At the ISACA Annual Conference, I delivered a presentation that delved into the interrelation between cybercrime and digital forensics. By examining the intricate connection between these two pivotal domains, I aimed to elucidate the symbiotic relationship that exists, wherein the techniques and methodologies of digital forensics play a crucial role in the investigation and mitigation of cybercrime incidents. Through this comprehensive analysis, attendees gained valuable insights into the dynamic landscape of cyber threats and the essential role digital forensics assumes in the pursuit of effective cybercrime prevention and response strategies.
2. Whoami?
ā Kharim Mchatta
ā CEO of HACK IT CONSULTANCY
āAuthor of 4 Cybersecurity books
ā Cybersecurity professional (Pen tester & Digital Forensics expert)
ā Founder of H4K-IT (Cybersec community in TZ)
ā CTF player
ā Blogger
ā Author at eForensics and Pentets Magazine in Poland
ā DW Swahili Subject matter expert (cybersecurity)
3. ROAD MAP OF TODAYS DISCUSSION
Discussion around
- digital economy
- Effects of digital economy
Discussion around digital forensics
- Types of digital forensics
- Digital forensics experts
Discussion on cybercrime
- Types of cybercrime
- Cybercrime inTanzania
Discussion around laws
- International vs Local laws
- Advocate vs Digital Forensics Expert
5. AFRICA DIGITAL ECONOMY
Majority of African countries are heading into the digital
economy while some of them are already in there. Some
African countries that are well known for their digital
economy include the following
Nigeria
Kenya
S. Africa
6. Tanzania in Digital Economy
Tanzania is heading into the digital economy.This means
that majority of the activities are being moved over to the
internet.
Here are some of the activities that are done online currently
includes
ā¢ National ID Number
ā¢ TRA (Filing returns)
ā¢ BRELA Registration
ā¢ Workers Compensation Funds (WCF)
ā¢ NHIF
7. Problems of Digital Economy
Tanzania being in the digital economy means majority of our
information can be found and accessed over the internet.
This comes with its draw backs and the major one is
cybercrime which affects the lives of people in variety of ways.
Example
ā¢ Privacy of the people can be compromised
ā¢ Information can be leaked
ā¢ System being hacked
ā¢ System being inaccessible due to denial of services (DOS)
ā¢ Financial Loss
ā¢ Reputational Loss
9. Cybercrime inTanzania is constantly increasing as more entities keep
on digitalizing their operations.This means that there are going to
be more cybercrime cases faced in the court.
The problem that we are facing as a country currently is that most of
the advocates and lawyers havenāt got the opportunity to explore and
understand about the digital crime since itās a new concept.
Hence it is important to have advocates and lawyers who are knowledgeable
on issueās relating to digital crime.This can be achieved through training.
Tanzania Digital Crime Ruling
10. What is cybercrime?
The first reported cybercrime took place in 1834 where the French
telegram system was hacked by a couple of robbers where they stole
information from the stoke market making it the first cybercrime in the
world. This led to the rise of more cybercrime activities which involved
viruses and network hacks.
History of Cybercrime
These are all the crimes that are conducted by means of computer or
over the internet.
11. There are several cybercrime that are being conducted and some of
them include;
Types of Cybercrime
Financial Fraud Theft of intellectual
property
Damage of company
service network
Systems being
hacked
Other Cybercrimeās
12. Tanzania as a country in the digital era faces plenty of cyber attacks. On
21st July 2020, IPPmedia reported that TCRA has called on all
Information and Communication Technology (ICT) experts in the
country to be wary of cyber-attacks due to 10 - 15 companies had
been hacked.
Cybercrime in Tanzania
The most common cybercrime activities happening in Tanzania include
the following;
ā¢ System hacking
ā¢ Financial fraud
ā¢ Social Engineering
ā¢ Cyberbullying
ā¢ Intellectual property theft
13. The rise of cybercrime in the world had to be addressed. This led to the
need of having a way on which these crime had to be addressed by law
enforcers.This Led to a rise of digital forensics.
Cybercrime & Digital Forensics
It is the process of collecting, analyzing, preserving and documenting of
digital evidence and presenting them in court of law for prosecution.
What is digital forensics
14. When it comes to digital forensics this refers to acquiring of evidence
from any electronic device. Here are some of the common types of
digital forensics
digital forensics Investigation
ā Computer forensics
ā Mobile forensics
ā Email forensics
ā Network forensics
ā Hacking
ā Malware forensics
ā Wireless forensics
ā Database forensics
19. When a cybercrime has occurred, there are 3 technical people who are
going to be responsible for handling the case and these individual's have
different roles to play when it comeās to digital forensics and each role
should be well understood by everybody.
ā¢ First responder
ā¢ Computer forensics analyst
ā¢ Expert witness
In court the expert witness is going to be responsible to answer all the
questions in court of how the investigation was conducted and whether
the procedures were followed.
Digital Forensics Expert
20. In digital forensics there are a set of stages that an expert must go
through in order until they present the evidence in the court of law
and these stages include:
Stage/Phases of Digital Forensics
ā¢ Authority
ā¢ Planning
ā¢ Evidence identification
ā¢ Evidence collection
ā¢ Chain of custody
ā¢ Analysis
ā¢ Report writing
ā¢ Expert witness
21. Best Practice in Digital Forensics (Kenya National Forensics Lab)
22. Law and Investigators
Laws in digital forensics are there to govern digital forensics expert on
what is or is not allowed to do when doing an investigation.
There is no single law that governs digital forensics but a nexus of them
which needs to be put into consideration. There are situations where a
digital forensics expert may be carry out an investigation and later it is
considered a criminal offense.
Here are some of the International Laws that govern digital forensics
ā¢ Human rights act of 1998 ā every person has their basic rights.
ā¢ Data protection right
ā¢ Interception of communication
ā¢ Computer misuse act 1990
ā¢ Police and criminal evidence act 1984 ā this act is for law enforcers
which covers power to search a person and property, power to
detain and arrest people, questioning of suspects, access and copying.
24. Law and Investigators
Here are some of the local Laws that govern digital forensics which can
be found on the cybercrime act 2015 part IV search and seizure
ā¢ Search and seizure
ā¢ Disclosure of data
ā¢ Expedited preservation
ā¢ Disclosure and collection of traffic data
ā¢ Disclosure and collection of content data
ā¢ Court order
ā¢ Use of forensic tools
ā¢ Hearing of application
26. Food for Though (Discussion)
We have discussed about Tanzania heading into the digital economy but
there are some questions we should be asking ourselves
1. Is Tanzania well prepared for the effects of being in the digital economy
2. Do we have experts who can help us combat the effects of digital economy
3. Do law enforcers understand about the effects of digital economy
4. Is the laws in place satisfying the ways to combat effects of cybercrime (are
there loopholes on the current laws)
5. What is our way forward
27. This intellectual property belongs to HACK IT Consultancy a
cybersecurity company located in Dar es salaam,Tanzania.
Author: Kharim Mchatta
Contact: +255 735 212 145
Email: info@hackitconsultacy.com
Website: www.h4k-it.com
LinkedIn: hack it consultancy Instagram: @hackitconsultancy