Upload
saron-messembe-obia
View
311
Download
0
Embed Size (px)
Citation preview
Cyber Criminality: An Intellectual Challenge for the Federal Bureau of Investigation (FBI) and
the International Police (INTERPOL)
Saron M. ObiaPan African Institute for Development
West AfricaPAID-WA Buea, Cameroon
Outline
Who is a cybercriminal?How is cyber criminality an intellectual battle?How do cybercriminals procure fake ID cards and passport?Why are some cybercriminals not registered in the criminal
database?What are some of the problems encountered ?How effective is forensics investigations?Can the FBI and INTERPOL combat this challenge?
Who is a cybercriminal?
Any person engage in criminal acts with the use of a computer the use of the internet for illegal activities especially for financial
motives Other names of cybercriminals in the society
419 guys machine men Ngues men Dak men yahoo guys Nak man, scammers and hackers
The types of crimesScamming, hacking, phishing and vishing
How is cyber criminality an intellectual battle?The changing pattern of conventional crimes, has led to emergence of an
asymmetric war. Is no more for financial motives, but to showcase security lapses and frustrate the state or country.
The development of software and its cheap cost in the dark market The hacking of the Nigerian secret service database 2012 The hacking of the Cameroon presidential website 2015 The continuous email hacks and scam in the United States of America Cybercriminals breach security tracks and are not identified in security
database The game of software which agencies are not vest and yet to acquire Some cybercriminals are the best students in ICT and IT in
universities and other private institutions Some are located in other countries and even in the United States of
America
How do cybercriminals procure fake ID cards and passport?
Election period has always been the time when Id cards are made for little or no prize to encourage people to vote. As such, cybercriminals profit to procure as many ID cards as possible in collaboration with dishonest staff.(case of Cameroon)
Some Africans have found Nigeria as a suitable ground, where crimes can be carried out with ease, since there is no ID card and the population. Also citizens from other countries can easily procure passport in Nigeria as well as withdraw money without complications.
Why are some cybercriminals not registered in the criminal database?
With the rapid internet revolution, security agencies have not yet understood the game behind their failures. Cybercriminals have develop what is known as a “pick-up”.
A pick-up is the person that money is been transfer to his account or to his name, before the money is transferred back to the cybercriminal. This prevent the victim or law enforcement from ever knowing the scammer.
This security assurance have made some cybercriminals never to be identified. As they say “insurance cover me”, that is they can’t be trace thank to their pick-up (can be a friend abroad, dishonest staff or manager in the bank)
What are some of the problems encountered?
Abuse of power by some authorities which children are involved in such activity.
Corruption of certain staffs involved when cybercrime in concern mostly in the sub region.
The destruction and modification of data by dishonest staffs in financial institutions.
Those engage in cybercrimes are sometimes the best students of university and private institutions due to lack of jobs.
Cipd and CIFAS (2012): Staff fraud and dishonesty Managing and mitigating the risks
How effective is forensics investigations?
An asymmetric war that shall destabilize African countries if not carefully tackled. Forensic investigations in Africa need reassessment, because cybercriminal software are more secured, since they buy from the dark market.
Intelligence is the key to defeat cybercrimes, base on the following - impersonation or identity theft - creation of virtual accounts - hacking or interception of company networks - free creation of mobile numbers on the cloud - officers to carry out investigations are sometimes not up to
the task, mostly in Africa. Akuta et al (2011): Combating Cyber Crime in Sub-Sahara Africa; A Discourse on Law, Policy and
Practice
Can the FBI and INTERPOL combat this challenge?
When the law enforcement make a step, cybercriminals move ten steps ahead.
The agencies can combat this challenge, if the following is respected;
Collaboration with security students for intelligence Review of the law on electronic commerce Track the pick-up through the transactional information Study the developing trends of criminals Insure best practices and collaboration between the criminal
justice system, experts and bank managersAbia et al (2010):Cameroonian youths, their attractions to scamming and strategies to divert
attention