This Study focuses on the legal framework prohibiting Cybercrimes in Nigeria. Cybercrime
involves using computers and internet by individuals to commit crime. The people across the globe are technologically transformed to the extent that life
depends on technology. The application of ICT covers every facet of human life and that has led
to the birth of unanticipated rates of crimes coming in a borderless form. The paper examines the
types of cybercrimes prevalent in Nigeria, international conventions approach and other
jurisdictional practices with a view to abreast the application of legal framework of cybercrimes
both in the Nigerian context and international community.
The findings of the paper are that the Nigerian legislations on the subject acknowledge
the existing challenges and are on the right track, but need to be strengthened to achieve the desired
purpose. It further observed that there is no unanimous definition of the concept in all jurisdictions
which add issue to the subject in terms of challenges. The study recommends that the recently signed Nigerian Cybercrimes (Prohibition & Prevention Act) 2015 should be actively enforced
with a view to bringing our legal framework on par with other jurisdictions as well as proffering
other reforms to enhance Cybersecurity in Nigeria.
Cybercrime encompasses criminal acts committed using computers and networks. The document discusses the origin, methodology, and impact of cybercrime on individuals, organizations, and society. It provides reasons for cybercrime such as taking advantage of opportunities, accessibility of large amounts of data in one place, and lack of monitoring. Specific details are given about the prevalence and types of cybercrime in Bangladesh, sources of information about cybercrime, and the Cyber Appellate Tribunal established to hear appeals related to cybercrime cases. The Bangladesh Bank heist is also mentioned.
This document discusses cyber crime and provides definitions and classifications of both conventional and cyber crimes. It begins by defining conventional crime and noting that crime has always been a part of human society. It then defines cyber crime, noting that a computer can be either a tool or target of criminal activity. Various types of cyber crimes are outlined such as those involving financial crimes, pornography, intellectual property crimes, and hacking. Prevention and security measures to address cyber crime are also discussed such as user access controls, firewalls, intrusion detection systems, and response mechanisms.
This document is a project report on cybercrime in the banking sector submitted by Praveen Singh Pokharia to the University of Lucknow. It contains an introduction that defines cybercrime and notes that cybercrime in banking involves crimes like ATM fraud, money laundering, and credit card fraud. It also provides an index of topics to be covered in the report such as the reasons for cybercrime, cybercriminals, cybercrime in the banking sector, case studies, and recent cases. The report aims to analyze cybercrime affecting the banking sector in India.
This document presents on the topic of present trends in cyber crime in Bangladesh and outlines regulatory gaps and future directions. It discusses what cyber crime is, types of cyber crimes like hacking and identity theft, and present trends in Bangladesh such as the Bangladesh Bank heist of 2016. Regulatory gaps in current cyber laws are identified, such as the lack of provisions around intellectual property, electronic payments, anti-spamming, and mobile phone crimes. The document concludes that stronger cyber laws and enforcement capabilities are needed to protect Bangladesh's cyber security as internet usage grows. Recommendations include establishing a digital forensics lab and cyber police force to investigate crimes.
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...AJHSSR Journal
ABSTRACT: In the past two decades, third world countries such as South Africa have made steadily developments towards combating hacking as a form of Cybercrime. The developments made by the South African Criminal Justice towards the prevention of hacking have been mildly progressive. The Council of Europe Convention on Cybercrime is the treaty that all South African legislation and policy with regard to hacking is required to be in line with this convention. This treaty has also been the cornerstone to first world countries such as the United States, when preventing cybercrime such as hacking. In order for South Africans to have a safe and secure cyberspace that is free from hackers; there needs to be a co-operative system put in place by the South African Criminal Justice System that involves the government, non-profit organizations and the community. A Criminal Justice system that works closely with the community is able to properly guide its members and correctly prosecute the crime of hacking. Therefore, using qualitative secondary data this paper explores the existing measures put in place by the South African Criminal Justice to combat hacking. The findings of this paper indicate that conceptual understanding of this crime (hacking) can play a pivotal role in addressing the manifestation of this crime in a large extent as the nature and extent can be established, the use of technological means also contribute to hacking, this is also linked to individuals (victims) ignorance. For recommendations, the use of technology and conventional method in awareness can help in responding to the scale and consequence of hacking in South Africa.
The document discusses cybercrime in Bangladesh. It provides an overview of the history of cybercrime, common types of cybercrimes, cyber laws in Bangladesh and other countries, and cybersecurity technologies. It notes that cybercrime is increasing in Bangladesh, with most victims being women aged 15-25 facing cyber harassment. While law enforcement is trying to tackle the problem, the conviction rate for cybercrime in Bangladesh is only 3%. The document calls for recommendations to address cybercrime and increase cybersecurity.
This document discusses cyber law and its impact on cyber crime. It notes that while cyber crimes are increasing globally and costing businesses trillions, the laws governing cyber space have not kept pace with the growth of the internet. There is still a huge challenge to develop comprehensive international regulations and laws to address coordinated cyber attacks across borders. It argues that some structure around jurisdiction, privacy, commerce and other issues is needed to help curb cyber crime, but that regulating the internet is complex given its global, boundary-less nature. Enhanced international cooperation around cyber law enforcement is important for addressing cyber threats.
This document discusses different types of computer crimes including hacking, phishing, computer viruses, identity theft, and cyberstalking. It provides examples of famous cases related to each type of computer crime. The document also discusses how computer crimes have evolved to include crimes using computers as tools as well as new crimes enabled by technology, such as denial of service attacks. It notes limited awareness of computer security among general users and discusses the UK government's "Get Safe Online" initiative to provide computer security advice and education.
Cybercrime encompasses criminal acts committed using computers and networks. The document discusses the origin, methodology, and impact of cybercrime on individuals, organizations, and society. It provides reasons for cybercrime such as taking advantage of opportunities, accessibility of large amounts of data in one place, and lack of monitoring. Specific details are given about the prevalence and types of cybercrime in Bangladesh, sources of information about cybercrime, and the Cyber Appellate Tribunal established to hear appeals related to cybercrime cases. The Bangladesh Bank heist is also mentioned.
This document discusses cyber crime and provides definitions and classifications of both conventional and cyber crimes. It begins by defining conventional crime and noting that crime has always been a part of human society. It then defines cyber crime, noting that a computer can be either a tool or target of criminal activity. Various types of cyber crimes are outlined such as those involving financial crimes, pornography, intellectual property crimes, and hacking. Prevention and security measures to address cyber crime are also discussed such as user access controls, firewalls, intrusion detection systems, and response mechanisms.
This document is a project report on cybercrime in the banking sector submitted by Praveen Singh Pokharia to the University of Lucknow. It contains an introduction that defines cybercrime and notes that cybercrime in banking involves crimes like ATM fraud, money laundering, and credit card fraud. It also provides an index of topics to be covered in the report such as the reasons for cybercrime, cybercriminals, cybercrime in the banking sector, case studies, and recent cases. The report aims to analyze cybercrime affecting the banking sector in India.
This document presents on the topic of present trends in cyber crime in Bangladesh and outlines regulatory gaps and future directions. It discusses what cyber crime is, types of cyber crimes like hacking and identity theft, and present trends in Bangladesh such as the Bangladesh Bank heist of 2016. Regulatory gaps in current cyber laws are identified, such as the lack of provisions around intellectual property, electronic payments, anti-spamming, and mobile phone crimes. The document concludes that stronger cyber laws and enforcement capabilities are needed to protect Bangladesh's cyber security as internet usage grows. Recommendations include establishing a digital forensics lab and cyber police force to investigate crimes.
An Exploratory Study on Mechanisms in Place to Combat Hacking In South Africa...AJHSSR Journal
ABSTRACT: In the past two decades, third world countries such as South Africa have made steadily developments towards combating hacking as a form of Cybercrime. The developments made by the South African Criminal Justice towards the prevention of hacking have been mildly progressive. The Council of Europe Convention on Cybercrime is the treaty that all South African legislation and policy with regard to hacking is required to be in line with this convention. This treaty has also been the cornerstone to first world countries such as the United States, when preventing cybercrime such as hacking. In order for South Africans to have a safe and secure cyberspace that is free from hackers; there needs to be a co-operative system put in place by the South African Criminal Justice System that involves the government, non-profit organizations and the community. A Criminal Justice system that works closely with the community is able to properly guide its members and correctly prosecute the crime of hacking. Therefore, using qualitative secondary data this paper explores the existing measures put in place by the South African Criminal Justice to combat hacking. The findings of this paper indicate that conceptual understanding of this crime (hacking) can play a pivotal role in addressing the manifestation of this crime in a large extent as the nature and extent can be established, the use of technological means also contribute to hacking, this is also linked to individuals (victims) ignorance. For recommendations, the use of technology and conventional method in awareness can help in responding to the scale and consequence of hacking in South Africa.
The document discusses cybercrime in Bangladesh. It provides an overview of the history of cybercrime, common types of cybercrimes, cyber laws in Bangladesh and other countries, and cybersecurity technologies. It notes that cybercrime is increasing in Bangladesh, with most victims being women aged 15-25 facing cyber harassment. While law enforcement is trying to tackle the problem, the conviction rate for cybercrime in Bangladesh is only 3%. The document calls for recommendations to address cybercrime and increase cybersecurity.
This document discusses cyber law and its impact on cyber crime. It notes that while cyber crimes are increasing globally and costing businesses trillions, the laws governing cyber space have not kept pace with the growth of the internet. There is still a huge challenge to develop comprehensive international regulations and laws to address coordinated cyber attacks across borders. It argues that some structure around jurisdiction, privacy, commerce and other issues is needed to help curb cyber crime, but that regulating the internet is complex given its global, boundary-less nature. Enhanced international cooperation around cyber law enforcement is important for addressing cyber threats.
This document discusses different types of computer crimes including hacking, phishing, computer viruses, identity theft, and cyberstalking. It provides examples of famous cases related to each type of computer crime. The document also discusses how computer crimes have evolved to include crimes using computers as tools as well as new crimes enabled by technology, such as denial of service attacks. It notes limited awareness of computer security among general users and discusses the UK government's "Get Safe Online" initiative to provide computer security advice and education.
Cybercrimeandforensic 120828021931-phpapp02Gol D Roger
This case study describes a large-scale international cybercrime gang that was busted in Chennai, India. The gang was involved in hacking ATMs using stolen credit card numbers and PINs acquired through phishing. A key member of the gang, Deepak Prem Manwani, was arrested in Chennai while hacking an ATM there. An investigation revealed that the gang had set up fake websites to phish credit card details and PINs from millions of subscribers. They then sold this stolen data to people like Manwani, who used it to hack ATMs. Manwani had hacked ATMs in Mumbai as well. The FBI was already investigating the gang based on complaints from victims in the US. Man
The document discusses the topics of cyber terrorism, hacktivism, cyber war, and cyber command. It provides examples of different cyber conflicts between nations and groups, such as the Pakistani-Indian cyberwar, Israeli-Palestinian cyberwar, and U.S.-al Qaeda cyberwar. The document also examines definitions of cyber terrorism, potential scenarios, and examples like attacks on the German and Mexican stock exchanges. It analyzes how governments have established cyber commands to address cyber threats and concludes that while cyber terrorism is possible, terrorists have not yet demonstrated the capability for significant cyber attacks.
Evil Geniuses: How organized cybercriminals could take over the worldHillary L
The document discusses the rise of organized cybercrime carried out by malicious hackers, programmers, and criminal organizations. It outlines who the main players are, including organized criminal groups, rogue governments, and security professionals. Some of the major threats discussed are identity theft, fraud, extortion, and cyberterrorism. The document also examines why computer crime has become more appealing and profitable for criminals, how organized cybercrime networks operate using botnets and other technologies, and potential ways the threats might be addressed through vigilance, threat response, and tracing cybercriminals.
In general cybercrime may be defined as “Any unlawful act where computer or communication device or computer network is used to commit or facilitate the commission of crime”.
Most cybercrime is an attack on information about individuals, corporations, or governments. Although the attacks do not take place on a physical body, they do take place on the personal or corporate virtual body, which is the set of informational attributes that define people and institutions on the Internet.
The document discusses computer and internet crime, including definitions of crime and different types of attacks such as viruses, worms, Trojan horses, denial-of-service attacks, and logic bombs. It also describes different types of perpetrators like hackers, crackers, insiders, industrial spies, cybercriminals, and cyberterrorists. Finally, it outlines some legal issues around fraud and recommendations for reducing internet vulnerabilities through risk assessment, security policies, education, and installing firewalls.
The document discusses cybercrime in the Philippines. It defines cybercrime and outlines four main types. It also discusses the global trend of cybercrime, with over 400 million adults worldwide victimized in 2011. In the Philippines, the PNP has encountered over 2,700 cybercrime cases between 2003-2012, and 87% of Filipino internet users have been victims of online crimes. The document outlines key cybercrime laws in the Philippines and notes the first recorded cybercrime case in 2000 and the first conviction in 2005.
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemLillian Ekwosi-Egbulem
This document discusses several common types of basic cyber attacks including internet fraud, destructive attacks, theft of intellectual property, and denial of service attacks. It provides examples of each type of attack, describing the motives and damages caused. Countermeasures are suggested to prevent each attack, such as installing security software, monitoring network activity, and enforcing access controls and policies. The conclusion emphasizes the importance of protecting information and systems given the economic and security impacts of vulnerabilities.
Al Amin Rahman & Associates is among the very few leading law firms in Bangladesh, having its presence throughout out of the world. We believe in our lawyers, they are very professional in their work and always try to suggest the best opinion according to the situation. We understated the importance of our client and work very carefully towards the procedure of Legal service. For further details in regards to LEGAL SERVICE in Bangladesh follow the down below link.
For further details in regards to LEGAL SERVICE in Bangladesh follow the down below link
Website: http://www.alaminrahman.com/2016/12/27/cyber-law-bangladesh/
Email: info@alaminrahman.com
The document discusses the history and rise of the World Wide Web and cybercrimes. It provides statistics on internet usage globally and discusses how the practical benefits of the internet also enabled new types of cybercrimes to emerge. Rational choice theory, strain/anomie theories, and self-control theory are introduced as frameworks for understanding why individuals engage in cybercrimes like software piracy, phishing, and digital copying of movies. Specific examples of cybercrimes in Nigeria are also examined in the context of economic strain and lack of law enforcement.
This document discusses popular cyber crimes committed in education. It begins by defining cyber crime as any criminal offense committed using information and communication technologies. The first recorded cybercrime in the Philippines was the "I Love You" virus released in 2000. According to a 2010 report, 87% of Filipino internet users had been victims of online crimes like malware, phishing scams, sexual predation, and fraudulent social media activities. Common cyber crimes in education include computer-related fraud like hacking accounts, identity theft by creating fake profiles, cybersex, posting child pornography online, and online bullying/libel.
This document provides an introduction to cyber law. It discusses how the internet and technology have evolved over time to connect people to information and each other. It also notes some of the risks that have emerged with technology, such as cyber crimes. The document then defines cyberspace and discusses some key aspects of it, such as its lack of boundaries and potential for anonymity. It concludes by outlining some penalty provisions under cyber law for offenses related to unauthorized access and harming computers/networks.
Computer crime and internet crime privacyGouthamXander
This document discusses computer crime and internet crime. It defines computer crime as any crime committed with the help of a computer. The history of computer crime is explored, from early physical damage to systems in the 1960s-1980s to modern financial crimes and malware attacks enabled by greater internet access and connectivity. Various categories of computer crime are also outlined, including computer viruses, denial of service attacks, malware, hacking, pirating, illegal trading, cyber terrorism, and pornography. Ways to protect against computer crime through anti-virus software, firewalls, and online safety are suggested.
This document summarizes a research paper about violations of cybercrime and jurisdiction in Indonesia. It discusses how technological advances have enabled new forms of digital crime. It describes several types of cybercrimes such as unauthorized access, spreading viruses, hacking, and cyberterrorism. It also discusses Indonesia's laws regarding electronic information and cybercrime. The document analyzes some challenges around jurisdiction for cybercrimes that cross borders. It examines how Indonesia applies legal jurisdiction and sanctions to cybercrime perpetrators based on the location of the crime and perpetrator. It aims to explain how Indonesia's legal system will handle cybercrime cases and reduce such violations.
This document provides information about a presentation on cyber crime and child pornography. It discusses how cyber crime involves using computers or networks to commit crimes. Specifically, it outlines how child pornography is a type of cyber crime where computers are used as weapons to commit real-world offenses of sexually abusing children. It notes how the internet has enabled abusers to more easily reach and target children globally. The document also provides safety tips for protecting against cyber crime like using antivirus software and firewalls, uninstalling unnecessary programs, maintaining backups, and staying anonymous online.
This document provides an overview of cybercrime trends in India presented by Muktesh Chander IPS. It discusses the growing issues of phishing, malware, spam, and botnets affecting India. While India has a booming tech industry, few organizations have chief information security officers or security budgets. The document outlines many types of cyber threats faced in India from individuals to nation states. It also examines trends like increased cybercrime sophistication and targeted attacks. Mobile devices and social media are highlighted as emerging areas of risk.
National framework for digital forensics bangladesh context Bank Alfalah Limited
Bangladesh is a young and rapidly growing population is 160 million. According to BASIS 2012 survey the ICT industry is consistently growing 20% to 30% per year. Most of our IT investment focused on Financial, Telecomm and Government sector. Now a day we cannot think a day without Information Technology as we are living on Information Age. We are very quickly accustomed to keeping and using digital information. While we are keeping our processed data on different digital media, security is one of the key issues in contemporary computing and is relevant to a wide range of activities, including software development, networking and system. Some people will then take the advantages of these loosely coupled securities and involved in different crime. Our object in this project is to make a Digital Forensics Framework which will cover Policy, Standard and give a future Guideline for investigation and presentation to law and enforcement agency.
Cyber Crime and Cyber Law of India BY VinayVinay Pancholi
This ppt contains details about various cyber crime and how can you prevent yourself from the cyber crime. This also includes cyber law of India and its various section.
This seminar presentation discusses cyber laws and cyber crimes in India. It begins with an overview of cyber theory, the need for cyber laws, and cyber laws currently in India. It then discusses different types of cyber crimes and cases that have occurred, as well as penalties for cyber crimes under Indian law. The presentation emphasizes that with more internet and computer use, cyber laws are necessary to protect digital privacy, intellectual property, and tackle cyber crimes in order to achieve peace in today's digital world.
Civil Liability on the Internet discusses the increasing harms caused by internet fraud, defective software, and failure to secure online data. It argues that traditional negligence principles can and should be applied to intermediaries like internet service providers and websites to allocate liability for cyber harms. However, successfully bringing a negligence claim is challenging due to issues like economic loss rules and safe harbors for intermediaries in laws like the Communications Decency Act. The common law will need to continue evolving to address unremedied online consumer injuries.
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALijcisjournal
This article underscores the urgent need for a global response to cyber threats, discusses the risks
associated with increasing reliance on technology, and sets the stage for a review focused on understanding and mitigating cybercrimes. In summary, the passage discusses the internet's impact on
national development and the growing problem of cybercrime. It calls for a deeper understanding of the
characteristics and motivations of cybercriminals and highlights several questions that need to be
addressed to effectively combat cybercrime and its detrimental effects on society. The classification of cybercrime is summarized into five categories: Cybercrimes against Persons (including cyber
pornography, cyber stalking, financial cybercrimes, phishing, and vishing), Cybercrimes against Property(involving intellectual property violations, data theft, and "Man in the Middle" attacks), Cybercrimes against Government, Denial of Service (DOS) Attacks, and Other Cybercrimes (comprising data diddling,salami attacks, email bombing, email spoofing, logic bombs, internet time theft, and mobile and wireless technology-related cybercrimes).
Essay on Cyber Crime and Cyber Law
Essay on CyberCrime
Cyber Crime Essay
Cyber Crime : A Crime
Cybercrime: Two Case Studies
Literature Review On Cyber Crime
Cyber Crime And Transnational Crime Essay
Essay on Cyber Crime and National Security
Cyber Crime Essay
CyberCrime Essay
Cyber Crime Essay
The Issue Of Cyber Crimes Essay
Essay on Introduction to Computer Crime
Essay about CyberCrime and Terrorism
Pros And Disadvantages Of Cyber Crime Essay
Internet Crime Essay
Cyber Crime
Cyber-Crime is a Serious Problem Essay examples
Advantages And Disadvantages Of Cyber Crime
Cyber Crime Essay
Cybercrimeandforensic 120828021931-phpapp02Gol D Roger
This case study describes a large-scale international cybercrime gang that was busted in Chennai, India. The gang was involved in hacking ATMs using stolen credit card numbers and PINs acquired through phishing. A key member of the gang, Deepak Prem Manwani, was arrested in Chennai while hacking an ATM there. An investigation revealed that the gang had set up fake websites to phish credit card details and PINs from millions of subscribers. They then sold this stolen data to people like Manwani, who used it to hack ATMs. Manwani had hacked ATMs in Mumbai as well. The FBI was already investigating the gang based on complaints from victims in the US. Man
The document discusses the topics of cyber terrorism, hacktivism, cyber war, and cyber command. It provides examples of different cyber conflicts between nations and groups, such as the Pakistani-Indian cyberwar, Israeli-Palestinian cyberwar, and U.S.-al Qaeda cyberwar. The document also examines definitions of cyber terrorism, potential scenarios, and examples like attacks on the German and Mexican stock exchanges. It analyzes how governments have established cyber commands to address cyber threats and concludes that while cyber terrorism is possible, terrorists have not yet demonstrated the capability for significant cyber attacks.
Evil Geniuses: How organized cybercriminals could take over the worldHillary L
The document discusses the rise of organized cybercrime carried out by malicious hackers, programmers, and criminal organizations. It outlines who the main players are, including organized criminal groups, rogue governments, and security professionals. Some of the major threats discussed are identity theft, fraud, extortion, and cyberterrorism. The document also examines why computer crime has become more appealing and profitable for criminals, how organized cybercrime networks operate using botnets and other technologies, and potential ways the threats might be addressed through vigilance, threat response, and tracing cybercriminals.
In general cybercrime may be defined as “Any unlawful act where computer or communication device or computer network is used to commit or facilitate the commission of crime”.
Most cybercrime is an attack on information about individuals, corporations, or governments. Although the attacks do not take place on a physical body, they do take place on the personal or corporate virtual body, which is the set of informational attributes that define people and institutions on the Internet.
The document discusses computer and internet crime, including definitions of crime and different types of attacks such as viruses, worms, Trojan horses, denial-of-service attacks, and logic bombs. It also describes different types of perpetrators like hackers, crackers, insiders, industrial spies, cybercriminals, and cyberterrorists. Finally, it outlines some legal issues around fraud and recommendations for reducing internet vulnerabilities through risk assessment, security policies, education, and installing firewalls.
The document discusses cybercrime in the Philippines. It defines cybercrime and outlines four main types. It also discusses the global trend of cybercrime, with over 400 million adults worldwide victimized in 2011. In the Philippines, the PNP has encountered over 2,700 cybercrime cases between 2003-2012, and 87% of Filipino internet users have been victims of online crimes. The document outlines key cybercrime laws in the Philippines and notes the first recorded cybercrime case in 2000 and the first conviction in 2005.
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemLillian Ekwosi-Egbulem
This document discusses several common types of basic cyber attacks including internet fraud, destructive attacks, theft of intellectual property, and denial of service attacks. It provides examples of each type of attack, describing the motives and damages caused. Countermeasures are suggested to prevent each attack, such as installing security software, monitoring network activity, and enforcing access controls and policies. The conclusion emphasizes the importance of protecting information and systems given the economic and security impacts of vulnerabilities.
Al Amin Rahman & Associates is among the very few leading law firms in Bangladesh, having its presence throughout out of the world. We believe in our lawyers, they are very professional in their work and always try to suggest the best opinion according to the situation. We understated the importance of our client and work very carefully towards the procedure of Legal service. For further details in regards to LEGAL SERVICE in Bangladesh follow the down below link.
For further details in regards to LEGAL SERVICE in Bangladesh follow the down below link
Website: http://www.alaminrahman.com/2016/12/27/cyber-law-bangladesh/
Email: info@alaminrahman.com
The document discusses the history and rise of the World Wide Web and cybercrimes. It provides statistics on internet usage globally and discusses how the practical benefits of the internet also enabled new types of cybercrimes to emerge. Rational choice theory, strain/anomie theories, and self-control theory are introduced as frameworks for understanding why individuals engage in cybercrimes like software piracy, phishing, and digital copying of movies. Specific examples of cybercrimes in Nigeria are also examined in the context of economic strain and lack of law enforcement.
This document discusses popular cyber crimes committed in education. It begins by defining cyber crime as any criminal offense committed using information and communication technologies. The first recorded cybercrime in the Philippines was the "I Love You" virus released in 2000. According to a 2010 report, 87% of Filipino internet users had been victims of online crimes like malware, phishing scams, sexual predation, and fraudulent social media activities. Common cyber crimes in education include computer-related fraud like hacking accounts, identity theft by creating fake profiles, cybersex, posting child pornography online, and online bullying/libel.
This document provides an introduction to cyber law. It discusses how the internet and technology have evolved over time to connect people to information and each other. It also notes some of the risks that have emerged with technology, such as cyber crimes. The document then defines cyberspace and discusses some key aspects of it, such as its lack of boundaries and potential for anonymity. It concludes by outlining some penalty provisions under cyber law for offenses related to unauthorized access and harming computers/networks.
Computer crime and internet crime privacyGouthamXander
This document discusses computer crime and internet crime. It defines computer crime as any crime committed with the help of a computer. The history of computer crime is explored, from early physical damage to systems in the 1960s-1980s to modern financial crimes and malware attacks enabled by greater internet access and connectivity. Various categories of computer crime are also outlined, including computer viruses, denial of service attacks, malware, hacking, pirating, illegal trading, cyber terrorism, and pornography. Ways to protect against computer crime through anti-virus software, firewalls, and online safety are suggested.
This document summarizes a research paper about violations of cybercrime and jurisdiction in Indonesia. It discusses how technological advances have enabled new forms of digital crime. It describes several types of cybercrimes such as unauthorized access, spreading viruses, hacking, and cyberterrorism. It also discusses Indonesia's laws regarding electronic information and cybercrime. The document analyzes some challenges around jurisdiction for cybercrimes that cross borders. It examines how Indonesia applies legal jurisdiction and sanctions to cybercrime perpetrators based on the location of the crime and perpetrator. It aims to explain how Indonesia's legal system will handle cybercrime cases and reduce such violations.
This document provides information about a presentation on cyber crime and child pornography. It discusses how cyber crime involves using computers or networks to commit crimes. Specifically, it outlines how child pornography is a type of cyber crime where computers are used as weapons to commit real-world offenses of sexually abusing children. It notes how the internet has enabled abusers to more easily reach and target children globally. The document also provides safety tips for protecting against cyber crime like using antivirus software and firewalls, uninstalling unnecessary programs, maintaining backups, and staying anonymous online.
This document provides an overview of cybercrime trends in India presented by Muktesh Chander IPS. It discusses the growing issues of phishing, malware, spam, and botnets affecting India. While India has a booming tech industry, few organizations have chief information security officers or security budgets. The document outlines many types of cyber threats faced in India from individuals to nation states. It also examines trends like increased cybercrime sophistication and targeted attacks. Mobile devices and social media are highlighted as emerging areas of risk.
National framework for digital forensics bangladesh context Bank Alfalah Limited
Bangladesh is a young and rapidly growing population is 160 million. According to BASIS 2012 survey the ICT industry is consistently growing 20% to 30% per year. Most of our IT investment focused on Financial, Telecomm and Government sector. Now a day we cannot think a day without Information Technology as we are living on Information Age. We are very quickly accustomed to keeping and using digital information. While we are keeping our processed data on different digital media, security is one of the key issues in contemporary computing and is relevant to a wide range of activities, including software development, networking and system. Some people will then take the advantages of these loosely coupled securities and involved in different crime. Our object in this project is to make a Digital Forensics Framework which will cover Policy, Standard and give a future Guideline for investigation and presentation to law and enforcement agency.
Cyber Crime and Cyber Law of India BY VinayVinay Pancholi
This ppt contains details about various cyber crime and how can you prevent yourself from the cyber crime. This also includes cyber law of India and its various section.
This seminar presentation discusses cyber laws and cyber crimes in India. It begins with an overview of cyber theory, the need for cyber laws, and cyber laws currently in India. It then discusses different types of cyber crimes and cases that have occurred, as well as penalties for cyber crimes under Indian law. The presentation emphasizes that with more internet and computer use, cyber laws are necessary to protect digital privacy, intellectual property, and tackle cyber crimes in order to achieve peace in today's digital world.
Civil Liability on the Internet discusses the increasing harms caused by internet fraud, defective software, and failure to secure online data. It argues that traditional negligence principles can and should be applied to intermediaries like internet service providers and websites to allocate liability for cyber harms. However, successfully bringing a negligence claim is challenging due to issues like economic loss rules and safe harbors for intermediaries in laws like the Communications Decency Act. The common law will need to continue evolving to address unremedied online consumer injuries.
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALijcisjournal
This article underscores the urgent need for a global response to cyber threats, discusses the risks
associated with increasing reliance on technology, and sets the stage for a review focused on understanding and mitigating cybercrimes. In summary, the passage discusses the internet's impact on
national development and the growing problem of cybercrime. It calls for a deeper understanding of the
characteristics and motivations of cybercriminals and highlights several questions that need to be
addressed to effectively combat cybercrime and its detrimental effects on society. The classification of cybercrime is summarized into five categories: Cybercrimes against Persons (including cyber
pornography, cyber stalking, financial cybercrimes, phishing, and vishing), Cybercrimes against Property(involving intellectual property violations, data theft, and "Man in the Middle" attacks), Cybercrimes against Government, Denial of Service (DOS) Attacks, and Other Cybercrimes (comprising data diddling,salami attacks, email bombing, email spoofing, logic bombs, internet time theft, and mobile and wireless technology-related cybercrimes).
Essay on Cyber Crime and Cyber Law
Essay on CyberCrime
Cyber Crime Essay
Cyber Crime : A Crime
Cybercrime: Two Case Studies
Literature Review On Cyber Crime
Cyber Crime And Transnational Crime Essay
Essay on Cyber Crime and National Security
Cyber Crime Essay
CyberCrime Essay
Cyber Crime Essay
The Issue Of Cyber Crimes Essay
Essay on Introduction to Computer Crime
Essay about CyberCrime and Terrorism
Pros And Disadvantages Of Cyber Crime Essay
Internet Crime Essay
Cyber Crime
Cyber-Crime is a Serious Problem Essay examples
Advantages And Disadvantages Of Cyber Crime
Cyber Crime Essay
This document discusses cybercrime in Iraq. It begins with definitions of cybercrime and various types of cybercrimes such as hacking, theft, cyber stalking, and identity theft. It then analyzes cybercrime statistics and cases in Iraq between 2006-2011, finding that cases increased by an average of 246.2% annually. Common cybercrime types in Iraq are discussed, with many cases involving social media sites like Facebook. The document also examines cybercrime legislation in Middle Eastern countries and discusses the emerging threat of cyber terrorism from ISIS and their online recruitment efforts.
This document is a report on cyber crime submitted by a student. It begins with an acknowledgement and abstract. The report categorizes cyber crimes as those against individuals, property, or government. It describes various types of cyber crimes like hacking, theft, cyber stalking, and cyber terrorism. It discusses some notable cyber attacks in history like the "I love you" worm in 2000 and Conficker worm in 2007 that caused billions in damages. The report aims to provide an overview of the broad topic of cyber crime.
Essay on Introduction to Computer Crime
Essay about CyberCrime and Terrorism
Cyber Crime : A Crime
Essay on CyberCrime
Cyber Crime Essay
Cyber Crimes And The Crime
Persuasive Essay On Cybercrime
Cyber Crime Essay
Cybercrime And Its Effect On Society
CyberCrime Essay
Essay on Cyber Crime and National Security
Cyber-Crime is a Serious Problem Essay examples
Literature Review On Cyber Crime
Cyber Crime
Cyber Crime
Why Cybercrime Is Important
Essay on Cyber Crime and Cyber Law
Cybercrime: Two Case Studies
Cyber Crime Essay
Cyber Crime Essay
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...IJCI JOURNAL
The study is focused on identity theft and cybersecurity in United States. Hence, the study is aimed at examining the impact of cybersecurity on identity theft in United States using a time series data which covers the period between 2001 and 2021. Trend analysis of complaints of identity theft and cybersecurity over the years was conducted; also, the nature of relationship between the two variables was established. Chi-Square analysis was used to examine the impact of cybersecurity on identity theft in United States. Line graphs were used to analyze the trend in the variable. Time series data was used in the study and the data was obtained from secondary sources; Statista.com, US Federal Trade Commission, Insurance Information Institute and Identitytheft.org. Result from the study revealed that consumers’ complaints on identity theft were on the increase every year. Total spending of the economy (both private and public
sector) on cybersecurity was on continuous increase over the years. More than 100% of spending in 2010 as incurred in 2018. The Chi-Square analysis revealed that cybersecurity does not have significant impact on identity theft. The study recommended that the government increase the level of public awareness to ensure that members of the public protect their personal and other information to ensure that they are not compromised for fraud or identity theft. Organizations also need to invest more in the security system and develop policies that will support the security system. At the country level, international treaties and collaboration should be encouraged to prosecute the fraudsters hiding behind national borders.
A Study on the Cyber-Crime and Cyber Criminals: A Global Problemijbuiiir1
Today, Cybercrime has caused lot of damages to individuals, organizations and even the Government. Cybercrime detection methods and classification methods have came up with varying levels of success for preventing and protecting data from such attacks. Several laws and methods have been introduced in order to prevent cybercrime and the penalties are laid down to the criminals. However, the study shows that there are many countries facing this problem even today and United States of America is leading with maximum damage due to the cybercrimes over the years. According to the recent survey carried out it was noticed that year 2013 saw the monetary damage of nearly 781.84 million U.S. dollars. This paper describes about the common areas where cybercrime usually occurs and the different types of cybercrimes that are committed today. The paper also shows the studies made on e-mail related crimes as email is the most common medium through which the cybercrimes occur. In addition, some of the case studies related to cybercrimes are also laid down
The document discusses the history and rise of the World Wide Web and cybercrimes. It notes that while the World Wide Web provided practical benefits and economic growth starting in 1991, its expansion also led to the introduction and rise of cybercrimes that are difficult for law enforcement to address due to the ability of criminals to erase digital tracks and issues with jurisdiction. The document also summarizes rational choice theory and strain/anomie theories as explanations for criminal behavior, and provides examples of cybercrimes like 419 scams that arise from economic strains in countries like Nigeria.
"Cyber crime", or computer-oriented crime..!!amit_shanu
Cybercrime involves using computers or networks to commit crimes. This document discusses several types of cybercrimes such as financial fraud, cyberterrorism, cyber extortion, cyber warfare, and using computers as targets. It provides examples of documented cybercrime cases and discusses efforts by governments and law enforcement to counter cybercrime. It also covers computer security and cybersecurity measures to protect systems from theft, damage, or service disruption.
The document discusses pros and cons of cybercrime. It provides definitions of cybercrime as criminal activities conducted online using computers to harm others, such as hacking, stealing personal or business information, or distributing viruses. Cybercrime can threaten individuals, national security, and financial systems. Common cybercrimes mentioned include illegal file downloading, stealing money from bank accounts, and creating/distributing viruses. The document also discusses punishments under Pakistani law for various cybercrimes such as fines and imprisonment.
This document discusses cyber crime. It begins by defining cyber crime and noting that computers are often the object or tool of criminal acts like hacking, identity theft, and child pornography. The history of cyber crime is traced back to the first spam email in 1976 and computer virus in 1982. Various types of cyber crimes are outlined such as hacking, theft, cyber stalking, and identity theft. The document also discusses international laws related to cyber crime and Bangladesh's laws targeting this issue. It concludes by providing tips to protect against cyber crime such as using strong passwords and antivirus software.
This document provides a review of cybercrime. It begins with definitions of crime and cybercrime. It then discusses several common types of cybercrimes like financial crimes, cyber pornography, drug trafficking, and cyber terrorism. It also examines cybercriminals and categorizes them from teenagers to professional hackers. The document analyzes data on the countries most affected by cybercrime. It concludes that cybercrime causes significant financial losses globally and emphasizes the importance of awareness and cybersecurity laws.
Cybercrimes are crimes that involve computers and computer networks. This document discusses jurisdiction as a major issue with cybercrimes due to the borderless nature of the internet. It notes that while the Information Technology Act 2000 allows for extra-territorial application of the law, provisions are needed for mutual legal assistance between law enforcement agencies internationally regarding sharing of cybercrime evidence and materials. The document also briefly mentions that cybercrimes in India are classified according to the computer networks involved and type of illegal act committed.
Cyber Crime Essay
Cybercrime: Two Case Studies
Cyber Crime Essay
Cyber Crimes, Moral And Ethical Implication
Cybercrime And Its Effect On The Youth
Essay on Cyber Crime and Cyber Law
CyberCrime Essay
Persuasive Essay On Cybercrime
Essay on CyberCrime
Essay on Cyber Crime and National Security
Research Paper On Cybercrime
Essay on Introduction to Computer Crime
Persuasive Essay On Cybercrime
Cyber Crime In The United States
Cyber Crime Essay
The Issue Of Cyber Crimes Essay
Literature Review On Cyber Crime
Cyber Crime Essay
Similar to Legal deficiency of cybercrime in nigeria need for urgent legal reform (chapter 1 & 2) (20)
Pedal to the Court Understanding Your Rights after a Cycling Collision.pdfSunsetWestLegalGroup
The immediate step is an intelligent choice; don’t procrastinate. In the aftermath of the crash, taking care of yourself and taking quick steps can help you protect yourself from significant injuries. Make sure that you have collected the essential data and information.
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee
Presentation slides for a session held on June 4, 2024, at Kyoto University. This presentation is based on the presenter’s recent paper, coauthored with Hwang Lee, Professor, Korea University, with the same title, published in the Journal of Business Administration & Law, Volume 34, No. 2 (April 2024). The paper, written in Korean, is available at <https://shorturl.at/GCWcI>.
Genocide in International Criminal Law.pptxMasoudZamani13
Excited to share insights from my recent presentation on genocide! 💡 In light of ongoing debates, it's crucial to delve into the nuances of this grave crime.
Safeguarding Against Financial Crime: AML Compliance Regulations DemystifiedPROF. PAUL ALLIEU KAMARA
To ensure the integrity of financial systems and combat illicit financial activities, understanding AML (Anti-Money Laundering) compliance regulations is crucial for financial institutions and businesses. AML compliance regulations are designed to prevent money laundering and the financing of terrorist activities by imposing specific requirements on financial institutions, including customer due diligence, monitoring, and reporting of suspicious activities (GitHub Docs).
Integrating Advocacy and Legal Tactics to Tackle Online Consumer Complaintsseoglobal20
Our company bridges the gap between registered users and experienced advocates, offering a user-friendly online platform for seamless interaction. This platform empowers users to voice their grievances, particularly regarding online consumer issues. We streamline support by utilizing our team of expert advocates to provide consultancy services and initiate appropriate legal actions.
Our Online Consumer Legal Forum offers comprehensive guidance to individuals and businesses facing consumer complaints. With a dedicated team, round-the-clock support, and efficient complaint management, we are the preferred solution for addressing consumer grievances.
Our intuitive online interface allows individuals to register complaints, seek legal advice, and pursue justice conveniently. Users can submit complaints via mobile devices and send legal notices to companies directly through our portal.
Legal deficiency of cybercrime in nigeria need for urgent legal reform (chapter 1 & 2)
1. 1
CHAPTERISATION
CHAPTER ONE:
1.1 Introduction
1.2 Background to the Study
1.3 Statement of the Problem
1.4 Significance of the Study
1.5 Aims & Objectives
1.6 Research Questions
1.7 Research Methodology
1.8 Scope of the Study
1.9 Clarification of Concept
CHAPTER TWO – LITERATURE REVIEW
2.1 Introduction
2.2 Literature Review
2.3 History of Concepts
2.4 Conclusion
CHAPTER 3 – CONCEPT OF CYBERCRIME
3.0 Defining Cybercrime
3.1 Classification of Cybercrime
a. Offences Against The Confidentiality, Integrity And Availability Of Computer Data
And Systems (Computer As A Target)
2. 2
i. Physical Damage
ii. Illegal Access
iii. Illegal Data Acquisition
iv. Illegal Interception
v. Data Interference
vi. System Interference
vii. Virus Attacks
viii. Cyber Vandalism
b. Computer-Related Offences
i. Fraud and Computer-Related Fraud.
ii. Identity Theft
iii. Misuse of Devices
c. Computer As An Incidental Or Other Crime
d. Crime Associated With The Prevalence Of Computers
i. Copyright Violation
ii. Trademark Related Offences
3.2 Brief History Of Cybercrime
3.3 History Of Cybercrime In Nigeria (The Cybercrime Project)
3.4 Effects Of Cybercrime
A. Legal Effects
B. Economic Effects
C. Social Effects
D. Political Impact
3.3 Conclusion
3. 3
CHAPTER 4:LEGAL FRAMEWORKFOR COMBATTINGCYBERCRIME
IN NIGERIA
4.1 Introduction
4.2 Executive Framework
i. Nigerian Cybercrime Working Group (NCWG)
ii. Computer Crime Prosecution Unit, Federal Ministry Of Justice
iii. The National Information Technology Development Agency
iv. Law Enforcement Agencies
4.3 Legislative Framework
a. Substantive Legislative Framework
i. The 1999 Constitution of The Federal Republic of Nigeria
ii. The Criminal Code Act
iii. The Penal Code
iv. The Shari’ah Penal Code Law of Zamfara State
v. The Economic and Financial Commissions Act
vi. The Advance Fee Fraud Act
vii. The Money Laundering Act
viii. CORRUPT PRACTICES AND OTHER RELATED OFFENCES ACT, 2003
ix. The Investments and Securities Act, 2007
x. Nigerian Communication Commission Act
xi. Telecommunications and Postal Offences Act 1995.
xii. The United Nations Convention On Carriage Of Goods By Sea (Ratification
and Enforcement Act) 2005
xiii. Copyright Act
xiv. Child Rights Act
4. 4
b. Procedural Legislative Framework
i. The Evidence Act 2011
ii. The Criminal Procedure Act (CPA)
iii. Criminal Justice (Misc. Prov) Act
c. Regional International Legislative Framework
i. African Union
ii. The Commonwealth
iii. Economic Community of West African States (ECOWAS)
d. International Regulatory Framework
e. Conclusion
CHAPTER 5:LEGAL DEFICIENCIESIN COMBATTINGCYBERCRIMES
IN NIGERIA
5.1 Introduction
5.2 Lack of Central Policy
5.3 Cyber Security
5. 5
5.4 Electronically Generated/Digital Evidence
5.5 Human Rights
5.6 Procedural Issues
5.7 Jurisdiction
5.8 Global Cooperation
5.9 Conclusion
CHAPTER 6: CRITICAL REVIEW OF THE CURRENT LEGISLATIVE
ANALYSIS
6.1 Introduction
6.2 Prospective Laws on Cybercrime
i. The Cyber Security and Data Protection Agency Bill
ii. Computer Misuse Bill
iii. The Nigerian Computer Security and Protection Agency Bill, 2009
iv. Computer Security & Critical Information Infrastructure Protection Bill, 2005
v. Electronic Messages, Information and Commerce and its Admissibility in
Evidence Bill, 2004.
vi. The Electronic Fraud Prohibition Bill, 2008
vii. The Electronic Commerce (Provision of Legal Recognition) Bill, 2011
viii. The Electronic Transactions (Establishment) Bill, 2013.
ix. The Electronic Transfer Of Funds Crime Bill, 2011
x. National Identity Management Commission Bill, 2006
6. 6
6.3 Compatibility of The Cybercrime Bills.
6.4 Conclusion
CHAPTER 7: RECOMMENDATIONS& CONCLUSION
6.1 The Need for Legislative Review
7. 7
CHAPTER ONE
1.1 INTRODUCTION
Cyber Crime is one of the words frequently used by individuals in our contemporary Society.
To understand the true meaning of cybercrime, there is the need to understand the slit meaning of
Cyber and Crime. The term “Cyber” is a prefix used to describe an idea as part of the computer
and Information age and “Crime” can be described as any activity that contravenes legal procedure
mostly performed by individuals with a criminal motive. Cybercrimes are defined as: "Offences
that are committed against individuals or groups of individuals with a criminal motive to
intentionally harm the reputation of the victim or cause physical or mental harm to the victim
directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms,
emails, notice boards and groups) and mobile phones” Halder & Jaishankar (2011). Such crimes
may threaten a nation’s security and financial health Saul (2007). Cyber crime can simply be
explained as crimes carried out with the aid of a computer system. The internet has offered a lot
of platform for useful research purposes; However, Cyber crime is a worldwide problem that's
costing countries billions of dollars. According to crime-research.org, as early as 2003 the United
States was already leading the world in percentage of cyber attacks at 35.4 percent, followed by
South Korea at 12.8 percent. Countries with high rates of computer piracy, such as Russia, have
reacted slowly to cyber crime. As a result, many hackers and other cyber criminals can flourish in
countries with few Internet crime laws while attacking richer countries through their computer
because it lacks rules and codes of a central authority which governs it as such internet has no
geographical demarcation as remarked by Guillane and Fortinet (2009).
In Nigeria, cyber-crimes are performed by people of all ages ranging from young to old, but
in most instances the young. Several youths engage in cyber-crime with the aim of emerging as
the best hacker, or as a profit making venture since the tools for hacking in our modern world has
become affordable by many. Mbaskei in his publication on “Cybercrimes: Effect on Youth
Development” noted that secret agents of the UPS (United Parcel Service) smashed a record scam
8. 8
with a face value of $2.1billion (about N252 billion) in Lagos. The interception was done within
three months. Some of the instruments uncovered by the UPS were documents like Wal – Mart
Money orders, Bank of America cheques, U.S postal service cheques and American Express
traveler’s cheques. This record scam is made possible as a result of the large number of young
people who now see Cybercrimes or internet fraud as a source of livelihood.
With a sharp increase in the use of Computers, internet and other electronic devices, over 55million
Nigerians are estimated to be internet users. The reason for this is dependent on so many factors
which include convenience and cost. Almost anything can be done on the internet including
Commercial transactions, social networking and easy access to information.
The Cyber World has brought a lot of convenience to people saving time, money and energy.
Although this is good, the Cyber world if unchecked also provides a high risk to human rights,
security and safety of lives and property.
Nigeria’s notoriety in cybercrimes worldwide is an open secret. There is hardly any crime
which is not perpetrated on the cyberspace by Nigerians.
There has been a sharp increase in cybercrime met by a sharp decrease in the need for
addressing this problem. There is no single Law legislating Cybercrime in Nigeria. The draft copy
of the Cybercrime Bill has been met by heavy criticism and has been amended over three times.
The Cybercrime Bill has also not been on the high priority list with other Bills such as The
Constitutional Amendment Bill and the Petroleum Industry Bill taking center stage.
While we wait for the outcome of the Cybercrime Bill, Law Enforcement Agents would have to
make do with the existing legal framework as the Economic and Financial Crimes Commission
has also experienced a few successes in prosecuting some aspects of cybercrime in Nigeria.
1.2 BACKGROUND OF STUDY
9. 9
Crime remains pervasive and forever strives to hide itself in the face of development. As measures
and techniques for detecting crimes and criminals advance, criminals also look for means of hiding
from these measures.
Obano (2007:17) asserts that the internet currently serves as a hiding place for fraudsters who have
simply migrated from the streets to an electronic platform.
Okonigini (2002:25) defines computer crime as criminal activities, involving information
technology infrastructure, including illegal access of computer data from or within a computer.
Similarly, Asokhia (2003:49) asserts that cybercrime, popularly called “YAHOO” is an off-shoot
of advance fee fraud which became popular in the early 90s. Today, it has produced “YAHOO” as
its first offspring with mostly young unemployed people (most especially the) as its practitioners.
Different nations have adopted different strategies to contend with crimes depending on their
nature and extent. Certainly, a nation with high incidence of crime cannot grow or develop. For
Nigeria, a nation in the process of saving her face regarding cybercrimes, efforts are now being
directed at the sources and channels through which cybercrimes are being perpetuated the most.
[Chiemeke (2008:32)].
Martins (2008:47) assert that “YAHOOISM” is an act of cybercrime that defrauds unsuspecting
victims in foreign countries of their hard-earned money. In some instance, the unsuspecting victim
is used to defraud banks, postal agencies, shops, etc. the yahoos (perpetrator) sends fake cheque
or postal money orders to victims in any of the following countries: Canada, United States of
America and other European countries or Asia as the case may be.
He further notes that when the cheques or money order are cashed, the victim is told to send the
money through Western Union Money transfer in Nigeria, while in other cases, the victim is told
to send the money to another country where the yahooist has built networks over time.
The mode of money collection is usually dependent on the modus operandi the yahooist uses. In
similar vein, Alemika (2007:15) notes that in Nigeria today, cyber crime has found its root in the
society. Like a cankerworm it has eaten deeply in the society and finally been accepted by the
same society.
Similarly, Martins (2008:43) notes that the paramount classification of yahooism as a branch of
cybercrime and transitional crime is not only expedient in understanding its mystery, but
10. 10
propounding a lasting solution when considering curbing the menace. Yahooism is the fastest
growing transnational crime in recent times, especially in Nigeria.
1.3 STATEMENTOF RESEARCHPROBLEM
Nigeria according to Wikipedia is said to be 7th largest oil producing country in the world, but
nevertheless, the majority of Nigerians are still living in poverty.
Nigeria is also rated amongst one of the most corrupt countries of the world.
Internet usage in Nigeria has grown rapidly resulting in the explosion of Internet Service Providers
(ISPS) and Internet Access Point creating an increase in the positive impacts on the socio-
economic and educational developments in the country.
Unfortunately, the country’s image has also suffered as a result of the unscripted activities of some
Nigerians using the internet as a channel for the perpetration of criminal spamming activities.
The major implication of the unconscious acceptance of this menace in the Nigerian society in the
nearest future has created a high level of disinterest in education and touting among young people.
In Nigeria today, young people mostly youths are the ones who engage in this form of anti-social
behaviour for the purpose of living a life of splendour.
In recent times Nigeria has been labelled as a corrupt nation. There is a need for the Nigerian
government to do something fast and urgent to curb this menace of cybercrime.
Akinsehinde (2011) argued that, over 80 per cent of businesses with online presence
in Nigeria are susceptible to cyber-attacks and the increasing spate of cyber-criminal
activities were threatening the Nigeria economy. He argued that, web portals and web based
applications of the Central Bank of Nigeria, Nigeria Stock Exchange, banks, pension fund
administrators and switching/electronic payment companies had been found to be vulnerable to
cyber-attacks due to inadequate security measures for safeguarding the platforms.
He lamented that, there are advanced countries with high Internet security measures,
yet their systems were hacked. He recalled that the Hong Kong Stock Exchange and
NZSDAQ servers were hacked via wed-facing applications. Based on his findings in Nigeria, most
businesses including the Central Bank of Nigeria, Nigeria Stock Exchange and banks are
11. 11
vulnerable to hacking and the need to create awareness as we go into a cashless economy by
adhering to international security standards.
Azazi (2011) set up a Committee on cybersecurity Legislation to access the Nigeria
cyberspace. In the report submitted to the office of the National Security Adviser (NSA), the
committee revealed the followings:
Nigeria lacks the structures to handle any cyber-attack emergency, with the increase
in bomb attacks and growing threat of attacks through computer networks.
There is no comprehensive assessment of the preparedness of the country in the event of
cyber-attacks.
There is no focal point for coordinating cybersecurity in Nigeria.
There are no structures to handle any emergency cases of cyber-attacks.
The current legal framework is grossly inadequate for cybersecurity in Nigeria and
does not support a coordinated approach to developing a cybersecurity strategy.
The committee further revealed that, the challenges in developing a cybersecurity
framework to include lack of awareness and jurisdiction overlaps among existing law
enforcement agencies. Others are the absence of certification of critical national information
infrastructure and the absence of systematic capacity and capability building for law
enforcement agencies.
The committee recommended that the office of the National Security Adviser (NSA)
should initiate the amendment of the National Security Agencies Act, Cap N74 LFN 2004 to create
the Directorate of Cybersecurity; liaise with the Office of the Attorney General of the Federation
and Minister of Justice and work with legislators to ensure the passage of the
harmonised cybersecurity Bill.
Sorunke (2011) maintained that Nigeria at the cyberspace is under threats, with much
vulnerability, many loopholes in our system and with issues bothering on our payment
networks. He warned that, if urgent measures were not taken by businesses and government
12. 12
organisations deploying web-based platforms for their operations and with the increasing rate of
cyber insecurity in Nigeria; companies might soon be faced with high incidence of
hacking, leading to loss of data critical to a business life and revenue.
He maintained that, the high level of insecurity in the Nigeria’s cyberspace might
affect the cashless economy objective of the Central Bank of Nigeria. He noted that the
wanton defacing of some government websites such as the Niger Delta Development
Corporation (NDDC), Power Holding Company of Nigeria (PHCN), etc. by a group of
hackers known as NaijaHacktivists; in practical terms inform how vulnerable most Nigerian
organisations were in the cyberspace.
From the above, it is obvious that the Nigeria’s cyberspace is porous and has no form
of legal protection to regulate activities in Nigeria’s cyberspace. Therefore, the study
intends to look at the Nigeria approaches in combating the menace of cybercrime.
1.4 Significance of the Study
The importance of this study cannot be overemphasized. This study, which is primarily aimed at
probing the legal deficiencies of cybercrime in Nigeria accompanied with an urgent need for legal
reforms, will provide an insight into the problems associated with cybercrime.
It would be useful to the government and related stakeholders to enable them adequately
understand factors responsible for and how to curb the continued spread of cybercrime among
Nigerian youths [and the general public]. Similarly, this work will assist law enforcement agencies
in their bid to curb e-crimes in Nigeria.
The findings will be useful for researchers to further generate knowledge in the field.
13. 13
1.5 Aims & Objectives of the study
This paper aims to look at the Structure of Cybercrime in Nigeria, The current Framework for
combatting Cybercrime in Nigeria, proffer solutions to how Cybercrime can be tackled within the
current framework and whether or not the current framework is adequate to tackle cybercrime in
Nigeria. It also aims to critically analyze the current legislative review and proffer long lasting
solutions on how Cybercrime can be tackled with emphasis on the need for legislative review of
the procedural laws in tackling Cybercrime in Nigeria.
The general objective is to highlight the nature of cybercrime and the threat they pose
to the effective operations and service in the Nigeria cyberspace.
The specific objectives are as follows:
To highlight the reasons, implications and the approaches adopted by the Nigerian
government in combating cybercrime and its criminal in the society.
To provide an aid in formulating appropriate legal and regulation framework for cyber law
and ensuring cybersecurity in Nigeria.
1.6 Research Questions
The Scope of Cybercrimes and its effects have generated questions to determine and grounds to
probe the very essence of this menace.
Some of the questions this study will consider are:
What is the perception of Law Enforcement agencies and existing Legal and technical
framework to counter the menace of cybercrimes in a developing country like Nigeria?
What is the attitude and response of the Judiciary in the face of new trends of cybercrimes
such credit card fraud, phishing, hacking, virus dissemination, cyber piracy and cyber
plagiarism?
How to proffer solutions to the inadequacies of existing enabling laws?
14. 14
What are the ways Federal Government can curb the continued spread of cybercrime
among Nigerian youth and the general public?
Is the internet used as a channel for the perpetration of criminal spamming activities?
1.7 Methodology
In order to ensure that this study achieves its aims and objectives, the doctrinal research method is
largely used in the collection of data needed for the research of this work. The research will
combine both primary and secondary sources of materials. The relevant statutes and case laws will
be consulted to assist in this research work.
The nature of the work also demands that much reliance will be placed on internet materials,
textbooks, journals and articles written in the area will also be used.
1.8 Scope of Research
The contribution of the Internet to the development of the nation has been marred by cybercrime
activities.
Cybercrime is emerging as a very concrete threat, not only in Nigeria but the globe at large. This
study is concerned about the Nigeria approach in combating the menace of cybercrime.
Being a law-related study, existing works on the subject matter are mostly sourced through the
internet, as there are few texts providing a guiding light on this discourse.
15. 15
1.9 Clarification of Concept
o Cyber: The use of computers, information systems or the internet by the Nigerian youths.
o Crime: The display of illegal act characterized by decent, contentment or violation of trust
of the youths.
o Youth: It is when a young person is young especially the time before a child becomes an
adult.
16. 16
CHAPTER TWO
LITERATURE REVIEW AND HISTORY OF CONCEPTS
2.1 INTRODUCTION
This chapter examines the views and opinions of writers on the subject matter. A further milestone
will be reached at the history of the concept; criticisms on the works of some writers and at the
end achieve a better understanding of the concepts.
2.2 LITERATURE REVIEW OF THE CONCEPTS
“Ever since creation’s peaceful dawn was startled by the death cry of the murdered Abel and
Jehovah placed his mark upon Cain and set him forth a ‘fugitive and a vagabond,’ cursed from the
earth that had opened its mouth to receive his brother’s blood from his hand, there has been a
never-ending conflict between those who make the laws and those who break them. (1926)”1
Cybercrime is one of the words frequently used by individuals in our contemporary society. To
understand the meaning of cybercrimes there is need to understand the slit meaning of "Cyber"
and "Crime". The term "Cyber" is a prefix used to describe an idea as part of the computer and
information age.2 On the other hand, "Crime" can be defined as any activity that contravenes
legal procedure mostly preferred by individuals with a criminal motive.3 It is therefore pertinent
1 Quotation by Guy H. Thompson, reproduced by F. Gregory Lastowka and Dan Hunter, “Virtual Crime”,
New York Law School Review. July 2004, also available at http://ssrn.com/abstract=564801
2 Anah B.H, "Cybercrimes" in Nigeria: causes,effects and the way out; AREN journal of science and Technology
Vol2. NO.7. August 2012 P.626
3 Ibid
17. 17
to point out that this definition of crime by Anah is more focused on having a criminal motive
before a crime can reassure. This is a subjective definition as one may be deemed or seen to have
committed a crime in different jurisdictions even when he has not intended it or even had any
criminal motive. For instance, in some countries which practice gay marriage, it is deemed a crime
where an individual fails to acknowledge this and could be punished on grounds of discrimination.4
Crime we are told is today a salient tact, an integral part of the risks we face in everyday life. In
both scholarly and public opinion, crime is associated with harm and violence. However, we lack
agreement on the most basic question "what is crime". The term crime does not in modern criminal
law have any simple and universally accepted definition5, though statutory definitions have been
provided for certain purposes6. The most popular view is that crime is a gateway created by law,
that is something is a crime if applicable Law says it is. One proposed definition is that a crime,
also called an offence or a criminal offence is an act harmful not only to some individuals, but also
to the community or the state (public wrong). For me, the most acceptable definition of a Crime is
that "Crime is an act that the law makes punishable”.7 This is because any act which has not been
condemned by any law or recognized by any act as wrong cannot be seen or called a crime.
Borrowing a leaf from the foregoing therefore, Cybercrime has not been defined severally by
various writers. This would be discussed having understood the split meaning of "Cyber" and
"Crime". Cybercrime has been defined as “a criminal offence on the web, a criminal offence
regarding the internet, a violation of law on the internet, an illegality committed with regard to the
4 See countries like USA
5 Farmer L., "crime definitions" in Cane and Conoghan (editors). The New Oxford Companion to Law, Oxford
University Press 2008, P.263
6 Such definitions as provided by Section 243 (2) of the Trade Union and Labour Relations (Consolidated) Act 1992
and by the schedule to the Prevention of Crimes Act 1871
7 Garner, B.A., Black’s Law Dictionary 9th Ed., West Publishing Co. USA, 2009, P.427
18. 18
internet etc”.8 According to Summer9, there is no generally acceptable or generally agreed
definition of Cybercrime and this lack directly impacts assessments of extent. The Council of
Europe Cybercrime Convention10 also known as the Treaty of Budapest covers in Articles 2-6 as
“substantive offences”, “illegal access”, and “misuse of devices”, “system interference”, “data
interference”, and “illegal interception”. It adds as Computer-related offences, “computer-related
forgery”11 , and “computer-related fraud”12 . Cybercrime has also been defined as including
“unauthorized acts with the intent to impair, or with recklessness as to impairing, operation of
computer, etc”.13 This definition is acceptable only within the jurisdiction in which the law was
made.
Cybercrime encompasses any criminal activity or act dealing with computers and networks (called
hacking). Additionally, it also includes traditional crimes conducted through the internet for
example; hate crimes, internet fraud, identity theft, and credit card account thefts.14
Okwunma opines that Cybercrime should not be attributed to just the use of computers to commit
crime, cybercrime is cloud crime. Most of the cybercrimes are being committed with the aid of the
internet and therefore, cybercrime should be defined as illegal activities committed through the
use of computer and internet.15
Dictionary.com defines Cybercrime as criminal activity or a crime that involves the internet, a
computer system or computer technology; identity theft, phishing and other kinds of Cybercrime.16
8 www.thefreedictionary.com assessed May 30, 2014
9 www.publications.parliament.uk/pa/cm201012/cmsctech/imtev/mal01.htm. Assessed May 31, 2014
10 http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm. It dates from 2001 and came into force in 2004
and was ratified by the UK in 2011.
11 Article 7 of the Council of Europe Cybercrime Convention
12 Article 8, The Council of Europe Cybercrime Convention
13 Section 3 Uk Computer Misuse Act, 1990
14 www.webopedia.com/term/c/cyber_crime.html Assessed 31/5/2014
15 Okunma E.N., “Criticism: 2011 Cybercrime Bill”, Telecommunications Engineering Project, University of
Witwatersrand Johannesburg South Africa 2013
16 http://dictionary.reference.com/browse/cybercrime
19. 19
Cybercrime is a term for any illegal activity that uses a computer as its primary means of
commission.17 These broad definitions offer little insight into the nature of the conduct that falls
within the umbrella term. The issue is further complicated by the fact that cybercrime is a social
label and not an established term within criminal law.
There has been confusion on the criteria used to determine the term Cybercrimes or computer
crimes.18 Some argued that, it is any crime that involves the use of computer, while some others
argued that it is a crime in the presence of a computer.19 However, some have criticized the
categorization of cybercrime. Gotternbarn argued that, there is nothing special on the crimes that
happen to involve computers. Is it possible for a crime being categorized in accordance to a tool,
equipment, mechanism or means through which it was committed? If that’s so, how many
categories of crime would be there? How about the crime committed through using a television,
automobiles, scalpels, scissors and other tools, can we categorize each of them as individual
crimes?20 Gotternbarn concludes that crimes involving computers are not necessarily issues in
computer ethics.
in arguing against Gotternbarn, it is true that we may not categorize other crimes in accordance to
tools, equipment, mechanism or means through which they were committed. However, due to the
nature and features of cybercrimes21 which differentiates the traditional universe and the cyber
universe, it made the traditional universe tremble like an earthquake and makes crimes difficult to
17 Esharenana, E., Igun S.E, Combating Cybercrime in Nigeria, Electronic library, vol 26, Emerald Group
Publishing Ltd, 2008, Delta, P. 717
18 Herman, T.T, Ethics and Technology, Ethical Issue in an Age of Information and Communication
Technology, 2nd Edition, John Wiley & sons Inc, 2007, USA, P.202
19 Ibid
20 ibid
21 ubiquity, global reach, universal standards,information reachness,interactivity, information density,
personalization, customization a nd social technology.As a result of these features, it achieves unprecedented
reach and makes available vast amounts of information of varying degrees of quality. Internet users cannot be
regarded as a homogenous group.
20. 20
control than they were before. This initiates the concept of these crimes being necessary to be
categorized as cybercrimes.22
Forester and Morrison argued that cybercrime is a criminal act in which a computer is used as a
principal tool. In that matter, the theft of computer hardware device, would not qualify as a
computer crime.23 Is it true that by using a computer as the principal to commit a crime, it will
amount to cybercrime? For instance in taxable transactions, in the case of data entry, can’t a person
commit fraud just by filling the wrong data into hardcopy version of tax forms which are the same
available in electronic forms? Therefore, their Argument holds no water as it is fallacious.
Girasa in 2002 argued that Cybercrime is a generic term covering the multiplicity of crimes found
in penal codes or in legislations having use of computers as a centre component. To him,
Cybercrime is a crime as long as the penal codes and any other legislation clearly stipulate it as
involving not only the use of computers but the use of computers as the centre component.24
At the Tenth United Nations Congress on the Prevention of Crime and Treatment of Offenders, in
a workshop devoted to the issues of crimes related to computer networks, cybercrime was broken
into two categories and defined thus:25
1. Cybercrime in a narrow sense: Any illegal behaviour directed by means of electronic
operations that targets the security of computer systems and the data processed by them.26
2. Cybercrime in a broader sense (computer-related crime): Any illegal behaviour
committed by means of, or in relation to a computer system or network, including such
22 Ashery M., “Introduction to Cybercrime: Security, Prevention and Detection of Cybercrime in Tanzania”, LL.M-
ICT law (thesis) 2013 Tumaini University Iringa College
23 Ibid P.203
24 Girasa, R.J., Cyber Law: National and International Perspectives, Prentice Hall Publishers, 1st Ed, New
Jersey, 2001
25 Talwant S., District & sessions Judge,Cyber Law & Technology, Delhi- India
26 Tenth United Nations Congress on the Prevention of Crime and Treatment of Offenders, Vienna A/CONF.187/10,
10-17 April 2000, P.4
21. 21
crimes as illegal possession and offering or distributing information by means of a
computer system or network.27
Even though this definition is not completely definitive, however, it gives us a good starting
point, for determining just what cybercrime means, by incorporating computer crime and
computer-related crime. Computer crime has two elements, “Computer” and “Crime”. Therefore,
it involves a crime in a relationship with a computer.28 The relationship could involve the direct
usage of a computer by the criminal as one of the first famous computer criminals did. However,
the relationship can also be indirect, the criminal cannot only use a computer to commit his
crime but can also use someone to make changes in a computer system by manipulating a key
computer user.29 Thus, one being the exploitation of weakness in the technical IT
infrastructure30, and the other being exploitation of trust in social fabric of IT users31 within the
organization
2.3 HISTORY OF CONCEPTS
The early computers like Electronic Numeric Integrator and Computer (ENIAC), Binary
Automatic Computer (BINAC), Universal Automatic Computer (UNIAC), and other Punch Card
Tabulation Machines had some inherent security advantages. They were stand-alone systems, huge
and very expensive and besides, not many people knew what a computer really was. Commercial
computers like Programmed Data Processor (PDP-1) got introduced around the 1960s with a
business model of renting out the machine to companies and individuals on a time sharing basis.
This made the data and programs stored in it vulnerable, and thus, the first doors to hacking were
opened. The first hackers group came from Massachusetts Institute of Technology (MIT) in 1961,
shortly after MIT got its first PDP-1.32 During the 1970s, while computers were slowly getting
introduced, the telephone system was already well established. There was a curious group of
27 Ibid
28 Magim C.J, “The 2001 Council of Europe Convention on Cybercrime: An efficient tool to fight Crime in
Cyberspace? A paper submitted for LLM at Santa Clara University in 2001
29 Ibid
30 United States V Morris (1991 The accused invaded the security systemthrough a worm as to measure the
weakness of MIT which in turn prevented the use of Federal interest computers, thereby causing loss.He was held
guilty.
31 See S V. Douvenga case no 111/150/2003, dated 2003/08/19 Northern Transvaal Regional Division 93 Cr APPR
32 Debra L.S, “Scene of the Cybercrime; Computer Forensics Handbook”
http://www.syngress.com/catalog/?pid.2250 Assessed 31/5/2014
22. 22
people, known as Phreaks who thrived by the idea of breaking it. One of the first known Phreaks
was Nelson from MIT who wrote softwares to generate tones that helped access the phone
company’s long distance service and make free calls. The Phreaks created a blue box device that
was programmed to generate a 2600-hertz signal, allowing them to do nasty things such as stalking
a trunk line, and kicking off the operator line that enabled making free long distance calls. Steve
Wozniak and Steve Jobs (founders of Apple Computer) were known to be involved in the early
production and distribution of similar devices. With the introduction of Altair 8800, the first
affordable PC in the 1970s it became possible for individuals to own computers and learn to
program. This learning was soon followed with a thirst for full fledged hacking by some
individuals. Simultaneously, the emergence of other computers like the Radio Shack’s TRS-80
and the IBM PC brought more powerful computing to people who were eager to find new ways to
exploit the system’s capabilities. Today’s networking technology has improved tremendously, and
gone beyond the mainframe model with new concepts such as peer to peer communication
standards like internet enabled vendors to create compatible products that link computers easily
and inexpensively. Unfortunately, these open standards also made it easier for the hackers to break
into systems by reverse engineering the widely available protocol.
As computers became cheaper and started getting mainstream, efforts were made for seamless
interaction between them. ARPA Net was one such effort and during its design, security was not
in issue to research scientists as they thought that the small number of nodes on the network limited
the scope of the threat posed by security branches. However, in 1988, Robert T. Morris, a
graduate student at Cornell University launched a self-replicating worm on the government’s
ARPA Net to test its effect on UNIX systems. The worm spread all across the United States and
infected thousands of networked computers, clogged government and university systems and
brought the internet to a standstill.33 This was the wakeup call to internet users who realized that
some amidst them haboured malicious intent.
In the early 1990s, as internet access became commercially available at an affordable price, the
number of attacks also increase and cybercrime was now crossing international boundaries.
Among the first Cyber-espionage case to make international headlines were hackers in West
Germany who were arrested for breaking into US Government and corporate computers, and
selling operating system source code to the Soviet KGB. In another event, Russian Cracker
33 United States V. Morris Supra
23. 23
Vladimir Levin, siphoned $10million from Citibank and transferred the money to banks accounts
around the world.34 Banks and other financial institutions were amongst the first large scale
computer users in the private sector35, for automatic payroll and accounting functions. Therefore,
fraud in a computer scheme emerged.
However, as technology advanced, the number of cybercrime cases increased. Several individuals
were engaged in the fight against computer crime from the early development. The founder and
father of the knowledge of computer crimes are by many observers considered to be Donn B.
Parker, USA. He was involved in the research of computer crime and security from the early 1970s.
He served as a Senior Computer consultant at the Stanford Research Institute (SRI) International
and was the main author of the first basic Federal manual for law enforcement in USA.36 This
manual also became soon an encyclopedia also for law enforcement outside US.37
Furthermore, in the late 1990, Hackers pierced security in Microsoft’s Windows operating system
to illustrate its weaknesses. Trojan horse virus was released in 1998 by hacking group called “Cult
of the Dead Cow” which on a machine running windows 95 or windows 98, allowed unauthorized
remote access of the machine. An example of which was the attack on the Federal Bureau of
Labour Statistics in 1998, which was inundated for days with hundreds of thousands of fake
information requests. The website was brought down that frustrated the economists and investors
as they depended on it to retrieve the latest economic data.
The worms and viruses released in the twenty first century posses a higher impact in terms of
financial damage and loss of productivity. An example is the “Love letter” worm that caught on in
May 2000 caused companies $960million in clean-up costs.38
2.4 CONCLUSION
“Ever since men began to modify their lives by using technology, they have found themselves in
34 http://www.thocp.net/reference/hacking/hacking.htm Assessed 30/5/2014
35 Lloyd I.J., Information Technology Law, Oxford University press,6th Ed, London, 2011, p. 90
36 Computer Crime - Criminal Justice Resource Manual 1979. This manual became an encyclopedia also for law
enforcement outside US
37 See an overview of his archies, www.cybercrimelaw.nnet His first book on the subject was: “computer Crime”
(1976)
38 Lessons of “Love” Virus still sinking in
http://news.com.com/lessons+of+love+virus+still+sinking+in/2100_ 1001_3-257095-html Assessed 31/5/2014
24. 24
a series of technological traps”.39 It is obviously established that a discourse on the concept
Cybercrime is indeed not an easy task as there are conflicting ideas on what it is. But a clear
understanding of it has been established in this chapter.
39 Vakul S., Information Technology Law and Practice, 3rd Edition, Universal Law Publishing Co. Ltd, New
Delhi, 2011, P.30