Headlines
  • Deepfakes use artificial intelligence (AI)-driven deep learning software to manipulate preexisting photographs, videos, or audio recordings of a person to create new, fake images, videos, and audio recordings.
  • AI technology has the ability to manipulate media and swap out a genuine person's voice and likeness for similar counter parts.
  • Deepfake creators use this fake substance to spread misinformation and other illegal activities.Deepfakes are frequently used on social networking sites to elicit heated responses or defame opponents.
  • One can identify AI created fake videos by identifying abnormal eye movement, Unnatural facial expressions, a lack of feeling, awkward-looking hand,body or posture,unnatural physical movement or form, unnatural coloring, Unreal-looking hair,teeth that don't appear natural, Blurring, inconsistent audio or noise, images that appear unnatural when slowed down, differences between hashtags blockchain-based digital fingerprints, reverse image searches.
  • Look for details,like stange background,orientation of teeth,handsclothing,asymmetrical facial features,use reverse image search tools.
  • Propagandist journalists are seen as the true journalists by autocratic rulers and populist leaders worldwide, as they serve as the government's cheerleaders.
  • Globally, populist and nationalist leaders passed draconian laws to punish journalists under the guise of "fake news" or "not in the national interest."
  • False or misleading informations are spread by organizations posing as legitimate media outlets in an attempt to twist public opinion in favor of a certain ideology.
  • On social media,watch out for fake messages and news.
  • Check Google Images for Authenticity. The Google Reverse Images search can helps you.
  • It Would Be Better to Ignore Social Media Messages that are forwarded from Unknown or Little-Known Sources.
  • It is a horrible crime to post obscene, morphed images of women on social media networks, sometimes even in pornographic websites, as retaliation.
  • If a fake message asks you to share something, you can quickly recognize it as fake messege.
  • Always Check Independent Fact Checking Sites if You Have Some Doubts About the Authenticity of Any Information or Picture or video.

More Details

Cyber Criminality Trends: Why and How it Works

By Saron Obia

Youths are increasing attracted to cybercrimes for quest wealth, luxurious goods and adventurers with the idea that western world is a utopic society. Crimes include but are not limited to; hacking (black hat), skimming (using the Simbox for theft), Vishing (voice dialing), Smishing (SMS messaging) and cyber bullying. The evolution of white collar crimes is linked to availability of gadgets, software (online security software to protect identity), and inadequate expertise at the level of judiciary (inadequate knowledge of cybercriminal patterns). In some Sub Saharan countries, the criminal justice system encounters several challenges in relation to cyber criminality cases, as tracking and apprehending criminals is challenging due to technological innovation (identity theft, fraud and software) and judgment is delayed or cases acquitted due to lack of evidence and non appearance of victims in courts.

The modus operandi of cybercriminals

Information and communication technology has brought a variety of non-conventional crimes. Cyber criminality is a major challenge for security officials in Sub Saharan Africa. Each seconds cyber criminals discover software and security terminal devices to operate. The language used by cybercriminals is also a barrier to the law enforcement officers and the criminal justice system. We listen to new words each day, like machine man, Ngues man (to describe scammers) and pick-up, but also mail with attach bills for ‘clients’ of  cybercriminals. 

Stage one on the cyberspace

Cybercriminal sends a mail, containing a pay voucher (usually call the first bill within the criminal milieu) which constitutes description of the pet, feeding, toys and how it would be transported to the ‘client’ (victim, Jk, Mugu, Maga).

The first bill is usually paid via local banks, due to the low request by the criminal. Meanwhile, the second bill is always via international banks to avoid suspension of the client. For example; the case of sale of pets the second bill would come in with a complaint of transportation fees and caging (huge amounts are always requested from ‘clients’).

In the third bill, the cybercriminal request for insurance and medical assistance (vaccination) for the pet for sale. At this juncture, criminals block the mails from their victims, as they discover it’s a scam. All email and phone number are disconnected and gadgets sold to the dark market or damage. 

Stage two on the cyber space

To security experts, the globalization period change the dynamics of international and national policing of non-conventional crimes, as transactions are made each minute, security measures should ensured in relation to internet protocol (IP) spoofing, phishing, account breach and use of cloned phone numbers (also the use of  Magic Jack and textnow) to perpetrate cybercrimes. Staff dishonesty and inadequate training in cyber security are prerequisite for the emergence of non-conventional crimes. As criminal develop new patterns each day, due to the slow pace of biometric identification is a  security measure but not a tool to completely curb cyber criminality. Below are some of the methods of cybercriminals;

The use of a fake ID cards (cybercriminals produce ID cards with information of individuals gotten from social networking sites) and attestation of lost to withdraw money and  create accounts in banks as well as mobile money to perpetrate crimes. The ID card number and information is not usually registered in the security database of the delegation of national security as well as the name might incriminate an innocent individual, not aware of stolen identity. It is often easy to obtain ID cards or attestation of lost, with just a complaint of lost ID or with the help of dishonest security staff a receipt that acts as an ID card will be provided. 

A pick-up is a person found in a different state, who acts as sale agent or manager in order to receive financial payment before transacting it back to the scammer. For instance if X scams Y, X will tell Y to do the transfer to Texas, which his pick-up (G) would receive, while collaborating with a person of the bank in Texas to delete the information (a percentage usually given to the person in the bank). G uses a different name to secure his/ her identity, and send the money to X, whose is now secure (X will be operating with a different identity not registered in the country of origin nor in any other state, due to fake ID card use for withdrawal). Law enforcement officers during investigations encounter several challenges, due staff dishonesty and inadequate with information from mobile operation companies. Certain agents usually identify Sim Cards of suspect with their ID cards without being aware of cybercriminal patterns. As such, Digital forensics remains a survival for victims to recover their identity, be healed from psychological torture due to cyberbullying and financial recovery, when a criminal is apprehended. However, the process of forensics is based on uncovering, interpreting electronic data and providing grounded evidence after structural investigation through the validation of information reconstituted from past events.

 Conclusion

 In globalization period validated the theory of biometric, a technological system that controls data of persons for security and administrative reasons. The theory is increasing challenged in Sub Saharan Africa, as the number of cybercriminals continues to double in geometric stance and some criminals wondering because of inadequate evidence provided by law enforcement officers to the criminal justice system in relation to white collar crimes. Relevant references of individuals are easy to access on social networking sites, which are use can be use for fraudulent purposes. In some cases, it is often extremely difficult for a victim to refute allegations from the police for the fraudulent usage and re-establish their credentials used by a cybercriminal. 

Biometric identification is a process not an end to crime waves. The slow pace in biometric identification in some Sub Saharan African countries facilitates crimes. Fraudsters continue to produce ID cards receipts in order to perpetrate crimes. Redefining the government-based biometric identification system will help identify and verify individuals interacting with government agencies for the purposes of card issuance, voting, immigration, social services, or employment background checks. The judiciary should ensure that biometric identification cards are issued on time, in order to effectively control the collection of social security benefits, minimize identify theft, and manage immigration on a very large scale.

( The Author is a Security Expert, Consultant, Specialist in Cyber Security, Counter Terrorism and Jehadist Tendencies)

Subscribe Our You Tube Channel

Fighting Fake News

Fighting Lies











































Related Article

Timor-Leste Seeks Economic Lifeline as Oil…

Timor-Leste, also known as East Timor, has made significant strides since its tumultuous birth in 20 ...
May 1, 2024

Philippine Police Arrest 3 Suspects Over…

Police in the Philippines have arrested three men suspected in the killing of community radio broadc ...
April 30, 2024

In Tibet, Parents Plead for Children…

It’s caterpillar fungus harvesting season in Tibet, and parents have staged protests urging Chines ...

Vietnamese Monk Seeks Justice for Brother…

In March 2015, the Thanh Nien newspaper reported that from October 2011 to September 2014, there wer ...
April 29, 2024

Myanmar Junta Attack on Hospital Kills…

A Myanmar junta airstrike on a hospital in the west of the country has killed four people, including ...
April 26, 2024

2 Decades on, Families of Tak…

Nearly two decades after the Tak Bai Incident where over 80 people died in Thailand’s insurgency-s ...

Other Article

Video Report

Report Warns,Climate Change Set to Cut…

According to a new report by Germany's Potsdam Institute for Climate Impact Research, which was publ ...
May 2, 2024
News & Views

Timor-Leste Seeks Economic Lifeline as Oil…

Timor-Leste, also known as East Timor, has made significant strides since its tumultuous birth in 20 ...
May 1, 2024
Video Report

South Africa Prepares to End Lion…

From allowing captive-bred lion hunting to selling lion bones to East Asia for their alleged "medici ...
Pick of the Day

UN Secretary-General Meets with Working Group…

United Nations Secretary-General António Guterres meets with the Working Group on Discrimination ag ...
April 30, 2024
Video Report

On Both US Coasts,Pro Palestinian Encampment…

Despite college administrations' warnings, anti-Gaza war protests on campuses are still going strong ...
News & Views

Philippine Police Arrest 3 Suspects Over…

Police in the Philippines have arrested three men suspected in the killing of community radio broadc ...

[wp-rss-aggregator feeds="crime-more-world"]
Top

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use. <br> To find out more, including how to control cookies, see here: <a href="https://automattic.com/cookies"> Cookie Policy </a> more information

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

Close