Upload
saron-messembe-obia
View
348
Download
2
Embed Size (px)
Citation preview
The paradigm of cybercriminalsin Cameroon
Saron M. ObiaPan African Institute for Development
West AfricaPAID-WA Buea, Cameroon
Outline Who is cybercriminal? Which software do they use? How financial theft is carried out? Who is behind the scene? Why do they succeed?
Who is cybercriminal?
Any person engage in criminal acts with the use of computer the use of the internet for illegal activities especially for financial motives
The types of crimes include
scamming (sale of pets, drug deals and cars) phishing hacking
The case of Assoua Achille Brice Eteki
*identity theft was used to mislead his victims Ach Ille Binirayjr Binnirey BinAm Studios
*creation of series of email accounts on social media
[email protected], [email protected], Yahoo ID: achille_eteki, Skype: binirayjr, [email protected], [email protected], [email protected], [email protected] Source: scamwarner
Which software do they use?
Software used by cybercriminals to secure their activities shall be disclosed in the following photos
jackhttps://www.google.com/search?q=magic+jack&biw=1366&bih=657&source=lnms&tbm=isch&sa=X&ved=0ahUKEwis366E_PnKAhVpYpoKHYfoCbwQ_AUIBygC#imgrc=Hn-0YMfDYtcOCM%3A
The above picture the device is known as the magic jack, use for free call via U.S
The gadget bought for 50000FCFA and used for a year
Hide my Ass use by cybercriminals to secure their location used to secure the VPN provides IPs for different countries and their local time
https://www.google.com/search?q=hide+my+ass&source=lnms&tbm=isch&sa=X&ved=0ahUKEwi45JTC6_nKAhVsCZoKHXqpCLgQ_AUICSgD&biw=1366&bih=657#imgrc=bPk13ZzCJ3_jmM%3A
text Now a secured chat forum for cybercriminals and clients
https://www.google.com/search?q=textnow&biw=1366&bih=657&source=lnms&tbm=isch&sa=
X&ved=0ahUKEwisw8Pi_PnKAhUBCZoKHbHODnsQ_AUICSgE#imgrc=zkkoHjg8XG-
DBM%3A
How is financial theft is carried out?
first identification of an online transaction
scan a birth certificate and edit, changing the name to that of the
receiver
apply for lost of ID card to procure another
use the ID card receipt issued at the police station to withdraw the
money(impersonation)
collaborate with dishonest staff to do the withdrawal in the banks
Who is behind the scene?
when the police make a step, cybercriminals take ten steps ahead.
those that are behind the scene in cybercrimes pick-up Dishonest staffs in financial institutions Unscrupulous authorities engage in such
activities
Why do they succeed?
Inadequate training of those involved in investigating
cybercrimes
The poor identification or authentication method
No regulations of protocols
Lack of internet censorship