Home Project-material A SOCIO-TECHNOLOGICAL ANALYSIS OF CYBER CRIME AND CYBER SECURITY IN NIGERIA

A SOCIO-TECHNOLOGICAL ANALYSIS OF CYBER CRIME AND CYBER SECURITY IN NIGERIA

Dept: COMPUTER SCIENCE File: Word(doc) Chapters: 1-5 Views:

Abstract

The Global Information Infrastructure creates unlimited opportunities for commercial, social and other human activities. However, it is increasingly under attack by cybercriminals; as the number, cost, and sophistication of attacks are increasing at an alarming rate. This study sets out to examine the sociological and technological factors that impact cybercrime and cyber security and thereby articulates the relevant circumstances and threats of cybercrime in Nigeria. The study approached the issue of cybercrime from theoretical and investigative points of views. Structured interviews with law enforcement agencies and governmental institution for cyber security were also conducted. Data obtained through these research instruments were subjected to descriptive analysis and frequency counts in order to explain the activities of Nigerian cybercriminals based on existing theories of crime, and to understand their intents, purposes and methods. Four theories of crime, namely, Structural Fu
INTRODUCTION

From business, industry, government to not-for-profit organizations, the internet has simplified business processes such as sorting, summarizing, coding, editing, customized and generic report generation in a real-time processing mode. However, it has also brought unintended consequences such as criminal activities, spamming, credit card frauds, ATM frauds, phishing, identity theft and a blossoming haven for cybercriminal miscreants to perpetrate their insidious acts. The development of the internet and the widened access to computer technology has created new opportunities for work and business activities, as well as those who engage in illegal activities. The rise of technology and online communication has not only produced a dramatic increase in the incidence of criminal activities, but has also resulted in the emergence of what appears to be a new variety of criminal activities. Both the increase in the incidence of criminal activities and the possible emergence of new varieties of criminal activity pose challenges for legal systems, as well as for law enforcement agencies (Brenner, 2007).While technological advancements have produced radical shifts in the ability to reproduce, distribute, control, and publish information, the Internet in particular has radically changed the economics and ease of reproduction (Longe and Chiemeke, 2008). Computer networks have also radically changed the economics of distribution. With transmission speeds approaching a billion characters per second, networks enable the sending of information products worldwide, cheaply and almost instantaneously.

The Global Information Infrastructure (GII) presents vast opportunities, but it can also be dangerous for the innocent people. Fraudulent schemes, scams and con artists have certainly been around long before the introduction of the internet, however, with the

14

technology and explosive growth of the internet, fraud has quickly become a major concern for consumers, merchants and governments. Furthermore, the introduction and acceptance of the Global System for Mobile Communication (GSM) in Nigeria and the proliferation of digital devices (such as the MP3 players, IPOD, IPAD, cell phones, smart phones, GPRS enabled phones) and electronic platform services (such as blogs, instant messaging and other web 2.0 platforms) contributes to the increase in internet fraudulent acts.

1.1 BACKGROUND TO THE STUDY

Over the past twenty years, immoral cyberspace users have continued to use the internet to commit crimes; this has evoked mixed feelings of admiration and fear in the general populace along with a growing unease about the state of cyber and personal security. This phenomenon has seen sophisticated and extraordinary increase recently and has called for quick response in providing laws that would protect the cyber space and its users. The first recorded cyber murder was committed in the United States seven years ago. According to the Indian Express, January 2002, an underworld don in a hospital was to undergo a minor surgery. His rival went ahead to hire a computer expert who altered his prescriptions through hacking the hospital’s computer system. He was administered the altered prescription by an innocent nurse, this resulted in the death of the patient. Statistically, all over the world, there has been a form of cybercrime committed every day since 2006. Prior to the year 2001, the phenomenon of cybercrime was not globally associated with Nigeria. This resonates with the fact that in Nigeria we came into realization of the full potential of the internet right about that time. Since then, however, the country has acquired a worldwide notoriety in criminal activities, especially financial scams, facilitated through the use of the Internet. Nigerian cyber criminals are

15

daily devising new ways of perpetrating this form of crime and the existing methods of tracking these criminals are no longer suitable to deal with their new tricks. The victims as well show increasing naivety and gullibility at the prospects incited by these fraudsters. Since the issue of cyber security is raising a number of questions in the minds of Nigerians, it is only fair that we answer these questions.

Crime remains indefinable and ever strives to hide itself in the face of development. As measures and techniques for detecting crimes and criminals advance, criminals also look for means of hiding from these measures and the Internet currently serves as a hiding place for fraudsters who have simply migrated from the streets to an electronic platform offered by the World Wide Web. Different nations have adopted different strategies to contend with crimes depending on their nature and extent. Certainly, a nation with high incidence of crime cannot grow or develop. That is so because crime undermines development. It leaves negative social and economic consequence (Sylvester, 2001).For Nigeria, a nation in the process of saving her face regarding cybercrimes; efforts are now being directed at the sources and channels through which cybercrimes are perpetuated. The task of re-stigmatizing cybercrime and re-dignifying honest is not as easy as that of institutionalising a deterrence mechanism like Code of Conduct Bureau, Independent Corrupt Practices and other related Crimes Commission (ICPC), Economic and Financial Crime Commission (EFCC) and many more. This is after many years at the bottom of the ladder of the corrupt nations of the world, which is based on some index set by the Transparency International (TI), an anti-corruption crusader group. The Advance Fee Fraud popularly called “419” has given birth to cybercrime. Needless to say that cybercrime popularly called “Yahoo-Yahoo” is an offshoot of Advanced Fee Fraud. Advance Fee Fraud which became popular in the early ‘90s, has now produced its first offspring with mostly the unemployed and

16

undergraduates as its practitioners. The quest of social scientists and historians is, ‘how did a society that value hard work, cooperation and contentment become deeply rotten in corruption (Ogunsanya, 2006). The answer to this can be linked to the materialistic value of the country.

Majority of the cybercrimes perpetrated in Nigeria generally are targeted at individuals and not necessarily computer systems, hence they require less technical expertise. The damage done manifests itself in the real world. Human weaknesses such as greed and carelessness are generally exploited. The damage done is largely psychological and financial. These crimes are similar to theft, and the likes that have existed for centuries, even before the development of high-tech equipment. Through the internet, the same criminals or persons with criminal intents have simply been given a tool which increases their potential pool of victims and make them all the harder to trace and apprehend (Aghatise, 2006).The challenge in fighting cybercrimes today relates to the fact that cybercrimes have been in existence for only as long as the Global Information Infrastructure exists. This explains the unpreparedness of society and the world in general towards combating them. Numerous crimes are committed daily on the Internet with Nigerians at the forefront of sending fraudulent and bogus financial proposals all over the world. Criminals involve in the Advance Fee Fraud schemes (419) are now popularly referred to as “yahoo-yahoo” in Nigeria. The nation has therefore carved a position for herself as source of what is now generally referred to as “419” mails named after Section 419 of the Nigerian Criminal Code (Capp 777 of 1990) that prohibits Advance Fee Fraud.

Apart from the availability and usage of Internet facilities in cyber cafes for scam mails and other cybercrimes, the evolution of fixed wireless facilities in the Nigerian network landscape has added another dimension to the cybercrimes problem. Fraudsters

17

who can afford to pay for Internet connection vial fixed wireless lines can now perpetrate their evil acts within the comfort of their homes. In some cyber cafes, a number of systems are dedicated to fraudsters (popularly referred to as “yahoo boys”) for the sole purpose of hacking and sending fraudulent mails. Other cyber cafes share their bandwidth (popularly referred to as home use) to some categories of customers who acquire systems for home use in order to perpetuate cybercrimes from their homes (Longe and Chiemeke, 2008).

1.2 STATEMENT OF THE PROBLEM

The internet creates unlimited opportunities for commercial, social and other human activities. But with cybercrime, the Internet introduces its own peculiar risks. What are the menace cybercrime and cyber-security threats poses to Nigeria? The convenience associated with Information Technology and the Internet is now being exploited to serve criminal purposes. Cybercrime covers Internet fraud not just online Advance Fee Fraud (419), also the use of computers and or the Internet to commit crime. Computer-assisted crime includes e-mail scams, hacking, distribution of hostile software (viruses and worms), denial of service attacks, and theft of data, extortion, fraud and impersonation. Waziri (2009) spoke about the dreadful level of corruption as being a threat to Vision 20:2020. Cyber-crime is an obstacle that may shut the door of progress against the nation. This was why Aluko (2004) gave seventeen (17) ways of stopping financial corruption in Nigeria. One of these crimes according to him has to do with cybercrimes. The global village currently records an increasing criminal behaviour. News of cybercriminal activities continue to fill the pages of the newspaper, it is central to world news and has become a global problem. There is hardly a place where computers and internet facilities are found that cases of crime are not recorded. New modes of

18

operation are developing as the Global System for Mobile-telecommunication (GSM) is now used for browsing. A lot of young people are common among the perpetrators of these criminal activities. They spend hours browsing and sometimes stay awake all night to carry out their nefarious activities. The people involved are mostly found within the ages of fifteen to thirty years.

According to Erhabor (2008), cybercrimes are described as one of the fastest growing criminal activities on the planet. He repeated the fact that it covers a large range of illegal activity including financial scams, computer hacking, downloading of pornographic images from the internet, virus attacks, stalking and creating websites that promote hatred. In recent time, young students in the tertiary institution engaged in forgery of all kinds ranging from false admission paper to school fees receipts, certificates racketeering and examination malpractice that is, accessing useful information during examinations through the handset and other electronic devices. Ajao (2008) said Nigeria, Ghana and South Africa top cybercrime in Africa. Nigeria is not spared from the heartache caused by cybercrimes.

The fight against cybercrime and cyber security threats in Nigeria requires not just knowledge of Information Technology but Information Technology Intelligence on the part of the security agencies. In Nigeria, there is an Information Technology Security divide – a serious shortage of skills to deal with the threats associated with Information Technology. Shouting and moaning about cybercrime is not enough. All the talk is meaningless unless the gap is closed. Security agencies need to be equipped with the skills, the know-how and the insight necessary to fight cybercrime effectively. The findings above are worrisome and it is in order to curb and proffer solution to the above that the study intends to look at the sociological and technological factors influencing cybercrime and cyber security in Nigeria.



Recent Project Materials

Abstract Studies on the biology of silver catfish Chrysichthys nigrodigitatus (Lacèpède, 1803) in Jebba La...
Word(doc) 1-5 5 Read More
Abstract Amietophyrnus regularis a synonym of Bufo regularis is an amphibian in the family Bufonidae.Amietoph...
Word(doc) 1-5 2 Read More
Abstract A preliminary study of helminth parasites of toad in Nnamdi Azikiwe University Awka, Anambra State,...
Word(doc) 1-5 4 Read More
Abstract ...The study investigated the lethal and sublethal effects of imidacloprid on stingless bee. Imidac...
Word(doc) 1-5 1 Read More
View More Topics

Browse by Departments