There are currently 0 users and 45 guests online.
AICCIFL - African ICT Criminal Intelligence, Forensics and Litigation SIG
AICCIFL - African ICT Criminal Intelligence, Forensics and Litigation SIG is designed to provide state-of-the-art knowledge around Forensic investigation of ICT-related crime. ICT Crimes have traditionally been seen as the problems of the western world; however everyone is at risk and those who are not are soon going to be. The trends in hitherto developing nations is increasing opening up in the communication sector; this will bring numerous opportunities but also pose challenges like ICT– crime. The U.S secret service has estimated the cost of cyber fraud at around U.S$ 2.5 billion; one reason for these high levels of computer crimes is that personal computers are common and the population of users is large. Opportunity is great and opportunity makes a thief. Topics covered in the SIG include:
ICT is a dynamic and growing field and no single person can claim to be an absolute authority in any aspect; in other words we are all novices, learners as we practice the art and science of ICT investigation. Please note that this is a closed SIG and you need to apply for membership. Also, while much of the information here is open, there are also other topics that are provate and available only to SIG members.
The African ICT Criminal Intelligence, Forensics and Litigation SIG is based on the work of KMAfrica KnowledgeHub member Davies Kelmen from Nairobi who is also the SIG manager.
Transparency International, self-described as “the global civil society organisation leading the fight against corruption,” has released its 2010 league table of corrupt countries. Guess what: about 3/4 of the world’s nations are corrupt!
With governments committing huge sums to tackle the world’s most pressing problems, from the instability of financial markets to climate change and poverty, corruption remains an obstacle to achieving much needed progress. The 2010 Corruption Perceptions Index shows that nearly three quarters of the 178 countries in the index score below five, on a scale from 10 (highly clean) to 0 (highly corrupt).
Submitted by KMAadmin on 19 November 2010 - 3:09pm. categories [ ]
categories [ ]
The focus on this section is on the likely targets of computer criminals. The particular criminals centred on are professional computer criminals. This is so because their activities are by far the most difficult to investigate. As has been mentioned before, they use highly sophisticated technology and they go out of their way to cover and conceal their tracks. They are usually aware of possible investigation and will often use staging to misdirect the course of investigation. In countries where these offences are rampant, many investigators have engaged in wild goose chases as a result of this staging. However, just like any other investigation, there is never a completely organised crime hence there will always be leads that a seasoned investigator can pick and follow up on.
Submitted by Kelmen on 8 December 2009 - 10:51am. categories [ ]
The Forensic ICT SIG wants to rebrand and rename itself. Which of the following names do YOU choose?
Submitted by storytelling on 4 December 2009 - 9:46am.
Mr. Kelmen has done perhaps the first real effort at codifying ICT forensic issues into a relevant topics upon which practitioners can meet to put their minds together and improve. Yet I find that there are certain issues that beg for answers. The work must first be acknowledged for raising the questions in the first place; indeed I have not come across text strictly dedicated to ICT forensic issues.
The first question that I request to be discussed is wether or not there are different meticulous procedures to treat a network environment as compared to machines not in a network interms of forensic procedures.
Perhaps this will help us understand why sometimes network forensic is distinguished from other ICT forensic issues. Moreover, the articles of Mr. Kelmen need to bring these issues out clearly.
Submitted by Korir on 26 November 2009 - 3:11pm. categories [ ]
This section documents the basic minimum of personnel required for an ict-crime syndicate to function effectively. The modern approach to Investigation emphasises team work, gone are the days when an inspector ‘Derricks ’ or ‘Charlock Holms’ would seem to anticipate everything a criminal does and like an onion, layer by layer unravels the crime exposing the criminal and the criminal acts to bare nakedness.
Today the concept of teamwork has gained more prominence as yielding better results. This is so because, teamwork benefits from various expertise available or necessary for the eventual solution of the crime. Hence depending on the nature of a crime a team of necessary experts is put together under a specialised investigator to carry out the investigations. Below we list some of the common experts necessary for any such investigation:
Submitted by Kelmen on 4 November 2009 - 2:46pm. categories [ ]
Crime Investigation is a scientific exercise that follows scientific procedures; each procedure is meticulously adhered to so that failure to follow the procedure could make the difference between solving the crime and not solving the crime. The procedure is what is called ‘General Procedure of Crime Investigation’ in the title above and it is chronologically listed below:-
The investigator should plan his work to enable him to conduct his investigations in an efficient and timely manner. The plan should be based on knowledge of the nature of the case one is investigating. It should be made amongst other things to cover:
Submitted by Kelmen on 4 November 2009 - 10:07am. categories [ ]
Crime classification is a very important step in every investigation; G. Mutusovskly says that “constant development of criminalistical characteristic of crimes is explained by the necessity of improving methods of their detection on the base of getting to know the nature of the criminal action itself, it’s mechanism, ways regularities of the inquiry process, and peculiarities of reflected evidences.”
Success in investigating any crime mostly depends on an investigators ability to understand not only the criminal-legal nature but also the criminalistical nature of the committed crime only under definite conditions. He should know typical criminalistic evidences of different crimes and be capable of revealing necessary criminalistical characteristic of a corresponding crime.
Submitted by Kelmen on 4 November 2009 - 9:59am. categories [ ]
Threats are things or conditions that pose a threat to secured data or programmes. Threats may include unauthorised modification, capture, and destruction or disclosure. Personal data are not the only vulnerable data. Confidential data on market strategies and product development must be kept from the eyes of competitors. Large sums of money transferred daily by electronic fund transfer must be kept against theft. The very high volume of business information processed by computers today means that the rewards of industrial espionage and fraud are of much higher magnitude than in the past and are increasing.
Submitted by Kelmen on 4 November 2009 - 9:47am. categories [ ]
With every change in technology comes an opportunity to violate systems and newer intrusions are getting to be more creative and effective. In one case in 1993, a long distance telephone company card holder compromised his card and 600 unauthorised international calls were placed on that card before network specialists detected the problem and disconnected the violators. All these happened in less than two minutes. Law enforcers and security managers have to be faster and smarter. They cannot continue the traditional approach of ‘security through obscurity, which is the keeping of vulnerable data security. There is need to embrace technology and device security policies that not only dissuade the violator from breaking into the system but also catch the violator. It is such technologies and policies that are the subject for this topic.
Submitted by Kelmen on 4 November 2009 - 9:38am. categories [ ]
Information Communication Technology (ICT) stand for the technologies including computers, telecommunication and audio-visual systems that enable the collection, processing, transportation, and delivery of information and communication services to users. Computer Technology Crimes include, theft of hardware, theft of software (piracy), theft of information (spying and netspionage), theft of time, trespass (hacking), credit card theft, ATM related theft and vandalism of hardware and software and denial of services. Having said these, it is necessary to explain what some of these words mean:
Hardware includes, the physical parts of a computer system, that is, the inputting devices such as keyboard, mouse, the Central Processing Unit (CPU), the display screen, and any other physical unit that qualify to be on the computer. Hardware theft therefore is when these components are physically stolen, while hardware vandalism is where malicious damage is occasioned on these components.
Submitted by Kelmen on 4 November 2009 - 9:29am. categories [ ]
Submitted by KMAadmin on 4 November 2009 - 9:08am.