Advertisement

Cyber fraud: A new force and threat to Ghana's image and security

The multi-faceted nature of operations by security officers in Ghana involve not only border patrol but also management, documentation, fraud detection, and prevention of illegal migration and drugs and human trafficking.

Sections of the Ghanaian community have already noted with concern that with the discovery of oil, the sporadic influx of migrants to Ghana has the potential to have an impact on  the economy and Ghana’s national security.

Currently, it is  common knowledge that the spread of cyber fraud in Africa and, in particular, Ghana, is on the ascendancy. The news  that Ghana ranks seventh  in cyber fraud, known in local parlance as ‘Sakawa,’ out of the 10 countries identified in the world, is alarming. This cyber fraud ranges from hacking of official websites to abduction of teenagers and the use of the  web to solicit young Ghanaian girls for sexual exploitation abroad.

In almost all countries of the world, including Ghana, governments and commercial organisations increasingly rely on Internet-worked information systems to carry out services that are critical to administrative and business mission success.

With this increased reliance has come increased exposure to malicious actions, particularly by individuals employed by the organisation who have, or previously had, authorisation for access to all or part of the organisation’s computing systems or infrastructure. What is alarming is that the ultimate effects of business policy decisions on insider threat risks are often complex and sometimes counterintuitive, with short-term effects very different from long-term effects.

In Ghana, just like any developed nation, the number of “netizens” has increased  with the presence of Internet cafes in every locality. As the population of Internet users in Ghana increases, so do the potential threats and vulnerability associated with such increase.

Much as the Internet can provide a wealth of information, it must also be viewed as a breeding ground for fraud.  Fact is that there are growing fraudulent schemes in which one or more components of the Internet, such as Web sites, chat rooms and e-mail play a significant role in offering non-existent goods or services to consumers, communicating false or fraudulent representations about the schemes to consumers, or transferring victim’s funds, access devices or other items of value to the control of the scheme’s perpetrator.

With the recent discovery of oil in Ghana, the economy of Ghana will take a new shape thus inviting international businesses and cyber hackers alike.

In a good economy, managers sometimes make decisions intended to enhance organisational performance and productivity. These decisions could be left on their computers without the intended consequence of magnifying the organisation’s exposure to and likelihood of insider cyber hackers’ attack.

There is also the possibility that new managers or government appointees who may innocently not be conversant with software used by the office  could call for assistance or confide in a secretary or someone they trust with passwords or security codes. There appears to be a number of potential vulnerability to exploit here, ranging from detailed knowledge of internal systems and controls to bad “security hygiene” – leaving passwords posted on monitors, sharing access codes, and other activities that simplify work activities under the assumption of good behaviour.

A recent vendor survey in the United States indicates that 50 per cent of respondents write down their passwords, and about 33 per cent share them with others in the organisation, in spite of repeated reminders to avoid such actions.

As this phenomenon is on the ascendancy in Ghana, there is the need for a legislation that holds public companies increasingly responsible for the actions of their employees that violate applicable laws and regulations in respect of the use of their computers.

The lack of methods and tools for analysing and communicating insider threat risks and mitigations in Ghana exacerbates the problem and the earlier the situation is arrested the better. It is also important that stakeholders in Ghana’s security issues begin to map out strategies to fight this crime before it becomes a canker in Ghana.

It is also important for the security agency responsible for apprehension, investigation and prosecution of criminals to be well vexed in  Information and Communication Technology (ICT), due to the complexities present in cyber fraud.

Today, there is no longer the need to rent office space, hire employees and spend countless hours on a telephone pitching to targeted audiences. Time and funding have been reduced significantly in terms of cyber fraud. As a result, the Internet looks extremely attractive. Furthermore, with the usefulness, popularity and global reach of the Internet continuously growing, it doesn’t take much to try and understand why fraudsters are venturing off into cyberspace.

In Ghana, the number of computer security incidents is growing exponentially and society's collective ability to respond to this crisis is constrained by the lack of trained professionals. The increased use of the Internal and computer technology to commit crimes indicates an abuse of new developments that requires a response by those involved in law enforcement.

Cyber crimes and many child-related sex crimes leave clear digital evidence that must be investigated by those who are trained in computer forensics.

These security men and women after training would be armed to stop those behind the most serious computer intrusions, identify and thwart efforts of those who use the Internet to exploit not only children but also businesses.

A critical look at  criminal technologies and criminal organisation associated with computer crimes that occur across the world will remind us that Ghana is vulnerable.

Article by ASP John Agbemabiese       

Email: [email protected]

Connect With Us : 0242202447 | 0551484843 | 0266361755 | 059 199 7513 |