Dismiss Notice
You are browsing this site as a guest. It takes 2 minutes to CREATE AN ACCOUNT and less than 1 minute to LOGIN

Fighting CYBERCRIME in Tanzania

Discussion in 'Tech, Gadgets & Science Forum' started by Shy, May 9, 2009.

  1. Shy

    Shy JF-Expert Member

    #1
    May 9, 2009
    Joined: Nov 2, 2006
    Messages: 4,238
    Likes Received: 17
    Trophy Points: 0
    There is no doubt that cybercrime is an image nightmare for Tanzania. The recent Attacks on our Local Banks and other Places is an indication that cybercrime is a source of concern and embarrassment. According to media reports in Tanzania , a bill is presently being prepared to deal specifically with the menace of cybercrime.

    The Internet creates unlimited opportunities for commercial, social and educational activities. But as we can see with cybercrime the net introduces its own peculiar risks. What is the menace cybercrime poses to society? The convenience associated with IT and the Internet is now being exploited to serve criminal purposes. Cybercrime covers Internet fraud not just online – the use of computers and or the Internet to commit crime. Computer-assisted crime includes e-mail scams, hacking, distribution of hostile software (viruses and worms), denial of service attacks, theft of data, extortion, fraud and impersonation.

    Cyber crime uses the unique features of the Net – sending of e-mail in seconds, speedy publication/ dissemination of information through the web to anyone on the planet. Computer attacks can be generated by criminals from anywhere in the world, and executed in other areas, irrespective of geographic location. And often these criminal activities can be faster, easier and more damaging with the use of the Internet.

    Since the loss suffered by consumers and investors creates serous credibility and image problems, many countries develop strategies for preventing, detecting and containing the threats associated with cybercrime. While it is acknowledged that greed is a major factor motivating most victims, what about the image created for many who never respond?

    How is the nation fighting cyber crime? It’s interesting that there is quite a lot of talk about fighting cyber crime. But what are the efforts? And how effective are they? Since there is an awareness of the menace it poses to society, what have been the sincere and meaningful efforts to fight cybercrime? For one are the security agencies enlightened enough? When you talk of efforts, you have to ask again: what have the security agencies done? How much has been invested in terms of time, education, personnel, etc? Are such efforts assessable or meaningful?

    Fighting cybercrime requires not just IT knowledge but IT intelligence on the part of the security agencies. In this clime, there is an IT security divide - a serious shortage of skills to deal with the threats associated with IT. Shouting and moaning about cybercrime isn’t enough. All the talk is meaningless unless the gap is closed. Security agencies need to be equipped with the skills, the know-how and the insight necessary to fight cybercrime effectively.

    While resources are needed to fight the menace, it is imperative to avoid the misdirected approach of "throwing money" at the problem. Invest based on priorities and strategies. Such policies must be based on knowledge. Knowledge not just for the operatives, but also for those that will commit resources. For example, do the decision makers have any REAL, PRACTICAL appreciation of technology, not to talk of cybercrime? What is their take on the basics of information security in today's high-tech, business environment? The cybercriminals seem to have the technology advantage.

    Essentially cybercrime is information and intelligence based activity. You cannot fight cybercrime with ignorance, strong directives or boastful talk.

    To fight cybercrime, those involved have to spend time to learn how cybercrime operates and then devise strategies to fight the menace. And note that learning in IT is not one-off but lifelong.

    How strong are the security agencies in the fundamentals of IT? You cannot fight today’s crime with yesterday’s technology. It will always be a losing battle if security professionals are way behind the cyber criminals in terms of tech knowledge. It’s not just about computing skills, but IT Security expertise is essential.

    Fighting cybercrime requires a holistic approach, not just addressing the cyber cafés alone. What is the culture towards cybercrime? All stakeholders should be involved. Security agencies should liaise with industry stakeholders. There is a need to create a security-aware culture involving the public, the ISPs, cybercafes, government, security agencies and Internet users. There must be education about the problems, risks and solutions. Existing and potential victims need to be considered. Greed and unrealistic expectations are major problems. “If an offer is too good to be true, don't believe it”.

    Furthermore, legislation needs to keep pace with e-crime, especially as it becomes more prevalent and sophisticated. Apart from awareness and culture, security measures (technical and non technical) will need to be put in place and enforced, as part of the solutions. This might involve raising penalties and increasing the seriousness of e-offences. The right culture should create a high level of awareness amongst stakeholders.

    Who are the main actors involved? Cyber cafés are not the only source of cyber crime. Apart from the Internet, what are the causes - both historical and current - for the continued rise in cybercrime activity? Can cybercrime be divorced from the widespread corruption in society? Or the harsh economic climate, high unemployment? Disregard for the rule of law and lack of transparency and accountability in governance certainly doesn’t help matters. There is no justification for crime but to the populace, who is perceived as the criminal? Which is the bigger crime: corruption in high places or cybercrime?

    Heavier punishments and enlightenment, closing down cyber cafés, issuing draconian directives may therefore not be meaningful without addressing the causes. To fight crime you attack the causes of crime.

    Also in terms of strategy, it is crucial to thoroughly address issues relating enforcement. Mishandling of enforcement can backfire. Enforcement can only work if it avoids harassment, abuse of privacy and extortion. Care must be taken not to throw out the baby with the bath water. Don't create a situation where genuine users of the Internet are frustrated out and unable to benefit from the Internet.

    We cannot afford to live in the dinosaur age. In today’s world, computing tools and the Internet are used to effectively promote social development and business growth. Strategies must strike a balance between security concerns and other developmental needs.

    Whatever strategy is adopted it should not be the “know-it-all” or “ram-it-down-their-throat” approach. Solutions should be practical, cost-effective, acceptable and supported by all stakeholders. It is not enough to issue directives and orders. For the right culture to grow all stakeholders must be involved in creating and accepting solutions. To fight crime, you need the cooperation of the community.

    There is no one measure that will cure the menace of cybercrime. But it is the combination of measures together with the sincerity and rigour with which they are implemented and administered that will serve to reduce risks most effectively.
     
  2. Z

    Zazo New Member

    #2
    May 10, 2009
    Joined: Feb 19, 2009
    Messages: 4
    Likes Received: 0
    Trophy Points: 0
    What I can see from the present situation of Tanzania, cyber crime and related issues are still not at a very serious stage but government should introduce or prepared with the policies and laws for future, especially in cyber cafes, every customer should register their name and address with showing any identity cards etc. This will help keeping a record of person used internet.
    Cyber crimes today is one of the biggest threat to national and international security worldwide, not only this but its also a devil to society of youths in every country. Now, time will show that how much Tanzania and Tanzanians are prepared to face this big-fat-ugly devil who is approaching them with a tremendous speed.
     
  3. Ndahani

    Ndahani JF-Expert Member

    #3
    May 10, 2009
    Joined: Jun 3, 2008
    Messages: 11,570
    Likes Received: 152
    Trophy Points: 160
    It could be a threat in the future if proactive measures are not put in place in due time.
     
  4. A

    AmaniGK JF-Expert Member

    #4
    May 11, 2009
    Joined: Jan 10, 2008
    Messages: 1,100
    Likes Received: 17
    Trophy Points: 135
  5. Abdulhalim

    Abdulhalim JF-Expert Member

    #5
    May 11, 2009
    Joined: Jul 20, 2007
    Messages: 16,463
    Likes Received: 16
    Trophy Points: 135
  6. Abdulhalim

    Abdulhalim JF-Expert Member

    #6
    May 11, 2009
    Joined: Jul 20, 2007
    Messages: 16,463
    Likes Received: 16
    Trophy Points: 135
    Kwenye MS Word kuna tools zinaitwa Copy & Paste halafu nyenine inaitwa Find & Replace..nadhani hii ni favourite commands za huyu mleta thread lol
     
  7. A

    AmaniGK JF-Expert Member

    #7
    May 11, 2009
    Joined: Jan 10, 2008
    Messages: 1,100
    Likes Received: 17
    Trophy Points: 135
    namfahamu Shy sana ndugu yangu... Sasa huyu jama Jide Adawi akiiona mmetundika bandiko lake hapa bila copy right si itakua kimeo?
     
  8. Abdulhalim

    Abdulhalim JF-Expert Member

    #8
    May 11, 2009
    Joined: Jul 20, 2007
    Messages: 16,463
    Likes Received: 16
    Trophy Points: 135
    Kuna nyengine ya 'mtaalam SHY' ipo hapa lol
     
  9. SnEafer

    SnEafer Senior Member

    #9
    May 11, 2009
    Joined: Apr 1, 2009
    Messages: 154
    Likes Received: 0
    Trophy Points: 0
    It doesn't matter if its a copy or anything, But the post still has a point. Being secured in tz is something new, its very suprising when u ask someone his speciality and he says "security specialist" ***Trust me i know***

    I haven't yet seen any company that deals with security in deep like mine yet***especially which coordinates with gov. ***
    most companies would just mention security in their brochures and when u approach them, u'll understand that they have no clue what they are suppose to be doing.

    Know comming to cyber crimes, thats a total new thing, ***if u don't trust me try proposing to the gov. and you'll get "huh?" as an answer. or something like we don't have a budget for it.***

    All and all, we have very old fashion leaders here in tz, i bet 60% of them have got laptops which ar used as a data entry things.
    So untill we decide to have a cyber crime in tz i think it would be like 2020 ***maybe***

    cheers
     
  10. Abdulhalim

    Abdulhalim JF-Expert Member

    #10
    May 11, 2009
    Joined: Jul 20, 2007
    Messages: 16,463
    Likes Received: 16
    Trophy Points: 135
    Ok, you are responding to the second issue. But what you have forgot mentioning is that copyrights laws were violated initially by the thread starter, how ironic..

    Cheers..
     
  11. SnEafer

    SnEafer Senior Member

    #11
    May 11, 2009
    Joined: Apr 1, 2009
    Messages: 154
    Likes Received: 0
    Trophy Points: 0
    ironic u said.. erm..
    i think we all know copying stuff and just chenging and pasting some other place is vialation and all, So how about we leave that and get back to the real discussion? or its just me who thinks the post makes sense? ***even though it has been copied and pasted***
    and i bet the guy you people ar saying he own the copyright and all, he copied some of the contents some other place, so i really doubt he would comment anything or sue.

    cheers
     
  12. Shy

    Shy JF-Expert Member

    #12
    May 11, 2009
    Joined: Nov 2, 2006
    Messages: 4,238
    Likes Received: 17
    Trophy Points: 0
    Nyie ndio hamjui mnaongea nini nenda kwenye blogu ya huyo dada hapo atakweleza nani alimwandikia makala hiyo ilikuwa kwa ajili ya gazeti la edunangu na mimi ndio mwandishi wa kwanza nikampa yeye mnaongea ongea tu vitu msivyokuwa na uhakika navyo
     
  13. Shy

    Shy JF-Expert Member

    #13
    May 11, 2009
    Joined: Nov 2, 2006
    Messages: 4,238
    Likes Received: 17
    Trophy Points: 0
    Eafer mimi ndio nilimpa huyo dada makala hii kwa ajili ya gazeti lake la edunanguw
     
  14. SnEafer

    SnEafer Senior Member

    #14
    May 11, 2009
    Joined: Apr 1, 2009
    Messages: 154
    Likes Received: 0
    Trophy Points: 0
    Nice, now i suppose those who just jumped in conclusion would step back and rethink.
    Anyway nice post i remember i talked about the same thing in a meeting sometime back.
    Hope tz would start those stuff early before its late.

    cheers
     
  15. K

    Kaka Blaza Member

    #15
    May 11, 2009
    Joined: Feb 1, 2009
    Messages: 18
    Likes Received: 4
    Trophy Points: 5
    Let's not let ourselves get distracted from the central topic of this posting.

    I would argue that the very first thing needed to enable Tz to combat cybercrime is an Act of Parliament (ie. a Law) that identifies activities which constitute a 'cybercrime' and what penalties the Courts can apply to those people who undertake such activities.

    Also, a number of related issues will need to be addressed, like providing for protection of privacy in cyberspace, recognition of transactions and signatures other than those done by pen and paper, to mention just those few.

    The problem is that those who know about the Law in Tz are mostly not concerned about IT issues, whereas those who know about IT issues are mostly not concerned about improving the legal environment. This is where we get our stalemate.

    It is becoming increasingly urgent that the stalemate should be overcome, because with the new connectivity via marine cable, our networks will become exposed to a great many new vulnerabilities from across the world. Most particularly, our computers will become attractive to those seeking inadequately protected PC to turn into Zombies. As the cybercrime is not explicitly illegal in Tz law books, cyber-terrorists and hackers will just love to use this country as the last traceable source for originating their activities.

    Or is this maybe a new opportunity for tourism?
     
  16. Abdulhalim

    Abdulhalim JF-Expert Member

    #16
    May 11, 2009
    Joined: Jul 20, 2007
    Messages: 16,463
    Likes Received: 16
    Trophy Points: 135
    lol..
     
  17. Abdulhalim

    Abdulhalim JF-Expert Member

    #17
    May 11, 2009
    Joined: Jul 20, 2007
    Messages: 16,463
    Likes Received: 16
    Trophy Points: 135
    The fact that you are determined to disprove us, come forward with crystal-clear genuine evidence NOT CLAIMS. Now lets get it done, shalln't we?
     
  18. Abdulhalim

    Abdulhalim JF-Expert Member

    #18
    May 11, 2009
    Joined: Jul 20, 2007
    Messages: 16,463
    Likes Received: 16
    Trophy Points: 135

    Futhermore, this dadaz of yourz seems to me to be a HE..lol

    Checked
     
  19. Yo Yo

    Yo Yo JF-Expert Member

    #19
    May 11, 2009
    Joined: May 31, 2008
    Messages: 11,245
    Likes Received: 39
    Trophy Points: 0
    kwikwikwikwikwikwi Dr uamvua nguo mwenzako haya muwe mnaambiana kwenye PM.......sasa kijana yu kama alivyozaliwa.......

    ......yaani kaona anaitwa JIDE kajua ni demu tehe tehe tehe
     
  20. L

    Lifer Member

    #20
    May 11, 2009
    Joined: Jan 28, 2007
    Messages: 33
    Likes Received: 0
    Trophy Points: 13
    Bongo sijasikia incident za cybercrime persee (yaani uhalifu ulio involve internet au uliofanyika over the internet) ila electronic fraud ipo kwa sana tuu bongo.Hapa chini Nimeweka linki za matukio mbali mbali ya electronic fraud Tanzania. Mostly uta notice yana involve "electronic card fraud" au kwa jina lingine "Debit card fraud".Kubwa kabisa naona ni lile la CRDB (922 Million) hata hivyo liliweza kufanikiwa kwa kiasi kikubwa kwa kuwa lili involve an "insider"

    Inawezekana kuna matukio mengi zaidi ya card fraud bongo, lakini hayajaripotiwa kwenye vyombo vya habari. Mabenki mengi huwa na hulka ya kuona haya ku reveal incident za namna hii, huenda ni kwa kuogopa kupoteza wateja au kwa kuogopa ku impact share price (mabenki yetu kadhaa ni publicly traded, yako listed pale DSE)

    "Card skimmers" zimewahi kukutwa zikiwa attached kwenye ATM za NMB na Barclays. Pia incident za "Phantom withdrawals" ni very common with card za Standard charterd bank, indicating kwamba, hata Stanchart ina suffer from ATM card skimming(a quick chat with watu wa stanchart visa card deparment ina indicate kuwa wana complaints kibao za un-authorized withdrawals) .A random survey ya ATM/debit cards za benki nyingi za bongo ina indicate kuwa, bado benki nyingi zina issue kadi zenye magnetic stripe, ambazo duniani kote inajulikana how vulnerable to "skimming" and duplication these cards are.A notable exception ni benki ya CRDB na Benki ya Posta. Hizi benki mbili zime implement "Chip and Pin" Kadi zao zina both a "mag stripe" na an embeeded chip, which makes them more secure against card skimmers.

    Hakuna sheria specific ya electronic crimes Tanzania, ila katika matukio yaliyotokea, sheria ambayo imekuwa ikitumika ku wa prosecute wahusika ni ile ya economic & organized crime act. Hii sheria ndio "RICO" equivalent ya bongo. Hii sheria haina utani kama ukiwa convicted, sentensing guidelines zake ni very harsh (kuna jail terms za mpaka 30 yrs). Na hakuna mdhamana kama alleged crime commited ina involve kiasi kilichozidi million 10.






    Wakenya wengine mbaroni

    Bongo5 - Milioni 922/- zaibwa ATM ya CRDB

    Wizi mpya wa mabenki watikisa Dar

    http://www.nifahamishe.com/NewsDetails.aspx?NewsID=719146&&Cat=1

    HabariLeo: Gwiji la habari Tanzania | Ashatakiwa kwa kuiba mil 60/- ATM ya CRDB

    Vibaka wabambwa na kadi `feki` 14 za ATM
     
Loading...