Download - The Paradigm of Cybercriminals in Cameroon
![Page 1: The Paradigm of Cybercriminals in Cameroon](https://reader035.vdocuments.mx/reader035/viewer/2022081513/58a0cf611a28ab6d018b6a49/html5/thumbnails/1.jpg)
The paradigm of cybercriminalsin Cameroon
Saron M. ObiaPan African Institute for Development
West AfricaPAID-WA Buea, Cameroon
![Page 2: The Paradigm of Cybercriminals in Cameroon](https://reader035.vdocuments.mx/reader035/viewer/2022081513/58a0cf611a28ab6d018b6a49/html5/thumbnails/2.jpg)
Outline Who is cybercriminal? Which software do they use? How financial theft is carried out? Who is behind the scene? Why do they succeed?
![Page 3: The Paradigm of Cybercriminals in Cameroon](https://reader035.vdocuments.mx/reader035/viewer/2022081513/58a0cf611a28ab6d018b6a49/html5/thumbnails/3.jpg)
Who is cybercriminal?
Any person engage in criminal acts with the use of computer the use of the internet for illegal activities especially for financial motives
The types of crimes include
scamming (sale of pets, drug deals and cars) phishing hacking
![Page 4: The Paradigm of Cybercriminals in Cameroon](https://reader035.vdocuments.mx/reader035/viewer/2022081513/58a0cf611a28ab6d018b6a49/html5/thumbnails/4.jpg)
The case of Assoua Achille Brice Eteki
*identity theft was used to mislead his victims Ach Ille Binirayjr Binnirey BinAm Studios
*creation of series of email accounts on social media
[email protected], [email protected], Yahoo ID: achille_eteki, Skype: binirayjr, [email protected], [email protected], [email protected], [email protected] Source: scamwarner
![Page 5: The Paradigm of Cybercriminals in Cameroon](https://reader035.vdocuments.mx/reader035/viewer/2022081513/58a0cf611a28ab6d018b6a49/html5/thumbnails/5.jpg)
Which software do they use?
Software used by cybercriminals to secure their activities shall be disclosed in the following photos
jackhttps://www.google.com/search?q=magic+jack&biw=1366&bih=657&source=lnms&tbm=isch&sa=X&ved=0ahUKEwis366E_PnKAhVpYpoKHYfoCbwQ_AUIBygC#imgrc=Hn-0YMfDYtcOCM%3A
The above picture the device is known as the magic jack, use for free call via U.S
The gadget bought for 50000FCFA and used for a year
![Page 6: The Paradigm of Cybercriminals in Cameroon](https://reader035.vdocuments.mx/reader035/viewer/2022081513/58a0cf611a28ab6d018b6a49/html5/thumbnails/6.jpg)
Hide my Ass use by cybercriminals to secure their location used to secure the VPN provides IPs for different countries and their local time
![Page 7: The Paradigm of Cybercriminals in Cameroon](https://reader035.vdocuments.mx/reader035/viewer/2022081513/58a0cf611a28ab6d018b6a49/html5/thumbnails/7.jpg)
https://www.google.com/search?q=hide+my+ass&source=lnms&tbm=isch&sa=X&ved=0ahUKEwi45JTC6_nKAhVsCZoKHXqpCLgQ_AUICSgD&biw=1366&bih=657#imgrc=bPk13ZzCJ3_jmM%3A
![Page 8: The Paradigm of Cybercriminals in Cameroon](https://reader035.vdocuments.mx/reader035/viewer/2022081513/58a0cf611a28ab6d018b6a49/html5/thumbnails/8.jpg)
text Now a secured chat forum for cybercriminals and clients
https://www.google.com/search?q=textnow&biw=1366&bih=657&source=lnms&tbm=isch&sa=
X&ved=0ahUKEwisw8Pi_PnKAhUBCZoKHbHODnsQ_AUICSgE#imgrc=zkkoHjg8XG-
DBM%3A
![Page 9: The Paradigm of Cybercriminals in Cameroon](https://reader035.vdocuments.mx/reader035/viewer/2022081513/58a0cf611a28ab6d018b6a49/html5/thumbnails/9.jpg)
How is financial theft is carried out?
first identification of an online transaction
scan a birth certificate and edit, changing the name to that of the
receiver
apply for lost of ID card to procure another
use the ID card receipt issued at the police station to withdraw the
money(impersonation)
collaborate with dishonest staff to do the withdrawal in the banks
![Page 10: The Paradigm of Cybercriminals in Cameroon](https://reader035.vdocuments.mx/reader035/viewer/2022081513/58a0cf611a28ab6d018b6a49/html5/thumbnails/10.jpg)
Who is behind the scene?
when the police make a step, cybercriminals take ten steps ahead.
those that are behind the scene in cybercrimes pick-up Dishonest staffs in financial institutions Unscrupulous authorities engage in such
activities
![Page 11: The Paradigm of Cybercriminals in Cameroon](https://reader035.vdocuments.mx/reader035/viewer/2022081513/58a0cf611a28ab6d018b6a49/html5/thumbnails/11.jpg)
Why do they succeed?
Inadequate training of those involved in investigating
cybercrimes
The poor identification or authentication method
No regulations of protocols
Lack of internet censorship