9
Cyber Criminality: An Intellectual Challenge for the Federal Bureau of Investigation (FBI) and the International Police (INTERPOL) Saron M. Obia Pan African Institute for Development West Africa PAID-WA Buea, Cameroon

Cyber Criminality: An Intellectual Challenge for the Federal Bureau of Investigation (FBI) and the International Police (INTERPOL)

Embed Size (px)

Citation preview

Page 1: Cyber Criminality: An Intellectual Challenge for the Federal Bureau of Investigation (FBI) and the International Police (INTERPOL)

Cyber Criminality: An Intellectual Challenge for the Federal Bureau of Investigation (FBI) and

the International Police (INTERPOL)

Saron M. ObiaPan African Institute for Development

West AfricaPAID-WA Buea, Cameroon

Page 2: Cyber Criminality: An Intellectual Challenge for the Federal Bureau of Investigation (FBI) and the International Police (INTERPOL)

Outline

Who is a cybercriminal?How is cyber criminality an intellectual battle?How do cybercriminals procure fake ID cards and passport?Why are some cybercriminals not registered in the criminal

database?What are some of the problems encountered ?How effective is forensics investigations?Can the FBI and INTERPOL combat this challenge?

Page 3: Cyber Criminality: An Intellectual Challenge for the Federal Bureau of Investigation (FBI) and the International Police (INTERPOL)

Who is a cybercriminal?

Any person engage in criminal acts with the use of a computer the use of the internet for illegal activities especially for financial

motives Other names of cybercriminals in the society

419 guys machine men Ngues men Dak men yahoo guys Nak man, scammers and hackers

The types of crimesScamming, hacking, phishing and vishing

Page 4: Cyber Criminality: An Intellectual Challenge for the Federal Bureau of Investigation (FBI) and the International Police (INTERPOL)

How is cyber criminality an intellectual battle?The changing pattern of conventional crimes, has led to emergence of an

asymmetric war. Is no more for financial motives, but to showcase security lapses and frustrate the state or country.

The development of software and its cheap cost in the dark market The hacking of the Nigerian secret service database 2012 The hacking of the Cameroon presidential website 2015 The continuous email hacks and scam in the United States of America Cybercriminals breach security tracks and are not identified in security

database The game of software which agencies are not vest and yet to acquire Some cybercriminals are the best students in ICT and IT in

universities and other private institutions Some are located in other countries and even in the United States of

America

Page 5: Cyber Criminality: An Intellectual Challenge for the Federal Bureau of Investigation (FBI) and the International Police (INTERPOL)

How do cybercriminals procure fake ID cards and passport?

Election period has always been the time when Id cards are made for little or no prize to encourage people to vote. As such, cybercriminals profit to procure as many ID cards as possible in collaboration with dishonest staff.(case of Cameroon)

Some Africans have found Nigeria as a suitable ground, where crimes can be carried out with ease, since there is no ID card and the population. Also citizens from other countries can easily procure passport in Nigeria as well as withdraw money without complications.

Page 6: Cyber Criminality: An Intellectual Challenge for the Federal Bureau of Investigation (FBI) and the International Police (INTERPOL)

Why are some cybercriminals not registered in the criminal database?

With the rapid internet revolution, security agencies have not yet understood the game behind their failures. Cybercriminals have develop what is known as a “pick-up”.

A pick-up is the person that money is been transfer to his account or to his name, before the money is transferred back to the cybercriminal. This prevent the victim or law enforcement from ever knowing the scammer.

This security assurance have made some cybercriminals never to be identified. As they say “insurance cover me”, that is they can’t be trace thank to their pick-up (can be a friend abroad, dishonest staff or manager in the bank)

Page 7: Cyber Criminality: An Intellectual Challenge for the Federal Bureau of Investigation (FBI) and the International Police (INTERPOL)

What are some of the problems encountered?

Abuse of power by some authorities which children are involved in such activity.

Corruption of certain staffs involved when cybercrime in concern mostly in the sub region.

The destruction and modification of data by dishonest staffs in financial institutions.

Those engage in cybercrimes are sometimes the best students of university and private institutions due to lack of jobs.

Cipd and CIFAS (2012): Staff fraud and dishonesty Managing and mitigating the risks

Page 8: Cyber Criminality: An Intellectual Challenge for the Federal Bureau of Investigation (FBI) and the International Police (INTERPOL)

How effective is forensics investigations?

An asymmetric war that shall destabilize African countries if not carefully tackled. Forensic investigations in Africa need reassessment, because cybercriminal software are more secured, since they buy from the dark market.

Intelligence is the key to defeat cybercrimes, base on the following - impersonation or identity theft - creation of virtual accounts - hacking or interception of company networks - free creation of mobile numbers on the cloud - officers to carry out investigations are sometimes not up to

the task, mostly in Africa. Akuta et al (2011): Combating Cyber Crime in Sub-Sahara Africa; A Discourse on Law, Policy and

Practice

Page 9: Cyber Criminality: An Intellectual Challenge for the Federal Bureau of Investigation (FBI) and the International Police (INTERPOL)

Can the FBI and INTERPOL combat this challenge?

When the law enforcement make a step, cybercriminals move ten steps ahead.

The agencies can combat this challenge, if the following is respected;

Collaboration with security students for intelligence Review of the law on electronic commerce Track the pick-up through the transactional information Study the developing trends of criminals Insure best practices and collaboration between the criminal

justice system, experts and bank managersAbia et al (2010):Cameroonian youths, their attractions to scamming and strategies to divert

attention