2020 APWG Symposium on Electronic Crime Research (eCrime)

2020 ◽  
Keyword(s):  
2018 ◽  
Vol 5 (2) ◽  
pp. 73-83
Author(s):  
Hussein Abed Ghannam

WhatsApp is a giant mobile instant message IM application with over 1billion users. The huge usage of IM like WhatsApp through giant smart phone “Android” makes the digital forensic researchers to study deeply. The artefacts left behind in the smartphone play very important role in any electronic crime, or any terror attack. “WhatsApp” as a biggest IM in the globe is considered to be very important resource for information gathering about any digital crime. Recently, end-to-end encryption and many other important features were added and no device forensic analysis or network forensic analysis studies have been performed to the time of writing this paper. This paper explains how can we able to extract the Crypt Key of “WhatsApp” to decrypt the databases and extract precious artefacts resides in the android system without rooting the device. Artefacts that extracted from the last version of WhatsApp have been analysed and correlate to give new valuable evidentiary traces that help in investigating. Many hardware and software tools for mobile and forensics are used to collect as much digital evidence as possible from persistent storage on android device. Some of these tools are commercial like UFED Cellebrite and Andriller, and other are open source tools such as autopsy, adb, WhatCrypt. All of these tools that forensically sound accompanied this research to discover a lot of artefacts resides in android internal storage in WhatsApp application.


Author(s):  
P. A. Samoylov ◽  

The integration and active application of electronic document flow to the daily activities of the police have consistently and logically led to the fact that the electronic crime incident report is increasingly used as a reason to initiate criminal cases. The departmental normative legal acts of the Ministry of Internal Affairs of Russia regulate in detail the processing of such reports. However, under the RF Criminal Procedure Code, not all electronic crime reports registered by the Departments of Internal Affairs meet the established requirements, and, accordingly, they can not perform the function of a criminal procedural cause. In this situation, with the obvious relevance of electronic documents, an example of a contradiction and gap in the law is evident, which somewhat hinders the development of electronic interaction between the participants of criminal procedural activity and can cause negative consequences. The paper analyzes and compares the provisions of some normative sources regulating the reception and consideration of electronic crime reports by the Departments of Internal Affairs of the Russian Federation and the norms of criminal procedural legislation. The author critically evaluates the legal definitions of the concept of a crime incident report and some organizational and legal mechanisms for accepting and considering electronic crime reports established by the departmental legal acts of the Ministry of Internal Affairs of the Russian Federation. The study highlights and clarifies the rules of filing, mandatory requisites, and some other requirements for electronic crime reports, which must be complied with according to the provisions of the criminal procedure code. Based on the data obtained, the author offers recommendations to improve criminal procedural law and the algorithm of accepting electronic crime reports using the official websites of the Departments of the Ministry of Internal Affairs of the Russian Federation.


2021 ◽  
pp. arabic cover-english cover
Author(s):  
أحمد المرضي ◽  
محمد النذير الزين

يتناولُ هذا البحثُ التعريفَ بتقنيةِ المعلوماتِ، وماهية الجريمة الإلكترونية، والأخطار الناجمة عنها وتصنيف المُجْرِمين الإلكترونيين، وتنويع الجرائم المُتعلقة بتقنية المعلومات، والأسباب التي تعزي إلى صعوبةِ الكشفِ عنها، وإيراد نموذجًا للجرائم التقنية وفقًا لأحكام القانون الجنائِيّ الإماراتِيّ والمصرِيّ المُتعلقين بمكافحة جرائم تقنية المعلومات. ويشيرُ البحثُ في إيجازٍ إلى: التعريف بالجريمة، وركنها المادي، وبيان شروط الركن المادي، والركن المعنوي، والعقوبة الأصيلة للجريمة، والعقوبة في صورتها المشددة، والعقوبات البديلة. وينطوي البحثُ أيضًا على الأسس الشرعية المُتضمنة حظر الجرائم الماسة بتقنيةِ المعلوماتِ تبعًا لنصوص القرآن الكريم، والسنة النبوية الشريفة، والقواعد الفقهية القاضية بحظر جرائم الانتحال الإلكتروني. ويشتملُ هذا البحثُ على مُقدمةٍ، وخمسة مباحث، وخاتمةٍ على النحو الآتـي: المبحث الأول الأصل الشرعي في تحريم الجرائم الإلكترونية، والمبحث الثاني تعريفات عامة للجرائم المعلوماتية وتصنيفها، والمبحث الثالث أنواع المجرمين المحترفين في المعلوماتية التقنية، وصعوبة اكتشافهم، والمخاطر الأمنية للإنترنت، والمبحث الرابع نماذج من أحكام القانون الجنائي الإماراتي والمصري في مكافحة الجرائم الإلكترونية، والمبحث الخامس الأدلة الرقمية لإثبات الجرائم الإلكترونية وفقًا للقضاءين الإماراتِيّ والمصرِيّ، ثمَّ جاءَت الخاتمةُ لتحتوي على أهم النتائج والتوصياتِ. By this forgoing paper which bearing the title: Combating Electronic Crimes According to Provisions of Criminal Laws of Emirates and Egypt, It Aims to, Enforcement to principals of shariah Law actualization which intents detterence commission crimes through mechanism of” Amr Bil Maroof and Nahy An Munkar”, actualization to the measures of shariah Law that prevent disobedience and electronic crimes. To explain that application of shariah legal maxims such as: "Al Ghurm Bi Al ghunm" whereby it implies whoever owns illegally as a result of committing an offense on a property of whosever should be suffered a penalty, typically to the legal maxim " La dharar wa La dirar ".(damage should be removed) The research methodology which adopted is the descriptive and analytical methods where the researcher intents to define, explains elements and punishments of the crimes. On the other hand the researcher under took the analytical method where he proceeds comparison between the provisions of the two selective criminal laws of Emirates and Egypt, for the achievement the purpose of identification of the similarity and distinctiveness. The problems that presumed to be settled by this research such as: Are there any legal basis to criminalize electronic crime with reference to shariah law? Are there any legal justifications to enforce punishment of fine on the criminal hackers? What are the dangerous consequences for committing the electronic crimes? What are the negative effects for commission electronic crime on individuals and societies at large, and what are the preventive international standards measure and strategies in this context? Concerning the expected achievements by this research, It will enrich the Islamic Library because a comparative research on this topic is so scarce and limited. It will guide the researchers by exploring a new referencing methods for application shariah law, It provides and exposes the legal measure for combating the electronic crimes by using the techniques of detection the electronic criminals by hiding cameras, intelligent phone thumb prints to enable the police investigative officer to deter, identify and arrest the electronic criminals. In the light of combating the researcher advices government officers’ bankers and others to provide top advanced sophisticated technological systems to protect their computers and account numbers against the expected threads of the electronic offences.


Author(s):  
M.E. Kyobe

E-commerce is critical to national development. Small and Medium sized organizations (SMEs) are encouraged to adopt it to address poverty, improve competitiveness and productivity. However, the escalation in electronic crime (e-crime) and lack of compliance with e-commerce regulations threaten e-commerce success in South Africa. While many strategies for improving e-commerce have been suggested, the focus has mainly been on economic and technological factors and less on human and social aspects such as compliance behaviors. This has resulted in the development of e-commerce systems that do not incorporate regulatory requirements. Consequently, the level of exposure to cyber-risks and legal liabilities has increased and SME market competitiveness compromised (Kyobe, 2009). This chapter examines the factors influencing compliance with e-commerce regulations and e-security requirements and how these impact on e-commerce optimization in South African SMEs. It also provides some useful frameworks and checklists SME managers can use to evaluate their compliance behaviors and security practices in order to make improvement to their e-commerce activities.


2011 ◽  
pp. 1254-1265
Author(s):  
Michael Kyobe

Electronic communication developments have always been associated with many security risks since the ARPANET implementation in 1960s. In 1972, John Draper (Captain Crunch) unlocked the AT&T phone network marking the beginning of the modern technology of hacking. Later in the 1980s, the seminal developments in the U.S. laid the conceptual and practical foundation for future electronic crime tools such as trapdoors, trojans, and viruses. More recently in the Internet environment, electronic attacks have reached an epidemic level (US-CERT, 2004). In South Africa alone, over 500 Web sites were defaced in January 2005 and e-crime losses are estimated at around 40 billion a year.


2008 ◽  
pp. 2704-2723
Author(s):  
Michael Kyobe

Electronic communication developments have always been associated with many security risks since the ARPANET implementation in 1960s. In 1972, John Draper (Captain Crunch) unlocked the AT&T phone network marking the beginning of the modern technology of hacking. Later in the 1980s, the seminal developments in the U.S. laid the conceptual and practical foundation for future electronic crime tools such as trapdoors, trojans, and viruses. More recently in the Internet environment, electronic attacks have reached an epidemic level (US-CERT, 2004). In South Africa alone, over 500 Web sites were defaced in January 2005 and e-crime losses are estimated at around 40 billion a year.


Sign in / Sign up

Export Citation Format

Share Document