cybercrime and computer misuse cases

31
C C ybercrime ybercrime & & C C omputer omputer M M isuse isuse c c ases ases In Mauritius and African Regions In Mauritius and African Regions Presented by: Group 1 •Ashnee Gunness •Bhavna Nobaub •Ashveen Beechowa •Ashesh Ramjeeawon University of Mauritius LAWS 2100Y Foundations of IT Law Faculty of Law & Management

Upload: ashesh-r

Post on 06-May-2015

14.177 views

Category:

Technology


2 download

DESCRIPTION

An assignment on The cybercrimes and computer misuse in Mauritius.

TRANSCRIPT

CCybercrimeybercrime & & CComputer omputer MMisuse isuse ccasesases

In Mauritius and African RegionsIn Mauritius and African Regions

Presented by: Group 1

•Ashnee Gunness

•Bhavna Nobaub

•Ashveen Beechowa

•Ashesh Ramjeeawon

University of Mauritius

LAWS 2100Y Foundations of IT Law

Faculty of Law & Management

Cybercrime & Computer Misuse cases in Mauritius & African Regions

AAgendagenda

What is What is CybercrimeCybercrime??Mauritian Mauritian CybercriminalsCybercriminalsCases of Computer Misuse in MauritiusCases of Computer Misuse in MauritiusCybercrimesCybercrimes in African Regionsin African RegionsLegislations in African RegionsLegislations in African RegionsFighting off the Fighting off the CybercrimalsCybercrimals in Mauritius in Mauritius –– the the ChallengeChallenge

Cyber crime Unit (Cyber crime Unit (MtiusMtius))CERTCERT--MUMU

Cybercrime & Computer Misuse cases in Mauritius & African Regions

WWhat hat iis s CCybercrimeybercrime??

An attack that undermines the confidentiality, integrity An attack that undermines the confidentiality, integrity or availability of a computer, information resident on it, or availability of a computer, information resident on it, or a computer service within a Network Information or a computer service within a Network Information System.System.Some offences under Computer Misuse and Some offences under Computer Misuse and CybercrimeCybercrime Act 2003:Act 2003:Unauthorised access to dataUnauthorised access to dataAccess with intent to commit offencesAccess with intent to commit offencesUnauthorised access to and interception of computer Unauthorised access to and interception of computer serviceserviceDamaging or denying access to computer systemDamaging or denying access to computer system

Cybercrime & Computer Misuse cases in Mauritius & African Regions

Mauritian Mauritian CybercriminalsCybercriminals

Cybercrime & Computer Misuse cases in Mauritius & African Regions

DDo you o you RRecognise the ecognise the FFace?ace?

Cybercrime & Computer Misuse cases in Mauritius & African Regions

CCyberCriminalyberCriminal 11

VishalVishal RamessurRamessur –– 32 years old32 years oldFirst Mauritian Hacker involved in theFirst Mauritian Hacker involved in the‘‘sabotage of internet connectionsabotage of internet connection’’ in 2005in 2005Violation of section 7 (b) of Violation of section 7 (b) of Computer misuse and Computer misuse and cybercrimecybercrime Act de 2003 :Act de 2003 :““a denial of access to, or impairment of any program or a denial of access to, or impairment of any program or data stored in, the computer systemdata stored in, the computer system””Shall commit an offence and shall, on conviction be Shall commit an offence and shall, on conviction be liable to a fine not exceeding 200, 000 and to penal liable to a fine not exceeding 200, 000 and to penal service not exceeding 20 yearsservice not exceeding 20 years

Source: http://www.lexpress.mu/display_search_result.php?news_id=38637

Cybercrime & Computer Misuse cases in Mauritius & African Regions

DDoes this oes this NName tell you anything?ame tell you anything?

BoodenBooden ((VinayVinay) ) RamrichiaRamrichia

Cybercrime & Computer Misuse cases in Mauritius & African Regions

CCyberCriminalyberCriminal 22

BoodenBooden ((VinayVinay) ) RamrichiaRamrichia --un pirate un pirate informatiqueinformatique dudu site site de de ll’’EtatEtatun un clercclerc dudu CISD de 28 CISD de 28 ansanspoursuivipoursuivi en en courcour interminterméédiairediaire20 20 maimai 2005 2005 -- tentativestentatives pour pour bloquerbloquer ll’’accaccèèss àà deuxdeux des des principauxprincipaux serveursserveurs dudu systsystèèmemeDansDans sasa ddéépositionposition àà la police, la police, ilil avoueavoueMaisMais la magistrate la magistrate AdilaAdila HamuthHamuth éécritcrit : : ““Il a Il a ééttéé clairementclairementconvenuconvenu, la , la foisfois dernidernièèrere, , queque le le procprocèèss devaitdevait êtreêtre ddééjjàà loglogéé. . CetteCette affaire a affaire a tratraîînnéé et la et la poursuitepoursuite nn’’aa pupu expliquerexpliquer pourquoipourquoill’’affaireaffaire nn’’aa pas pas ééttéé instruiteinstruite. . DansDans les les circonstancescirconstances, la charge , la charge provisoireprovisoire estest rayrayééee

Source: http://www.lexpress.mu/display_search_result.php?news_id=90200

Cybercrime & Computer Misuse cases in Mauritius & African Regions

DDo you o you RRecognise this ecognise this CCybercrimeybercrime??

Cybercrime & Computer Misuse cases in Mauritius & African Regions

CComputeromputer MMisuse isuse --PPhishinghishing in in MM’’tiustius

26 26 septembreseptembre 2004, 2004, KovalenKovalen, 14 , 14 ansans, , éétudianttudiant duducollcollèègege St Esprit, St Esprit, atteintatteint dd’’uneune maladiemaladie incurable incurable –– la la maladiemaladie de de CreutzCreutz--feldtfeldt--JakobJakob. . ll’’adolescentadolescent peutpeut êtreêtre sauvsauvéé, , maismais commecomme ilil vientvient dd’’uneunefamillefamille modestemodeste, , ilil nn’’aa pas les pas les moyensmoyens de se faire de se faire soignersoigner! ! IlsIls lancentlancent un un appelappel àà la la ggéénnéérositrositéé : : «« DonnezDonnez RsRs 1, 1, RsRs5 5 ouou mêmemême RsRs 100. 100. AidezAidez cetcet enfant enfant àà vivre plus vivre plus longtempslongtemps, , chacunchacun a le a le droitdroit de vivre, de vivre, pourquoipourquoi pas pas luilui ? ? PlusieursPlusieurs associations associations dontdont la Croix Rouge, Amnesty la Croix Rouge, Amnesty International International participentparticipent àà cetcet éélan de lan de solidaritsolidaritéé. . »»

Source:http://www.lexpress.mu/display_search_result.php?news_id=52226

Cybercrime & Computer Misuse cases in Mauritius & African Regions

Cybercrime & Computer Misuse cases in Mauritius & African Regions

Important Security Announcement To Internet Important Security Announcement To Internet Banking(IBBanking(IB) Customers) Customers PortPort--Louis,Louis, 21st21st January 2008January 2008

Cybercrime & Computer Misuse cases in Mauritius & African Regions

CComputer omputer MMisuseisuse

May 2008May 2008-- Three Cases lodged by the Mauritius Three Cases lodged by the Mauritius TelecomTelecomforeigners have introduced a system with the foreigners have introduced a system with the help of switches and other apparatus to divert help of switches and other apparatus to divert international calls coming from abroad.international calls coming from abroad.Diverting the gateway of MT is a criminal Diverting the gateway of MT is a criminal offence.offence.This has led to the loss of huge amount of This has led to the loss of huge amount of money for MT.money for MT.

Cybercrime & Computer Misuse cases in Mauritius & African Regions

CComputer omputer MMisuse (isuse (ctnuedctnued..)..)

The Information Communication Technologies Act 2001:The Information Communication Technologies Act 2001:--under section 46 offencesunder section 46 offences(j) By means of an apparatus or device connected to an (j) By means of an apparatus or device connected to an installation maintained or operated by a licenseeinstallation maintained or operated by a licensee--(i) defrauds the licensee of any fee or charge properly payable (i) defrauds the licensee of any fee or charge properly payable for for the use of a service; causes the licensee to provide a service tthe use of a service; causes the licensee to provide a service to o some other person without payment by such other person of the some other person without payment by such other person of the appropriate fee or charge; or fraudulently installs or causes toappropriate fee or charge; or fraudulently installs or causes to be be installed an access to a telecommunication line;installed an access to a telecommunication line;PenaltiesPenalties(1) Any person who commits an offence under this Act shall, on (1) Any person who commits an offence under this Act shall, on conviction, be liable to a fine not exceeding 1,000,000 rupees aconviction, be liable to a fine not exceeding 1,000,000 rupees and nd to imprisonment for a term not exceeding 5 yearsto imprisonment for a term not exceeding 5 years

Cybercrime & Computer Misuse cases in Mauritius & African Regions

CybercrimesCybercrimes in African Regionsin African RegionsLegislations in African RegionsLegislations in African Regions

Cybercrime & Computer Misuse cases in Mauritius & African Regions

African RegionsAfrican Regions

1. Nigeria1. Nigeria

Cybercrime & Computer Misuse cases in Mauritius & African Regions

CCybercrimeybercrime –– Nigerian 419Nigerian 419

Nigerian 419 scam stole the most money off Internet. Nigerian 419 scam stole the most money off Internet. Americans reported losing an allAmericans reported losing an all--time high of $183 time high of $183 million to Internet fraud in 2005, up 169 percent from million to Internet fraud in 2005, up 169 percent from $68 million in 2004. $68 million in 2004.

ReferedRefered to as "Advance Fee Fraud" or "419 Fraud" to as "Advance Fee Fraud" or "419 Fraud"

The Scam operates as follows: the target receives an The Scam operates as follows: the target receives an unsolicited fax, email, or letter often concerning Nigeria unsolicited fax, email, or letter often concerning Nigeria or another African nationor another African nation containing either a money containing either a money laundering or other illegal proposal laundering or other illegal proposal

Cybercrime & Computer Misuse cases in Mauritius & African Regions

Cybercrime & Computer Misuse cases in Mauritius & African Regions

African RegionsAfrican Regions

2. South Africa2. South Africa

Cybercrime & Computer Misuse cases in Mauritius & African Regions

CCybercrimesybercrimes --SSouth outh AAfricafrica

Credit card "cloning" and eCredit card "cloning" and e--mail scams mail scams Windows Windows SinowalSinowal Trojan Trojan --500 000 online bank 500 000 online bank accounts and affected several thousands credit accounts and affected several thousands credit cards in Nigeria, South Africa cards in Nigeria, South Africa

Cybercrime & Computer Misuse cases in Mauritius & African Regions

African RegionsAfrican Regions

3. Ghana3. Ghana

Cybercrime & Computer Misuse cases in Mauritius & African Regions

CCybercrimeybercrime -- GhanaGhana

Many Ghanaians perpetrate credit card fraud. Many Ghanaians perpetrate credit card fraud. The most typical example is a group in The most typical example is a group in NimaNima, called , called ''SakawaSakawa'. This group is alleged to be selling stolen credit '. This group is alleged to be selling stolen credit cards numbers as well as using same to order for cards numbers as well as using same to order for products from the United States and Europe. products from the United States and Europe.

These scammers buy or steal credit card and These scammers buy or steal credit card and verification numbers from hotel employees and cashiers verification numbers from hotel employees and cashiers of super markets, either in the country or from abroad. of super markets, either in the country or from abroad.

Cybercrime & Computer Misuse cases in Mauritius & African Regions

LLegislations in egislations in AAfrican regionsfrican regions

Electronic Communications and Transactions Act (ECT). Electronic Communications and Transactions Act (ECT). Hacking been entrenched in our law in s86 (1) of the ECT, Hacking been entrenched in our law in s86 (1) of the ECT, which makes any unlawful access and interception of data a which makes any unlawful access and interception of data a criminal offence.criminal offence.The ECT has now created The ECT has now created ““CyberCyber--InspectorsInspectors”” who, with the who, with the authority of a warrant, may enter any premises or access authority of a warrant, may enter any premises or access information that has a bearing on an investigation (into possiblinformation that has a bearing on an investigation (into possible e cyber crime) cyber crime) Cyber InspectorsCyber Inspectors are empowered to access and inspect the are empowered to access and inspect the operation of any computer or equipment forming part of an operation of any computer or equipment forming part of an information systeminformation system-- used or suspected to have been used in an used or suspected to have been used in an offenceoffence-- and require any person in control of, or otherwise and require any person in control of, or otherwise involved with the operation of a computer to provide reasonable involved with the operation of a computer to provide reasonable technical assistance. technical assistance.

Cybercrime & Computer Misuse cases in Mauritius & African Regions

Fighting off the Fighting off the cybercrimalscybercrimals in in Mauritius Mauritius –– the Challengethe Challenge

Cybercrime & Computer Misuse cases in Mauritius & African Regions

Cyber Crime Cyber Crime Unit(MUnit(M’’tiustius))

Created in 2000Created in 2000Takes into consideration:Takes into consideration:

Data Protection Act 2000Data Protection Act 2000Information and Communication Technology Act 2001Information and Communication Technology Act 2001Computer Misuse and Cyber Crime Act 2003 Computer Misuse and Cyber Crime Act 2003

Pour Pour apprendreapprendre àà collectercollecter des des preuvespreuves plus plus correctementcorrectement, la force , la force policipolicièèrere a a envoyenvoyéé 21 21 policierspolicierssuivresuivre uneune formation. formation. CelleCelle--cici éétaittait dispensdispensééee par le par le ddéépartementpartement AntiAnti--Terrorism Assistance (ATA) Terrorism Assistance (ATA) Le Le courscours éétaittait dispensdispenséé par par quatrequatre experts experts amamééricainsricains de de ll’’ATAATA. .

Cybercrime & Computer Misuse cases in Mauritius & African Regions

Les agents de Les agents de ll’’ordreordre locauxlocaux ontont ainsiainsi apprisappris comment comment ppéénnéétrertrer sursur les les lieuxlieux dd’’un crime.un crime.

Par Par exempleexemple, , lorsquelorsque la police la police ddéébarquebarque chez un chez un individuindividu soupsoupççonnonnéé de de fabriquerfabriquer des faux billets de des faux billets de banquebanque, la premi, la premièère chose re chose àà examiner sera le clavier de examiner sera le clavier de ll’’ordinateurordinateur. Et . Et avantavant queque cetcet ordinateurordinateur nene soitsoitddéébranchbranchéé, les , les enquêteursenquêteurs tenteronttenteront de de collectercollecter le le maximum maximum dd’’informationsinformations sursur le le disquedisque durdur. . EnsuiteEnsuite, , chaquechaque pipièèce, ce, composantcomposant de de ll’’ordinateurordinateur, sera , sera soigneusementsoigneusement rangrangééee dansdans un sac un sac statiquestatique (sac (sac spspéécifiquecifique pour pour protprotéégerger les les appareilsappareils informatiquesinformatiques) et ) et les articles les articles saisissaisis conservconservééss dansdans uneune sallesalle climatisclimatisééee..

Cybercrime & Computer Misuse cases in Mauritius & African Regions

Les Les deuxdeux sections sections directementdirectement liliééeses, , concernconcernééeses par le par le cybercrimecybercrime sontsont ll’’InformationInformation Technology (IT) de la Technology (IT) de la police police –– placplacééee soussous la la responsabilitresponsabilitéé dudu sergentsergentBalgobinBalgobin –– et la et la CybercrimeCybercrime Unit Unit soussous le le commandementcommandement dudu sergentsergent TanyTany..

ParmiParmi les 21 participants les 21 participants àà cettecette formation en formation en cybercrimecybercrime, on note la , on note la prpréésencesence de de policierspoliciers de de ll’’InformationInformation Technology, Technology, dudu Central Criminal Central Criminal Investigation Department, de la Criminal Investigation Investigation Department, de la Criminal Investigation Division, de la Major Crimes Investigation Team et de Division, de la Major Crimes Investigation Team et de la Police Training School. la Police Training School.

Cybercrime & Computer Misuse cases in Mauritius & African Regions

CCERTERT--MUMU

Mauritian Computer Emergency Response Team Mauritian Computer Emergency Response Team (CERT(CERT--MU)MU)Fully Operational since 16 May 2008Fully Operational since 16 May 2008Incident reporting, Security alerts, Awareness Incident reporting, Security alerts, Awareness ProgrammesProgrammesMission: To enhance the security of Mauritius Mission: To enhance the security of Mauritius information and communications infrastructure information and communications infrastructure through effective collaboration and communication through effective collaboration and communication with all stakeholderswith all stakeholders

Cybercrime & Computer Misuse cases in Mauritius & African Regions

CCERTERT--MUMUURL: URL: http://certhttp://cert--mu.org.mumu.org.muEmail: Email: info@[email protected] Free: 800 2378 ( 8.45 am to 4.00 pm)Toll Free: 800 2378 ( 8.45 am to 4.00 pm)

Cybercrime & Computer Misuse cases in Mauritius & African Regions

RReferenceseferences

NCB websiteNCB websiteCyber crime unit Cyber crime unit LexpressLexpressDefimedia.infoDefimedia.infoUoMUoM Library Law SectionLibrary Law Section

Cybercrime & Computer Misuse cases in Mauritius & African Regions

TThank hank YYou for your kind attention!ou for your kind attention!