Skip to main content

Data leak: Independent probe needed; don’t downplay it, expert says

 WITH several ministers attempting to underplay expose over revelation that millions of personal data may have been compromised, an expert urged Putrajaya to stop trivialising such matters and act on the matter.  

“We need an independent investigation to get to the bottom of the matter. The team must include former top-ranking police officers and ex-officials from the National Registration Department (NRD).  

“The findings must be made public and those responsible must be arrested,” Arunachala Research & Consultancy Sdn Bhd principal consultant R Paneir Selvam told FocusM.  

Last week, tech website Lowyat.net reported that NRD dataset containing details of Malaysia’s population with birth years between 1940 and 2004 – roughly about 22.5 million people – was on sale for nearly RM44,000 at a database marketplace forum. 

The seller claimed the personal data included full names, identity card numbers, addresses and photographs. Data from the Election Commission (EC) website is also allegedly up for sale. 

Following the shocking revelation, Bukit Aman Commercial Crime Investigation Department (CCID) announced it would investigate the matter.  

“We urge the public not to speculate on the issue. The police can assure that proper investigations will be conducted to address the matter swiftly,” CCID director Datuk Kamarudin Md Din had said.  

Later, Home Minister Datuk Seri Hamzah Zainuddin claimed that the leak did not come from NRD, despite the ongoing probe.  

“We (at the ministry) have a mechanism to verify that the leaked data was not from the NRD. 

“As in previous cases, the sale of data involves several agencies which we have given some leeway (for them) to obtain information from the department.”  

On May 20, Senior Minister (Defence) Datuk Seri Hishammuddin despite the leak, Malaysians need not worry as it would not jeopardise national security.  

“The home ministry has the Special Branch, and I’ve worked with them in the past (as home minister). I believe that they (home ministry) are more than equipped (to handle such a threat). 

“Also, this sort of threat does not jeopardise the national security of our country,” Free Malaysia Today reported him as saying.  

Touching on the matter, Paneir Selvam said that in developed countries, such exposes would have triggered the minister in charge to take responsibility over the matter and resign.  

‘Unfortunately, we don’t practise that culture here. The problem in Malaysia is that we are not proactive in dealing with any situation.  

“We only act when something bad has happened. What we need in Malaysia is a mindset change, where we prioritise prevention before cure,” he mentioned.  

Elaborating on the data leak, Paneir Selvam opined that it could have happened through two ways; one is the leak being perpetrated by an insider or secondly, by hackers.  

He also urged the Government not to underestimate the situation as the data leak could very much involve personal details of VIPs.  

“We have to find our if personal details of our Agong, prime minister and other Cabinet members were also leaked in the dark web.  

“And we need to ascertain whether any of our intelligence information got leaked in the process too. That is why I consider this a national security issue,” Paneir Selvam stressed.   

Was CyberSecurity Malaysia consulted?  

Calling it a treasonous act, the academic warned that such data leak could compromise Malaysia’s security apparatuses work as top officials could be at risk of being threatened by unsavoury elements.  

“For example, these dubious people may be in possession of a top police officer’s family’s daily routine. They can essentially use the information to threaten to harm the officer’s family if the latter doesn’t cooperate with them,” he quipped.  

On that note, Paneir Selvam questioned whether NRD or any other Government agencies holding personal data of Malaysians had approached CyberSecurity Malaysia to strengthen their system to prevent such leaks.  

“In developed nations like the US, the authorities work constantly to upgrade and update their data storage system. They even hire hackers and get them to try to hack into the system to test it.  

“If the hackers succeed, they even hire the former and get their know-how on how to strengthen their systems further.  

“So my question to NRD and other agencies, did you all get help from CyberSecurity Malaysia to strengthen our database system to deter hacking?”, he queried. – May 22, 2022

Source: https://focusmalaysia.my/data-leak-independent-probe-needed-dont-downplay-it-expert-says/

Comments

Popular posts from this blog

Terrorism in Africa

According to state.gov, ISIS was defeated a few years ago. However, the organization's presence and existence remain conspicuous in Africa. Ongoing conflicts in Somalia, Ethiopia, Mozambique, Nigeria, and Burkina Faso demonstrate that ISIS has shifted its focus away from Iraq and Syria. Although ISIS lacks a clear hierarchy like Al-Qaeda, its followers and supporters wholeheartedly believe in its strong ideology. In 2014, the United States led the formation of a broad international coalition known as 'The Global Coalition to Defeat ISIS' to combat the organization during the height of the Syrian and Iraqi conflict. The primary objectives of this 83-member coalition are to degrade and defeat ISIS, which poses a threat to international peace and security. ISIS has brought thousands of foreign fighters from around the world to combat zones like Syria and Iraq, and it has used technology to promote its violent extremist ideology and instigate terrorist attacks. For example, t

Sedition Act 1948 should have been repealed a long time ago. But why?

THE Sedition Act 1948 is a legislative measure that was enacted in Malaysia during the colonial era, designed to curb any form of speech or expression that was deemed to be seditious in nature with the aim of maintaining public order and security. The Sedition Act has been subject to much debate and criticism, with some arguing that it is a violation of freedom of speech and expression. Despite this, the Act remains in force in Malaysia to this day, albeit with some amendments made over the years. Although I concur with the abolition of this Act, it is imperative that a comparable new legislation be enacted to address the escalating prevalence of racially and religiously bigoted remarks that have been unsettling our distinctive multicultural and multi-religious society as of late. An instance that exemplifies the prudent decision-making of the governing body is the substitution of the Internal Security Act of 1960 with the Security Offences (Special Measures) Act 2012 (SOSMA). This rep

THE HISTORY OF TERRORISM: MORE THAN 200 YEARS OF DEVELOPMENT

The history of terrorism dates back at least 1500 years when Jewish resistance groups (66 - 72 A.D.) known as Zealots killed Roman soldiers and destroyed Roman property. The term assassin comes from a Shi'ite Muslim sect (Nizari Isma'ilis - also known as hashashins "hashish-eaters") fighting Sunni Muslims (1090 - 1275) and during Medieval Christendom resisting occupation during the Crusades (1095-1291). The hashashins were known to spread terror in the form of murder, including women and children. The brotherhood of Assassins committed terror so as to gain paradise and seventy-two virgins if killed and to receive unlimited hashish while on earth. The modern development of terrorism began during the French Revolution's Reign of Terror (1793 - 1794). During this period the term terrorism was first coined. Through the past two hundred years, terrorism has been used to achieve political ends and has developed as a tool for liberation, oppression, and i