SlideShare a Scribd company logo
Page | 1
Prostitution and Cyber Insecurity in Cameroon
By Saron M. Obia
Abstract -The increasing nature of prostitution have been linked to cyber insecurity in
Cameroon. Though legislation's exist for such crimes, the network of prostitution and cybercrime
continues to increase at a geometric rate. The quest for profit by mobile operating companies
have increased, as well as the rate of vulnerability due to poor security measures and staff
dishonesty in financial institutions.
Keywords: Prostitution, Cybercrime, Hacking.
Introduction
Prostitution is the act of commercializing oneself for either money or service. Thought
legislation's in Cameroon prescribe punishment for prostitution with an amount to be paid and
jail sentence, the business still flourishes. Prostitution is one of the largest business in the world,
which hires millions of women each hour. In Cameroon, the business has gained ground and
some suggest space be given to them during the Labour Day parade, since they have the sex
hawkers syndicate. The emergence of new forms of crimes like cybercrime and identity theft has
been linked to prostitution in Cameroon. Security in Cameroon is faced with two pertinent
questions in regards to cyber insecurity; who is a prostitute? What is the role played by
prostitutes in cybercrime? The scope of prostitution has increased in Cameroon which is not only
limit to street hawkers but also students, workers in mobile operating companies and airtime
vendors.
Cyber Insecurity Scenery
The term cyber refers to electronic communication network and virtual reality. The problem
under discussion is cyber insecurity which constitute; scamming, phishing, skimming and
hacking just to name a few. According to Law No 2010/012 of 21 December 2010 relating to
cyber security and cyber criminality in Cameroon, cybercrime is defined as an illegal activity
related to the internet world or cyberspace committed by an individual or group of persons for
financial motives. The have been recent acronyms adopted by criminals like Ngues, machine
Page | 2
man, dak just to name a few. Identity theft also known as identity fraud is a strategy used by
individuals to steal data that defines a person. In Cameroon, such activities are oriented on
skimming and the use of the sim box. According to Arora et al (2012), there exist a vicious circle
on the latter. The role of prostitutes in cybercrime in Cameroon is mapped as follows; hacking of
accounts and skimming, identity theft on mobile money and offensive content, harassment and
drugs.
The role of prostitutes in cyber insecurity in Cameroon
The evolution of capitalism has led to increasing level of crimes. Sociologist like Ronald Weitzer
pointed out six types of prostitutes in his work titled “Legalizing Prostitution in 2011” which
are independent escort, brothel employee, window worker, escort agency employee, casino
worker and streetwalker. At this juncture, the role of prostitutes will be examined.
1. Hacking of accounts and skimming
2. Identity theft on mobile money
3. Offensive content, harassment and drugs
1. Hacking of accounts and skimming
With the evolution of information and communication technology the pattern of crimes have
changed, with prostitutes engaged in organized crimes such as cybercrime and identity theft. The
collaboration of prostitutes and cybercriminals is far beyond the definition of cyber criminality.
These prostitutes gather credit card information of their clients such as name and credit card
number, for accounts to be hacked, some clic with dishonest authorities for security.
Moreover, prostitutes engaged in organized crimes get visit cards of their victims which usually
contains email, phone numbers, job description, position and order of name for phishing. As
such, they contact victims through such mediums, telling him or her the account need to be
update, requiring a new password through a form sent through mail. Criminals equally clone
credit card and effectuate online transactions.
Another pattern is that malicious software are sent to the victim’s mail, when he/she clicks the
account is pirated. One of the major reasons for the increasing victimization of Cameroonians
and foreigner is due to lack of proper security measures by financial institutions, mobile
Page | 3
operation companies and state security agencies which rarely caution the population on the
evolution of crimes and also their inadequate training accounts for the high vulnerability rate.
2. Mobile Money Accounts (MMA)
There is an adage that “no risk no reward” with the proliferation of mobile operating companies
in Cameroon which has made them to engage in banking activities like mobile money. One of
the fastest technique to make profit, with little or no security, enhanced by the android generation
in Cameroon. Due to its services like fast money transfer, airtime borrowing and payment of
bills. Though this is social development, some Pan Africanists perceive mobile money as a
strategy of financing terrorism or terrorist organizations. For instance, senders are not sometimes
identified. As such, after discussing with a terrorist organization, the can effectuate a mobile
money transaction, since the senders name is not required in some of its transactions.
Furthermore, the quest for profit by mobile operation companies have reduced the level of
security protocols for their clients. For example, during an interview with an agent of a mobile
operation company in Cameroon involved in mobile money, she said there is no criteria for
selection for agents engaged in the task of identifying sim cards sold at 100 and the registration
of airtime vendors which is critical not only to citizens but also to national security. Since most
of the works or agents engaged in the task have targets to attain per day, some connive with
cybercriminals an identify sim cards with other people’s information. She went ahead to say,
some of the agents cooperate with cybercriminals and give valuable information gotten from
workers in the company through seduction and they also have a commission.
The pattern changes each hour, as some mobile money agents have become part of the game. In
areas like Yaounde 2, Soa, and Molyko, Buea, cybercriminals lull some mobile money agents to
get information about their victims. Others buy numbers of people from airtime vendors and use
to browse due to the poor networking system and cyber security in the country. In an interview
with an agent of a mobile operation company offering this service, the lady said the salary for the
job is little as compare to the task involved. As such, in the bid to keep to standard with the
capitalists system, ladies go extra mile in to prostitution with business clients of the mobile
operating companies to get information and sell to criminals.
Page | 4
3. Drug, offensive content and harassment
Drug, harassment and offensive content are gaining grounds in Cameroon. It has been linked to
cybercrime, as criminals keep bullying lecturers, foreigners and stakeholders in the country. In
Cameroon foreigners (Bushfallers) are most targeted persons when discussing of drug, offensive
content and harassment.Two cases will be explored at this level, first that of a university lecturer
of the state and a foreigner which are unreported.
Case study 1: Offensive content and harassment of university lecturer
Sexual harassment is one of the leading issue in secondary and university milieu. In 2014, a
young lady obtain her first degree in a state university, when the lecturer who was harassing her
had his naked pictures with some suspected criminals working with the girl blackmailing the
latter to pay a certain amount and she must have the first degree if not he will be exposed and
pictures published in all social platforms. The lecturer was faced with a huge challenge, first that
of offensive content and harassment then extortion. Though the act committed by the lecturer is
punishable, it’s still rampant in the academic milieu and as well the young lady can be
imprisoned for extortion as per section 318 of the Cameroon Penal code. But she obtained the
first degree and left to do her master’s in a private university in the country.
Case study 2: Drug and harassment of foreigners (Bushfaller)
The industrial revolution revolutionized the world, as thing that were done by hand were now
produce or made by machine. Some Africans consider the West as utopia. As such, any person
from the West is like a semi god in Cameroon. But criminals collaborate with young ladies from
universities and secondary schools to drug this foreigners (Bushfallers) to take their passport and
other documents and start harassing them to pay huge sums of money in order to recover their
documents or they will burn it into ashes. This case is rampant with guys from the U.S and other
European countries. During this period, they use phone boot (call box) for security purposes.
Also, they collaborate with some dishonest staffs (back up or pick-up) of financial institutions to
receive the money.
It will be recalled that, though the is legislation which deals with illicit drug trafficking,
offensive content and harassment, these crimes keep increasing at a geometric rate in Cameroon
because of negligence and lack of cooperation.
Page | 5
Conclusion
The complexity of cybercrime, requires adequate knowledge and expertise to crackdown
criminals. It should be noted that one of the major issue with cyber insecurity in Cameroon is
prostitution. The lack of collaboration among stakeholders, mobile operating companies,
financial institutions and security experts accounts for cyber insecurity in the country. As such,
the Cameroon government should introduce cyber security as a course in the police academy, so
as to educate them on the changing patterns and gadgets used by cybercriminals and identity
thieves in Cameroon. Also, mobile operating companies should step up the security for their
clients rather than only focusing on profit. For there is a say that the client is the king and should
be treated as such.
References:
Arora, S., Bhatt, Ch. & Pant, A. (2012) Forensics Computing-Technology to Combat
Cybercrime. Journal of Advanced Research in Computer Science and Software Engineering. Vol
2, Issue 7, July 2012.
Pondi, E. (2011) Sexual Harassment and Deontology in the University Milieu. Edition CLE 2011
Prostitution taking over Yaoundé. Cameroonweb, General News of Mon, 13 July 2015.
Weitzer, R. (2011) Legalizing Prostitution. From Illicit Vice to Lawful Business

More Related Content

What's hot

Phishing website method
Phishing website methodPhishing website method
Phishing website method
arelyf_7
 
Grant Proposal Excerpt Build Your Own NGO
Grant Proposal Excerpt Build Your Own NGOGrant Proposal Excerpt Build Your Own NGO
Grant Proposal Excerpt Build Your Own NGO
Ericka Rodas
 
Phishing
PhishingPhishing
Phishing
Ajit Yadav
 
Causes of soco economic crimes or white collar crimes
Causes of soco economic crimes or white collar crimesCauses of soco economic crimes or white collar crimes
Causes of soco economic crimes or white collar crimes
geo irfan01
 
Scams and-fraud-presentation
Scams and-fraud-presentationScams and-fraud-presentation
Scams and-fraud-presentation
Roel Palmaers
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
CA.Kolluru Narayanarao
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
Kolluru N Rao
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft
Rahmat Inggi
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theft
IJCNCJournal
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
vineetkathan
 
01.fnc free seminar (public) new
01.fnc free seminar (public) new01.fnc free seminar (public) new
01.fnc free seminar (public) new
forensicsnation
 
ID Theft
ID TheftID Theft
ID Theft
Willhack
 
Phishing in China
Phishing in ChinaPhishing in China
Phishing in China
James Corcoran
 
Android mobile platform security and malware
Android mobile platform security and malwareAndroid mobile platform security and malware
Android mobile platform security and malware
eSAT Publishing House
 
CBSV%20INFORMATION[1]
CBSV%20INFORMATION[1]CBSV%20INFORMATION[1]
CBSV%20INFORMATION[1]
Stephanie L. Elder
 
PREVENTING ID THEFT GUIDE FOR CONSUMERS
PREVENTING ID THEFT GUIDE FOR CONSUMERSPREVENTING ID THEFT GUIDE FOR CONSUMERS
PREVENTING ID THEFT GUIDE FOR CONSUMERS
Greg Ewers
 
Electronic fraud by prof godwin oyedokun (1)
Electronic fraud by prof godwin oyedokun (1)Electronic fraud by prof godwin oyedokun (1)
Electronic fraud by prof godwin oyedokun (1)
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
Unearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet FraudUnearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet Fraud
Internet Law Center
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
John Hamilton, DAHC,EHC,CFDAI, CPP, PSPO
 

What's hot (19)

Phishing website method
Phishing website methodPhishing website method
Phishing website method
 
Grant Proposal Excerpt Build Your Own NGO
Grant Proposal Excerpt Build Your Own NGOGrant Proposal Excerpt Build Your Own NGO
Grant Proposal Excerpt Build Your Own NGO
 
Phishing
PhishingPhishing
Phishing
 
Causes of soco economic crimes or white collar crimes
Causes of soco economic crimes or white collar crimesCauses of soco economic crimes or white collar crimes
Causes of soco economic crimes or white collar crimes
 
Scams and-fraud-presentation
Scams and-fraud-presentationScams and-fraud-presentation
Scams and-fraud-presentation
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theft
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 
01.fnc free seminar (public) new
01.fnc free seminar (public) new01.fnc free seminar (public) new
01.fnc free seminar (public) new
 
ID Theft
ID TheftID Theft
ID Theft
 
Phishing in China
Phishing in ChinaPhishing in China
Phishing in China
 
Android mobile platform security and malware
Android mobile platform security and malwareAndroid mobile platform security and malware
Android mobile platform security and malware
 
CBSV%20INFORMATION[1]
CBSV%20INFORMATION[1]CBSV%20INFORMATION[1]
CBSV%20INFORMATION[1]
 
PREVENTING ID THEFT GUIDE FOR CONSUMERS
PREVENTING ID THEFT GUIDE FOR CONSUMERSPREVENTING ID THEFT GUIDE FOR CONSUMERS
PREVENTING ID THEFT GUIDE FOR CONSUMERS
 
Electronic fraud by prof godwin oyedokun (1)
Electronic fraud by prof godwin oyedokun (1)Electronic fraud by prof godwin oyedokun (1)
Electronic fraud by prof godwin oyedokun (1)
 
Unearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet FraudUnearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet Fraud
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 

Similar to Prostitution and cyber insecurity in cameroon

Forensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in CameroonForensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in Cameroon
SARON MESSEMBE OBIA
 
Research Article
Research ArticleResearch Article
Research Article
Tabo Sokhowa
 
Essays On Cyber Crime
Essays On Cyber CrimeEssays On Cyber Crime
Essays On Cyber Crime
Best Online Paper Writing Service
 
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docx
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docxTECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docx
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docx
erlindaw
 
New microsoft office word document (3)
New microsoft office word document (3)New microsoft office word document (3)
New microsoft office word document (3)
Priyatham Kanigarla
 
Risk analytics to fight fraud - cio applications europe
Risk analytics to fight fraud  - cio applications europeRisk analytics to fight fraud  - cio applications europe
Risk analytics to fight fraud - cio applications europe
Freelancing
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
praveen1792
 
Delincuencia Cibernética- Inglés
Delincuencia Cibernética- InglésDelincuencia Cibernética- Inglés
Delincuencia Cibernética- Inglés
Gim Andrade Vidal
 
Cybercrime in Iraq
Cybercrime in IraqCybercrime in Iraq
Cybercrime in Iraq
Ayub Nuri
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social Decline
IRJET Journal
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Rohit Revo
 
cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdf
gaherwarsaloni1234
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
DINESH KAMBLE
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
vichu19891
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
amani kadope
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
Jody Sullivan
 
comm16en01_dafc4
comm16en01_dafc4comm16en01_dafc4
comm16en01_dafc4
Filip Stojkovski
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
BadarHossain
 
An Exploratory Study On Causes Of Identity Document Theft In South Africa
An Exploratory Study On Causes Of Identity Document Theft In South AfricaAn Exploratory Study On Causes Of Identity Document Theft In South Africa
An Exploratory Study On Causes Of Identity Document Theft In South Africa
Tracy Morgan
 

Similar to Prostitution and cyber insecurity in cameroon (20)

Forensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in CameroonForensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in Cameroon
 
Research Article
Research ArticleResearch Article
Research Article
 
Essays On Cyber Crime
Essays On Cyber CrimeEssays On Cyber Crime
Essays On Cyber Crime
 
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docx
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docxTECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docx
TECH CYBER CRIME Homegrown menace Contents1. Regional trouble.docx
 
New microsoft office word document (3)
New microsoft office word document (3)New microsoft office word document (3)
New microsoft office word document (3)
 
Risk analytics to fight fraud - cio applications europe
Risk analytics to fight fraud  - cio applications europeRisk analytics to fight fraud  - cio applications europe
Risk analytics to fight fraud - cio applications europe
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Delincuencia Cibernética- Inglés
Delincuencia Cibernética- InglésDelincuencia Cibernética- Inglés
Delincuencia Cibernética- Inglés
 
Cybercrime in Iraq
Cybercrime in IraqCybercrime in Iraq
Cybercrime in Iraq
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social Decline
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
 
cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdf
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
comm16en01_dafc4
comm16en01_dafc4comm16en01_dafc4
comm16en01_dafc4
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
An Exploratory Study On Causes Of Identity Document Theft In South Africa
An Exploratory Study On Causes Of Identity Document Theft In South AfricaAn Exploratory Study On Causes Of Identity Document Theft In South Africa
An Exploratory Study On Causes Of Identity Document Theft In South Africa
 

More from SARON MESSEMBE OBIA

Terrorisme et sécessionnismes les enjeux des opérateurs de téléphonie Mobile...
Terrorisme et sécessionnismes  les enjeux des opérateurs de téléphonie Mobile...Terrorisme et sécessionnismes  les enjeux des opérateurs de téléphonie Mobile...
Terrorisme et sécessionnismes les enjeux des opérateurs de téléphonie Mobile...
SARON MESSEMBE OBIA
 
Jihad and just war a religious game
Jihad and just war a religious gameJihad and just war a religious game
Jihad and just war a religious game
SARON MESSEMBE OBIA
 
When time calls
When time callsWhen time calls
When time calls
SARON MESSEMBE OBIA
 
The transfiguration of Africa
The transfiguration of AfricaThe transfiguration of Africa
The transfiguration of Africa
SARON MESSEMBE OBIA
 
Why i hail my enemies
Why i hail my enemiesWhy i hail my enemies
Why i hail my enemies
SARON MESSEMBE OBIA
 
Above poverty
Above povertyAbove poverty
Above poverty
SARON MESSEMBE OBIA
 
The battle
The battleThe battle
Pick the coin
Pick the coinPick the coin
Pick the coin
SARON MESSEMBE OBIA
 
The crusade
The crusadeThe crusade
The crusade
SARON MESSEMBE OBIA
 
The saron messembe conflict theory
The saron messembe conflict theoryThe saron messembe conflict theory
The saron messembe conflict theory
SARON MESSEMBE OBIA
 
Spy glass
Spy glassSpy glass
Divorce
DivorceDivorce
Understanding boko haram in nigeria
Understanding boko haram in nigeriaUnderstanding boko haram in nigeria
Understanding boko haram in nigeria
SARON MESSEMBE OBIA
 
The only pen
The only penThe only pen
The only pen
SARON MESSEMBE OBIA
 
African union transition and its ability to respond to conflicts in africa
African union transition and its ability to respond to conflicts in africaAfrican union transition and its ability to respond to conflicts in africa
African union transition and its ability to respond to conflicts in africa
SARON MESSEMBE OBIA
 
Pan africanism why
Pan africanism whyPan africanism why
Pan africanism why
SARON MESSEMBE OBIA
 
My chibok sister
My chibok sisterMy chibok sister
My chibok sister
SARON MESSEMBE OBIA
 
Muslim Ideology: Terrorism And Insurgency
Muslim Ideology: Terrorism And InsurgencyMuslim Ideology: Terrorism And Insurgency
Muslim Ideology: Terrorism And Insurgency
SARON MESSEMBE OBIA
 
International terrorism scope, causes and the role of education in combating ...
International terrorism scope, causes and the role of education in combating ...International terrorism scope, causes and the role of education in combating ...
International terrorism scope, causes and the role of education in combating ...
SARON MESSEMBE OBIA
 
Terrorism on the African continent: The case of Cameroon
Terrorism on the African continent: The case of CameroonTerrorism on the African continent: The case of Cameroon
Terrorism on the African continent: The case of Cameroon
SARON MESSEMBE OBIA
 

More from SARON MESSEMBE OBIA (20)

Terrorisme et sécessionnismes les enjeux des opérateurs de téléphonie Mobile...
Terrorisme et sécessionnismes  les enjeux des opérateurs de téléphonie Mobile...Terrorisme et sécessionnismes  les enjeux des opérateurs de téléphonie Mobile...
Terrorisme et sécessionnismes les enjeux des opérateurs de téléphonie Mobile...
 
Jihad and just war a religious game
Jihad and just war a religious gameJihad and just war a religious game
Jihad and just war a religious game
 
When time calls
When time callsWhen time calls
When time calls
 
The transfiguration of Africa
The transfiguration of AfricaThe transfiguration of Africa
The transfiguration of Africa
 
Why i hail my enemies
Why i hail my enemiesWhy i hail my enemies
Why i hail my enemies
 
Above poverty
Above povertyAbove poverty
Above poverty
 
The battle
The battleThe battle
The battle
 
Pick the coin
Pick the coinPick the coin
Pick the coin
 
The crusade
The crusadeThe crusade
The crusade
 
The saron messembe conflict theory
The saron messembe conflict theoryThe saron messembe conflict theory
The saron messembe conflict theory
 
Spy glass
Spy glassSpy glass
Spy glass
 
Divorce
DivorceDivorce
Divorce
 
Understanding boko haram in nigeria
Understanding boko haram in nigeriaUnderstanding boko haram in nigeria
Understanding boko haram in nigeria
 
The only pen
The only penThe only pen
The only pen
 
African union transition and its ability to respond to conflicts in africa
African union transition and its ability to respond to conflicts in africaAfrican union transition and its ability to respond to conflicts in africa
African union transition and its ability to respond to conflicts in africa
 
Pan africanism why
Pan africanism whyPan africanism why
Pan africanism why
 
My chibok sister
My chibok sisterMy chibok sister
My chibok sister
 
Muslim Ideology: Terrorism And Insurgency
Muslim Ideology: Terrorism And InsurgencyMuslim Ideology: Terrorism And Insurgency
Muslim Ideology: Terrorism And Insurgency
 
International terrorism scope, causes and the role of education in combating ...
International terrorism scope, causes and the role of education in combating ...International terrorism scope, causes and the role of education in combating ...
International terrorism scope, causes and the role of education in combating ...
 
Terrorism on the African continent: The case of Cameroon
Terrorism on the African continent: The case of CameroonTerrorism on the African continent: The case of Cameroon
Terrorism on the African continent: The case of Cameroon
 

Recently uploaded

Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 

Recently uploaded (20)

Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 

Prostitution and cyber insecurity in cameroon

  • 1. Page | 1 Prostitution and Cyber Insecurity in Cameroon By Saron M. Obia Abstract -The increasing nature of prostitution have been linked to cyber insecurity in Cameroon. Though legislation's exist for such crimes, the network of prostitution and cybercrime continues to increase at a geometric rate. The quest for profit by mobile operating companies have increased, as well as the rate of vulnerability due to poor security measures and staff dishonesty in financial institutions. Keywords: Prostitution, Cybercrime, Hacking. Introduction Prostitution is the act of commercializing oneself for either money or service. Thought legislation's in Cameroon prescribe punishment for prostitution with an amount to be paid and jail sentence, the business still flourishes. Prostitution is one of the largest business in the world, which hires millions of women each hour. In Cameroon, the business has gained ground and some suggest space be given to them during the Labour Day parade, since they have the sex hawkers syndicate. The emergence of new forms of crimes like cybercrime and identity theft has been linked to prostitution in Cameroon. Security in Cameroon is faced with two pertinent questions in regards to cyber insecurity; who is a prostitute? What is the role played by prostitutes in cybercrime? The scope of prostitution has increased in Cameroon which is not only limit to street hawkers but also students, workers in mobile operating companies and airtime vendors. Cyber Insecurity Scenery The term cyber refers to electronic communication network and virtual reality. The problem under discussion is cyber insecurity which constitute; scamming, phishing, skimming and hacking just to name a few. According to Law No 2010/012 of 21 December 2010 relating to cyber security and cyber criminality in Cameroon, cybercrime is defined as an illegal activity related to the internet world or cyberspace committed by an individual or group of persons for financial motives. The have been recent acronyms adopted by criminals like Ngues, machine
  • 2. Page | 2 man, dak just to name a few. Identity theft also known as identity fraud is a strategy used by individuals to steal data that defines a person. In Cameroon, such activities are oriented on skimming and the use of the sim box. According to Arora et al (2012), there exist a vicious circle on the latter. The role of prostitutes in cybercrime in Cameroon is mapped as follows; hacking of accounts and skimming, identity theft on mobile money and offensive content, harassment and drugs. The role of prostitutes in cyber insecurity in Cameroon The evolution of capitalism has led to increasing level of crimes. Sociologist like Ronald Weitzer pointed out six types of prostitutes in his work titled “Legalizing Prostitution in 2011” which are independent escort, brothel employee, window worker, escort agency employee, casino worker and streetwalker. At this juncture, the role of prostitutes will be examined. 1. Hacking of accounts and skimming 2. Identity theft on mobile money 3. Offensive content, harassment and drugs 1. Hacking of accounts and skimming With the evolution of information and communication technology the pattern of crimes have changed, with prostitutes engaged in organized crimes such as cybercrime and identity theft. The collaboration of prostitutes and cybercriminals is far beyond the definition of cyber criminality. These prostitutes gather credit card information of their clients such as name and credit card number, for accounts to be hacked, some clic with dishonest authorities for security. Moreover, prostitutes engaged in organized crimes get visit cards of their victims which usually contains email, phone numbers, job description, position and order of name for phishing. As such, they contact victims through such mediums, telling him or her the account need to be update, requiring a new password through a form sent through mail. Criminals equally clone credit card and effectuate online transactions. Another pattern is that malicious software are sent to the victim’s mail, when he/she clicks the account is pirated. One of the major reasons for the increasing victimization of Cameroonians and foreigner is due to lack of proper security measures by financial institutions, mobile
  • 3. Page | 3 operation companies and state security agencies which rarely caution the population on the evolution of crimes and also their inadequate training accounts for the high vulnerability rate. 2. Mobile Money Accounts (MMA) There is an adage that “no risk no reward” with the proliferation of mobile operating companies in Cameroon which has made them to engage in banking activities like mobile money. One of the fastest technique to make profit, with little or no security, enhanced by the android generation in Cameroon. Due to its services like fast money transfer, airtime borrowing and payment of bills. Though this is social development, some Pan Africanists perceive mobile money as a strategy of financing terrorism or terrorist organizations. For instance, senders are not sometimes identified. As such, after discussing with a terrorist organization, the can effectuate a mobile money transaction, since the senders name is not required in some of its transactions. Furthermore, the quest for profit by mobile operation companies have reduced the level of security protocols for their clients. For example, during an interview with an agent of a mobile operation company in Cameroon involved in mobile money, she said there is no criteria for selection for agents engaged in the task of identifying sim cards sold at 100 and the registration of airtime vendors which is critical not only to citizens but also to national security. Since most of the works or agents engaged in the task have targets to attain per day, some connive with cybercriminals an identify sim cards with other people’s information. She went ahead to say, some of the agents cooperate with cybercriminals and give valuable information gotten from workers in the company through seduction and they also have a commission. The pattern changes each hour, as some mobile money agents have become part of the game. In areas like Yaounde 2, Soa, and Molyko, Buea, cybercriminals lull some mobile money agents to get information about their victims. Others buy numbers of people from airtime vendors and use to browse due to the poor networking system and cyber security in the country. In an interview with an agent of a mobile operation company offering this service, the lady said the salary for the job is little as compare to the task involved. As such, in the bid to keep to standard with the capitalists system, ladies go extra mile in to prostitution with business clients of the mobile operating companies to get information and sell to criminals.
  • 4. Page | 4 3. Drug, offensive content and harassment Drug, harassment and offensive content are gaining grounds in Cameroon. It has been linked to cybercrime, as criminals keep bullying lecturers, foreigners and stakeholders in the country. In Cameroon foreigners (Bushfallers) are most targeted persons when discussing of drug, offensive content and harassment.Two cases will be explored at this level, first that of a university lecturer of the state and a foreigner which are unreported. Case study 1: Offensive content and harassment of university lecturer Sexual harassment is one of the leading issue in secondary and university milieu. In 2014, a young lady obtain her first degree in a state university, when the lecturer who was harassing her had his naked pictures with some suspected criminals working with the girl blackmailing the latter to pay a certain amount and she must have the first degree if not he will be exposed and pictures published in all social platforms. The lecturer was faced with a huge challenge, first that of offensive content and harassment then extortion. Though the act committed by the lecturer is punishable, it’s still rampant in the academic milieu and as well the young lady can be imprisoned for extortion as per section 318 of the Cameroon Penal code. But she obtained the first degree and left to do her master’s in a private university in the country. Case study 2: Drug and harassment of foreigners (Bushfaller) The industrial revolution revolutionized the world, as thing that were done by hand were now produce or made by machine. Some Africans consider the West as utopia. As such, any person from the West is like a semi god in Cameroon. But criminals collaborate with young ladies from universities and secondary schools to drug this foreigners (Bushfallers) to take their passport and other documents and start harassing them to pay huge sums of money in order to recover their documents or they will burn it into ashes. This case is rampant with guys from the U.S and other European countries. During this period, they use phone boot (call box) for security purposes. Also, they collaborate with some dishonest staffs (back up or pick-up) of financial institutions to receive the money. It will be recalled that, though the is legislation which deals with illicit drug trafficking, offensive content and harassment, these crimes keep increasing at a geometric rate in Cameroon because of negligence and lack of cooperation.
  • 5. Page | 5 Conclusion The complexity of cybercrime, requires adequate knowledge and expertise to crackdown criminals. It should be noted that one of the major issue with cyber insecurity in Cameroon is prostitution. The lack of collaboration among stakeholders, mobile operating companies, financial institutions and security experts accounts for cyber insecurity in the country. As such, the Cameroon government should introduce cyber security as a course in the police academy, so as to educate them on the changing patterns and gadgets used by cybercriminals and identity thieves in Cameroon. Also, mobile operating companies should step up the security for their clients rather than only focusing on profit. For there is a say that the client is the king and should be treated as such. References: Arora, S., Bhatt, Ch. & Pant, A. (2012) Forensics Computing-Technology to Combat Cybercrime. Journal of Advanced Research in Computer Science and Software Engineering. Vol 2, Issue 7, July 2012. Pondi, E. (2011) Sexual Harassment and Deontology in the University Milieu. Edition CLE 2011 Prostitution taking over Yaoundé. Cameroonweb, General News of Mon, 13 July 2015. Weitzer, R. (2011) Legalizing Prostitution. From Illicit Vice to Lawful Business