SlideShare a Scribd company logo
1 of 31
Download to read offline
University of Mauritius
                             Faculty of Law & Management

                          LAWS 2100Y Foundations of IT Law




       Cybercrime & Computer
            Misuse cases
                     In Mauritius and African Regions
Presented by: Group 1
‱Ashnee Gunness
‱Bhavna Nobaub
‱Ashveen Beechowa
‱Ashesh Ramjeeawon
Agenda
What is Cybercrime?
Mauritian Cybercriminals
Cases of Computer Misuse in Mauritius
Cybercrimes in African Regions
Legislations in African Regions
Fighting off the Cybercrimals in Mauritius – the
Challenge
  Cyber crime Unit (Mtius)
  CERT-MU
                 Cybercrime & Computer Misuse cases
                    in Mauritius & African Regions
What is Cybercrime?
An attack that undermines the confidentiality, integrity
or availability of a computer, information resident on it,
or a computer service within a Network Information
System.
Some offences under Computer Misuse and
Cybercrime Act 2003:
Unauthorised access to data
Access with intent to commit offences
Unauthorised access to and interception of computer
service
Damaging or denying access to computer system

                  Cybercrime & Computer Misuse cases
                     in Mauritius & African Regions
Mauritian
Cybercriminals
   Cybercrime & Computer Misuse cases
      in Mauritius & African Regions
Do you Recognise the Face?




       Cybercrime & Computer Misuse cases
          in Mauritius & African Regions
CyberCriminal 1
     Vishal Ramessur – 32 years old
     First Mauritian Hacker involved in the
     ‘sabotage of internet connection’ in 2005
     Violation of section 7 (b) of Computer misuse and
     cybercrime Act de 2003 :
     “a denial of access to, or impairment of any program or
     data stored in, the computer system”
     Shall commit an offence and shall, on conviction be
     liable to a fine not exceeding 200, 000 and to penal
     service not exceeding 20 years
Source: http://www.lexpress.mu/display_search_result.php?news_id=38637
                             Cybercrime & Computer Misuse cases
                                in Mauritius & African Regions
Does this Name tell you anything?




       Booden (Vinay) Ramrichia



           Cybercrime & Computer Misuse cases
              in Mauritius & African Regions
CyberCriminal 2
 Booden (Vinay) Ramrichia -un pirate informatique du site
 de l’Etat
 un clerc du CISD de 28 ans
 poursuivi en cour intermédiaire
 20 mai 2005 - tentatives pour bloquer l’accùs à deux des
 principaux serveurs du systĂšme
 Dans sa déposition à la police, il avoue
 Mais la magistrate Adila Hamuth Ă©crit : “Il a Ă©tĂ© clairement
 convenu, la fois derniĂšre, que le procĂšs devait ĂȘtre dĂ©jĂ  logĂ©.
 Cette affaire a traĂźnĂ© et la poursuite n’a pu expliquer pourquoi
 l’affaire n’a pas Ă©tĂ© instruite. Dans les circonstances, la charge
 provisoire est rayée
Source: http://www.lexpress.mu/display_search_result.php?news_id=90200
                        Cybercrime & Computer Misuse cases
                           in Mauritius & African Regions
Do you Recognise this Cybercrime?




          Cybercrime & Computer Misuse cases
             in Mauritius & African Regions
Computer Misuse -Phishing in M’tius

   26 septembre 2004, Kovalen, 14 ans, Ă©tudiant du
   collùge St Esprit, atteint d’une maladie incurable – la
   maladie de Creutz-feldt-Jakob.
   l’adolescent peut ĂȘtre sauvĂ©, mais comme il vient d’une
   famille modeste, il n’a pas les moyens de se faire soigner
   ! Ils lancent un appel à la générosité : « Donnez Rs 1, Rs
   5 ou mĂȘme Rs 100. Aidez cet enfant Ă  vivre plus
   longtemps, chacun a le droit de vivre, pourquoi pas lui ?
   Plusieurs associations dont la Croix Rouge, Amnesty
   International participent à cet élan de solidarité. »
  Source:http://www.lexpress.mu/display_search_result.php?news_id=52226
                           Cybercrime & Computer Misuse cases
                              in Mauritius & African Regions
Cybercrime & Computer Misuse cases
   in Mauritius & African Regions
Important Security Announcement To Internet
Banking(IB) Customers Port-Louis, 21st January 2008




                Cybercrime & Computer Misuse cases
                   in Mauritius & African Regions
Computer Misuse
May 2008- Three Cases lodged by the Mauritius
Telecom
foreigners have introduced a system with the
help of switches and other apparatus to divert
international calls coming from abroad.
Diverting the gateway of MT is a criminal
offence.
This has led to the loss of huge amount of
money for MT.
              Cybercrime & Computer Misuse cases
                 in Mauritius & African Regions
Computer Misuse (ctnued..)
The Information Communication Technologies Act 2001:-
under section 46 offences
(j) By means of an apparatus or device connected to an
installation maintained or operated by a licensee-
(i) defrauds the licensee of any fee or charge properly payable for
the use of a service; causes the licensee to provide a service to
some other person without payment by such other person of the
appropriate fee or charge; or fraudulently installs or causes to be
installed an access to a telecommunication line;
Penalties
(1) Any person who commits an offence under this Act shall, on
conviction, be liable to a fine not exceeding 1,000,000 rupees and
to imprisonment for a term not exceeding 5 years

                    Cybercrime & Computer Misuse cases
                       in Mauritius & African Regions
Cybercrimes in African Regions
Legislations in African Regions




      Cybercrime & Computer Misuse cases
         in Mauritius & African Regions
African Regions
1. Nigeria




               Cybercrime & Computer Misuse cases
                  in Mauritius & African Regions
Cybercrime – Nigerian 419
Nigerian 419 scam stole the most money off Internet.
Americans reported losing an all-time high of $183
million to Internet fraud in 2005, up 169 percent from
$68 million in 2004.

Refered to as quot;Advance Fee Fraudquot; or quot;419 Fraudquot;

The Scam operates as follows: the target receives an
unsolicited fax, email, or letter often concerning Nigeria
or another African nation containing either a money
laundering or other illegal proposal

                 Cybercrime & Computer Misuse cases
                    in Mauritius & African Regions
Cybercrime & Computer Misuse cases
   in Mauritius & African Regions
African Regions
2. South Africa




              Cybercrime & Computer Misuse cases
                 in Mauritius & African Regions
Cybercrimes -South Africa
Credit card quot;cloningquot; and e-mail scams
Windows Sinowal Trojan -500 000 online bank
accounts and affected several thousands credit
cards in Nigeria, South Africa




              Cybercrime & Computer Misuse cases
                 in Mauritius & African Regions
African Regions
3. Ghana




             Cybercrime & Computer Misuse cases
                in Mauritius & African Regions
Cybercrime - Ghana
Many Ghanaians perpetrate credit card fraud.
The most typical example is a group in Nima, called
'Sakawa'. This group is alleged to be selling stolen credit
cards numbers as well as using same to order for
products from the United States and Europe.

These scammers buy or steal credit card and
verification numbers from hotel employees and cashiers
of super markets, either in the country or from abroad.

                  Cybercrime & Computer Misuse cases
                     in Mauritius & African Regions
Legislations in African regions
Electronic Communications and Transactions Act (ECT).
Hacking been entrenched in our law in s86 (1) of the ECT,
which makes any unlawful access and interception of data a
criminal offence.
The ECT has now created “Cyber-Inspectors” who, with the
authority of a warrant, may enter any premises or access
information that has a bearing on an investigation (into possible
cyber crime)
Cyber Inspectors are empowered to access and inspect the
operation of any computer or equipment forming part of an
information system- used or suspected to have been used in an
offence- and require any person in control of, or otherwise
involved with the operation of a computer to provide reasonable
technical assistance.

                    Cybercrime & Computer Misuse cases
                       in Mauritius & African Regions
Fighting off the cybercrimals in
   Mauritius – the Challenge




         Cybercrime & Computer Misuse cases
            in Mauritius & African Regions
Cyber Crime Unit(M’tius)
Created in 2000
Takes into consideration:
  Data Protection Act 2000
  Information and Communication Technology Act 2001
  Computer Misuse and Cyber Crime Act 2003
Pour apprendre Ă  collecter des preuves plus
correctement, la force policiÚre a envoyé 21 policiers
suivre une formation. Celle-ci était dispensée par le
département Anti-Terrorism Assistance (ATA)
Le cours était dispensé par quatre experts américains de
l’ATA.

                 Cybercrime & Computer Misuse cases
                    in Mauritius & African Regions
Les agents de l’ordre locaux ont ainsi appris comment
pĂ©nĂ©trer sur les lieux d’un crime.

Par exemple, lorsque la police débarque chez un
individu soupçonné de fabriquer des faux billets de
banque, la premiĂšre chose Ă  examiner sera le clavier de
l’ordinateur. Et avant que cet ordinateur ne soit
dĂ©branchĂ©, les enquĂȘteurs tenteront de collecter le
maximum d’informations sur le disque dur. Ensuite,
chaque piùce, composant de l’ordinateur, sera
soigneusement rangée dans un sac statique (sac
spécifique pour protéger les appareils informatiques) et
les articles saisis conservés dans une salle climatisée.
                 Cybercrime & Computer Misuse cases
                    in Mauritius & African Regions
Les deux sections directement liées, concernées par le
cybercrime sont l’Information Technology (IT) de la
police – placĂ©e sous la responsabilitĂ© du sergent
Balgobin – et la Cybercrime Unit sous le
commandement du sergent Tany.
Parmi les 21 participants Ă  cette formation en
cybercrime, on note la présence de policiers de
l’Information Technology, du Central Criminal
Investigation Department, de la Criminal Investigation
Division, de la Major Crimes Investigation Team et de
la Police Training School.

                 Cybercrime & Computer Misuse cases
                    in Mauritius & African Regions
CERT-MU
Mauritian Computer Emergency Response Team
 (CERT-MU)
 Fully Operational since 16 May 2008
 Incident reporting, Security alerts, Awareness
 Programmes
  Mission: To enhance the security of Mauritius
  information and communications infrastructure
  through effective collaboration and communication
  with all stakeholders
                  Cybercrime & Computer Misuse cases
                     in Mauritius & African Regions
CERT-MU
URL: http://cert-mu.org.mu
Email: info@cert-mu.gov.mu
Toll Free: 800 2378 ( 8.45 am to 4.00 pm)




                       Cybercrime & Computer Misuse cases
                          in Mauritius & African Regions
References
NCB website
Cyber crime unit
Lexpress
Defimedia.info
UoM Library Law Section




             Cybercrime & Computer Misuse cases
                in Mauritius & African Regions
Thank You for your kind attention!




        Cybercrime & Computer Misuse cases
           in Mauritius & African Regions

More Related Content

What's hot

Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newDr. Arun Verma
 
Software Piracy
Software PiracySoftware Piracy
Software PiracyByerdavi
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crimemukeshkaran
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime AwarenessSibesh Singh
 
Cyber crime
Cyber crimeCyber crime
Cyber crimeJoyBhowmik4
 
Digital law powerpoint
Digital law powerpointDigital law powerpoint
Digital law powerpointDLRUDO01
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivismrashidirazali
 
Software Piracy Powerpoint
Software Piracy PowerpointSoftware Piracy Powerpoint
Software Piracy PowerpointMbradber
 
Legal aspects of digital forensics
Legal aspects of digital forensics Legal aspects of digital forensics
Legal aspects of digital forensics KakshaPatel3
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensicSANTANU KUMAR DAS
 
Computer Crime
Computer CrimeComputer Crime
Computer CrimeAdeel Rasheed
 
Computer Misuse Act
Computer Misuse ActComputer Misuse Act
Computer Misuse Actmrmwood
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attackssommerville-videos
 
An introduction to cyber law
An introduction to cyber lawAn introduction to cyber law
An introduction to cyber lawshreya sanghvi
 
Information System Security(lecture 1)
Information System Security(lecture 1)Information System Security(lecture 1)
Information System Security(lecture 1)Ali Habeeb
 

What's hot (20)

Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes new
 
Software Piracy
Software PiracySoftware Piracy
Software Piracy
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Digital law powerpoint
Digital law powerpointDigital law powerpoint
Digital law powerpoint
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivism
 
Software Piracy Powerpoint
Software Piracy PowerpointSoftware Piracy Powerpoint
Software Piracy Powerpoint
 
Legal aspects of digital forensics
Legal aspects of digital forensics Legal aspects of digital forensics
Legal aspects of digital forensics
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Computer Misuse Act
Computer Misuse ActComputer Misuse Act
Computer Misuse Act
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Hacking
Hacking Hacking
Hacking
 
An introduction to cyber law
An introduction to cyber lawAn introduction to cyber law
An introduction to cyber law
 
Information System Security(lecture 1)
Information System Security(lecture 1)Information System Security(lecture 1)
Information System Security(lecture 1)
 

Viewers also liked

Auditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
Auditing Multimedia Campaigns -ASI 2008 European Conference - FurlanettoAuditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
Auditing Multimedia Campaigns -ASI 2008 European Conference - FurlanettoPaola Furlanetto
 
Facebook Privacy Enhancements
Facebook Privacy EnhancementsFacebook Privacy Enhancements
Facebook Privacy Enhancementsguest5f7bf4
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariArber Hoxhallari
 
lecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networkinglecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networkingHamid Zainudin
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...Frances Coronel
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacyJIJO CLEETUS
 
osn-threats-solutions-2
osn-threats-solutions-2osn-threats-solutions-2
osn-threats-solutions-2SMITA V MORE
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime actCP-Union
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challengesLouie Medinaceli
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technologyparamalways
 
Legal issues in the media industry
Legal issues in the media industry Legal issues in the media industry
Legal issues in the media industry BenRay95
 
Anti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyAnti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyPECB
 
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Arniel Ping
 
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...Arniel Ping
 
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...Arniel Ping
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rightsharshhanu
 

Viewers also liked (18)

Auditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
Auditing Multimedia Campaigns -ASI 2008 European Conference - FurlanettoAuditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
Auditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
 
Facebook Privacy Enhancements
Facebook Privacy EnhancementsFacebook Privacy Enhancements
Facebook Privacy Enhancements
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber Hoxhallari
 
lecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networkinglecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networking
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
 
osn-threats-solutions-2
osn-threats-solutions-2osn-threats-solutions-2
osn-threats-solutions-2
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime act
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
 
Legal issues in the media industry
Legal issues in the media industry Legal issues in the media industry
Legal issues in the media industry
 
Anti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyAnti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacy
 
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
 
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
 
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
 

Similar to Cybercrime And Computer Misuse Cases

UNIT 5.docx
UNIT 5.docxUNIT 5.docx
UNIT 5.docxKavithaK23
 
CTO-CybersecurityForum-2010-Patricia Asognwe
CTO-CybersecurityForum-2010-Patricia AsognweCTO-CybersecurityForum-2010-Patricia Asognwe
CTO-CybersecurityForum-2010-Patricia Asognwesegughana
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and natureDr. Arun Verma
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p ptHemant
 
Forensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in CameroonForensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in CameroonSARON MESSEMBE OBIA
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)Asish Verma
 
Cybercriminality
CybercriminalityCybercriminality
CybercriminalityChantal Abam
 
Cyber law media law & ethic
Cyber law media law & ethicCyber law media law & ethic
Cyber law media law & ethicSyed Ali Hassan
 
Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Jacqueline Fick
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaDr. Arun Verma
 
Cybercrime In South Africa and the benefits of public private partnerships
Cybercrime In South Africa and the benefits of public private partnershipsCybercrime In South Africa and the benefits of public private partnerships
Cybercrime In South Africa and the benefits of public private partnershipsJacqueline Fick
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Gol D Roger
 
Cybercrime in government
Cybercrime in governmentCybercrime in government
Cybercrime in governmentJacqueline Fick
 

Similar to Cybercrime And Computer Misuse Cases (20)

UNIT 5.docx
UNIT 5.docxUNIT 5.docx
UNIT 5.docx
 
CTO-CybersecurityForum-2010-Patricia Asognwe
CTO-CybersecurityForum-2010-Patricia AsognweCTO-CybersecurityForum-2010-Patricia Asognwe
CTO-CybersecurityForum-2010-Patricia Asognwe
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p pt
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Forensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in CameroonForensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in Cameroon
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercriminality
CybercriminalityCybercriminality
Cybercriminality
 
ICT ICA3
ICT ICA3ICT ICA3
ICT ICA3
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber law media law & ethic
Cyber law media law & ethicCyber law media law & ethic
Cyber law media law & ethic
 
Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in india
 
Cybercrime In South Africa and the benefits of public private partnerships
Cybercrime In South Africa and the benefits of public private partnershipsCybercrime In South Africa and the benefits of public private partnerships
Cybercrime In South Africa and the benefits of public private partnerships
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
 
Cybercrime in government
Cybercrime in governmentCybercrime in government
Cybercrime in government
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 

More from Ashesh R

Sukhi parivaar web launch
Sukhi parivaar web launchSukhi parivaar web launch
Sukhi parivaar web launchAshesh R
 
Open source
Open sourceOpen source
Open sourceAshesh R
 
Web2.0
Web2.0Web2.0
Web2.0Ashesh R
 
Linux
LinuxLinux
LinuxAshesh R
 
Managing onlinebusiness
Managing onlinebusinessManaging onlinebusiness
Managing onlinebusinessAshesh R
 
Presentation on Gifts
Presentation on GiftsPresentation on Gifts
Presentation on GiftsAshesh R
 
Internet for everyone
Internet for everyoneInternet for everyone
Internet for everyoneAshesh R
 
Influenza A H1 N1 Mexa
Influenza A H1 N1 MexaInfluenza A H1 N1 Mexa
Influenza A H1 N1 MexaAshesh R
 
Internet Pour Tous
Internet Pour TousInternet Pour Tous
Internet Pour TousAshesh R
 
Intellectual Property Rights - Mauritian Legislation
Intellectual Property Rights - Mauritian LegislationIntellectual Property Rights - Mauritian Legislation
Intellectual Property Rights - Mauritian LegislationAshesh R
 
Activity Diagram
Activity DiagramActivity Diagram
Activity DiagramAshesh R
 
Use Case Diagram
Use Case DiagramUse Case Diagram
Use Case DiagramAshesh R
 
UML Case Tools
UML Case ToolsUML Case Tools
UML Case ToolsAshesh R
 
Pascal Programming Session 1
Pascal Programming Session 1Pascal Programming Session 1
Pascal Programming Session 1Ashesh R
 
Problem Solving Techniques
Problem Solving TechniquesProblem Solving Techniques
Problem Solving TechniquesAshesh R
 
National Geographic
National GeographicNational Geographic
National GeographicAshesh R
 
E Recruitment
E RecruitmentE Recruitment
E RecruitmentAshesh R
 
Reflections
ReflectionsReflections
ReflectionsAshesh R
 

More from Ashesh R (18)

Sukhi parivaar web launch
Sukhi parivaar web launchSukhi parivaar web launch
Sukhi parivaar web launch
 
Open source
Open sourceOpen source
Open source
 
Web2.0
Web2.0Web2.0
Web2.0
 
Linux
LinuxLinux
Linux
 
Managing onlinebusiness
Managing onlinebusinessManaging onlinebusiness
Managing onlinebusiness
 
Presentation on Gifts
Presentation on GiftsPresentation on Gifts
Presentation on Gifts
 
Internet for everyone
Internet for everyoneInternet for everyone
Internet for everyone
 
Influenza A H1 N1 Mexa
Influenza A H1 N1 MexaInfluenza A H1 N1 Mexa
Influenza A H1 N1 Mexa
 
Internet Pour Tous
Internet Pour TousInternet Pour Tous
Internet Pour Tous
 
Intellectual Property Rights - Mauritian Legislation
Intellectual Property Rights - Mauritian LegislationIntellectual Property Rights - Mauritian Legislation
Intellectual Property Rights - Mauritian Legislation
 
Activity Diagram
Activity DiagramActivity Diagram
Activity Diagram
 
Use Case Diagram
Use Case DiagramUse Case Diagram
Use Case Diagram
 
UML Case Tools
UML Case ToolsUML Case Tools
UML Case Tools
 
Pascal Programming Session 1
Pascal Programming Session 1Pascal Programming Session 1
Pascal Programming Session 1
 
Problem Solving Techniques
Problem Solving TechniquesProblem Solving Techniques
Problem Solving Techniques
 
National Geographic
National GeographicNational Geographic
National Geographic
 
E Recruitment
E RecruitmentE Recruitment
E Recruitment
 
Reflections
ReflectionsReflections
Reflections
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Recently uploaded (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

Cybercrime And Computer Misuse Cases

  • 1. University of Mauritius Faculty of Law & Management LAWS 2100Y Foundations of IT Law Cybercrime & Computer Misuse cases In Mauritius and African Regions Presented by: Group 1 ‱Ashnee Gunness ‱Bhavna Nobaub ‱Ashveen Beechowa ‱Ashesh Ramjeeawon
  • 2. Agenda What is Cybercrime? Mauritian Cybercriminals Cases of Computer Misuse in Mauritius Cybercrimes in African Regions Legislations in African Regions Fighting off the Cybercrimals in Mauritius – the Challenge Cyber crime Unit (Mtius) CERT-MU Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 3. What is Cybercrime? An attack that undermines the confidentiality, integrity or availability of a computer, information resident on it, or a computer service within a Network Information System. Some offences under Computer Misuse and Cybercrime Act 2003: Unauthorised access to data Access with intent to commit offences Unauthorised access to and interception of computer service Damaging or denying access to computer system Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 4. Mauritian Cybercriminals Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 5. Do you Recognise the Face? Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 6. CyberCriminal 1 Vishal Ramessur – 32 years old First Mauritian Hacker involved in the ‘sabotage of internet connection’ in 2005 Violation of section 7 (b) of Computer misuse and cybercrime Act de 2003 : “a denial of access to, or impairment of any program or data stored in, the computer system” Shall commit an offence and shall, on conviction be liable to a fine not exceeding 200, 000 and to penal service not exceeding 20 years Source: http://www.lexpress.mu/display_search_result.php?news_id=38637 Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 7. Does this Name tell you anything? Booden (Vinay) Ramrichia Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 8. CyberCriminal 2 Booden (Vinay) Ramrichia -un pirate informatique du site de l’Etat un clerc du CISD de 28 ans poursuivi en cour intermĂ©diaire 20 mai 2005 - tentatives pour bloquer l’accĂšs Ă  deux des principaux serveurs du systĂšme Dans sa dĂ©position Ă  la police, il avoue Mais la magistrate Adila Hamuth Ă©crit : “Il a Ă©tĂ© clairement convenu, la fois derniĂšre, que le procĂšs devait ĂȘtre dĂ©jĂ  logĂ©. Cette affaire a traĂźnĂ© et la poursuite n’a pu expliquer pourquoi l’affaire n’a pas Ă©tĂ© instruite. Dans les circonstances, la charge provisoire est rayĂ©e Source: http://www.lexpress.mu/display_search_result.php?news_id=90200 Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 9. Do you Recognise this Cybercrime? Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 10. Computer Misuse -Phishing in M’tius 26 septembre 2004, Kovalen, 14 ans, Ă©tudiant du collĂšge St Esprit, atteint d’une maladie incurable – la maladie de Creutz-feldt-Jakob. l’adolescent peut ĂȘtre sauvĂ©, mais comme il vient d’une famille modeste, il n’a pas les moyens de se faire soigner ! Ils lancent un appel Ă  la gĂ©nĂ©rositĂ© : « Donnez Rs 1, Rs 5 ou mĂȘme Rs 100. Aidez cet enfant Ă  vivre plus longtemps, chacun a le droit de vivre, pourquoi pas lui ? Plusieurs associations dont la Croix Rouge, Amnesty International participent Ă  cet Ă©lan de solidaritĂ©. » Source:http://www.lexpress.mu/display_search_result.php?news_id=52226 Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 11. Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 12. Important Security Announcement To Internet Banking(IB) Customers Port-Louis, 21st January 2008 Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 13. Computer Misuse May 2008- Three Cases lodged by the Mauritius Telecom foreigners have introduced a system with the help of switches and other apparatus to divert international calls coming from abroad. Diverting the gateway of MT is a criminal offence. This has led to the loss of huge amount of money for MT. Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 14. Computer Misuse (ctnued..) The Information Communication Technologies Act 2001:- under section 46 offences (j) By means of an apparatus or device connected to an installation maintained or operated by a licensee- (i) defrauds the licensee of any fee or charge properly payable for the use of a service; causes the licensee to provide a service to some other person without payment by such other person of the appropriate fee or charge; or fraudulently installs or causes to be installed an access to a telecommunication line; Penalties (1) Any person who commits an offence under this Act shall, on conviction, be liable to a fine not exceeding 1,000,000 rupees and to imprisonment for a term not exceeding 5 years Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 15. Cybercrimes in African Regions Legislations in African Regions Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 16. African Regions 1. Nigeria Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 17. Cybercrime – Nigerian 419 Nigerian 419 scam stole the most money off Internet. Americans reported losing an all-time high of $183 million to Internet fraud in 2005, up 169 percent from $68 million in 2004. Refered to as quot;Advance Fee Fraudquot; or quot;419 Fraudquot; The Scam operates as follows: the target receives an unsolicited fax, email, or letter often concerning Nigeria or another African nation containing either a money laundering or other illegal proposal Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 18. Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 19. African Regions 2. South Africa Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 20. Cybercrimes -South Africa Credit card quot;cloningquot; and e-mail scams Windows Sinowal Trojan -500 000 online bank accounts and affected several thousands credit cards in Nigeria, South Africa Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 21. African Regions 3. Ghana Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 22. Cybercrime - Ghana Many Ghanaians perpetrate credit card fraud. The most typical example is a group in Nima, called 'Sakawa'. This group is alleged to be selling stolen credit cards numbers as well as using same to order for products from the United States and Europe. These scammers buy or steal credit card and verification numbers from hotel employees and cashiers of super markets, either in the country or from abroad. Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 23. Legislations in African regions Electronic Communications and Transactions Act (ECT). Hacking been entrenched in our law in s86 (1) of the ECT, which makes any unlawful access and interception of data a criminal offence. The ECT has now created “Cyber-Inspectors” who, with the authority of a warrant, may enter any premises or access information that has a bearing on an investigation (into possible cyber crime) Cyber Inspectors are empowered to access and inspect the operation of any computer or equipment forming part of an information system- used or suspected to have been used in an offence- and require any person in control of, or otherwise involved with the operation of a computer to provide reasonable technical assistance. Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 24. Fighting off the cybercrimals in Mauritius – the Challenge Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 25. Cyber Crime Unit(M’tius) Created in 2000 Takes into consideration: Data Protection Act 2000 Information and Communication Technology Act 2001 Computer Misuse and Cyber Crime Act 2003 Pour apprendre Ă  collecter des preuves plus correctement, la force policiĂšre a envoyĂ© 21 policiers suivre une formation. Celle-ci Ă©tait dispensĂ©e par le dĂ©partement Anti-Terrorism Assistance (ATA) Le cours Ă©tait dispensĂ© par quatre experts amĂ©ricains de l’ATA. Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 26. Les agents de l’ordre locaux ont ainsi appris comment pĂ©nĂ©trer sur les lieux d’un crime. Par exemple, lorsque la police dĂ©barque chez un individu soupçonnĂ© de fabriquer des faux billets de banque, la premiĂšre chose Ă  examiner sera le clavier de l’ordinateur. Et avant que cet ordinateur ne soit dĂ©branchĂ©, les enquĂȘteurs tenteront de collecter le maximum d’informations sur le disque dur. Ensuite, chaque piĂšce, composant de l’ordinateur, sera soigneusement rangĂ©e dans un sac statique (sac spĂ©cifique pour protĂ©ger les appareils informatiques) et les articles saisis conservĂ©s dans une salle climatisĂ©e. Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 27. Les deux sections directement liĂ©es, concernĂ©es par le cybercrime sont l’Information Technology (IT) de la police – placĂ©e sous la responsabilitĂ© du sergent Balgobin – et la Cybercrime Unit sous le commandement du sergent Tany. Parmi les 21 participants Ă  cette formation en cybercrime, on note la prĂ©sence de policiers de l’Information Technology, du Central Criminal Investigation Department, de la Criminal Investigation Division, de la Major Crimes Investigation Team et de la Police Training School. Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 28. CERT-MU Mauritian Computer Emergency Response Team (CERT-MU) Fully Operational since 16 May 2008 Incident reporting, Security alerts, Awareness Programmes Mission: To enhance the security of Mauritius information and communications infrastructure through effective collaboration and communication with all stakeholders Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 29. CERT-MU URL: http://cert-mu.org.mu Email: info@cert-mu.gov.mu Toll Free: 800 2378 ( 8.45 am to 4.00 pm) Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 30. References NCB website Cyber crime unit Lexpress Defimedia.info UoM Library Law Section Cybercrime & Computer Misuse cases in Mauritius & African Regions
  • 31. Thank You for your kind attention! Cybercrime & Computer Misuse cases in Mauritius & African Regions