Page 1
Write a research paper of 5000 words based on cyber-crime and computer forensic in
Mauritius.
Computer crime, or cybercrime, refers to any crime that involves a computer and
a network. The computer may have been used in the commission of a crime, or it may be the
target. Netcrime refers to criminal exploitation of the Internet. Such crimes may threaten a
nation’s security and financial health] Issues surrounding this type of crime have become high-
profile, particularly those surrounding cracking, copyright infringement, child pornography,
and child grooming. There are also problems of privacy when confidential information is lost or
intercepted, lawfully or otherwise.
Internationally, both governmental and non-state actors engage in cybercrimes,
including espionage, financial theft, and other cross-border crimes. Activity crossing
international borders and involving the interests of at least one nation-state is sometimes
referred to as cyber warfare. The international legal system is attempting to hold actors
accountable for their actions through the International Criminal Court.
Computer crime encompasses a broad range of activities. Generally, however, it may be divided
into two categories:
(1) Crimes that target computers and directly
(2) Crimes facilitated by computer networks or devices, the primary target of which is
independent of the computer network or device.
Page 2
Crimes that primarily target computer networks or devices include:
Computer viruses
Denial-of-service attacks
Malware (malicious code)
Crimes that use computer networks or devices to advance other ends include:
Cyber stalking
Fraud and identity theft
Information warfare
Phishing scams
Computer forensics (sometimes known as computer forensic science is a branch of digital
forensic science pertaining to legal evidence found in computers and digital storage media. The
goal of computer forensics is to examine digital media in a forensically sound manner with the
aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about
the information.
Although it is most often associated with the investigation of a wide variety of computer crime,
computer forensics may also be used in civil proceedings. The discipline involves similar
techniques and principles to data recovery, but with additional guidelines and practices
designed to create a legal audit trail.
Evidence from computer forensics investigations is usually subjected to the same guidelines
and practices of other digital evidence.
Page 3
Computer forensic investigations usually follow the standard digital forensic process
(acquisition, analysis and reporting). Investigations are performed on static data (i.e. acquired
images) rather than "live" systems. This is a change from early forensic practices which, due to a
lack of specialist tools, saw investigations commonly carried out on live data.
Computer forensics analysis is not limited only to computer media
Page 4
A portable Tableau write-blocker attached to a Hard Drive
A number of techniques are used during computer forensics investigations.
Cross-drive analysis: A forensic technique that correlates information found on multiple hard
drives. The process, which is still being researched, can be used for identifying social networks
and for performing anomaly detection.
Live analysis: The examination of computers from within the operating system using custom
forensics or existing sysadmin tools to extract evidence. The practice is useful when dealing
with Encrypting File Systems, for example, where the encryption keys may be collected and, in
some instances, the logical hard drive volume may be imaged (known as a live acquisition)
before the computer is shut down.
Page 5
Deleted files: A common technique used in computer forensics is the recovery of deleted files.
Modern forensic software have their own tools for recovering or carving out deleted
data. Most operating systems and file systems do not always erase physical file data, allowing it
to be reconstructed from the physical disk sectors. File carving involves searching for known file
headers within the disk image and reconstructing deleted materials.
Volatile data: When seizing evidence, if the machine is still active, any information stored solely
in RAM that is not recovered before powering down may be lost. One application of "live
analysis" is to recover RAM data (for example, using Microsoft's COFEE tool) prior to removing
an exhibit.
RAM can be analyzed for prior content after power loss, because the electrical charge stored in
the memory cells takes time to dissipate. The length of time for which data recovery is possible
is increased by low temperatures and higher cell voltages. Holding unpowered RAM below −60
°C will help preserve the residual data by an order of magnitude, thus improving the chances of
successful recovery. However, it can be impractical to do this during a field examination.
Analysis tools: A number of open source and commercial tools exist for computer forensics
investigation. Typical forensic analysis includes a manual review of material on the media,
reviewing the Windows registry for suspect information, discovering and cracking passwords,
keyword searches for topics related to the crime, and extracting e-mail and pictures for review.
Page 6
Certifications:
There are several computer forensics certifications available. Many state laws in the United
States require computer forensic expert witnesses to have a professional certification or a
private investigator's license.
In Mauritius:
Openness of global network gives rise to the need to protect Internet users against criminal
activities. Global nature of the Internet has moved governments to pass laws that will combat
internet crimes.
Page 7
Cyber Criminal 1:
Vishal Ramessur- 32 years old
First Mauritian Hacker involved in the sabotage of internet connection in 2005
Violation of section 7(b) of Computer misuse and cybercrime Act 2003:
F̎ a denial of access to, or impairment of any program or data stored in the computer system GF
Shall commit an offence and shall,, on conviction be liable to a fine not exceeding 200,000 and
to penal service not exceeding 20 years
Cyber Criminal 2:
Booden(vinay) Ramrichia- a hacker of the governmental website
Sued in intermediary court
20 May 2005- attempt to block access of two principal servers of the system
Page 9
May 2008- Three cases lodged by the Mauritius Telecom
Foreigners have introduced a system with the help of switches and other apparatus to divert
international calls coming from abroad
Diverting the gateway of MT is a criminal offence
This has led to the loss of huge amount of money for MT
The Information Communication Technologies Act 2001:
Under section 46 offences
(1) By means of an apparatus or device connected to an installation maintained or
operated by a license
(2) Defrauds the licensee of any fee or charge properly payable for the use of a
service; causes the licensee to provide a service to some other person without
payment by such other person of the appropriate fee or charge; or fraudulently
installs or causes to be installed an acess to a telecommunication line;
(3) Penalties
(4) Any person who commits an offense under this Act shall, on conviction, be liable
to a fine not exceeding 1,000,000 rupees and to imprisonment for a term not
exceeding 5years
What is Computer Forensics?
Page 10
Computer Forensics is the science of acquiring, preserving, retrieving, and analyzing digital
evidence found on a computer media and factual reporting of the findings for presentation in a
court of law.
Computer Forensics has been applied in a number of areas: financial fraud, embezzlement,
counterfeiting, espionage, sabotage, misappropriation of trade secrets or corporate
confidential information, e-mail abuse, hacking, equipment misuse, to name a few. Given the
technological nature of these crimes, some unique challenges are involved in tracking down the
perpetrators. By using advanced computer techniques and scientifically proven methodology,
Cyber Lab Ltd can provide you with sound computer forensic capabilities to gather, process,
interpret and utilize digital evidence found to support the illegal act in a manner that it is
acceptable in a court of law.
Cyber Lab Ltd is an IT service provider based in Mauritius, offering web design and
development, e-commerce solutions and internet marketing services to businesses and
organizations.
Our team consists of highly qualified web developers with two to ten years of hand-on
experience in web design & development and internet marketing.
Our goal is on being a responsible and innovative business partner providing best quality
services to our customers' satisfaction with maximum return on investment.
Page 11
Cyber Lab Ltd also offers state-of-the-art computer forensic services for electronic evidence
with litigation support and expert witness services to legal professionals and corporations.
Cyber Lab Ltd is led by Sien Sien Yip Tong, a true veteran of the IT industry with more than 14
years of working experience in consulting, designing, developing and implementing various
information management systems, financial, accounting and inventory control systems for
Canadian and Mauritian firms. Holder of a Bachelor of Computer Science from Concordia
University, Canada. She is also a Certified Computer Examiner (CCE), member of the
International Society of Forensic Computer Examiner (ISFCE) and an associate member of the e-
marketing Association (eMA)...
Mauritius reiterates fight against cybercrime
“CERT-MU will also ensure co-operation between state services, the private sector and the
public in such cases”
Page 12
A team of Indian experts in computer technology i s expected in Mauritius Monday to assist
that African country in the setting up a "National Computer Emergency Response Team" which
will help to secure computer...
Even though it is a rare manifestation, “Cybercrime” –Hacking has become one of the leading
crimes of this 21st Century. Undoubtedly, this is becoming a nuisance in the use of computer. It
has become a growing concern for both law enforcement officials and consumers taking into
account the rapid growth of internet.
Like any other individual, Criminals have adapted to the fast paced world. Crimes related to
computers and information technology has steadily risen in the past few years. In other words,
internet has become a “playground” or a public place for cyber criminals to look for their
victims. In this line, these highly manipulative people often take advantage of unsuspecting
victims. Everyone is vulnerable. Internet can also pose as an opportunity for criminals where
acts of Phishing, corporate fraud, intellectual property disputes, theft, breach of contract, virus
infection, insider abuse of network resources, forgery, piracy, break-ins, masquerading, Identity
Theft and harassment occur.
Most importantly, we should never under-estimate the potentials of a hacker because these
people are the most up-to- date, they abreast themselves with every wave of technology. They
are knowledgeable, forward thinking and a step ahead in advanced technology of operating
Page 13
system and programming language as well as networking and the ways how to curb security
protocols.
Mauritian Context
Mauritius…..? Some will ponder, is this tiny island affected by cybercrimes? Or it is just an
elevated idea to highlight it. Well, we should calm all the sceptics, as like any other country of
the world even Mauritius is concerned with the problem of cybercrimes. Being one of the most
advanced of all African States, the state is also preparing its different strategies to combat
cybercrimes.
A 32 year old Mauritian has carved his name as being the “First Mauritian Hacker” in 2005.
Actually, he was involved in ‘sabotage of Internet Connection’. Some years later in May 2008,
other cases brought growing concern to cybercrimes were that ofMauritius Telecom where
three cases were exposed. Here, foreigners were involved who had introduced a system with
the help of switches and other apparatus to divert International Calls coming from abroad. It
goes without saying that Mauritius Telecomhad to face huge loss during that period.
In this vein, the policymakers are devising strategies to handle this issue. There are many laws
present to enhance the security of Mauritius information and Communication
infrastructure.We have the Computer Misuse and Cybercrime Act 2003. The penalties for wrong
doers consist of a fine not exceeding 1,000, 000rupees and to imprisonment for a term not
exceeding 5 years. However, it depends on the nature of the cybercrime.
Page 14
We also have the Cyber Crime Unit 2008 which takes into account
The Data Protection Act 2000
Information and Communication Technology Act 2001
Computer Misuse and Cyber Crime Act 2003
Alongside, there is the Mauritian Computer Emergency Response Team which is operational
since 16th May 2008. Moreover, proper training has been given to different agents of Criminal
Justice from American experts from the Department of Anti- Terrorism. These different
measures have been devised for the protection of vulnerable people both in cyber space and
offline as cybercrimes have spillover effect of affecting real people in the real world.
Page 15
In the light of the above discussion, it can be assessed that computers have become an
important part of our lives. It is one of the most dominant forms of technology. But, we should
also take into due consideration the setbacks in this field. This does not exclude criminals who
have the technical knowhow of hacking into computer network systems. Hereby, a better
awareness of the existence of the cybercrimes might alert people to take precaution from being
victimized. Eventually, all the stakeholders including the Public, Private and the NGO’s should
work together to prevent further harms of cybercrimes.
Workshop addresses cyber security challenges
GIS - May 25, 2010: A two-day training workshop for Computer Emergency Response Team
(CERT-MU)and Computer Incident Response Team (CIRT) is being held under the patronage of
the National Cybercrime Prevention Committee at the Swami Vivekananda International
Conference Centre, Pailles since yesterday.
The Committee is organising the training workshop to provide participants who are involved in
cyber security activities with a better insight into the establishment and the functioning of the
Computer Emergency/ Incident Response Team to enable the proactive and reactive handling
and managing of computer incidents.
Page 16
The National Cybercrime Prevention Committee is a working group established by government
under the aegis of the Information and Communication Technology Authority with the mandate
of addressing cyber crime issues. Its members comprise officials from the Ministry of
Information and Communication Technology, the Attorney General's Office, the Ministry of
Education and Human Resources, the Data Protection Office and the Police IT Unit. Its
responsibilities include reviewing the state of play in fighting cyber crime and issuing
implementable recommendations.
In his opening address yesterday morning, the Minister of Information and Communication
Technology, Mr T. Pillay Chedumbrum, announced that a Controller of Certification Authority
would be operationalised soon to enable the carrying out of secured electronic transactions at
government and businesses level. This initiative is a step further in government’s efforts to
support the development of a trustworthy and competitive information economy in Mauritius.
The Minister recalled measures already introduced to combat cyber crime and transform
Mauritius into an information-secure society so that it drives its way towards earning
recognition at international level as a secure regional Information and Communication
Technology hub. They include the introduction of appropriate legislations relating to cyber
security, and the setting up of instances such as the national Computer Emergency Response
Team (CERT-mu), a police unit dedicated to fight cyber crimes, a unit to address security of
Government Information Systems as well as a Data Protection Office to protect privacy of data.
Mr Pillay Chedumbrum stated that other legislations such as regulations regarding Child Online
Safety and Spam Control are in the pipeline to further strengthen the legal arsenal.
Page 17
The ICT minister also stressed the importance of protecting the rights of the vast majority of
people who use ICT for legitimate purposes. He affirmed government’s commitment to strike
the right balance between the need for efficient enforcement and the need to protect the
privacy and freedom of expression of citizens while ensuring that great care is taken to ensure
fairness and prevent abusive restrictions. He added that the fight against cyber crime needs not
only to harness efforts of the public and private sectors in Mauritius but also seek bilateral
collaboration between countries and with relevant international bodies.
Cyber attack 2010 in Mauritius:
Page 19
Mauritius Post And Cooperative Bank website hacked
Page 20
Lalit webside hacked
In analysing the hacking,four possibilities for the culprit and motivation have been raised:
- It may just be a random hacker, with the various motives random hackers have.
2. The Mauritian Government on 9 January announced that it was freezing its diplomatic links
with Israel. A few days later the planned Enrico Macias concert was cancelled following
Mauritian Ministers calling him "persona non grata" after he said he was "a thousand billion per
cent in favour of Israel's 'hard lead' operation on Gaza". This would certainly have drawn the
attention of the notorious Israeli secret services to Mauritius, as to our knowledge not many
States took this position. We know of Venezuela, Bolivia, Mauritania and Mauritius. The secret
Page 21
services of Israel will want to know who was responsible for causing the stand of the Mauritian
government, usually so tame and pro-USA. Once looking into who has been responsible for the
political pressure on Government, they will have found that LALIT and the former President of
the Republic, Cassam Uteem, had called for "freezing" diplomatic relations at a joint
demonstration when Israel bombarded the Lebanon, and re-iterated the call again this year.
They will have found that on three occasions LALIT members have braved the Israeli security
and entered Palestine as part of solidarity work with the people of Palestine. They will have
become aware of Ragini Kistnasamy's PALESTINE DIARIES. Again this year LALIT was swift to
take a stand, and participate in demonstrations. The Israeli Mossad obviously has a section that
does hacking.
3 The USA's lease for the Island on which they have their key Diego Garcia military base comes
up for renewal in 2016. The USA and UK would thus be very keen to weaken any political forces
that oppose the Diego Garcia US military base and oppose the continued illegal occupation of
the Chagos Islands. When the House of Lords judgment was handed down the only political
force associated with this struggle and mentioned a number of times in the judgement was
LALIT. So, the secret services of these two countries are not to be excluded. In addition, LALIT
was one of the central organizations involved in the setting up of the NO BASES movement
which has contributed to the closure of the Manta military base in Ecuador.
4. The local National Security Service and other local enemies could also be involved, for
political reasons at a local level.
Page 22
All the political forces representing the status quo are concerned about the political shocks that
the economic crisis is going to produce.
Of course, we will be unlikely to get to the bottom of the hacking. The hacker said he is called
"Serseridelikan" and this is the name of some kind of a hacker. Should any site-visitor have any
ideas on this kind of hacking problem, please let us know.
LALIT
29 January 2009