 1 1
Ieth tx::[c2
xx s ys & hitLtkn AIL
P1r (Qda1
-437-
APPENDIX IXc
I 1 I I I I I
OFFicr OFFhw in Oftw i/c I OFFIrci- (hiLIit
in ot• c1mim1 I Ial in Chir j Mnfntzittive
of Gxitir IntLgitim I of SI1 OFffr
axXt 1ifFfr ___
APPENDIX Xa
4thApr11 1990
Dear Respondent,
a. 34,SS 21/44,
Damansara Utama,
47400,Petaling Jaya,
Selangor ,Malaysia.
Tel: 03-7171210
Yours Sincerely,
YUSOFF NOOK
- 439-
APPENDIX Xb
fflQ1H3Lt ND BXXUt3,
tNEVERS1Y cF SflRLflC
BACKGROUND
Q1c
[11e [1F
Q3leligicn
[]N []siith
[]Islan []BxU-d2n
[1 QirLstiaity []Oter
(PleasesçMy)
(Plea1y)
cp ard1M/diiJfjr?
[]Yes JmtPIoq10
c If Yes,
i. ftw urny thIJx1JthU±i do ym teve?
illa If ND,
INflIE D nrc
a. Thinnry
b. Sexalary
c. Rt-Sexnry
d. TJthr-Qaite
e. Bst-kainte
f. Othr (Ea%
sçMy)
I]S±xol [IthLersity
Th1ytnic []Odr
[ICoUe
(P1eae sçsd)
hArts
hIEIratlm flaw
hImt []SLa1S
[ICArB IlOttEr
P1ease ify)
- 443 -
Mder
Nm
PrinBry
[1 [1
[[ ]]
aty
Rst-mhryt1jca1 [] []
I
titute -
Nxe-degr level (e.g.
cb1l/Eb1yt±nic)
[
[I
ter [I
[I [I
[I
PnD
txi't1ixw
[I
[ I
[[I]
QL6 Wt di yv.ii cb tefixe Itilding this Ixe1t pitLxxi?
[]RiU-th [I 1t BIXBtkn
[]Part-tin
[]Part-tthE eixaxn
[I u []Oifrr
(Ha±y)
I kw $5cw.co
[ i $5,col-$1O,OXLOJ
I $25,GJI-$1,ctU.co
I $3J,oJl-$35,coJ.co
i I $lo,cOl-$15,cco.cO $35,cxl-$40,coJ.co
I $l5,GJl-2lJ,crXJ.cD [ ] $L40,o1-$45,cQJ.co
[I $20,oJl-$25,cxD.OJ
[
II $45,cxl-$5o,cnD.cYJ
$50,OJI.
axI alx,ve
(Plsçe1y)
-444-
[ ]let11l3r
[ ]lto5ars
]5tolOyrs
[ ]??bret±r1lOyrs
a.Fcamic [ I [ I [1 [1 [1 [1 [1
b.Sxtal [I[I [1 [1 [1 [1 [1
rTestie
c.Sxial& [ I [ I [1 [1 [1 [1 [1
litkal
inflim
[ I $5,cxD.cO [ I $5o,col-$55,cxn.cO
[ I $5, x31-$lO , cro . OJ [ I $55,w1-$EQ,aD.OJ
[ I $1O,col-$15,cm.co [ I $o,w].-$65,crn.cX
[ II $15,w1-$20,cco.co { I $65,OJ1-$70,coJ.W
I $25,col-$3J,coJ.OJ [ I $70,col-$75,cco.co
[ I $3J,w1-$ 35,cXxJ.cO [ I $75,aJl-$a,c.tO.cXJ
I $35,QJ1-$40 , coJ.OJ [ I $D,co1-$85,cxD.cO
I $L^D,w1-$45,rnoJ [ I 5,w1-$J,cxD.W
[ I $45,col-$5o,coicO [ I $9J,al-$95,xxJ.cO
I I $95,QJ1 ad atove
(Please spei±y)
- 445'-
ç26 sjthlntemeof:
a.Ecmmic [ I 1] [1 [1 [1 [1 [1
b.Sc1al [I [II] I] [I I I [I
rresti
c.&cial& [
plitLeal
I I I I I I I I I Ii I
1nflxe
Q28 IiildyiirateIrthinternsof:
[]Utr1yr
[ 1 11-15 years
[]1-5ars [ ]16-2Ors
[ I 6-10yrs }NxeiJyears
Aml Be39ze
rsa1
* ab 012345
* 012345
* t1r tie systan 012345
* Five githLir 012345
* Ii delt 012345
* living ieyciii neae 012345
* Fxtaie stcxk nrket sçei1atkn 012345
* Iren ar:k in1it 012345
* 1 y4vy exjs i.roxre:1
ai otters e.g. wim 012345
* hue faally omnthIits 012345
* tkugs au akthl piD1e1E 012345
012345
* Ot±er
012345
012345
012345
012345
012345
012345
012345
ss arstas
B. Qçttzxiity Variables
Bh cxaitas
* Ds nt ie ahte rmscxil
sng plid2s drg
r aplcs to fill tte x,si-
tim øf tt. 012345
* H3s a ry cxBpl2c lmLrEs9
strrbxe 012345
* Ds mt raii.re e itic.ie dls-
clnsxe au ±Bt1mS 012345
* aLre of exp11dt axi mL-
facn raxu1 policies 012345
* Des mt lve a effetie inter-
ml axUting staff 012345
* }s a çox &xx:uitlng rxds axi
tnlily literal amnting pat1s 012345
* Otter
012345
012345
012345
012345
012345
C. Rrscrlity variab
-450-
* A arsai tx Is arro-it x
egxitri.e 012345
*Aithcj01 2345
* A çeraxi with tI threata1 Lf-
estn 012345
is intrigeflyda
rersa1 dn]J. of abc.erting a
sstancfcxritJs 012345
012345
* A rerscn with a criniiral history 012345
* A ersai tD his ctkrnbl.e
assdate(s)
* A çeran with xxr refers 01234 5
* 0tI:r
_____________________ 012345
_____________________ 012345
___________________ 012345
_____________________ 012345
_________________ 012345
14 V38 Excessive gambling
16 V39 High debt
18 V40 Living beyond means
20 V41 Extensive stock speculation
22 V42 Loan shark Involvement
24 V43 Bad Company expenses
26 V44 Undue family commitment
28 V45 Drugs and alcohol
30 v46 Underpaid
32 v47 Other
34 V48 Mismanagement by staffs
36 V49 Mismanagement by directors
38 V50 Heavily Influenced by politicians
40 V51 Recession
42 V5 2 Other
44 V53 Position of trust
46 V54 Cover-up operations
48 V55 Close associate with cohorts
50 V56 Other
52 V57 No adequate screening
54 V5 8 Complex business structure
56 V59 No executive disclosure & examination
58 V60 No uniform policies
60 V61 No effective auditing staff
62 V62 Poor accounting practices
64 V63 Other
3 V64 Lack personal moral
5 V6 5 Power enjoyment
7 V66 No personal ethic code
9 V67 Emotional unstable
11 V68 Arrogant
13 V69 Psycho personality
15 V70 Threatened self-esteem
17 V71 Intrigued by personal challenge
19 V72 Too greedy
21 V73 Criminal history
23 V74 Questionable associate
25 V75 Poor referee(s)
27 V76 Other
29 V77 Improve security system
31 V78 Improve auditing system
33 V79 Personnel screening
35 V80 Improve planning skills
37 V8l Improve organlsing skills
39 V8 2 Improve coordinating skills
41 V83 Improve motivational skills
43 V84 Improve Management Information system
45 V8 5 Improve Management environment
47 v86 Other
- 453 -
APPENDIX XI
FI F1NR Q1EXLrSI
1.RERTIJJN LflS
EO]NIB . REM
2.n1I3IcNL ci OIUPATEN
EO]B .
flEAL
Ffieni.al cxitro1:e1 5
Eirarial reaxd 1pir 4
Giier 5
Qntrat.s I'h-niait 9
Sales xxnt1ng 6
Bit Ir axxntir 7
Other 4
Systen kE.lyst 7
Proanir 7
ceratct 5
Other 5
-451-
APPENDIX Xc
1 vi Respondents
35 V2 Sample Number
7-8 V3 Age
10-11 V4 Sex
13 V5 Religion
15 V6 Nationality
17 V7 Race
19 V8 Marital Status
21-22 V9 Number of Brothers
24- 2 5 yb Position of Sibling
27-28 vii Number of Children
30-31 V12 Number of Children stay together
33-34 V13 Country high education
36-37 v14 Years of education
39 V15 Type of education Institution
41 V16 Stream of studies
43 V17 Father s education
45 V18 Mother's education
47 V19 Previous job
49-50 V20 Annual income
52 V21 Number of years working
54 V22 Perceived economic power
56 V23 Perceived social status
58 V24 Perceived social political influence
60 V2 5 Number of wage earner
62-63 V26 Total annual income
65 V2 7 Father's economic power
67 V2 8 Father's social prestige
69 V29 Father's social political influence
71 V30 Mother's economic power
73 V31 Mother's social prestige
75 V32 Mother's social political influence
3 V33 Number of years as investigators
* V33 Organisation of victim
* V33 Type of offences committed by perpetrators
* V33 Profession of professional
5-6 V34 Numbers of investigating papers
* v34 Amount of losses suffered by victim
* V34 Amount of losses involved by perpetrators
* V34 Organisation of professional
8 V35 Power abuse
10 V36 Incompetence
12 V3 7 Beating the system
-.454-- -
SThPF
x1itar 8
Se3Jrlty ngr 8
TP& 11 AIviax 5
lërsaml 7
ETARIAL
NERAL R
sales 8
Sales Peçre1tati'?e 5
anrt secv1s 7 -
Rdnsing or Ccntrats gr 9
Br 7
Brdng rt 6
iifabirh r 3
r 5
1arisjxrt irr 6
.klrtising,Sales & Ia1otfrrE 6
ocaa
LA1R ND W1
fraLDrt Liiers 6
rth crator 5
Iëiving-Gxx]s In-staff 6
iifabirii 1
Oti-Er 1
TIAL CF 'JHtS nN
BJINIS . REW
J3JE
rirmi c x
'IIJIAL cF H[S KN
Otter 2
5 J]IIPIIY lLS
uptoil,DJ 5
wtoilo,cto 7
acer £LO,axD 9
-456 -
RuNES • REM
7 QNflJL RESRIB]L1JY
-457-
da £icO,03J 9
açpoces invoices 8
a11cxates eirxy Qxitrets 9
a11cxates 'Jixa1' antrats 9
-458.-
DtSflN .
8aEDJNDGflLcFRBIIE8
tHJ1R PE3i1S
B. Is ss to:
op.iter terniir1 3
systel8 oxeDle 7
nr calpiter terre 5
thta fLies (rine or 4
jxograis arid ckxiiitatiai 5
oiminicatixi or 'test 1ey' ax'es 9
'JL1IALUSCU
9 KXSS TO E1EMtSES D
HT g AL ANIs
B. Gxds
-459-
C.Rplpiait
has as to critical or iti
exipimt e cqxanise or dai
axild:
*rjj gly di&tpt iiy qeratim 8
*ce ser1 1ø to
tMxd partias 5
D. claasifieI JilñxnBtial
has direct as to 1nfcmtixn onmir
*Jrs 1t pla 8
*traè xets or ataits 8
*rarch ad c'ee1cpimt 8
*saTe1 rtds 5
thng ad taedr pia 5
rIet strategLes,ridng p1irlic 5
HrsSEUrKN
acnt F]t1S
S W SthESW
Lfl( HEADI3 SIRE F]tR
1 LINES 10
2 HYEtcNAL CR (XXJJPAIJtN 8
3 SJERVISRN 8
4 JAUFICATtN 5
5 nnuri
6 nL3REIrc.w 20
-460-
7 aNntL RESRUJJY 15
9 ff11GL 7
10 2
2DTAL AFAISAL BN
AFAISL
APPENDIX XII
L1 aius
rafly CothI
Bs1ca1 a w1rm Cmtrols
- tiys1ca1 ciritrol fcr critianl ar; *
- logging of hyska1 s to crithal ars; *
- a au fire etatlm systan; *
- aitalEtiC fire apxesskn systen; *
- tmH] flm1 fire rrs; *
- th311e fire aiy rtres; *
- m airidng regulat1a in na±drE r; *
- lxrarre a1 safety iits *
Qpiter c
- thte1 cd1 1m; *
- logging of cçeratar ativity; *
- nnintamE of OçemtlCxEl trc*±le kg; *
- aiiIetkn of reglar ta±-tçs; *
- cçerator 1satim fran a1rtis ]i1xari *
- sepnratlm of cçeratia fran rogramng
resflt1; *
- restrictal xsa to rrivfled cçeratar fintims *
Ccnfigxatirn Sarity
fflB1 ckp1li1t nethth1ogr for ap1iantim aftvre; *
- lngeit qlity srae fu2tim; *
- dxats1 testh pohres; *
- tim systan da oiitrol nxthires; *
- i.sDlaticn of cxhtfrn aul thve1cit awircnrmts; *
- nEintame of trxere ad aiftre inttxi; *
- 1Ercre ad systan sfre da atro1 rrxthxes; *
- thirmtaticn of systan r1ty relreits. *
Dmmtaticn Saidty
- writtan cljoiiaitaticn stathrds; *
- ra1ires for naintam of mtatlrn; *
- aitateI xtatim takis; *
-462-
xt rvis
- irEhicn of udty rov1sicr in *ag; *
- aiçervislm of !P rvi *
Late r1ty
- apointirit of data çtotetim -nrdJmttx; *
- antroLs acer ( irçut ixcreiires; *
- re distrihitlrn of reçrrts au oih-ut *
- axss authrLsat4'xi riI.rts rogrr data *
- off-site data takiip *
k±iistrt1ai of SrLty
- Sir1ty nar or cx-ordjrator ixiti.cxi; *
- cee1qnmt of stratLc irity plai; *
- icLty staxhrris; *
- iEit ad frtJj rx9j1rs; *
- tatjce of fon1 utity reviø; *
- irity steering cxxmTittee; *
- Oipiter &xlit skills *
è1einnxtim r1ty
- re;i.i 'ixeTmt to si-m to all systers; *
- edsteue of j1j'cyjj] ltht.ifkatim *
- sord 81 H1fr çyjij; *
- psjrrJ da frmy ad rj; *
- ur antrol of rJ5; *
-ass].ogging *
Cznthy PJatth
APPENDIX XIII
1. Input Scams
a) Data Diddling. Changing data before or during their input
to the computer, i.e., counterfeiting, forging, altering,
or fabricatin g input documents. (This Is the most common
computer scam)
b) Piggybacking. A form of impersonation• in which a
nonauthorised person gains access to a terminal which has
not been deactivated (signed off) and uses it for his own
purposes; or the nonauthorised person knows the
authorised person's password code and signs on with that
password.
c) Imposter terminal. Using a home computer or an offsite
terminal with a telephone modern to gain access to a main
computer by fabricating authorisation (cracking the
password code) and then either intercepting data or using
time on the computer free of charge.
d) Multiple data based manipulation. Gaining access to one
computer In the network and using that access privilege to
break Into other computers In the network by use of a
common access code; or cracking an access protocol by
successive attempts to decipher the access code then
stealing time on the computer, converting software, or
manipulating data files.
2. Throughput Scams
3. Output Scams
1. Programming Controls
.AINi1X XIVa
çp1ieI far a term 1cm of $6 mfl 1 fm .plie fcr a nrrtge ]mi of $2J mWim -
far IH 1i*. Iin açpliel 1y dirtor fran CflL 1cm aith by anta-it cxi
of RIP cxi 12 r 1981 cxi 1Lf of tLf of RIP cxi 1st N,ve±er 1983.
r p rc. Hr tIe 1cm s arra1 by
Letter of offer to RIP far $6 mLUlm Letter of offer to RIP ns t cxi 28-11-83 au
tenn km s gLvi to BF ai letter axi axte1 by RIP cxi 29-11-83.
of aitari of tIe offer sig
byB cxi 13-6-1981.
Collatera]. for tIe $6 mfl 1 im term km Collateral for tIe $) mfllfrTi rrrrta km is
is 10 es of r1ainI lati (wLthxit 1st 1egi]. derg of P11 to 6 GE (D) N).- -
Q.T.) at ?è].a1a Jaya as çer laycut plan (43.6 a:ire) at N1a1a Jaya. in±th tIe
in tIe 1cm agr it thts]. 2-9-81. 11 10 a:ies trEth s tIe at,t of der-dn
of Assimt axi cIer-fn raq is artj c1 of aasjnmt. This 10 azes of
exB.itB1 for 10 es of r&lainal laul re'Jaine ]au to HI k s al9 der1 to (IN
rig insame of tIe title. wLthiit tiE 1xd &xl xit of HI *,
it1Er g Q]4 tolLi by RIP ahut t1s
tLtiLn. Ceratkm1 r of CXII (B)
stateI tiEt the nixt km of $20 mLllfrr
th1 nt 1e ti 1, 1 (XII tIet
ttet tIe 10 aies as ixevialy "derI" HI
-467-
Ni1X XIVb
frail
Preçaraticn to itim of Frail th3r1 of frail tlistdbitn ail
Ha cl.erkwith 1y fñi1t1y "°w ainnting to Iar±ring of ra
B. traniting 22.2 22.2 TTlfllfrfl 22.2 mf1ijfT 11
to k Bulpitra 1raqi1iO3S. tyHail poU
in amnt of a -S
th1ra1 s it
aiste1 ty ai e wr]l. ht-
nagr of . SteofUe 1n
ny rreI stte1
inSthgxeail tytFe
Nte: It is too lcng far tFe axlçetait lxxly aith as tFe Caitra]. Pak (i ra) of 1ays1a
to tt tte frail au 1cx11 a offkfr1 rx)lice rqxrt. 'Jh this &nble tIE
lercetrators to 1er tIElr traks ery U 1:efixe plfre st.artel Its invstLtlrn.
- 468 -
APPENDIX
Definition of CBT
The Supreme Court further held that the accused got control and
dominion over funds under the powers conferred on him by the
Board of Directors, by its Resolution authorising him and
another partner to operate on the accounts of the Insurance
Company with the Bank.
APPENDIX XVI