Top Banner
Write a research paper of 5000 words based on cyber-crime and computer forensic in Mauritius. Computer crime , or cybercrime , refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Netcrime refers to criminal exploitation of the Internet. Such crimes may threaten a nation’s security and financial health ] Issues surrounding this type of crime have become high-profile, particularly those surrounding cracking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise. Internationally, both governmental and non-state actors engage in cybercrimes, including espionage, financial theft, and other cross-border crimes. Activity crossing international borders and involving the interests of at least one nation-state is sometimes referred to as cyber warfare. The international legal system is
29
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: cyber security

Write a research paper of 5000 words based on cyber-crime and computer forensic in

Mauritius.

Computer crime, or cybercrime, refers to any crime that involves a computer and

a network. The computer may have been used in the commission of a crime, or it may be the

target. Netcrime refers to criminal exploitation of the Internet. Such crimes may threaten a

nation’s security and financial health] Issues surrounding this type of crime have become high-

profile, particularly those surrounding cracking, copyright infringement, child pornography,

and child grooming. There are also problems of privacy when confidential information is lost or

intercepted, lawfully or otherwise.

Internationally, both governmental and non-state actors engage in cybercrimes,

including espionage, financial theft, and other cross-border crimes. Activity crossing

international borders and involving the interests of at least one nation-state is sometimes

referred to as cyber warfare. The international legal system is attempting to hold actors

accountable for their actions through the International Criminal Court.

Computer crime encompasses a broad range of activities. Generally, however, it may be divided

into two categories:

(1) Crimes that target computers and directly

(2) Crimes facilitated by computer networks or devices, the primary target of which is

independent of the computer network or device.

Page 2: cyber security

Crimes that primarily target computer networks or devices include:

Computer viruses

Denial-of-service attacks

Malware (malicious code)

Crimes that use computer networks or devices to advance other ends include:

Cyber stalking

Fraud and identity theft

Information warfare

Phishing scams

Computer forensics (sometimes known as computer forensic science is a branch of digital

forensic science pertaining to legal evidence found in computers and digital storage media. The

goal of computer forensics is to examine digital media in a forensically sound manner with the

aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about

the information.

Although it is most often associated with the investigation of a wide variety of computer crime,

computer forensics may also be used in civil proceedings. The discipline involves similar

techniques and principles to data recovery, but with additional guidelines and practices

designed to create a legal audit trail.

Evidence from computer forensics investigations is usually subjected to the same guidelines

and practices of other digital evidence.

Page 3: cyber security

Computer forensic investigations usually follow the standard digital forensic process

(acquisition, analysis and reporting). Investigations are performed on static data (i.e. acquired

images) rather than "live" systems. This is a change from early forensic practices which, due to a

lack of specialist tools, saw investigations commonly carried out on live data.

Computer forensics analysis is not limited only to computer media

Page 4: cyber security

A portable Tableau write-blocker attached to a Hard Drive

A number of techniques are used during computer forensics investigations.

Cross-drive analysis: A forensic technique that correlates information found on multiple hard

drives. The process, which is still being researched, can be used for identifying social networks

and for performing anomaly detection.

Live analysis: The examination of computers from within the operating system using custom

forensics or existing sysadmin tools to extract evidence. The practice is useful when dealing

with Encrypting File Systems, for example, where the encryption keys may be collected and, in

some instances, the logical hard drive volume may be imaged (known as a live acquisition)

before the computer is shut down.

Page 5: cyber security

Deleted files: A common technique used in computer forensics is the recovery of deleted files.

Modern forensic software have their own tools for recovering or carving out deleted

data. Most operating systems and file systems do not always erase physical file data, allowing it

to be reconstructed from the physical disk sectors. File carving involves searching for known file

headers within the disk image and reconstructing deleted materials.

Volatile data: When seizing evidence, if the machine is still active, any information stored solely

in RAM that is not recovered before powering down may be lost. One application of "live

analysis" is to recover RAM data (for example, using Microsoft's COFEE tool) prior to removing

an exhibit.

RAM can be analyzed for prior content after power loss, because the electrical charge stored in

the memory cells takes time to dissipate. The length of time for which data recovery is possible

is increased by low temperatures and higher cell voltages. Holding unpowered RAM below −60

°C will help preserve the residual data by an order of magnitude, thus improving the chances of

successful recovery. However, it can be impractical to do this during a field examination.

Analysis tools: A number of open source and commercial tools exist for computer forensics

investigation. Typical forensic analysis includes a manual review of material on the media,

reviewing the Windows registry for suspect information, discovering and cracking passwords,

keyword searches for topics related to the crime, and extracting e-mail and pictures for review.

Page 6: cyber security

Certifications:

There are several computer forensics certifications available. Many state laws in the United

States require computer forensic expert witnesses to have a professional certification or a

private investigator's license.

In Mauritius:

Openness of global network gives rise to the need to protect Internet users against criminal

activities. Global nature of the Internet has moved governments to pass laws that will combat

internet crimes.

Page 7: cyber security

Cyber Criminal 1:

Vishal Ramessur- 32 years old

First Mauritian Hacker involved in the sabotage of internet connection in 2005

Violation of section 7(b) of Computer misuse and cybercrime Act 2003:

F̎ a denial of access to, or impairment of any program or data stored in the computer system GF

Shall commit an offence and shall,, on conviction be liable to a fine not exceeding 200,000 and

to penal service not exceeding 20 years

Cyber Criminal 2:

Booden(vinay) Ramrichia- a hacker of the governmental website

Sued in intermediary court

20 May 2005- attempt to block access of two principal servers of the system

Page 8: cyber security

Computer Misuse:

Page 9: cyber security

May 2008- Three cases lodged by the Mauritius Telecom

Foreigners have introduced a system with the help of switches and other apparatus to divert

international calls coming from abroad

Diverting the gateway of MT is a criminal offence

This has led to the loss of huge amount of money for MT

The Information Communication Technologies Act 2001:

Under section 46 offences

(1) By means of an apparatus or device connected to an installation maintained or

operated by a license

(2) Defrauds the licensee of any fee or charge properly payable for the use of a

service; causes the licensee to provide a service to some other person without

payment by such other person of the appropriate fee or charge; or fraudulently

installs or causes to be installed an acess to a telecommunication line;

(3) Penalties

(4) Any person who commits an offense under this Act shall, on conviction, be liable

to a fine not exceeding 1,000,000 rupees and to imprisonment for a term not

exceeding 5years

What is Computer Forensics?

Page 10: cyber security

Computer Forensics is the science of acquiring, preserving, retrieving, and analyzing digital

evidence found on a computer media and factual reporting of the findings for presentation in a

court of law.

Computer Forensics has been applied in a number of areas: financial fraud, embezzlement,

counterfeiting, espionage, sabotage, misappropriation of trade secrets or corporate

confidential information, e-mail abuse, hacking, equipment misuse, to name a few. Given the

technological nature of these crimes, some unique challenges are involved in tracking down the

perpetrators. By using advanced computer techniques and scientifically proven methodology,

Cyber Lab Ltd can provide you with sound computer forensic capabilities to gather, process,

interpret and utilize digital evidence found to support the illegal act in a manner that it is

acceptable in a court of law.

Cyber Lab Ltd is an IT service provider based in Mauritius, offering web design and

development, e-commerce solutions and internet marketing services to businesses and

organizations.

Our team consists of highly qualified web developers with two to ten years of hand-on

experience in web design & development and internet marketing.

Our goal is on being a responsible and innovative business partner providing best quality

services to our customers' satisfaction with maximum return on investment.

Page 11: cyber security

Cyber Lab Ltd also offers state-of-the-art computer forensic services for electronic evidence

with litigation support and expert witness services to legal professionals and corporations.

Cyber Lab Ltd is led by Sien Sien Yip Tong, a true veteran of the IT industry with more than 14

years of working experience in consulting, designing, developing and implementing various

information management systems, financial, accounting and inventory control systems for

Canadian and Mauritian firms. Holder of a Bachelor of Computer Science from Concordia

University, Canada. She is also a Certified Computer Examiner (CCE), member of the

International Society of Forensic Computer Examiner (ISFCE) and an associate member of the e-

marketing Association (eMA)...

Mauritius reiterates fight against cybercrime

“CERT-MU will also ensure co-operation between state services, the private sector and the

public in such cases”

Page 12: cyber security

A team of Indian experts in computer technology i s expected in Mauritius Monday to assist

that African country in the setting up a "National Computer Emergency Response Team" which

will help to secure computer...

Even though it is a rare manifestation, “Cybercrime” –Hacking has become one of the leading

crimes of this 21st Century. Undoubtedly, this is becoming a nuisance in the use of computer. It

has become a growing concern for both law enforcement officials and consumers taking into

account the rapid growth of internet.

Like any other individual, Criminals have adapted to the fast paced world. Crimes related to

computers and information technology has steadily risen in the past few years. In other words,

internet has become a “playground” or a public place for cyber criminals to look for their

victims. In this line, these highly manipulative people often take advantage of unsuspecting

victims. Everyone is vulnerable. Internet can also pose as an opportunity for criminals where

acts of Phishing, corporate fraud, intellectual property disputes, theft, breach of contract, virus

infection, insider abuse of network resources, forgery, piracy, break-ins, masquerading, Identity

Theft and harassment occur.

Most importantly, we should never under-estimate the potentials of a hacker because these

people are the most up-to- date, they abreast themselves with every wave of technology. They

are knowledgeable, forward thinking and a step ahead in advanced technology of operating

Page 13: cyber security

system and programming language as well as networking and the ways how to curb security

protocols.

Mauritian Context

Mauritius…..? Some will ponder, is this tiny island affected by cybercrimes? Or it is just an

elevated idea to highlight it. Well, we should calm all the sceptics, as like any other country of

the world even Mauritius is concerned with the problem of cybercrimes. Being one of the most

advanced of all African States, the state is also preparing its different strategies to combat

cybercrimes.

A 32 year old Mauritian has carved his name as being the “First Mauritian Hacker” in 2005.

Actually, he was involved in ‘sabotage of Internet Connection’. Some years later in May 2008,

other cases brought growing concern to cybercrimes were that ofMauritius Telecom where

three cases were exposed. Here, foreigners were involved who had introduced a system with

the help of switches and other apparatus to divert International Calls coming from abroad. It

goes without saying that Mauritius Telecomhad to face huge loss during that period.

In this vein, the policymakers are devising strategies to handle this issue. There are many laws

present to enhance the security of Mauritius information and Communication

infrastructure.We have the Computer Misuse and Cybercrime Act 2003. The penalties for wrong

doers consist of a fine not exceeding 1,000, 000rupees and to imprisonment for a term not

exceeding 5 years. However, it depends on the nature of the cybercrime.

Page 14: cyber security

We also have the Cyber Crime Unit 2008 which takes into account

The Data Protection Act 2000

Information and Communication Technology Act 2001

Computer Misuse and Cyber Crime Act 2003

Alongside, there is the Mauritian Computer Emergency Response Team which is operational

since 16th May 2008. Moreover, proper training has been given to different agents of Criminal

Justice from American experts from the Department of Anti- Terrorism. These different

measures have been devised for the protection of vulnerable people both in cyber space and

offline as cybercrimes have spillover effect of affecting real people in the real world.

Page 15: cyber security

In the light of the above discussion, it can be assessed that computers have become an

important part of our lives. It is one of the most dominant forms of technology. But, we should

also take into due consideration the setbacks in this field. This does not exclude criminals who

have the technical knowhow of hacking into computer network systems. Hereby, a better

awareness of the existence of the cybercrimes might alert people to take precaution from being

victimized. Eventually, all the stakeholders including the Public, Private and the NGO’s should

work together to prevent further harms of cybercrimes.

Workshop addresses cyber security challenges

GIS - May 25, 2010: A two-day training workshop for Computer Emergency Response Team

(CERT-MU)and Computer Incident Response Team (CIRT) is being held under the patronage of

the National Cybercrime Prevention Committee at the Swami Vivekananda International

Conference Centre, Pailles since yesterday.

The Committee is organising the training workshop to provide participants who are involved in

cyber security activities with a better insight into the establishment and the functioning of the

Computer Emergency/ Incident Response Team to enable the proactive and reactive handling

and managing of computer incidents.

Page 16: cyber security

The National Cybercrime Prevention Committee is a working group established by government

under the aegis of the Information and Communication Technology Authority with the mandate

of addressing cyber crime issues. Its members comprise officials from the Ministry of

Information and Communication Technology, the Attorney General's Office, the Ministry of

Education and Human Resources, the Data Protection Office and the Police IT Unit. Its

responsibilities include reviewing the state of play in fighting cyber crime and issuing

implementable recommendations.

In his opening address yesterday morning, the Minister of Information and Communication

Technology, Mr T. Pillay Chedumbrum, announced that a Controller of Certification Authority

would be operationalised soon to enable the carrying out of secured electronic transactions at

government and businesses level. This initiative is a step further in government’s efforts to

support the development of a trustworthy and competitive information economy in Mauritius.

The Minister recalled measures already introduced to combat cyber crime and transform

Mauritius into an information-secure society so that it drives its way towards earning

recognition at international level as a secure regional Information and Communication

Technology hub. They include the introduction of appropriate legislations relating to cyber

security, and the setting up of instances such as the national Computer Emergency Response

Team (CERT-mu), a police unit dedicated to fight cyber crimes, a unit to address security of

Government Information Systems as well as a Data Protection Office to protect privacy of data.

Mr Pillay Chedumbrum stated that other legislations such as regulations regarding Child Online

Safety and Spam Control are in the pipeline to further strengthen the legal arsenal.

Page 17: cyber security

The ICT minister also stressed the importance of protecting the rights of the vast majority of

people who use ICT for legitimate purposes. He affirmed government’s commitment to strike

the right balance between the need for efficient enforcement and the need to protect the

privacy and freedom of expression of citizens while ensuring that great care is taken to ensure

fairness and prevent abusive restrictions. He added that the fight against cyber crime needs not

only to harness efforts of the public and private sectors in Mauritius but also seek bilateral

collaboration between countries and with relevant international bodies.

Cyber attack 2010 in Mauritius:

Page 18: cyber security
Page 19: cyber security

Mauritius Post And Cooperative Bank website hacked

Page 20: cyber security

Lalit webside hacked

In analysing the hacking,four possibilities for the culprit and motivation have been raised:

- It may just be a random hacker, with the various motives random hackers have.

2. The Mauritian Government on 9 January announced that it was freezing its diplomatic links

with Israel. A few days later the planned Enrico Macias concert was cancelled following

Mauritian Ministers calling him "persona non grata" after he said he was "a thousand billion per

cent in favour of Israel's 'hard lead' operation on Gaza". This would certainly have drawn the

attention of the notorious Israeli secret services to Mauritius, as to our knowledge not many

States took this position. We know of Venezuela, Bolivia, Mauritania and Mauritius. The secret

Page 21: cyber security

services of Israel will want to know who was responsible for causing the stand of the Mauritian

government, usually so tame and pro-USA. Once looking into who has been responsible for the

political pressure on Government, they will have found that LALIT and the former President of

the Republic, Cassam Uteem, had called for "freezing" diplomatic relations at a joint

demonstration when Israel bombarded the Lebanon, and re-iterated the call again this year.

They will have found that on three occasions LALIT members have braved the Israeli security

and entered Palestine as part of solidarity work with the people of Palestine. They will have

become aware of Ragini Kistnasamy's PALESTINE DIARIES. Again this year LALIT was swift to

take a stand, and participate in demonstrations. The Israeli Mossad obviously has a section that

does hacking.

3 The USA's lease for the Island on which they have their key Diego Garcia military base comes

up for renewal in 2016. The USA and UK would thus be very keen to weaken any political forces

that oppose the Diego Garcia US military base and oppose the continued illegal occupation of

the Chagos Islands. When the House of Lords judgment was handed down the only political

force associated with this struggle and mentioned a number of times in the judgement was

LALIT. So, the secret services of these two countries are not to be excluded. In addition, LALIT

was one of the central organizations involved in the setting up of the NO BASES movement

which has contributed to the closure of the Manta military base in Ecuador.

4. The local National Security Service and other local enemies could also be involved, for

political reasons at a local level.

Page 22: cyber security

All the political forces representing the status quo are concerned about the political shocks that

the economic crisis is going to produce.

Of course, we will be unlikely to get to the bottom of the hacking. The hacker said he is called

"Serseridelikan" and this is the name of some kind of a hacker. Should any site-visitor have any

ideas on this kind of hacking problem, please let us know.

LALIT

29 January 2009