Issues and Challenges in Addressing Cybercrime in Malaysia
Abstract
Cybercrime in Malaysia has become increasingly alarming, with various cases involving hacking, online fraud, malware attacks, and data breaches. Although there are more than 30 laws related to cyber activities, the enforcement of these laws remains ineffective in addressing increasingly complex threats. This study employs qualitative data analysis to examine the issues and challenges in combating cybercrime in Malaysia. Key challenges identified include the rapid advancement of technology, the evolving definition of cybercrime, jurisdictional challenges in cross-border investigations, and inadequate digital evidence. Additionally, difficulties in pinpointing the exact location of cybercriminals and issues related to the preservation of digital data pose significant obstacles to effective investigation and prosecution. This study proposes improvements to existing cyber laws, including amendments to the Communications and Multimedia Act 1998, the Computer Crimes Act 1997, and the Personal Data Protection Act 2010, to enhance the enforcement and investigation of cybercrimes. With more dynamic approaches, these laws can become more responsive in reducing the risks posed by the rapidly evolving cyber threats.
Keywords: Cybercrime, cybercrime definition, cross-border investigation, digital forensics, legal framework, digital security
Full Text: PDF
References
2. Caragliano, D. A. (2013). Real names and responsible speech: The cases of South Korea, China and facebook. Yale Journal of International Affairs. https://www.yalejournal.org/publications/real-names-and-responsible-speech-the-cases-of-south-korea-china-and-facebook
3. Caral, J. (2004). Lessons from ICANN: Is self-regulation of the Internet fundamentally flawed? International Journal of Law and Information Technology, 12(1), 1–31. https://doi.org/10.1093/ijlit/12.1.1
4. Cloudfare. (2024). How to prevent DDoS attacks. Methods and tools. Cloudfare. https://www.cloudflare.com/learning/ddos/how-to-prevent-ddos-attacks/
5. CyberSecurity Malaysia. (2023). Mid-year report threat landscape 2023. CyberSecurity Malaysia. https://www.cybersecurity.my/data/content_files/26/2511.pdf
6. Donna L. B. (1998). Malaysia’s “Computer Crimes Act 1997” gets tough on cybercrime but fails to advance the development of cyberlaws. Pacific Rim Law and Policy, 7(2), 26.
7. Duryana Mohamed. (2012). Investigating cybercrimes under the Malaysian cyberlaws and the criminal procedure code: Issues and challenges. Malayan Law Journal, 6, i--ix. http://irep.iium.edu.my/27926/
8. Duryana Mohamed. (2013). Combating the threats of cybercrimes in Malaysia: The efforts, the cyberlaws and the traditional laws. Computer Law & Security Review, 29(1), 66–76. https://doi.org/10.1016/J.CLSR.2012.11.005
9. Dustin Volz, J. F. (2016, 24 Mac). U.S. indicts Iranians for hacking dozens of banks, New York dam. Reuters. https://jp.reuters.com/article/us-usa-iran-cyber-idUSKCN0WQ1JF
10. Freedom House. (2014). Freedom on the Net: Canada. https://freedomhouse.org/report/freedom-net/2014/canada
11. Freedom House. (2016). Freedom on the Net 2015. https://freedomhouse.org/sites/default/files/FOTN 2015 Full Report.pdf
12. Helmi Noman. (2013). Saudi Arabia to impose restrictions on online content production, including on YouTube. OpenNet Initiatives.https://opennet.net/blog/2013/12/saudi-arabia-impose-restrictions-online-content-production-including-youtube
13. Home Office UK Government. (2013). Cyber crime: A review of the evidence. Home Office UK Government. https://www.gov.uk/government/publications/cyber-crime-a-review-of-the-evidence
14. Interpol. (2021). National cybercrime strategy guidebook. Interpol. https://www.interpol.int/content/download/16455/file/Cyber Strategy Guidebook.pdf
15. Irene Tham, Rachel Au-Yong, Tin May Linn & Rodolfo Pazos. (2018). SingHealth cyber attack: How it unfolded. Strait Times. https://graphics.straitstimes.com/STI/STIMEDIA/Interactives/2018/07/sg-cyber-breach/index.html
16. Janaletchumi Appudurai & Chitra L. Ramalingam. (2007). Computer crimes: A case study of what Malaysia can learn from others? Journal of Digital Forensics, Security and Law, 2(2).
17. Joli-Coeur, F. (2014). Canada’s approach to intermediary liability for copyright infringement: The notice and notice procedure. Berkeley Technology Law Journal. http://btlj.org/2014/03/canadas-approach-to-intermediary-liability-for-copyright-infringement-the-notice-and-notice-procedure/
18. Mahyuddin Daud & Ida Madieha Abd Ghani Azmi. (2021). Digital disinformation and the need for Internet co-regulation in Malaysia. Pertanika Journal of Social Sciences and Humanities, 29(S2), 169–183. https://doi.org/10.47836/pjssh.29.s2.12
19. Mahyuddin Daud. (2021). Freedom of Misinformation and the relevance of co-regulation in Malaysia: A cross-jurisdictional analysis. IIUM Law Journal, 29(2), 27–54. https://doi.org/10.1016/j.clsr.2019.105373
20. Majlis Keselamatan Negara. (2024, 15 Mac). Deepfake dikesan semakin banyak digunakan dalam aktiviti penipuan. Majlis Keselamatan Negara. https://www.mkn.gov.my/web/ms/2024/03/15/deepfake-dikesan-semakin-banyak-digunakan-dalam-aktiviti-penipuan/
21. Malaysian Communications and Multimedia Commission. (2020). FAQs on online content problems. Malaysian Communications and Multimedia Commission. https://www.mcmc.gov.my/en/faqs/online-content-problems/what-are-the-steps-required-for-me-to-lodge-compla
22. Maleen Balqish Salleh. (2023, 17 Jun). PDRM: Over RM5.2 billion lost to scams in two years. The Edge. https://theedgemalaysia.com/article/pdrm-over-rm52-billion-lost-scams-two-years
23. Marsden, C., Meyer, T., & Brown, I. (2020). Platform values and democratic elections: How can the law regulate digital disinformation? Computer Law & Security Review, 36, 105373. https://doi.org/10.1016/j.clsr.2019.105373
24. Mohamad Rizal Abd Rahman. (2020). Online scammers and their mules in Malaysia. Jurnal Undang-undang dan Masyarakat, 26, 65–72. https://doi.org/10.17576/juum-2020-26-08
25. Nazli Ismail Nawang. (2017). Combating anonymous offenders in the cyberspace: An overview of the legal approach in Malaysia. International Conference on Anti-Cybercrime (ICACC). https://doi.org/10.1109/Anti-Cybercrime.2017.7905255
26. Nehaluddin Ahmad & Norulaziemah Zulkiffle. (2022). Jurisdiction issues in cyberspace: An overview in respect of Brunei and Malaysia Compared to the United States’ system. Journal of Southeast Asian Research, 1–12. https://doi.org/10.5171/2022.384427
27. Norton. (2021). 2021 Norton cyber safety insights report. Norton Life Locks. https://www.nortonlifelock.com/us/en/newsroom/press-kits/2021-norton-cyber-safety-insights-report/
28. Nurkhairina Noor Sureani, Atikah Shahira Awis Qurni, Ayman Haziqah Azman, Mohd Bahrin Othman & Hariz Sufi Zahari. (2021). The adequacy of data protection laws in protecting personal data in Malaysia. Malaysian Journal of Social Sciences and Humanities (MJSSH), 6(10), 488–495. https://doi.org/10.47405/mjssh.v6i10.1087
29. OpenNet Initiatives. (2012). ONI country profile: China. OpenNet Initiatives.
30. Prasad Jayabalan, Roslina Ibrahim & Azizah Manaf. (2014). Understanding cybercrime in Malaysia: An vverview. Sains Humanika, 2(2), 109–115. https://doi.org/10.11113/sh.v2n2.424
31. Wall, D. S.(2007). Cybercrime: The transformation of crime in the information age. https://ssrn.com/abstract=1066922
32. Wimmer, K., & Pogoriler, E. R. (2006). International Jurisdiction and the Internet. Covington & Burling LLP. http://euro.ecom.cmu.edu/program/law/08-732/Jurisdiction/InternationalJurisdiction.pdf