11
The paradigm of cybercriminals in Cameroon Saron M. Obia Pan African Institute for Development West Africa PAID-WA Buea, Cameroon

The Paradigm of Cybercriminals in Cameroon

Embed Size (px)

Citation preview

Page 1: The Paradigm of Cybercriminals in Cameroon

The paradigm of cybercriminalsin Cameroon

Saron M. ObiaPan African Institute for Development

West AfricaPAID-WA Buea, Cameroon

Page 2: The Paradigm of Cybercriminals in Cameroon

Outline Who is cybercriminal? Which software do they use? How financial theft is carried out? Who is behind the scene? Why do they succeed?

Page 3: The Paradigm of Cybercriminals in Cameroon

Who is cybercriminal?

Any person engage in criminal acts with the use of computer the use of the internet for illegal activities especially for financial motives

The types of crimes include

scamming (sale of pets, drug deals and cars) phishing hacking

Page 4: The Paradigm of Cybercriminals in Cameroon

The case of Assoua Achille Brice Eteki

*identity theft was used to mislead his victims Ach Ille Binirayjr Binnirey BinAm Studios

*creation of series of email accounts on social media

[email protected], [email protected], Yahoo ID: achille_eteki, Skype: binirayjr, [email protected], [email protected], [email protected], [email protected] Source: scamwarner

Page 5: The Paradigm of Cybercriminals in Cameroon

Which software do they use?

Software used by cybercriminals to secure their activities shall be disclosed in the following photos

jackhttps://www.google.com/search?q=magic+jack&biw=1366&bih=657&source=lnms&tbm=isch&sa=X&ved=0ahUKEwis366E_PnKAhVpYpoKHYfoCbwQ_AUIBygC#imgrc=Hn-0YMfDYtcOCM%3A

The above picture the device is known as the magic jack, use for free call via U.S

The gadget bought for 50000FCFA and used for a year

Page 6: The Paradigm of Cybercriminals in Cameroon

Hide my Ass use by cybercriminals to secure their location used to secure the VPN provides IPs for different countries and their local time

Page 7: The Paradigm of Cybercriminals in Cameroon

https://www.google.com/search?q=hide+my+ass&source=lnms&tbm=isch&sa=X&ved=0ahUKEwi45JTC6_nKAhVsCZoKHXqpCLgQ_AUICSgD&biw=1366&bih=657#imgrc=bPk13ZzCJ3_jmM%3A

Page 8: The Paradigm of Cybercriminals in Cameroon

text Now a secured chat forum for cybercriminals and clients

https://www.google.com/search?q=textnow&biw=1366&bih=657&source=lnms&tbm=isch&sa=

X&ved=0ahUKEwisw8Pi_PnKAhUBCZoKHbHODnsQ_AUICSgE#imgrc=zkkoHjg8XG-

DBM%3A

Page 9: The Paradigm of Cybercriminals in Cameroon

How is financial theft is carried out?

first identification of an online transaction

scan a birth certificate and edit, changing the name to that of the

receiver

apply for lost of ID card to procure another

use the ID card receipt issued at the police station to withdraw the

money(impersonation)

collaborate with dishonest staff to do the withdrawal in the banks

Page 10: The Paradigm of Cybercriminals in Cameroon

Who is behind the scene?

when the police make a step, cybercriminals take ten steps ahead.

those that are behind the scene in cybercrimes pick-up Dishonest staffs in financial institutions Unscrupulous authorities engage in such

activities

Page 11: The Paradigm of Cybercriminals in Cameroon

Why do they succeed?

Inadequate training of those involved in investigating

cybercrimes

The poor identification or authentication method

No regulations of protocols

Lack of internet censorship