The Paradigm of Cybercriminals in Cameroon

Preview:

Citation preview

The paradigm of cybercriminalsin Cameroon

Saron M. ObiaPan African Institute for Development

West AfricaPAID-WA Buea, Cameroon

Outline Who is cybercriminal? Which software do they use? How financial theft is carried out? Who is behind the scene? Why do they succeed?

Who is cybercriminal?

Any person engage in criminal acts with the use of computer the use of the internet for illegal activities especially for financial motives

The types of crimes include

scamming (sale of pets, drug deals and cars) phishing hacking

The case of Assoua Achille Brice Eteki

*identity theft was used to mislead his victims Ach Ille Binirayjr Binnirey BinAm Studios

*creation of series of email accounts on social media

binirayjr@justice.com, achillebrice@binamstudios.net, Yahoo ID: achille_eteki, Skype: binirayjr, intercamarts@gmail.com, info@intercamarts.tk, info@intercamarts.com, artstalkcam@gmail.com Source: scamwarner

Which software do they use?

Software used by cybercriminals to secure their activities shall be disclosed in the following photos

jackhttps://www.google.com/search?q=magic+jack&biw=1366&bih=657&source=lnms&tbm=isch&sa=X&ved=0ahUKEwis366E_PnKAhVpYpoKHYfoCbwQ_AUIBygC#imgrc=Hn-0YMfDYtcOCM%3A

The above picture the device is known as the magic jack, use for free call via U.S

The gadget bought for 50000FCFA and used for a year

Hide my Ass use by cybercriminals to secure their location used to secure the VPN provides IPs for different countries and their local time

https://www.google.com/search?q=hide+my+ass&source=lnms&tbm=isch&sa=X&ved=0ahUKEwi45JTC6_nKAhVsCZoKHXqpCLgQ_AUICSgD&biw=1366&bih=657#imgrc=bPk13ZzCJ3_jmM%3A

text Now a secured chat forum for cybercriminals and clients

https://www.google.com/search?q=textnow&biw=1366&bih=657&source=lnms&tbm=isch&sa=

X&ved=0ahUKEwisw8Pi_PnKAhUBCZoKHbHODnsQ_AUICSgE#imgrc=zkkoHjg8XG-

DBM%3A

How is financial theft is carried out?

first identification of an online transaction

scan a birth certificate and edit, changing the name to that of the

receiver

apply for lost of ID card to procure another

use the ID card receipt issued at the police station to withdraw the

money(impersonation)

collaborate with dishonest staff to do the withdrawal in the banks

Who is behind the scene?

when the police make a step, cybercriminals take ten steps ahead.

those that are behind the scene in cybercrimes pick-up Dishonest staffs in financial institutions Unscrupulous authorities engage in such

activities

Why do they succeed?

Inadequate training of those involved in investigating

cybercrimes

The poor identification or authentication method

No regulations of protocols

Lack of internet censorship

Recommended