Professional Documents
Culture Documents
Cyber Tuto 1
Cyber Tuto 1
(Week 2)
Question 1
Cyberspace may be described as the non-physical “place” where electronic communications
happen and digital data is located.
Taking examples from the legal framework in Malaysia explain the challenges that are
presented in regulating computer networks in cyberspace.
(25 Marks)
Should I add the solution ? PDF notes
Intro: definition of cyberspace. Non-physical place-virtual
The Multimedia Super Corridor (MSC) was established to accelerate the growth of the
country's digital economy. It is a special economic zone designed to support the innovative
ecosystem of IT and IT-enabled industries and the growth of the country's digital economy.
Rights of User
The problem of anonymity affected the right of user in Internet in many ways.
Popularly, this problem has always led to cyberbully and cause the use to be bullied,
and thereby affect mental health and tend to shy away from cyberspace. Due to the
problem of anonymity, people in Internet can say whatever they want including
offensive content which attacking people. Furthermore, due to the problem of
anonymity, the user will get cheated by the cheater who claiming themselves to be
another person, i.e. the cheater, an uncle may claims that he is a handsome teenager
and deceit young female teenager for sexual photo. This will affect the safety Not
only that, due to this problem, in cyberspace there’s a lot of people impersonating
another thereby using that person identity to cause injury to that person’s reputation
and etc. by posting offensive or obscene content.
Further Elaboration
One of the significant challenges from the legal point of view is the impossibility of
controlling and monitoring a virtual identity. This claim rooted in the unknown
identity of the user in the virtual space, which called anonymity. Anonymity makes it
possible for the users to behind on a virtual persona via a username. This is quite
different from the real world, as in real world, people are always controlled by
restricting factors, i.e. we have our own identity card and birth certificate.
As a matter of fact, unlike the real world, we can be in several places at the same time
in the internet world. Therefore, the problem or identity in cyberspace will be faced
with many challenges. Regarding to identity, Cyberspace provides us with the
freedom to be anybody that we want to, it allows us to communicate almost with
anybody in the world. Everybody chooses a mask of some appearance, a certain social
role and comes in with a new shape of identity which is included in many manuscripts
of the information technology field with the titles like Virtual Identity. Therefore, the
problem of identity has led to many issues, i.e. Fraud, sending malicious email or
message, harassment and etc. In addition, to make the situation worse, terrorism often
use the ‘advantage’ of cyberspace to hide their identity in cyber terrorism to prevent
from being tracked down by the police forces. Furthermore, the anonymity issue of
cyberspace makes identity tracking a noteworthy predicament which poses obstacles
in detection and investigations process.
Examples
The problem of identity can be seen in the case of Godfrey v Demon Internet
Limited. In this case, the plaintiff (Godfrey), a lecturer alleged that an unknown
Internet user created an obscene and defamatory posting and fraudulently attributed
its authorship to him. The lecturer then complained to the defendant (Demon Internet
Limited) (DIL), the public forum platform company where the statement was posted.
Despite receiving the notification of fraudulently posting from Godfrey, DIL did not
remove the posting in the public forum. Godfrey then filed a claim against DIL. The
court held that DIL knew about the impugned statement was defamatory and posted
fraudulently as Godfrey had notified the company, DIL was therefore held liable. This
case shows that the problem of anonymity in cyberspace can lead to impersonation of
another to do things in bad faith. In another case of Regina v Reynolds, the accused
engaged in online chat claiming himself to be a 16 years old boy, attempting to make
young girls expose their bodies and transmit photographs to him over the internet. By
looking at this case, we can know that it is hard for us to identify the person behind
the monitor. In PP v Rutinin Suhaimin, which involved the posting of offensive
remark on the same state’s portal, the respondent (accused) was acquitted by the trial
judge. It was decided that there was no prima facie case against the respondent as the
appellant (prosecutor) failed to prove the offensive remark was posted by the
respondent and that the Internet could have been accessed by anyone from the same
computer. From this case, it clearly shown the hardship and difficulty faced by the
prosecution in proving such cases against the alleged offenders.
Besides, an internet user can also hide their identity by modified the IP address. There
are a number of IP scrambler programs, i.e. Virtual World Computing’s Cocoon. By
using Cocoon, it will reveals us as a ‘Cocoon user’ and only Cocoon's IP address can
be seen, and cookies can be easily blocked entirely. On the other hand, internet user
can also hide their identity by using Virtual Private Network or widely known as
VPN. By using VPN, it will be hard for the internet user to be tracked and monitored,
hence hide their identity.
Right of user
Due to the problem of attribution, the user on the internet if being attacked, it would
be hard for them to trace the attacker and find out who is the attacker. This problem
has therefore affect the right of user from using the internet peacefully as it is hard to
trace the offender, they will therefore continue to attack.
Further Elaboration
The idea that identifying the source of a cyber-attack or cybercrime is often
complicated and difficult because there is no physical act to observe and attackers can
use digital tools to extensively cover their tracks. In other words, it means that you
will not know who is behind the screen carrying out the attack or any illegal activities.
Example
Example of this issue can be seen in the incident of Russian interference in the 2016
United States elections. On 2016, Hillary Clinton attributed her loss in the 2016
election to Russian meddling organized by Putin, the reason of this is that she claimed
that Putin had a personal grudge against her, and linked his feelings to her criticism of
the 2011 Russian legislative election. In addition, the Director of National
Intelligence, James Clapper also attributed this Russian hacking attempt to Putin.
Besides, the Federal Investigators of U.S also attributed these attempts to Russian
government-sponsored hackers, and specifically to Russian intelligence agencies.
Although with this few attribution, it is still hard to attribute this 2016 interference in
the 2016 United States election to Russia as there is still lacking of evidence. Another
example of this problem is that, i.e. a professional hacker defame another by using a
fake account, it would be hard for us to trace back and determine the IP address of the
professional hackers, as they are good at modify the IP address. Hence, it is hard to us
to attribute the defamation to that professional hacker.
3. The problem of authentication (original)
Whether it’s original or not?
Electronic message can be easily fringed
Even its identified party, there’s difficulty ensuring that message / signature is
identify / authentical
Right of user
The problem of authentication in cyberspace can affected the users in many ways.
Firstly, due to this problem, the user will always get fraud by the forged and fake
document, which will cause them lost in money or property. Further, this problem will
also affect legitimate seller from making business online. This is because due to this
problem, the consumer tend to shy away from buying things online and thereby affect
the business of online seller.
Example
Example of the authentication problem in cyberspace is that, we hard to identify the
authenticity of digital signature on an electronic contract as it can be modified easily.
Further, for instances, we also hard to identify the authenticity of information that
being shared in Facebook, as it can be shared easily and may be false information, we
therefore not sure about the authenticity of that information.
Right of user
Due to the problem of non-repudiation and its uncertainty, it will affect the right of
user from claiming that they have been giving their consent freely. For example, once
the user read the shrink wrap agreement or click the ‘I agree’ button on Click wrap
agreement, the user is said to be bound by the contract, even though the user might
not have consent to that contract, as nowadays a lot of user just simply click or scroll
through the agreement before proceed. This has therefore caused the user to be bound
by the contract even without their consent. Due to this problem a lot of people shy
away from online contract and will therefore affecting people those who doing online
business, as the transactions cannot be guaranteed.
Right of user
The problem of jurisdiction has affected the user the right to choose where to settle
the dispute and has affected their choice of law. This is because cyberspace is a
borderless world and in one dispute it might involve parties from different
jurisdiction, the user therefore cannot choose the place of court to listen the matter
and the law to be tried against them.
Example
For example, a hacker based in Malaysia, hacked a bank in Switzerland. The question
here is which country shall have the jurisdiction to hear the case? Malaysia or
Switzerland? This has therefore become an issue in the cyberspace.
Extradition treaties and law that allows us to bring that person in a diff country back
to Malaysia ( we have this in Malaysia in the CCA)
Question 2
“Governments of the Industrial World, you weary giants of flesh and steel, I come from
Cyberspace, the new home of Mind. On behalf of the future, I ask you of the past to leave us
alone. You are not welcome among us. You have no sovereignty where we gather.”
John Perry Barlow’s Declaration of Independence for Cyberspace,1996
Do you think the above comment holds true in modern times (especially in the year 2022) in
Malaysia?
(25 Marks)
Explain the statement as it doesn’t hold true to in modern times as we have so many laws that
have been enacted throughout the years which is used to regulate the internet – a set of laws
telling us what we can do or what we cannot do.