AUTHOR: IBRAHIM ABDULAI SAWANEH, DIRECTOR OF ACADEMIC AFFAIRS AT THE INSTITUTION OF ADVANCED MANAGEMENT AND TECHNOLOGY - IAMTECH
19th December, 2018
ABSTRACT
There are numerous benefits one can get from using technological innovations ranging from comfort to minimal cost in telecommunications, health, aviation, commerce, energy, agriculture, intelligence, education via Internet and Internet of things (IoT). However, criminals have over the past decade accelerated sophisticated techniques to steal billions of sensitive data from private individuals, government and corporations costing billions of US dollars globally. Therefore, the research provides awareness as to how these Cyber crimes can be mitigated especially within the scope of Sierra Leone. It largely focuses on the establishment of the Cyber crime Unit at the Central Intelligence Department (CID), and the Office of National Security (ONS). Both units were created by an act of Parliament to secure and protect citizen’s personal data against imminent cyber criminals within the confirmed of Sierra Leone. These agencies are able to solve some of the crimes, but yet still there exist unsolved problems. This is because of the lack of many indigenous cyber security experts in the country. Also, the study indicates that the laws governing cyber crimes are too weak to tackle all the numerous issues relating to internet crime.
KEYWORDS
Scientific Support Department (SSD), Cyber Security, Office of the National Security (ONS), Cybercrimes.
REFERENCES
[1] Eriksson, Johan & Giacomello, Giampiero (2006), The Information Revolution, Security, and International Relations: (IR) relevant Theory? International Political Science Review vol. 27: 221-244
[2] Compete site comparison. http://siteanalytics.compete.com/ facebook.com+myspace.com+twitter.com/
[3] C. Kanich, N. Weaver, D. McCoy, T. Halvorson, C. Kreibich, K. Levchenko, V. Paxson, G. Voelker, and S. Savage. Show Me the Money: Characterizing Spam-advertised Revenue. USENIX Security Symposium, 2011.
[4] B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kem- merer, C. Kruegel, and G. Vigna. Your Botnet is My Botnet: Analysis of a Bot- net Takeover. In ACM Conference on Computer and Communications Security (CCS), 2009.
[5] B. Stone-Gross, T. Holz, G. Stringhini, and G. Vigna. The Underground Econ- omy of Spam: A Botmaster’s Perspective of Coordinating Large-Scale Spam Campaigns. In USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2011.
[6] N. Provos, P. Mavrommatis, M. A. Rajab, and F. Monrose. All your iFRAMEs point to Us. In USENIX Security Symposium, 2008.
[7] C. Grier, K. Thomas, V. Paxson, and M. Zhang. @spam: the underground on 140 characters or less. In ACM Conference on Computer and Communications Security (CCS), 2010.
[8] K.Thomas,D. McCoy, C. Grier, A. Kolcz, and V. Paxson. Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse. In USENIX Security Symposium, 2013.
[9] Buzan, B. & Hansen, L. (2009), The Evolution of International Security Studies, Cambridge University Press, Cambridge Trends in World Military Expenditure, 2017″ (PDF). Stockholm International Peace Research Institute. Retrieved 2 May 2018.
[10] “Data for all countries from 1988–2017 in constant (2016) USD (pdf)” (PDF). SIPRI. Retrieved 2 May 2018.
[11] Dunn, M. (2003), Securing the Digital Age. In Bombs and Bandwidth: The Emerging Relationship between Information Technology and Security, ed. Robert Latham. New York: The New Press, 85-105.
[12] c5franey. (2011). Disaster Recovery Plan. Retrieved March 21, 2012, from Study Mode: http://www.studymode.com/essays/Disaster-Recovery-Plan-809693.html
[13] T. Jagatic, N. Johnson, M. Jakobsson, and T. Jagatif. Social phishing. Commu- nications of the ACM, 2007.
[14] L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda. All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks. In World Wide Web Conference (WWW), 2009.
[15] G. Stringhini, O. Hohlfeld, C. Kruegel, and G. Vigna. The harvester, the botmaster, and the spammer: On the relations between the different actors in the spam landscape. In ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2014.
[16] Lewis, James A. (2014). “National Perceptions of Cyber Threats”. Strategic Analysis, Vol. 38, No. 4
[17] Ibid., 567
[18] Singer & Friedman, 39
[19] Visit report, Sierra Leone Security and Intelligence Service Reform, September 1999.
[20] Hart, Catherine (2011), Mobilizing the Cyberspace Race: the Securitization of the Internet and its Implications for Civil Liberties, Cyber-Surveillance in Everyday Life: An International Workshop, May 12-15, 2011, University of Toronto