cybercrimes in tanzania
TRANSCRIPT
1
TABLE OF CONTENTS
Certification.............................................................................................................................................i
Declaration..............................................................................................................................................ii
Copyright................................................................................................................................................iii
Acknowledgement.................................................................................................................................iv
Dedication...............................................................................................................................................v
Abstract..................................................................................................................................................vi
CHAPTER ONE.........................................................................................................................................1
1.0 Introduction..................................................................................................................................1
1.1 Background to the Problem..........................................................................................................2
1.2 Statement to the Problem............................................................................................................5
1.3 Objectives of the Study.................................................................................................................6
1.4 Significance of the Study...............................................................................................................7
1.5 Literature Review..........................................................................................................................7
1.6 Hypothesis of the Study................................................................................................................9
1.7 The Scope of the Study.................................................................................................................9
1.8 Research Methodology...............................................................................................................9
CHAPTER TWO......................................................................................................................................11
2.1 Introduction................................................................................................................................11
2.2 Cybercrimes, Criminals and the Need for Specific Laws.............................................................11
2.2.1 Law and Computer Technology...............................................................................................12
2.2.2 Cybercrimes and Criminals......................................................................................................12
2.3 THE INTERNATIONAL CRIMINAL LAW REFORM IN COMBATING CYBERCRIMES........................13
2.3.1 The United Nations...........................................................................................................13
2.4 THE AFRICAN AND REGIONAL CRIMINAL LAW REFORM IN COMBATING CYBBERCRIMES.........15
2.4.1 The African Union.............................................................................................................15
2.4.2 The East African Community.............................................................................................16
2
2.5 THE EFFORTS TAKEN BY INDIVIDUAL EAST AFRICAN COUNTRIES IN ADOPTING CYBER LAWS AND COMBATING CYBERCRIMES..........................................................................................................17
2.5.1 Kenya................................................................................................................................18
2.5.2 Uganda..............................................................................................................................18
2.5.2 Tanzania...........................................................................................................................18
CHAPTER THREE....................................................................................................................................20
3.1 Introduction................................................................................................................................20
3.2 Evidence.....................................................................................................................................20
3.3 Digital Evidence and Cybercrimes..............................................................................................21
3.4 The Nature of Electronic Evidence.............................................................................................23
3.5 Challenges brought by Electronic/Digital Evidence....................................................................25
3.5.1 Authentication.................................................................................................................25
3.5.2 Integrity............................................................................................................................27
3.5.3 Confidentiality..................................................................................................................28
3.6 Relevancy and Admissibility of Digital Evidence in Tanzanian Courts.......................................28
CHAPTER FOUR.....................................................................................................................................32
4.1 Introduction.................................................................................................................................32
4.2 Conclusion....................................................................................................................................32
4.3 Recommendations.......................................................................................................................32
4.3.1 The Need to Enacting Cyber laws.....................................................................................33
4.3.2Training of Judges, Lawyers and Law Enforcers................................................................34
4.3.3 Judicial Response............................................................................................................34
4.3.4 Raising Public Awareness and Education........................................................................35
4.3.5 The Need for firms to secure their Networked Information...........................................35
4.3.6 Coordination and Cooperation........................................................................................35
Bibliography.............................................................................................................................36
3
CERTIFICATION
The undersigned certify that has read and hereby recommends and approve for acceptance by
the Faculty of Law of Tumaini University – Makumira, a Research paper titled “AN
ASSESSMENT OF LEGAL SYSTEM IN RELATION TO THE INCREASING RATES OF
CYBER CRIMES IN TANZANIA ” in partial fulfilment of requirement for the award of the
bachelor of laws degree of Tumaini University-Makumira, Arusha.
4
DECLARATION AND SUPERVISION
I, Fikiri Liganga, do hereby declare that this research paper is my own original work and has
not been presented in any University in full or partial fulfilment of academic requirement for
any degree or equivalent.
Signed at Arusha this.........day of .........2012
Signature.......................
Fikiri Liganga
This research paper was supervised by Frank Akyoo, Lecturer, Faculty of Law, Tumaini
University-Makumira.
I have read this paper and approve it for final marking.
Signature...............
F. Akyoo
Date..................
5
COPYRIGHT
All rights reserved. This research work is a copyright material protected under the Berne
Convention, the Copyright and Neighbouring Rights Act, Cap 218 R.E. 2002 and other
International and National enactments in that behalf, written on intellectual property. No part
of this work may be reproduced, stored in any retrieval system, or transmitted in any form
by any means, electronic, mechanical, photocopying, recording or otherwise without prior
written permission of the researcher or The Faculty of Law of Tumaini University-Makumira
in that behalf.
All rights reserved © 2012
6
ACKNOWLEDGEMENT
One person who hands without assistance and contribution from other people cannot do as a
hard work as this research would seem to be. Many people have contributed in accomplishing
this research. Few of them are mentioned but all who accompanied me in one way or another
are regarded and their assistance is of vital role in doing this research.
I would first of all thank my Heavenly Father for his close presence to me since I was born to
date and be with me ever since I set my feet at Tumaini University-Makumira.
I would like also to thank my family for their moral and financial support during my studies. I
would like to thank my parents in a very special way for their courage and prayer throughout
my lifetime and during my studies at this Institution. It is hard to pay them back but I pray
they are blessed by the Almighty God.
Special thanks to my supervisor, Mr. Frank Akyoo for his kind supervision, fatherly heart and
material support in accomplishment of this research. Also his guidance and criticism played a
vital role for this research to be presentable.
I also appreciate the contribution of Dean, Faculty of Law, Tumaini University - Makumira
for his support and courage. Special thanks to my roommates; Daniel D. Sanka, Gabriel
Wansato and Dennis Ngutu for their moral support and criticism to this research.
Finally, I would like to express my appreciation to my fellow third year students, Faculty of
Law at Tumaini University, Makumira (2012) for their cooperation throughout three years of
studying. I wish them all the best.
7
DEDICATION
This work is dedicated to my family, my precious parents Zubeda Rashidi Kunamba and Dr.
Ntauka, my lovely sister Fatima Faraji, my elder brother Abillahi Omari and my lovely
younger brother Ninde Liganga.
Their Love, Labour and Courage are untold.
8
ABSTRACT
The ICT revolution is shaping our world in ways it has been difficult to predict and to
appreciate. The remarkable achievements in the Information and Communication
Technology (ICT) sector is really a matter of pride in Tanzania and the world as a whole, but
cybercrime, as its associated problem, is causing serious concern. Cybercrime, also known as
‘Internet crime’ or ‘computer crime’, is a modern crime, which is growing and expanding at
the highest speed. As a result, incidences of cybercrimes are increasing geometrically
worldwide and Tanzania in particular.
The country’s image has also suffered because of the immoral activities of some Tanzanians
and other foreigners that have now turned ICT technology into a cheap conduit for the
commission of the offences. Few incidences have been reported to the police and few cases
taken to court.
Although, some cases are in court, however, existing laws in Tanzania have not sufficiently
considered the online society in cyberspace. The offences have changed from traditional
crimes to cybercrimes; Evidence has also changed from tangible to intangible. The ways of
prosecuting, collecting, preserving and tendering evidence in court have also changed. This
situation challenges existing traditional laws in Tanzania.
The researcher in this work has digested various issues by making a comparative study with
other jurisdictions that have taken serious measures in addressing cyber issues. In analysing
the issues, the researcher has realised that Tanzanian laws are inadequate to curb cyber
related issues. Finally, the researcher has provided recommendations on the possible
measures to curb the situation.
9
CHAPTER ONE
1.0 INTRODUCTION
The term "cybercrime" is also known as the "computer crime" or "computer-related crime”,
or "high-tech crime." However, they can be used interchangeably. Cybercrime is understood
as "criminal acts committed using electronic communication networks and information
systems or against such networks and systems."1 The term cybercrime is not different from
the concept of conventional crime. Both include conduct which causes breach of rules of law
and counterbalanced by the sanction of the state.2 However, they somehow differ from one
another.
The primary difference is that; cybercrimes operates by using new technology that involves
computer systems in a cyber- culture context.3 This involvement of the computer technology
creates new challenges that require legal systems and legislation be amended.4
Cybercrime is global in character; offenders can take advantage of gaps in existing laws to
avoid apprehension and prosecution. Therefore, in so far as this is concerned, Tanzania needs
to have in place all the necessary legal tools including an arsenal of clearly defined
cybercrime offences for use in prosecuting cyber criminals and procedural rules governing
evidence gathering and investigation.5
Cybercrimes are associated with the use and development of Information Communication
Technology (ICT) which has improved the efficiency and flexibility in providing services and
many organizations are increasingly relying on it, which evidently handles a very critical part
of the organisations’ core services.6 The exponential growth of this technology, the increase
in its capacity and accessibility, and the decrease in its cost, has brought about revolutionary
changes in commerce, communication, entertainment and the rise of a modern crime known
as cyber crime.7
1The cybercrime convention committee, cybercrime and the European Union, 2007 at Pg. 42Rathinasabapathy, G and Rajendran, L, Cyber crimes and information frauds: Challenges for LIS professionals, Butterworths, Lexis 1991 Pg. 132.3Ibid4Bakari, J.K. A Holistic Approach for Managing ICT Security in non Commercial Organization, Doctoral Thesis, Stockholm University Sweden. 2007 Pg. 35Ibid6See note 4 above7Grabosky,P, Cyber crime and Information Warfare; paper presented at the transnational crime conference convened by the Australian Institute of Criminology in association with the Australian Federal Police and Australian customs service, 2000 at Pg. 3
10
This work, therefore, focuses at providing an overview of the recent developments in
Information Communication Technology in Tanzania and its legal impact on domestic laws
and the security of internet users. Furthermore, it provides a critical analysis of the efforts
taken by Tanzania in addressing cyber issues and the challenges it faces so far.
1.1 THE BACKGROUND TO THE PROBLEM
The problem of cybercrime in Tanzanian can be traced far back in 1960s. By that time,
following the need to protect information technologies, the government enacted legislations
to regulate Information Communication Technology (ICT). Examples of these pieces of
legislation include; Post and Telecommunications Corporation Act, the Broadcast Receiving
Apparatus (Licensing) Act,8 and the Tanganyika Broadcasting Corporation (Dissolution)
Act.9
In 1970’s, following the advancement of science and technologies in the world, which was
associated with the massive use of computers, the government foresaw the danger of
information system in the country being affected by such advancement. As a result, the
government banned the importation of computers in the country.10 This mission failed and as
a result several computers were imported. Because of this, the government enacted the Posts
and Telecommunications Corporation Act in 1977 to cope with those changes.
The process continued and it reached the time where the technological changes outpaced the
law regulating Information Communication Technologies (ICT) in the country. In other
words, the laws by that time were not meant to incorporate internet issues. They were indeed
meant to deal with paper-based transactions.
Until now Tanzania does not have specific legislations dealing with cyber laws and most of
the laws that are in place were enacted before cyber security was an issue. Therefore,
statutory laws have remained in yesterday while the society and technology are moving at a
speed of light. This situation contravenes the very purpose of the law and disturbs its
functions in the society as well.
8Act No. 6 of 19649Act no. 11 of 196510The website of Eileen P. Drew and F. Gordon on the Information Technology in Selected Countries: Reports from Ireland, Ethiopia, Nigeria and Tanzania found at http://www.lrct.go.tz/documents/jpurnal.pdf retrieved on the 21st December 2011.
11
It is a known fact that law is a dynamic concept that keeps on changing in keeping pace with
changes in society. Flexibility provides some measure of discretion in law to make it
adaptable to social conditions.11 If law is rigid and unalterable, it may not respond to changes
spontaneously which may lead to resentment and dissatisfaction among the subjects and may
even result in violence or revolution.12
Furthermore, some cases may go unpunished due to the absence of clear and responsive laws.
For example, in early May of 2000, a computer virus known as the "love bug" emerged and
spread rapidly around the globe.13 The virus that was designed to disseminate itself and to
destroy various kinds of files on a victim's computer infected about 270,000 computers and
forced the shutdown of computers at large corporations such as Ford Motor Company and
Dow Chemical Company, as well as the computer system at the House of Lords in the first
hours after it was released.14
If one goes clearly through this particular experience, he will, without hesitation, find that the
challenges, which were posed by “love bug” virus in Philippines is a good lesson for other
countries around the world including Tanzania.
Although, the judiciary in Tanzania has tried in certain instances to resolve the challenges of
ICT; however, it has done this by interpreting and applying the existing statutory and
common law principles in ways and manners that incorporate the existing social realities.15
While the Evidence Act of 1967,16 Penal Code17 and the Criminal Procedure Act,18 remain
operational, developments in such areas as information technology have gone way beyond
what those statutes could have envisaged at the time of their enactment. The advent of the
computer has brought with it new forms of record keeping in software - microfilms,
11Paranjape, N.V. Studies in jurisprudence and Legal theory, Central Law Publications, 2004, Pg.13612Ibid13Abdallah .A, The impact of ICT revolution in Tanzania’s legal system: A critical analysis of cybercrimes and computer forensic evidence. A compulsory research paper submitted in partial fulfilment for the requirement for the degree of master of laws ( LLM) by thesis of the open university of Tanzania, p. 9614Brenner, S.W. Cybercrime investigation and prosecution; the role of Penal and Procedural law . Macmillan Publications, 2001, Pg.215This was stated i the case of Tanzania Cotton Marketing Board v Cogecot Cotton Company SA [1997] TLR No. 16516CAP 6 of the Laws of Tanzania (R.E 200217CAP 16 of the Laws of Tanzania(R.E 2002)18CAP 20 of the Laws of Tanzania (R.E 2002)
12
microchips, diskettes, and flash discs that are not by any means within the former
understanding of the word “document”19 which was a written matter on a surface.
While cybercrimes pose a significant threat to the development of electronic transactions,
Tanzanian laws do not recognize criminal activities on the internet. For example, laws on
consumer protection, sales and supply of goods in Tanzania protect consumers in off-line
business only and do not apply to online businesses especially when it comes to the matter of
distance contracts.
Current laws do not protect consumers against risks involved in the distance selling and
buying business because online or distance contracts were not in practice in Tanzania by the
time these laws were enacted. It is further, noted that, Tanzanian laws neither cover on-line
contracts nor recognize cyber space. The laws provide that; the contract must be in writing
and duly signed or authenticated before a witness.20 This requirement is hardly applicable in
cyber space.
The existing laws facilitate paper –based transactions, which apparently are not applicable to
technological changes that are currently taking place in requirement of an information
society.21 Furthermore, the government and institutions relying on ICT have not
accommodated the increased capacity, efficiency and security risk in ensuring the delivering
of public services at the safe environment.22
The report from the Tanzanian Police Force shows that there is an increase in reported cases
of computer related crimes in the country. A good example is the increase of number of
traders forging receipt of imported goods using computers in order to evade tax. The incident
of theft that occurred at Barclays bank where an organised group of business people stole
US$1.8 million equivalent of 2.4 billions Tanzania shillings using computer technology is a
continuation of computer crimes taking place in Tanzania.23
19The term document is defined under section 3(1) of the Evidence Act 1967 (CAP 6 R.E 2002) to mean; any writing, handwriting, typewriting, printing, Photostat, photograph and every recording upon any tangible thing, any form of communication or representation by letters, figures, marks or symbols or by more than one of these means which may be used for the purpose of recording any matter provided that such recording is reasonably permanent and tangible.20 See note 13 above.21The website of Cyber security in Tanzania- Country report, available at http://www.itu.int/osg/spu/cybersecurity//contributions/tanzania-ulanga-paper- visited on 29th March 2012.22See note 13 at pg. 3923See note 13 above.
13
Although, cybercrime is a worldwide problem, in developed countries such as USA and the
UK, the government and institutions relying on ICT have tried to employ in- house
Computer forensic experts who realise the risks of having an attack before it occurs or before
the security breach and have enacted cyber laws which define clearly cybercrime offences.24
As the industrial revolution rendered obsolete aspects of law based on notions of an agrarian
society, so a legal system focusing on issue of ownership, control and use of physical objects
must reorientate itself to suit the requirement of an information society.25
That has never been done in Tanzania and it remains clear, however, that regulation of ICT in
Tanzania is still at an initial stage, and much needs to be done in the ICT legal framework.
1.2 STATEMENT TO THE PROBLEM
The problem of cybercrimes in Tanzania is, like in many other jurisdictions, increasingly
fatal. As computers have developed in the country, so have also criminal offences associated
with their use. But the laws in Tanzania have never changed to reflect these dangerous
advancements.
The existing traditional penal laws such as the Penal Code26 have nothing to do with the
increasing cybercrimes yet. These traditional laws were not written with the on-line society
with Cyberspace in mind causing the problem of their applicability on cybercrime. It is a
common understanding that the information structure in Cyberspace represents values which
should be protected, also by criminal law measures. But the provisions in existing traditional
criminal laws are still meant to ignore the protection of these values and instead they only
describe qualified unethical behaviours that the societies have decided to be criminal
offences. There is, until now, no specific provision in the penal code which addresses
cybercrime as an offence under the Code.
There are also issues associated with admissibility of electronic evidence. It is clearly known
that in every criminal case, parties are required to tender evidences before the court of law. In
Tanzania, the law regulating the principles of evidence is governed by Evidence Act.27 The
Act provides for the best evidence rule that ‘Documents must be proved by primary evidence
except as otherwise provided in this Act.’28 The term primary evidence is defined under
24Ibid, pg. 4325See note 13 above,at pg. 4526CAP 16 of the Laws of Tanzania (R.E 2002)27CAP 6 of the Laws of Tanzania (R.E 2002)28Section 66 of Evidence Act, CAP 6 of laws R.E 2002.
14
section 64(1) to mean the document itself produced for the inspection of the court. According
to sections 67 and 68,29 secondary evidence may be admitted in court where the original
cannot be found.
From the analysis of the provisions above, it seems that the term ‘evidence’ assumes the
existence of a tangible thing, which under normal circumstances entails a piece of paper. The
ordinary construction given to the term evidence in the Act excludes evidence derived from
electronic transactions. It is thus suited only to a paper-based economy. It can therefore be
correctly stated that the Evidence Act was enacted to govern paper-based transactions. The
Act, however, does not take into account of the electronic evidences as being admissible.
Probably it is because by the time this Act was enacted, the advancement of information
technology was not such high. But the trend has changed since 1990’s and still nothing
exhaustive has been done to the Act to reflect those changes.
1.3 OBJECTIVES OF THE STUDY
In this work, the researcher intends to explore the legal system in relation to the increasing
rate of cybercrimes activities in the country. The researcher has managed to probe into
whether the current legal framework in Tanzania is adequate and sufficient in responding to
the changes in information technology which accelerates cybercrimes in the country.
The specific objectives of this study were;
1.3.1 To examine the extent to which the current legal framework in Tanzania
has achieved in fighting against cybercriminals.
1.3.2 To examine the factors hindering the fight against cybercrimes in
Tanzania.
1.3.3 To propose a suitable legal framework that is responsive to technological
changes with a view to reducing problems associated with cybercrimes in Tanzania.
1.4 SIGNIFICANCE OF THE STUDY
The general study provides a thorough review of the legal framework regulating criminal
matters in the country with a view to determining the extent to which it is responsive to the
advancement of science and technology which introduces new forms of criminal activities.
The gap identified in this study is that; while the changes in information technology
29Ibid
15
associated with the massive use of computers has led to new tactics of criminal activities,
most laws in Tanzania are left behind these changes.
The study presents an argument that without provisions in the existing laws with as much
clarity and specificity as possible, and not relying on vague interpretations of the existing
laws, the problem of cybercrimes will continue to exist. To this end, the protection of
information and communication in Cyberspace will continue being at risk.
1.5 LITERATURE REVIEW
Several writers have, in one way or another, contributed towards addressing the problem
which this researcher intended to work on. Some of these writers are worthy reviewing as
follows hereunder;
Adam Mambi30 in his article shows how most African countries, Tanzania inclusive, lack
effective legal framework to combat cybercrimes. Then the article explores what initiatives
may be taken to tackle cybercriminals in Africa. Lastly, the article shows the possible
obstacles towards the implementation of those initiatives.
Adam Mambi31 in his book further contends that; the Tanzanian legal system is far behind in
adopting regulatory steps to secure electronic transactions. He gives examples of digital
signatures, reforms to business laws, and dispute settlement which have not yet been
promulgated. The book further explores how our laws should be in order for them to be able
to fight against cybercriminal activities in the country.
Andrew Mollel and Zakayo Lukumay32 in their book show that the Tanzanian Evidence Act
does not recognise electronic evidence as being admissible in Tanzanian Courts. They also
show how the problem can be cured, that is by amending some of the provisions of the Act so
that it also takes into account of the electronic evidence. Finally the book outlines the cause
as to why the Tanzanian Evidence Act is in the nature as it stands now.
David I. Bain33 in his book shows how it is difficult to fight against cybercrimes if the
country does not have a specific statute to deal with electronic transactions. He further gives
30`?Adam Mambi, Public Policy, Legal Issues on cyber Security in Africa, Dakar, Senegal, 2009 pg. 1931Adam Mambi, ICT Law Book: A Source book For Information and Communication Technologies and Cyber Law In Tanzania and East African Community, Mkuki na Nyota Publishers: Dar Es Salaam, Tanzania, 2010 pg.13.32Andrew Mollel et el, Electronic Transactions and Law of Evidence in Tanzania, Peramiho Printing Press: Iringa Tanzania, 2007 pg. 1433David I Bainbridge, Introduction to Information Technology Law, 6th Ed. Pearson Education Limited: England, 2008 pg. 417
16
comparative study of the United Kingdom (U.K), where it was after the enactment of the
Computer Misuse Act of 1990 from which cybercrimes were effectively regulated. Prior to
that, cybercrimes had increasing effects in the United Kingdom society.
Dr. Eve Hawa Suinare34 in her article shows the efforts made by the Tanzanian Legal
Framework in fighting against cybercrimes. She gives examples of sections 40, 76 and 78 of
the Tanzanian Evidence Act which were amended to recognise electronic evidence as being
admissible in courts of law. However, she further gives a caution that; it is still in doubt as to
whether the electronic equipments such as a computer or server would be acceptable as
evidence under Section 40A of the amended Evidence Act especially where it has been used
to store information which is subject to the legal proceedings.
Edward A35 in his book explores the difficulties facing the traditional copyright laws in
dealing effectively with computer mediated communications. The book further gives
initiatives to be employed to cure the problem as that there must be specific laws to deal with
copyright issues arising out from the electronic transactions or modifying the existing laws to
cope with the change.
Erick Agwe-Mbarika Akuta36 in their journal shows how most governments in African
countries are caught off guard as a result of the manifestations of Cybercrime, its far reaching
and potentially devastating capacity for harm. They also show how African countries are
unable to keep up with the alarming rate at which cybercrimes have diffused.
John Ubena37 in his article shows how Tanzania is running the risk of being the
cybercriminals’ haven because there is no legislation in place to govern or address the issues
of cyber world. He further gives a comparative analysis with other countries like United
Kingdom which has adopted the Convention on Cyber Crimes and has enacted the Computer
Misuse Act of 1990. He concludes that there are no laws of the specificity to cybercrimes in
Tanzania.
34Eve Hawa Suinare, Electronic Evidence and its Admissibility in Tanzania Courts, World Series Group Publications: 2007 pg.2335Edward A. Cavazos et el, Cyber-Space and the Law: Your Rights and Duties in the On-Line World, MIT Press: Cambridge, London 1996 pg.47. 36Erick Agwe-Mbarika Akuta et el Combating Cybercrimes in Sub-Sahara Africa: A Discourse onLaw, Policy and Practice, International Research Journals: 2011 pg 137The website of John Ubena on Why Tanzania Needs Electronic Communications Legislation?, Law Keeping up with Technology, found at http://www.Irct.go.tz/documents/journal.pdf retrieved on 23rd December 2011.
17
Richard A.38 in his book shows how difficult governing internet is. He further argues that
even covering cybercrimes is also difficult. He states that this difficulty can be overcome
only by enacting specific cybercrime statutes instead of relying on the vague interpretation of
the existing criminal statutes.
Saidi M. Kalunda39 in his article shows how cybercrime is uncovered in Tanzania. He
explores that Tanzania lacks a robust legal regime on cybercrime that is why it is increasingly
affected with the cybercriminals’ activities.
1.6 HYPOTHESIS OF THE STUDY
In this study the following have been established by the researcher;
▪ The current Tanzania’s legislations on criminal matters are not sufficient in dealing
with cybercrimes issues.
▪ The legislature have done no effort on the existing legal framework for them to
reflect technological advancements.
1.7 SCOPE OF THE STUDY
This study is basically confined in the following sources; the Penal Code40 the Law of
Evidence Act,41 the Criminal Procedure Act42 and case laws. The main focus in this study is
Tanzania. However, in some instances a comparative study has been made from other
communities apart from Tanzania such as Kenya, and other African communities for this
problem is also considered worldwide.
1.8 RESEARCH METHODOLOGY.
This research has employed two methods which are library research and field research.
Library research has been used to develop the theoretical part of the research. These libraries
include Tumaini University-Makumira Library for general theoretical development,
International Criminal Tribunal for Rwanda (ICTR) Library for complementary of materials
read at Tumaini University- Makumira Library. The relevant materials which have been
relied from these libraries include books, articles, journals, and reports of the researchers
done on the cybercrimes and the laws. Internet has also been relied on to download relevant 38Richard A. Spinello, Cyber Ethics: Morality and the Law In Cyber Space, 3rd Ed. Jones and Bartlett Publishers: Massachusetts, London, 2006. Pg. 27-2839Saidi M. Kalunde The Status of Cybercrimes in Tanzania, Strasbourg, France, 2011 pg 5.40As amended by the Sexual Offences Special Provisions Act CAP 16 R.E 200241CAP 6 of laws R.E 2002 42CAP 20 of laws R.E 2002
18
materials that have been considered to back up the reading particularly on the latest updated
information regarding the cybercrimes and the law.
All these sources have assisted the researcher to build up and develop the theoretical part of
the research and collect insights of what other researchers have done to discover the extent of
their findings, the way forward and the areas which demand further research in cybercrimes
and the law.
CHAPTER TWO
A COMPARATIVE ANALYSIS ON LEGAL AND INSTITUTIONAL FRAMEWORK IN
COMBATING CYBERCRIMES IN TANZANIA
2.1 Introduction
In this chapter, the researcher shows how far Tanzanian legal system has gone in fighting
cybercrimes. However, in so doing, a comparative study from other jurisdictions is made.
19
The researcher has tried to evaluate what has been done at international and regional level, so
that the same be incorporated at national level.
2.2 CYBERCRIMES, CRIMINALS AND THE NEED FOR SPECIFIC LAWS
Cybercrimes have been disturbing and necessitating the slight changes in legal systems of
different jurisdictions due to effects it has posed so far in those countries. Almost every
country around the globe has experienced the effects brought by it. Different International
and regional bodies have adopted various efforts so that they get rid of this new form of
crimes.
Following its global nature, it is crucial that the fight against cybercrime be cooperative as
well. Every country should employ cooperative measures with other countries or institutions
with the aim to achieving a measurable overthrow of this form of criminality. It is also
important for each country to learn experience from other jurisdictions on how this new form
of crimes can be fought against.
The rationale of this chapter is, therefore, to give a detail of cybercrimes and how cyber
criminals go about it. It also makes a comparative analysis of the efforts undertaken by
different International and Regional Institutions in combating cybercrimes. Finally, it shows
the steps taken by Tanzanian government in combating cybercrimes and areas which attracts
more concern.
In order to comprehend cybercrime and to determine how this new form of criminality be
fought, this chapter also traces the origin of cybercrimes, and the cyber-criminals. The
question as to why the science and technological evolution necessitates the need to having
specific laws to regulate the electronic transactions has been discussed in this chapter as well.
2.2.1 Law and Computer Technology
The quarter century between 1945 and 1970 is the first stage in the evolving relationship
between law and computer technology, which is now generally referred to as information
technology.43 Although, early uses of computers were mainly mathematical, the globe has
43Gringras, C, The Laws of the Internet, 2nd edition, Butterworth’s, Lexis, 2003 pg. 15
20
moved a very long way from the notion of the computer as a calculating machine to an
important machine in various aspects of human life.44 The scope of the machine’s capabilities
has expanded to the extent that virtually any item of information, sound pictures, text or
graphics is in a series of zeros and ones in to a digital format.45
Although, legal aspect of the use of ICT have been addressed and dealt with by academics in
the Nordic countries since the late 1960s,46 it is only since 1990s that ICT related legal
problems have gained more general attention all around the world.47 The basic reason is that
the technology and its use has achieved a higher grade of penetration and are thus bringing
problem out from the room of academics to the practical sphere of everyday life.48
From legal point of view, these activities challenge the continuing relevance and
effectiveness of traditional legal provisions. The actions taken by International organisation
have activated some countries to either amend or enact laws to cope with IT revolution. Legal
harmonisation has been a major emphasis on the work of various international organisations.
2.2.2 Cybercrime and Criminals
As technology develops, the world must adapt. Crime is an ever present problem, and with
the proliferation of computer and computer technologies, crime using computers has become
widespread. Computer crime, or cybercrime, is defined as any criminal activity in which
computers, or a computer network, are the method or source of a crime. This encompasses a
wide variety of crimes, from hacking into databases and stealing sensitive information to
using computers to set up illegal activities.49 Cybercrime encompasses the use of a computer
as a tool in the perpetration of a crime, as well as situations in which there has been
unauthorised access to the victim’s computer, or data.50
Because cyber criminals can launch coordinated attacks from all over the globe, catching
them often requires the collaboration of many people, and this becomes more difficult as
44See note 7 above, pg 132-139, see also Watney, M. Understanding Electronic Surveillance as an investigatory method in conducting criminal investigations on the internet, 4th Ed, Butterworths, 2006, pg.113. 45Lloyd J.J, Information Technology Law, 3rd Ed. Butterwoths, Edinburgh Duldin, London, 2001, pg. 3.46Ibid, at pg. 4.47The website of Heidari, M. on. Malicious codes in depth, available in http://www.securitydocs.com accessed on 9th March 201248Seipel I.J, Law and Information Technology, Information Communication Technology Commission Report Stockholm, 2002, pg. 44-45.49See note 13 above, at p 10950Fick J, Cybercrime in South Africa: Investigating and Prosecuting Cyber crime and the benefits of public-private partnerships, Butterworths, London, 2009, pg. 4.
21
cyber crime continues to grow. Cyber defenders have to constantly develop new tools, new
technologies, new procedures and even new fields of study just to keep up with cyber
criminals.51
2.3 The International Criminal Law reform in Combating Cybercrime
In this part the researcher discusses the efforts undertaken at international level, particularly
under the United Nations, in addressing and fighting against cybercrimes. In so doing, the
researcher has also tried to show how, in fighting against cybercrimes, the United Nations
differs from other international and regional organisations.
2.3.1 The United Nations
The United Nations is the only global organisation that forms a forum of its 191 member
states with fuller functions. Compared with professional organisation, the United Nations
does not limit its activities to certain domains. Compared with regional organisations, the
United Nations does not limit its activities to certain states (in the field of cyber security
protection and cybercrime prevention). The actions of the United Nations have unique
advantages in coordinating international positions.52
In 1985, the General Assembly Resolution 40/71 of 11 December called upon Governments
and international organisations to take action in conformity with the recommendation of the
commission on the legal value of computer records of 1985, in order to ensure legal security
in the background of the broadest possible use of information processing in international
transactions.
In 1990, the General Assembly of the United Nations adopted the guidelines concerning
computerized personal data files. It proposed to respond appropriately to protect the files
against both natural and artificial dangers.53
The international review of criminal policy: United Nations Manual on the Prevention and
Control of Computer-Related Crime called for further international work and presented a
proper statement of the problem. It stated that; at the international level, activities shall be
51See note 13 above, at p 10952Ibid, at p 111.53The website of United Nations on Criminalisation of Computer wrong doing –United Nations, found at www.un.org/events/11thcongress/docs/bkkcp19e.pdf, accessed on 25th March 2012.
22
undertaken, including harmonisation of substantive law, and establishing a jurisdictional
base.54
Also, the UNCITRAL Model Laws55 and other related Model Laws can be useful in seeking
solutions to the above stated legal problems. For instance, some of the core provisions of the
UNCITRAL Model Law stipulate that; ‘information shall not be denied legal effect, validity
or enforceability solely on the grounds that it is in a form of a data message.’56 The
subsequent article provides that; legal requirement for writing,57 signature,58 and the use of
originals59 can be satisfied by the use of appropriate data messages and that rules of evidence
should not deny the admissibility of data messages solely because of their form.60 Countries
with common law principles that lack cyber laws like Tanzania can create a legal framework
that can take into account some relevant provisions of UNCITRAL Model Laws and other
related cyber laws.
In 2007, the United Nations adopted the United Nations Convention on the use of electronic
communications in International Contracts. Some relevant provisions of this convention that
are worth mentioning as far as electronic communications and digital signatures are
concerned are;
Legal recognition of electronic communications is dealt with by Article 8 which provides
that; ‘A communication or a contract shall not be denied validity or enforceability on the sole
ground that it is in the form of an electronic communication.’61 The question of electronic
evidence as compared to physical world evidence is stipulated under Article 9 which states
that; ‘Nothing in this Convention requires a communication or a contract to be made or
evidenced in any particular form.’62
54The website of United Nations on Criminalisation of Computer wrong doing –United Nations, found at www.un.org/events/11thcongress/docs/bkkcp19e.pdf, accessed on 25th March 2012.55The United Nations Commission on International Trade Law (UNCITRAL) is the core legal body of the United Nations system in the field of international trade law. Its mandate is to remove legal obstacles to international trade by progressively modernizing and harmonizing trade law.56See note 31above. 3557Article 6 of the UNCITRAL Mode Law, guide to enactment, 1996.58Ibid, article 759See note 58 above, article 860Ibid, article 961 See note 56 above62 Ibid
23
On the other hand, legal issues and uncertainties as to the determination of time and place of
dispatch and receipt of electronic communications are covered under Articles 6, 8, and 10 of
the Convention.63
2.4 The African and the Regional Criminal Law reform in Combating Cybercrime
In this part the researcher concentrates much on discussing the measures taken by the African
Union in fighting cybercrimes. The researcher also discusses what has been made at regional
level, mainly, under the East African Community, in achieving the same goals.
2.4.1 The African Union
The African Union (AU) is now working to keep in place the legislation to combat
cybercrimes in Africa.64 Cyber criminals have over the years considered Africa as a fertile
continent to commit their criminal acts which had given the continent a bad name.65 For that
reason, the AU want to ensure that an e-legislation protocol is developed under close
cooperation with the EAC, and it will ensure that it is adopted by member states in order to
curb the menace. cyber security in Africa would provide improved and easy economic and
commercial activities such as e-laws, e-signatories, arbitration laws, e-commerce, e-
transaction and other e-services which will improve good governance on the continent.66
The African Union has also adopted the Draft African Union Convention on the
Establishment of a Credible Legal Framework for Cyber Security in Africa . The Draft
Convention gives effect to a Resolution of the last session of the Assembly of Heads of State
and Government of the African Union, and seeks to harmonize African cyber legislations on
electronic commerce organization, personal data protection, cyber security promotion and
cyber crime control.67
63 Ibid64The United Nations Economic Commission for Africa (UNECA) report, on 3rd April 201265This was said by Aida Opoku-Mensah, the director, ICT, Science and Technology division of the UNECA, in Addis Ababa at the closing press conference of the second meeting of Committee on Development Information, Science and Technology.66The website of UN, on UNECA, AU to provide e-legislation against cyber crimes in Africa, found at http://www.businessdayonline.com/NG/index.php/news/world-news/20982-uneca-au-to-provide-e-legislation, accessed on 6th April 2012.67Article 23(1) of the draft convention which states that ‘Each Member State shall adopt such legislative measures as it deems effective, to define material criminal offenses as acts which affect the confidentiality, integrity, availability and survivability of ICT systems and related infrastructure networks; as well as procedural measures deemed effective for the arrest and prosecution of offenders. Member States shall be called upon to take on board, where necessary, the approved language choice in international cyber crime legislation models such as the language choice adopted by the Council of Europe and the Commonwealth of Nations.’
24
In pursuance of the principles of the African Information Society Initiative (AISI) and the
African Regional Action Plan for the Knowledge Economy (ARAPKE), the Draft
Convention is intended not only to define the objectives and broad orientations for the
Information Society in Africa, but also to strengthen existing legislations in Member States
and the Regional Economic Communities (RECs) on the Information and Communication
Technologies.68
It defines the security rules essential to establishing a credible digital space in response to the
major security related obstacles to the development of digital transactions in Africa. It lays
the foundation for an African Union-wide cyber ethics and enunciates fundamental principles
in the key areas of cyber security. It also defines the basis for electronic commerce, puts in
place a mechanism for combating intrusions into private life likely to be generated by the
gathering, processing, transmission, storage and use of personal data and sets broad
guidelines for incrimination and repression of cyber crime.
Its adoption would capitalize African and international experiences in cyber legislations and
speed up relevant reforms in African States and the RECs.
2.4.2 The East African Community
The East African Community has also started to take efforts in addressing cyber related
issues. In January 2008, the East African Community (EAC) held the first regional task force
meeting on cyber laws in Arusha, Tanzania.69 At the meeting, attendees from four EAC
member states; Burundi, Kenya, Uganda, and Tanzania, discussed a range of issues relating
to the need to reform national laws to address the increasing use of the internet as a medium
for electronic commerce and administration.70
The task force noted and recommended that the process of law reform be coordinated at a
regional level and harmonized and benchmarked against international best practice. The task
force also recommended that a comparative review of the existing laws and bills of partner
states be undertaken and a regional legal framework be developed for harmonisation of cyber
laws.71
68The website of the UN on the Draft African Union convention on the Establishment of a Credible Legal Framework for Cyber Security in Africa, found at http://www.uneca.org/aisi/elegislation/documents/Draft_ accessed on 6th April 2012.69Walden, I. East African Community Task Force on Cyber Laws, May 2008.70See note 69 above71Ibid
25
In terms of developing a draft legal framework for EAC partner states, the task force
recommended that the process be divided into two phases. In phase I, cyber law reform
would focus on five topics: Electronic transactions, electronic signature and authentication,
data protection and privacy, consumer protection and computer crime. Phase II would address
topics such as intellectual property and taxation.72
The second meeting of the EAC regional task force on cyber laws was held on 23 rd – 25th
June 2008 in Kampala, Uganda. It was jointly organised by EAC and UNCTAD and
supported by the Finnish government. This meeting was held as a follow up to the first
meeting of the EAC task force on cyber laws held on 28 th – 30th January in Arusha, Tanzania.
However, in the meeting, it was revealed that nothing in this area had changed since the first
task force meeting in January 2008.73
2.5 The Efforts Taken by Individual East African Countries in Adopting Cyber Laws
and Combating Cyber Crimes.
In this part, after discussing the overall efforts taken at Africa and regional level, the
researcher discusses the efforts taken by countries forming part to the East African
Community. This is done to selected East African countries, namely; Kenya, Uganda, and,
finally, Tanzania.
2.5.1 Kenya
The government has already initiated the process of enacting cyber legislation. The Kenya
Communication (Amendment) Bill, published in August of 2008, provides for regulation of
telecoms, posts, broadcasting, electronic transactions and domain names. In the same month,
the bill went through the first reading in Parliament.74
2.5.2 Uganda
The Government of Uganda has drafted electronic laws, the electronic transaction Bill, the
Computer Misuse Bill and The Electronic Signature Bill. The bills were approved by the 72Supra note 66 above73Report of the second EAC regional task force meeting on cyber laws, Golf course Hotel Kampala Uganda, June 200874See note 73 above
26
Cabinet on 16th January 2008, and went to Parliament for debate. The bills are in conformity
with the proposed East African Community (EAC) framework on cybercrimes.75
2.5.3 Tanzania
The process commenced in 2006 with the submission of a proposal for the enactment of
cyber laws by the Tanzania Law Reform Commission to the Ministry of Justice and
Constitutional Affairs.76 It proposed separate bills on cybercrimes, regulation of electronic
transactions and communications, privacy and data protection and the amendment of the
Evidence Act 1967.77 Only some of these recommendations were taken into action.
The second development was the creation of a merged Tanzania Regulatory Authority
(TCRA) to oversee postal and electronic communication industries on the mainland. The
Commission for Human Rights and Good Governance Act78 provides for the admissibility of
electronic evidence. However, this is not adequate and the bills proposed by the Tanzania
Law Reform Commission still need to be enacted.
It was revealed by the Law Reform Commission legal officer who provided the position of
the commission as far as cyber laws are concerned.79 He said; ‘Tanzanian Law Reform
Commission has completed a report on electronic commerce, that examines all the issues of
concern, but there is no draft legislation.’80 However, under part IX of the Written Laws
(Miscellaneous) Act 2007, reforms have been adopted in respect of the use of electronic
evidence in certain context.81
In the report, the commissioner is intending to review the laws affected by the development
and use of E-commerce. The rationale behind is to protect the consumers and facilitate
business transactions. The commission recommended also on the enactment of the new laws
to cover the crucial area that has a high impact on the economic development in Tanzania and
75 Ibid76See note 13 above, at pg 10477Economic Commission for Africa, first meeting of the committee on Development Information, Science and Technology(CODIST), Addis Ababa, Ethiopia, 2009 at Pg.978Act No. 16 of 200779See note 13 above, at, pg 122 80See 13 note 81Ibid, at pg 122
27
East Africa in general. The laws proposed include Law of Contract Act,82 the Bill of Exchange
Act,83 Sale of Goods Act84 and Banking and Financial Institutions Act.85
CHAPTER THREE
THE IMPACT OF CYBERCRIMES ON THE TANZANIA’S LEGAL SYSTEM
3.1 Introduction
This chapter generally discusses on how the emergency of this new form of crime
(cybercrimes), as associated with the development of Information Communication
Technology, impacts on the Tanzanian legal system. The researcher focuses much on the law
of evidence as the main area which brought many challenges as a result of criminal activities.
To that end, the discussion will provide a critical analysis of digital evidence and how it
82CAP 345 of the Laws of Tanzania (R.E 2002)83CAP 215 of the Laws of Tanzania (R.E 2002)84CAP 214 of the Laws of Tanzania (R.E 2002)85CAP 342 of the Laws of Tanzania (R.E 2002)
28
differs from paper based evidence. Moreover, the discussion will provide challenges
associated with Electronic/Digital Evidence in Tanzania.
On top of that, analysis will be made on the improvements made to the law of evidence and
suggest which more is to be done so as to make the law fully compatible with the
admissibility of electronic evidence in Tanzanian courts.
3.2 Evidence
The legal definition or question of evidence is of different schools of thoughts. In the original
sense, the word ‘evidence’ signifies the state of being evident, that is to be plain, or apparent.
In other words, the means which tend to prove or disprove any matter of fact the truth of
which is for judicial investigation.86
The Evidence Act, 196787 defines the term evidence as being, ‘the means by which an alleged
matter of fact, and the truth of which is submitted to investigation, is proved or disproved,
and without prejudice to the proceeding generally, includes statements and admissions by
accused person’.88 From this definition, it is clear that the term evidence signifies two main
senses; first, that which is received in court to prove or disprove an alleged matter of fact
which is inquired in court, secondly, those rules of law used in judicial proceedings, which
lay down as to what matter is or is not admissible.89
There are various methods or kinds of evidence, few of which are oral evidence, direct
evidence, circumstantial evidence, real evidence, intrinsic and extrinsic evidence, hearsay
evidence, original evidence, conclusive evidence, derivative evidence, documentary
evidence, primary and secondary evidence.90 Due to technological advancement, computer
digital evidence has emerged as another category of evidence in the list.91
3.3 Digital Evidence and Cybercrime
Digital or Electronic Evidence means any data stored or transmitted using a computer that
supports or refutes a theory that addresses critical elements of the offense such as intent or
86Mapunda, B.T.Evidence part one, Relevancy of facts, 2005 Pg. 187CAP 6 of the Laws of Tanzania (R.E 2002)88Section 3 of the Evidence Act, CAP 6 of the Laws (R.E 2002). 89See note 13 above, at pg. 9690The website of Terry M. Anderson on Criminal Evidence: Principles and Cases, found at www.amazon.com/Criminal-Evidence-Principles-Thomas-Gardner/dp accessed on 1st April 201291Ibid
29
alibi.92 Digital evidence has previously been defined as any data that can establish that a
crime has been committed or can provide a link between a crime and its victim or a crime and
its perpetrator.93 However, these definitions focus too heavily on proof and neglect data that
simply further an investigation.
The use of digital evidence has increased in the past few decades as courts have allowed the
use of emails, digital photographs, TM transaction logs, word processing documents, and
instant message histories, files saved from accounting programmes, spreadsheets, internet
browser histories, databases, the contents of computer memory, computer backups, computer
printouts, global positioning system tracks, logs from a hotel’s electronic door locks, and
digital video or audio files.94
As compared to the more traditional evidence, the digital evidence tends to be more
voluminous, more difficulty to destroy, easily modified, easily duplicated, potentially more
expensive, and more readily available.95
In today’s era of rapid growth, information technology is encompassing all occupations all
over the world. These technological developments in internet and computer globally has led
to the growth of new forms of transnational crime especially internet related.96 These crimes
have virtually no boundaries and may affect any country across the globe.97 Moreover,
criminals are using technology to facilitate their offenses and avoid apprehension, creating
new challenges for attorneys, judges, law enforcement agents, forensic examiners, and
92An alibi is evidence showing that a defendant was somewhere other than the scene of a charged crime at the time that the crime occurred. Film and TV characters often pronounce the word "alibi" with a sneer, suggesting that alibi claims are inherently untruthful. In reality, an alibi is a perfectly respectable legal defence. Defendants may offer an alibi defence without giving up their constitutional right to remain silent. Any witness who can place the defendant at a location other than the scene of the charged crime can provide an alibi. Alibi can be used in formal contexts, such as providing evidence to the police for a crime that has been committed and they can also be used in informal contexts, such as in conversation between friends. Alibis vary in how convincing they are. For example, teenagers are well known for pretending to be at each other's houses while sneaking out for the night, so sensible parents check with the parents of the other child before believing an alibi. Yet sometimes false alibis can cover up dishonest behaviour for years, and are often so convincing that online alibi services are even available for people trying to get away with something. An alibi can be useful to clear your name. But using a false alibi is deceitful, and will eventually land you in trouble. Using a friend as a false alibi can cost you and/or your friendship, and if you haven't told your friend in advance that you intend to use them as an alibi, may not effectively cover up what you are trying to hide. Found at http://addictions.about.com/od/legalandethicalissues/g/What-Is-An-Alibi.htm, accessed on 4th April 2012.93Casey, E. Digital evidence and computer crime: forensic science, computers and the internet, 2004, pg. 2394See note 93 above, at pg.2495Ibid96See note 13 above, at pg 10097Ibid
30
corporate security professionals.98 Organized criminals around the globe are using technology
to maintain records, communicate, and commit crimes.
Digital evidence can be useful in a wide range of criminal investigations including homicides,
sex offenses, missing persons, child abuse, drug dealing, and harassment. In addition, civil
cases can hinge on digital evidence, and digital discovery is becoming a routine part of civil
disputes. Computerized records can help establish when events occurred, where victims and
suspects were, whom they communicated with, and may even show their intent to commit a
crime.99
Robert Duralls’s Web Browser history showed that he had searched for terms such as ‘‘kill
+spouse,’’ ‘‘accident + deaths,’’ and ‘‘smothering’’ and ‘‘murder’’ prior to killing his wife.
These searches were used to demonstrate premeditation and increase the charge to first –
degree murder. Sometimes information stored on a computer is the only clue in an
investigation. In one case, e-mail messages were the only investigative link between a
murderer and his victim.100
For example, in the American Maryland case,101 Maryland women named Sharon Lopatka
told her husband that she was leaving to visit friends. However, she left a terrifying note that
caused her husband to inform police that she was missing. During their investigation, the
police found hundreds of e-mail messages between Lopatka and a man named Robert Glass
concerning their torture and death fantasies. The contents of the e-mail led investigators to
Glass’s trailer in North Carolina and they found Lopatka’s shallow grave nearby. Her hands
and feet had been tied and she had been strangled. Glass pled guilty, claiming that he killed
Lopatka accidentally during sex.102
The researcher found it necessary to refer to the American case due to lack of a relevant
Tanzanian case to illustrate the point elaborated above.
Digital data are all around us and should be collected in any investigation routinely. More
likely than not, someone involved in the crime used a computer, personal digital assistant,
mobile telephone, or accessed the internet. Therefore, every corporate investigation should
98Ibid99Ibid, at pg.102100Supra note 13 above.101 (1996) 48 Cal. App. 4th 1822 [56 Cal. Rptr. 2d 498]102See note 13 above, at pg 103
31
consider relevant information stored on computer systems used by their employees both at
work and at home.
Every search warrant should include digital evidence to avoid the need for a record warrant
and the associated lost time and evidence. Even if digital data do not provide a link between a
crime and its victim or a crime and its perpetrator, they can be useful in an investigation.
Digital evidence can reveal how a crime was committed, provide investigative leads, disprove
or support witness statements, and identify likely suspects.103
3.4 The Nature of Electronic Evidence
Different from paper based documents, which are visible and tangible, much of electronic
evidence are invisible with naked eye. It takes a number of technological steps for electronic
evidence to be determined. It tends to be hidden among immense data files. This evidence is
measured by kilobytes, megabytes, gigabytes, and terabytes.104 Thus, in the electronic or
digital world, the information is divided in two parts. The binary strings of zero and one that
make up the genetic code of data and allow information to be fruitful and multiply, and allow
people to create, manipulate and share data.105
In the event one sends this information to another person using computers, the information is
transmitted through many phases. First, the sender creates it. Then the information to be
communicated is broken down in to small packets that contain some portion of the contents
of the communication as well as the sender and recipient’s Internet Protocol addresses and
some accounting information.106
The packets are individually transmitted from the sender’s computer to a nearby packet
switch and then forward to the next available switch in the direction of their ultimate
destination. Different packets may take different routes through the network as they travel
from the sender to recipient, depending on link availability and loading in the network. Upon
receipt, the packets are reassembled into an exact replica of the original file.107
Therefore, information passes through several stages of disassembly, storing and forwarding
and reassembly, before becoming available to the recipient. The recipient may store the file
103Ibid, at pg.103104See note 32 above, at pg. 77105See note 32 above, at pg. 77106Ibid107Ibid
32
for future reference for some period before deleting it. The issue is how to ensure
trustworthiness, reliability, integrity, and security of electronic evidence. It is argued that,
since digital evidence usually takes the form of writing, or at least a form, which can be
analogous to writing, it must be authenticated and satisfy the requirements of the best
evidence rule.108
3.5 Challenges Brought by Electronic or Digital Evidence
The problem with electronic evidence lies in the temporary nature of digital data.109It is very
easy to view, copy, modify, or destroy a digital record; be it a number, document, or image.
Digital technology permits perfect reproduction and easy dissemination of print, graphics,
sound, and multimedia combination, the combination of a high percentage of a fraud with
employee involvement and the possibility that an individual can modify raw data with
immediate access to the system.110
In addition, evidence collected from the system has a questionable and unverifiable level of
integrity.111 By their very origin and nature, mode of transmission, storage and usage,
electronically generated evidence pose certain challenges when used in evidence, challenges
bordering on authenticity, integrity and confidentiality of the pieces of evidence.112
3.5.1 Authentication
108When dealing with the contents of writing, recording, or photograph courts sometimes require the original evidence. This was originally intended to prevent a witness from misrepresenting such materials by simply accepting their testimony regarding the contents. With the advent of photocopiers, scanners, computers, and other technology that can create effectively identical duplicates, copies became acceptable in place of the original, unless "a genuine question is raised as to the authenticity of the original or the accuracy of the copy or under the circumstances it would be unfair to admit the copy in lieu of the original" (Best Evidence Rule).Because an exact duplicate of most forms of digital evidence can be made, a copy is generally acceptable. In fact, presenting a copy of digital evidence is usually more desirable because it eliminates the risk that the original will be accidentally altered. Even a paper printout of a digital document may be considered equivalent to the original unless important portions of the original are not visible in printed form. For example, a printed Microsoft Word document does not show all of the data embedded within the original file such as edits and notes. See Casey op.cit, Ch 7.2109See note 32 above, at pg. 78110See note93 above, at pg. 30111See note 32 above112Ibid
33
Authentication means satisfying the court that (a) the contents of the record have remained
unchanged, (b) that the information in the record does in fact originate from its purported
source, whether human or machine, and (c) that extraneous information such as the apparent
date of the record is accurate. As with paper records, the necessary degree of authentication
may be proved through oral and circumstantial evidence113, if available, or via technological
features in the system or the record.114
Authentication is actually a two-step process, with an initial examination of the evidence to
determine that it is what its proponent claims and, later, a closer analysis to determine its
probative value.115 In the initial stage, it may be sufficient for an individual who is familiar
with the digital evidence to testify to its authenticity.
For instance, the individual who collected the evidence can confirm that the evidence
presented in court is the same as when it was collected. Alternatively, a system administrator
can testify that log files presented in court originated from her/his system. In some cases, the
defence will cast doubt on more malleable forms of digital evidence, such as logs of online
chat sessions.116
Normally, when information is entered on a computer memory, or an e-mail is sent or an
order is placed for goods or services through the internet, the sender is unable to authenticate
the information he has sent by way of a signature. It is the same if he speaks with another
person on the telephone, leaves a message on that other person’s voicemail or sends a text
message (sms). Even if he uses a password or an acronym they may not be peculiar to him
the way a signature written by him would be.117
The password or acronym can also be endorsed or used by anybody else who knows them far
more easily than a signature can be imitated. A voice on the phone can also be imitated. In a
work place, any person can enter information into a computer memory, purporting it to be
entered by another person.118
113Circumstantial Evidence is a testimony by witnesses as to the circumstances from which an inference is to be drawn as to the fact in issue. In case of absence of direct evidence then circumstantial evidence can be resorted to. It is the evidence which relates to a series of other facts than the fact in issue, but by experience has been found so associated with the fact-in-issue in relation to cause and effect that it leads to a satisfactory conclusion.114See note 93 above115See note 113 above?See note 93 above116See note 93 above117Ibid118Ibid
34
As a result, when customer’s account records are called up in a bank’s computer system there
is hardly any way of knowing which person made which entry. This makes it difficult to
ascertain whether that person was an appropriate officer to make the entry. Even if one of
several appropriate officers makes a wrong entry, it may not be traceable to him since he has
not signed it, because there is no way he would have done so.119
This means that if such a false entry or message is presented to the Court, there will hardly be
a way of detecting the false nature and the Court can easily be misled. The presence of
signatures in equivalent non-electronic documents or materials makes them more authentic
and harder to forge or imitate. Of course, signatures can be forged on non-electronic
documents but a Court can compare an allegedly forged signature with other signatures of the
same person and come to an intelligent decision on the point. If the Court is unable to decide
on the matter, a signature expert can be called in and detect if there is any forgery.120
Furthermore, even in the absence of a signature, if a document is written in long hand, a
comparison with the alleged writer’s other writings can be done. For an entry in software
(bank account entries, e-mail, websites), there is no opportunity for those steps to be taken.121
Electronically generated materials therefore do not lend themselves to effective tests of
authenticity that are normally possible with the conventional documents.122
Once digital evidence is admitted, its reliability is examined to determine its probative value.
For instance, if there is concern that the evidence was tampered with prior to collection, these
doubts may reduce the weight assigned to the evidence. In several cases, attorneys have
argued that digital evidence was untrustworthy simply because there was a theoretical
possibility that it could have been altered or fabricated.123
However, as judges become more familiar with digital evidence, they are requiring evidence
to support claims of untrustworthiness. Even when there is a reasonable doubt regarding the
reliability of digital evidence, this does not necessarily make it inadmissible, but will reduce
the amount of weight it is given by the court.124
3.5.2 Integrity
119See note 112 above120See note 93 above121See note 93 above122Chukwuemerie, A.I. Affidavit Evidence and Electronically Generated Materials in Nigerian Courts Volume 3, 2006 at Pg. 185123See note 93 above124Ibid
35
Integrity is another problem of authenticity. It can however be seen as more of an issue of
whether or not the information has got distorted or tampered with even after it emanated
from a correct source. An audio or visual tape can be edited or tampered with through the
introduction or removal of some bits and superimposition of images. Through any such
interference, the later form of the contents is fundamentally different from the first or original
form.125
Through hacking of computers, crashing through passwords and kindred wrongdoings,
information stored in computer memories and e-mails can be altered even without the
knowledge of the maker, sender and, or receiver as the case may be. Telefaxes can be
intercepted and possibly changed just as text messages can be intercepted, listened in to and
even edited by an unscrupulous operator. On the other hand, if a letter is sent through the
post office or through a courier service, it may be only remotely possible, if at all, for it to be
tampered with. A hard copy of a document is generally more difficult to tamper with than an
electronic copy.126
3.5.3 Confidentiality.
Confidentiality ensures that only authorised parties’ access computer-related assets. That is,
only those who should have access to something will actually get that access. By “access”
here it means not only reading but also viewing, printing, or simply knowing that a particular
asset exists. Confidentiality is sometimes called secrecy or privacy.
The electronically generated materials hardly enjoy confidentiality since they are legitimately
or illegitimately accessible to third parties or undesirable readers or users. Any information
posted on the internet or used in what has come to be called e-filing of Court processes and
e-trial and related procedures, is accessible to many more people than the immediate parties
and Court staff that directly deal with or treat the documents.127
3.6 Relevancy and Admissibility of Digital Evidence in Tanzanian Courts
125 Ibid126See note 120 above127Ibid
36
In a simple language, relevancy determines whether one fact is related to another. A fact is
relevant to case when it is related to the facts in issue. Lord Simon attempted to define the
term ‘relevant evidence’, in the case of DPP v. Kilbourne128 as follows;
‘Evidence is relevant if it is logically probative or disapprobative of some matter
which requires proof....evidence which makes the matter which requires proof more or less
probable’129
However, a classic definition of relevance is contained under Article 1 of Stephen’s Digest of
the Law of Evidence according to which the relevance means;
‘any two facts to which it is applied are so related to each other that according to the
common course of events one either taken by itself or in connection with other facts proves or
renders probable the past, present or the future existence or non existence of the other.’130
Evidence must be sufficiently relevant to be admissible but sufficiently relevant evidence is
only admissible as far as it is not excluded by any rule of law of evidence. Admissibility
presupposes relevancy and is found on the law and not logic. The consequence of this is that
some evidence, however relevant it may be, it may as well be excluded. It is the law that
determines whether a particular fact can be admitted or accepted in evidence.131 With
increased computerisation and ICT, courts have been forced to admit digital evidence.132
The Tanzanian law of Evidence Act133 does not have provisions recognizing electronic
documents as admissible evidence whether primary or secondary. Yet Tanzanian companies
take orders, conclude contracts, send invoices and generally conduct business electronically
without additional documentation to support the business transacted electronically.134
Only minor amendments have been made to the Tanzania Evidence Act to give partial
recognition to evidence generated electronically. Part IX of the amending Act proposes to
amend the Evidence Act.135 The amendment was done to include new sections 40A, 78A, and
128[1973] A.C.729 at Pg. 756129See note 13 above, at pg 111130See note 86 above, at Pg. 7131See note 86 above132Juma,I.H. Admissibility of Electronically obtained evidence at Pg. 2133Act No. 6 of 1967, CAP 6 of the Laws (R.E 2002)134The website of Rex Attorneys on Tanzania: Admissibility Of Electronic Evidence, found at http:// www.mondaq.com/article.asp?articleid accessed on 9th April 2012135CAP 6 of the Laws of Tanzania (R.E 2002)
37
78B.136 Nevertheless, this initiative alone is seriously inadequate in so far as electronic
transactions and their nature are concerned.
In the first place, the amendment does not cover all aspects of challenges posed by electronic
transactions on the law of evidence. Only some few sections of the Evidence Act were
amended, leaving untouched a number of other provisions of the same law which relate to
documentary evidence.137
The amendment is also inadequate if one takes into account the fact that there are various
other laws in the country which touch upon the documents as potential pieces of evidence.138
Furthermore, the amendment does not cover all issues relating to ICT, electronic commerce
and Internet transactions in general, particularly in relation to legal certainty.
Another shortcoming of the above amendment is lack of mechanism for authenticity. Since
one of the main concerns in the admissibility of electronically generated documents centres
on the question of their security, reliability and credibility, any attempt to provide legal
recognition of this type of documents has to go hand-in-hand with the provision for
mechanisms of authentication, so as to reduce the risks resulting from the above concerns.139
The current amendment of the Tanzania Evidence Act140 does not mention anything about the
manner of authentication of electronically obtained documents when they are used as
evidence.
It was not until 2000 when the wisdom of the High Court of Tanzania was called upon to rule
whether electronic evidence is admissible as best evidence in the case of Trust Bank Ltd v.
Le-Marsh Enterprises Ltd.141. In this case, Nsekela J (as he then was), adopting the view of
the English Judge in the Barker’s case, extended the definition of bank records to include
computer print-outs. He noted, further, that; ‘the law must keep abreast of technological
changes as they affect the way of doing business.’ This was a departure from the strict rule of
best evidence rule.
136See note 133 above, at pg 90137Ibid, pg. 91138See note 133 above, at pg. 91139See note 133 above, at pg. 91140CAP 6 of the Laws of Tanzania (R.E 2002) 141Commercial case No. 4 of 2000 (Unreported)
38
On the role of the courts in admitting electronic evidence, the judge stated that; ‘the court
should not be ignorant of modern business methods and shut its eyes to the mysteries of the
computer.’142 This decision shows the judicial activism and the role of Judiciary in filling the
gaps left by the legislature.
The ruling by Nsekela J (as he then was) above presupposes that courts should not be blind of
technological advancement in so far as they affect the legal system of the country. They
should play their role in making sure that cybercriminals do not go unpunished on a mere
ground that laws do not effectively cover cybercrimes matters.
Subsequently, cases involving computer-generated evidence have been referred to courts of
law. For instance, Tanzania Bena Co. Ltd v. Bentash Holdings Ltd143 relates to e-mail
evidence. In this case, parties exchanged communications by way of e-mails on purchase of a
farm and crushes. The e-mails were tendered in court and admitted as one of the exhibits. The
court (Per Kimalo J, as he then was), found that the exchange of e-mails between the parties
draws a conclusion that the defendant took possession of the farm and crushes.144 In other
words, the e-mails were admitted as admissible electronic evidence.
Another case is that of National Bank of Commerce v. Milo Construction Co. Ltd and two
others145 which involved a claim on recovery of an amount of money alleged to have arisen
out of an overdraft facility. It was alleged that the plaintiff defaulted repayment of the said
facility. Two statements were tendered in court. One was the processed easy bank computer
program, and the other was the processed inflexible banking computer program. The court
found discrepancies between the two statements as some entries were not reflected in one of
the statements. The plaintiff did not adduce sufficient explanation on the discrepancies. The
court therefore found that the plaintiff has failed to prove the exact amount the first defendant
borrowed from the plaintiff.
The analysis of this case reveals that the plaintiff had bank-produced statements generated by
two different computer programs. The later program did not have features similar to the
earlier one. Unfortunately, the Bank failed to lead expert evidence to clear the discrepancies
noted. The court was therefore justified in rejecting the claim in the absence of sufficient
explanations regarding the operation of the two computer programs. One would expect the
142See note 13 above, at pg.113143Commercial case No. 71 of 2001 (Unreported)144See note 133 above, at pg. 113145Commercial case No.293 of 20002(Unreported)
39
bank to make use of the software programmers who created the two computer programs.
Perhaps it is an opportune moment for the courts to make use of forensic experts, who would
assist it in analysing computer related evidence.146
The Legislature, on the other hand, responded by enacting Electronic Evidence Amendment
Act 2007147 which provided provision for the reception of electronic evidence in courts of law
in Tanzania. The new section has been added in the Tanzania Evidence Act 1967, the said
section is section 40 A.
This section provides, inter alia, that; in any criminal proceedings, information retrieved from
computer systems, networks or servers; or records obtained through surveillance of means of
preservation of information including facsimile machines, electronic transmission and
communication facilities shall be admissible as evidence.
CHAPTER FOUR
CONCLUSION AND RECOMENDATIONS
4.1 Introduction
The researcher, after making a thorough examination on how the advancement of science and
technology have impacted on the Tanzanian legal system, comes up with the following
conclusion and recommendations.
4. 2 CONCLUSION
This research aimed at examining the current legal system in Tanzania as far as cybercrimes
are concerned. That was to be done through examining the efforts taken to combat
cybercrimes and areas for more concern. Comparison as to what has been done in other
jurisdictions to fight against cybercrimes was inevitable as well.
Some of the laws which the researcher has examined are; The Evidence Act,148 Criminal
Procedure Act,149 and the Penal Code,150 whereby the researcher observed and concludes that
146See note 133 above, at pg. 114147Act No. 46 of 2007148CAP 6 of the Laws of Tanzania (R.E 2002)149CAP 20 of the Laws of Tanzania (R.E 2002)150CAP 6 of the Laws of Tanzania (R.E 2002)
40
none of these laws deals with the issue of cybercrimes with overriding specificity and
seriousness as required.
The researcher has come to the conclusion that the existing laws in Tanzania are not capable
enough to combat cybercrimes. The amendments made to some of the laws such as the
Evidence Act, are still not adequate enough to keep pace with the increasing rate of
cybercrimes.
The researcher has also examined that, following the lack of specific cyber laws, and
continued relying on the vague interpretation of existing criminal laws, Tanzania is
increasingly becoming the cybercriminals’ haven as cyber activities are getting roots therein.
4.3 RECOMMENDETATIONS
After coming across all challenges brought by technological development worldwide and
Tanzania, there is no room for Tanzania to isolate itself from the rest of the world. Serious
efforts should be taken by responsible organs to bring cyber laws within the jurisdiction of
this country. To curb these challenges, the researcher has come up with the following
recommendations to be considered;
4.3.1 The Need to Enacting Cyber Laws
The only quick and sure attempt by which Tanzania will defeat cybercrimes is the enactment
of specific laws dealing with cybercrimes and not relying on the vague interpretation of the
existing penal laws.
Tanzania will need to learn experience of other countries like India, South Africa, Nigeria
and the UK that have accommodated the challenges of Information Communication
Technology through enactment of legislation that address properly issues relating to
cyberspace. Tanzania can also enjoy the lesson from the provisions of Convention on Cyber
Crime,151 Model Law on Electronic Evidence,152 and the Commonwealth Model Law on
Computer and Related Crime.153 The government should be flexible enough to cope with the
changes that are taking place rather than using traditional legislations in the digital age.
151Convention on Cybercrime ,Budapest, 23.XI.200152The Uncitral model law on electronic commerce, with guide to enactment 1996 with additional article 5 bis as adopted in 1998153Bourne, 2002
41
Speaking in 2005 on the need for the law to adapt itself to the times for the achievement of
justice, the Nigerian Honourable Justice, Pats-Acholonu of the Supreme Court stated,154
‘The beauty of the law in a civilised society is that....It should be progressive and act
as a catalyst to social engineering. Where it relies on mere technicality or out-moded or
incomprehensible procedures and immerses itself in a jacket of hotchpotch legalism that is
not in tune with the times, it becomes anachronistic and it destroys or desecrates the temple
of justice it stands on’ 155
In addition to that, we can also benefit from the wisdom of Lord Denning, who said that;156
‘What is the argument on the other side? Only this that no case has been found in
which it had been done before. That argument does not appeal to me in the least. If we never
do anything which has not been done before, we shall never get anywhere. The laws will
stand still whilst the rest of the world goes on and that will be bad for both’157
The arguments by these two scholars all suggest the need of having a specific law on a
particular matter and the need for those laws to change timely following the changes in the
social circumstances. Tanzania can be said be one of the big targets of these arguments as far
as cybercrimes are concerned.
4.3.2. Training of the Judges, Lawyers and Law Enforcers.
There is no doubt that, most of the lawyers, magistrates, judges and law enforcers got their
education and training while cybercrime was not an issue. To ensure that justice is not only
done but seen to be done, training of these people is very important to equip them with basic
knowledge of cyber law.
4.3.3. Judicial Response
The researcher recommends that judges should continue to play a vital role in extending the
existing principles governing paper-based documents and authentication to cover documents
and signatures in electronic form. It is recommended that judges should categorically hold
154Chukwuemerie, A.I. Affidavit Evidence and Electronically Generated Materials in Nigerian Courts Volume 3, 2006 at Pg. 198155Ibid156Ibid157See 154 note above, at Pg. 198
42
that evidence in a computer hard disk, flash disk; compact disk or floppy disk is relevant and
admissible to prove or disprove a fact in issue in legal proceedings.
The effect of this is to allow parties to present in court not only computer printouts, but also a
piece of information in the above mentioned devices. For instance, in the case of National
Bank of Commerce v. Milo Construction Co. Ltd and two others,158 the court missed the
opportunity of inspecting the two computer programs which generated the statement that
were admitted in court.
The examination of the two programs, with the aid of a forensic expert, would have cleared
the doubts whether replacing an old computer program for a new one leads to having two
different standards of calculating interest resulting in two different statements. With the
absence of a computer forensic, a person knowledgeable with the operation of the two
computer programs could have been called to testify in his respect.
The similar view was taken in an English case of R v. Shepherd.159 Though his case was
criminal in nature, but the principle set is relevant to the point under discussion. It was held
that; ‘proof that a computer was reliable could be provided by calling a witness who was
familiar with its operation in the sense of knowing what the computer was required to do and
who could say that it was doing it properly, and such a witness need not be someone
responsible for the operation of the computer.’160
4.3.4. Raising Public Awareness and Education
There is a need of educating the whole community on the harms of cybercrimes and the
techniques applied by the cyber criminals. For example, as most of the organisations and
financial institutions are operating with the assistance of computer, people should be
educated on how they can handle their computers and passwords for the sake of securing
their information.
Tanzanians are characterized by generosity that affects not only material exchange, but also
information exchange. Because of this generosity, you may ask to know about one thing and
end up with a lot of more information being provided. One with malicious may be tempted to
misuse the information. Furthermore, in connection with culture, there was observed lack of
158Commercial case No. 293 of 2002 (Unreported)159(1993)1 All ER 213160See note 133 above, at pg. 119
43
discipline concerning password that appears to be a very significant problem. It is very
common to have passwords shared among employees.
4.3.5. The Need for Firms to secure their networked information
The first thing organisations can do is to take reasonable steps to ensure that their networks
are well protected. Even where laws are adequate, organisations dependent on their network
must make their own information and systems secure. This can be done through the
installation of software such as antivirus software and firewalls.
4.3.6. Coordination and Cooperation
There is no doubt that cybercrime is global in nature, to curb this problem, Tanzania will
need to cooperate with other countries and international organisations to effect this war. In
addition, Tanzania will have also to ratify the convention on cybercrime and to invite legal
and IT experts within and outside Tanzania to address the issue and thereafter to provide
ways of handling this global harm.
44
BIBLIOGRAPHY
BOOKS
Adam Mambi, ICT Law Book: A Source book For Information and Communication Technologies and Cyber Law In Tanzania and East African Community, Mkuki na Nyota Publishers: Dar Es Salaam, Tanzania, 2010
Andrew Mollel et el, Electronic Transactions and Law of Evidence in Tanzania, Peramiho Printing Press: Iringa Tanzania, 2007
Casey, E. Digital evidence and computer crime: forensic science, computers and the internet, 2004.
Chukwuemerie, A.I. Affidavit Evidence and Electronically Generated Materials in Nigerian Courts Volume 3, 2006.
David I Bainbridge, Introduction to Information Technology Law, 6th Ed. Pearson Education Limited: England, 2008
Dr. Eve Hawa Suinare, Electronic Evidence and its Admissibility in Tanzania Courts, World Series Group Publications: 2007
Edward A. Cavazos et el, Cyber-Space and the Law: Your Rights and Duties in the On-Line World , MIT Press: Cambridge, London 1996.
45
Fick J, Cybercrime in South Africa: Investigating and Prosecuting Cyber crime and the benefits of public-private partnerships, Butterworths, London, 2009.
Grabosky, P. Cybercrime and Information Warfare, Paper presented at the Transnational Crime Conference convened by the Australian Institute of Nexis, UK. Edinburgh Dublin. Sciences, 2009 – Vol. 6, No. 4.
Gringras, C, The Laws of the Internet, 2nd edition, Butterworth’s, Lexis, 2003.
Klodwig Mgaya, Development of Information Technology in Tanzania, United Nations University (UNU) Press: Tokyo, Japan, 1994.
Lloyd J.J, Information Technology Law, 3rd Ed. Butterworth’s, Edinburgh Duldin, London, 2001.
Mapunda, B.T.Evidence part one, Relevancy of facts, 2005.
Richard A. Spinello, Cyber Ethics: Morality and the Law In Cyber Space, 3rd Ed. Jones and Bartlett Publishers: Massachusetts, London, 2006.
Seipel I.J, Law and Information Technology, Information Communication Technology Commission Report Stockholm, 2002.
Watney, M. Understanding Electronic Surveillance as an investigatory method in conducting criminal investigations on the internet, 4th Ed, Butterworths, 2006
CASES
DPP v. Kilbourne (1973) A.C.729 at Pg. 756
Maryland case (1996) 48 Cal. App. 4th 1822 [56 Cal. Rptr. 2d 498]
National Bank of Commerce v. Milo Construction Co. Ltd and two others, Commercial case No.293 of 20002(Unreported)
R v. Shepherd. (1993)1 All ER 213
Trust Bank Ltd v. Le-Marsh Enterprises Ltd, Commercial case No. 4 of 2000 (Unreported)
Tanzania Bena Co. Ltd v. Bentash Holdings Ltd, Commercial case No. 71 of 2001 (Unreported)
ELECTRONIC SOURCES
46
The website of John Ubena on Why Tanzania Needs Electronic Communications Legislation?, Law Keeping up with Technology, found at http://www.Irct.go.tz/documents/journal.pdf retrieved on 23rd
December 2011.
The website of Eileen P. Drew and F. Gordon on the Information Technology in Selected Countries: Reports from Ireland, Ethiopia, Nigeria and Tanzania found at http://www.lrct.go.tz/documents/jpurnal.pdf retrieved on the 21st December 2011. The website of the UN on the Draft African Union convention on the Establishment of a Credible Legal Framework for Cyber Security in Africa, found at http://www.uneca.org/aisi/elegislation/documents/Draft_ accessed on 6th April 2012.
The website of Heidari, M. on. Malicious codes in depth, available in http://www.securitydocs.com accessed on 9th March 2012
The website of United Nations on Criminalisation of Computer wrong doing –United Nations, found at www.un.org/events/11thcongress/docs/bkkcp19e.pdf, accessed on 25th March 2012.
The website of UN, on UNECA, AU to provide e-legislation against cyber crimes in Africa , found at http://www.businessdayonline.com/NG/index.php/news/world-news/20982-uneca-au-to-provide-e-legislation, accessed on 6th April 2012.
The website of Terry M. Anderson on Criminal Evidence: Principles and Cases, found at www.amazon.com/Criminal-Evidence-Principles-Thomas-Gardner/dp accessed on 1st April 2012.
The website of Rex Attorneys on Tanzania: Admissibility Of Electronic Evidence, found at http:// www.mondaq.com/article.asp?articleid accessed on 9th April 2012
JOURNALS/ THESIS
A. Abdallah, The impact of ICT revolution in Tanzania’s legal system: A critical analysis of cybercrimes and computer forensic evidence. A compulsory research paper submitted in partial fulfilment for the requirement for the degree of master of laws ( LLM) by thesis of the open university of Tanzania.
Adam Mambi, Public Policy, Legal Issues on cyber Security in Africa, Dakar, Senegal, 2009
Dr. Eve Hawa Suinare, Electronic Evidence and its Admissibility in Tanzania Courts, World Series
Group Publications: 2007
Erick Agwe-Mbarika Akuta et el Combating Cybercrimes in Sub-Sahara Africa: A Discourse on Law,
Policy and Practice, International Research Journals: 2011.
Saidi M. Kalunde, The Status of Cybercrimes in Tanzania, Strasbourg, France, 2011
47
Walden, I. East African Community Task Force on Cyber Laws, May 2008.
REPORTS
Report of the second EAC regional task force meeting on cyber laws, Golf course Hotel Kampala Uganda, June 2008
The United Nations Economic Commission for Africa (UNECA) report, on 3rd April 2012
NATIONAL LEGISLATIONS
Broadcast Receiving Apparatus (Licensing) Act No. 6 of 1964
Broadcasting Corporation (Dissolution) Act of 1965 No. 11 of 1965
Broadcasting Services Act of 1993
Commission for Human Rights and Good Governance Act No. 16 of 2007
Communications Act N0 18 of 1993
Evidence Act of 1967 (CAP 6 of Laws R.E 2002)
Penal Code CAP 16 of the Laws (R.E 2002)
The Communications Regulatory Authority Act N0 12 of 1994
The Posts and Telecommunication Act of 1993(R.E 2010)
The Posts and Telecommunications Corporation Act of 1977
FOREIGN LEGISLATIONS
The Computer Misuse Act of the United Kingdom of 1990
CONVENTIONS
Draft African Union Convention on the Establishment of a Credible Legal Framework for Cyber Security in Africa, version 01/01of 2011.
48
United Nations Convention on International Trade Law (UNCITRAL) Model Law, guide to enactment, 1996.
United Nations Convention on the use of electronic communications in International Contracts of 2007.
The Convention on Cybercrimes of 2004