BEING A RESEARCH PROJECT, SUBMITTED TO THE FACULTY OF LAW
EBONYI STATE UNIVERSITY, ABAKALIKI
ABSTRACT
Technology
has integrated nations and the world has become a global village. The economy
of most nations in the world is accessible through the aid of electronic via
the internet. Since the electronic market is opened to everybody it also
includes eaves droppers and criminals. False pretence finds a fertile ground in
this situation. Some perpetrators of this crime usually referred to
in Nigeria
as “ Yahoo boys” are taking advantage of the e-commerce system available on the
internet to defraud unsuspecting victims who are mostly foreigners, thousands
and sometimes millions of naira. Cyber crime is increasing astronomically each
day as the internet continues to permeate every nooks and crannies of our
society and no one can predict the next dimension. This work is therefore a
response to the ravaging effect of cyber crime in Nigeria. The work is divided
into five chapters. Chapters one is the general introduction. Chapter two talk
about the classifications of cyber crime. Under chapter three, the writer
discusses the legal instrument for the prevention of cyber crime in Nigeria. In
chapter four, the impact of cyber crime on the Nigerian economy is discussed
while chapter five is the conclusions. The methodology used is to rely on
primary and secondary source of material. Internet sources are very useful due
to the nature of the work.
TABLE OF CONTENTS
Title page: - - - - - - - - i
Certification: - - - - - - - ii
Dedication: - - - - - - - - iii
Acknowledgement: - - - - - - iv
Abstract: - - - - - - - - v
Table of contents: - - - - - - - vi
Table of cases: - - - - - - - x
Table of Status: - - - - - - - xi
Table of Abbreviations: - - - - - - xii
Chapter One: GENERAL INTRODUCTION
1.0 Background of the Study: - - - - 1
1.2 Statement of the Problem: - - - -
4
1.3 Research Questions: - - - - - 6
1.4 Objectives of the Study: - - - - - 7
1.5 Scope of the Study: - - - - - 7
1.6 Significance of the Study: - - - - 8
1.7 Methodology: - - - - - - 8
1.8 Limitations of the Study - - - - - 8
Chapter Two
2.0 Classification of Cyber Crime: - - - - 10
2.1 Introduction: - - - - - - 10
2.2.1 Computer: - - - - - - - 10
2.2.2 Crime: - - - - - - - 11
2.2.3 Cyber Crime - - - - - - 11
2.2.4 Economic Crime - - - - - - 12
2.2.5 Internet / Cyber Café - - - - - 13
2.2.6 Software/Virus - - - - - - 13
2.3 Types/Incidences of Cyber Crime - - - 14
2.3.1 E-mail Scams / Spam - - - - - 14
2.3.2 Cyber Stalking - - - - - - 15
2.3.3 Hacking - - - - - - - 16
2.3.3 Computer Vandalism - - - - - 17
2.3.4 Piracy - - - - - - -
17
2.3.5 Money Laundering - - - - - - 19
2.3.6 ATM Fraud - - - - - - - 20
2.3.7 Internet Pornography - - - - - 22
2.3.8 Illegal E-Lotteries - - - - - - 23
2.3.9 Theft of Communication Services - - - 23
2.3.10 Other Incidences of Cyber Crimes - - - 24
Chapter Three
3.0 Legal Instruments for the Prevention of Cyber Crimes in
Nigeria 29
3.1 Introduction - - - - - - - 29
3.2 The Criminal Code Act / Laws - - - - - 29
3.3 The Copy Right Act - - - - - - 34
3.4 EFCC Act - - - - - - - 35
3.5 Advanced Fee Fraud Act - - - - - - 36
3.6 Money Laundering Act - - - - - - 37
3.7 The Draft Nigerian Cyber Crime Act - - - - 37
3.8 International Instrument Pertaining to Cyber Crime - - 40
3.9 Challenges Faced in Prosecuting Cyber Crimes in Nigeria - 42
3.9.1 Jurisdictional Issues - - - - - - 42
3.9.2 Evidential Issues - - - - - - - 44
3.9.3 Extradition Issues - - - - - - - 45
3.10 Effective4nss and Relevancy of the Agencies
Set-up
to Combat Cyber Crimes in Nigeria - - - 46
Chapter Four
4.0 The Impact of Cyber Crime on Nigerian Economy - - 48
4.1 Introduction - - - - - - - 48
4.2 Reasons for the Rise in Cyber Crime in Nigeria - - 48
4.3 Perpetrators of Cyber Crimes - - - - - 51
4.4 Emerging Cyber Crimes Method in Nigeria - - - 53
4.5 Economic Impact of Cyber Crime in Nigeria - - - 56
4.6 The Social Impact of Cyber Crime in Nigeria - - - 59
Chapter Five: CONCLUSIONS:
5.1 Observations - - - - - - - 61
5.2 Recommendations - - - - - - - 66
5.3 Conclusion - - - - - - - 70
TABLE OF CASES
ESSO
West Africa Inc. V. T. Oyegbola 1999 I NWLR 194 SC - - 45
Oguma
Associated Co. Nig LTD V. IBWA Ltd (1998) I NSCC Vol.19 - 45
Rv.
Manning (1990) 2g App. 461 - - - - - - 43
Rv.
Manning (1990) 2g App. 461 - - - - - - 43
San
Lelis V. Badgley 136 F.
Sup 2d 139 (US) (2000) - - - 45
St.
Clair V. Jonney’s Oyster and Shruinp 76. F. supp 2d 733755 (US) 1999 - 44
Tolliver
V Federal Republich of Nigeria 263
F. Supp. 2d. 873 (US) (2003)- 44
United
States V. Johnson (208) F Supp. 3d. 633 7th Cir. US (2000)- - 44
TABLE OF STATUTES
Nigeria
Advanced
Fee Fraud Act Cap A6 LFN 2004 S. 5 (1)
Constitution
FRN 1999 (as amended) S. 36 (12)
Copyright
Act Cap (38 LFN, 2004 S.I (1)
S.
18 (1) – (5)
Criminal
Code Act Cap C12. (28 LFN 2004 SS. 440, 421, 451 (6) (F-g)
SS.
419
SS.
451, 419, 419
EFFCC
Act Cap E1 LFN 2004 SS. 6,7,18,19,20 & 21,46
Evidence
Act Cap E14 LFN 2004 SS. 76,77,78,90-98,100,101
Money
Laundry Act Cap M18 LFN 2004 S. 14
NCC
Act Cap N33 LFN 2004
Telecommunications
and Postal Offence Act Cap. T4 LFN 2004 S. 3 (h)
TREATIES-FOREIGN
Articles
23, 24
Article
22
Council
of Europe Convention on Cyber crime 1999
Vienna
Convention on Diplomatic Relation 1969
Article
31
ATM Automated
Teller Machine
CIA Central
Intelligence Agency
COE Council
of Europe
DSTV Digital
Satellite Television
EFCC Economic and Financial Crime Commission
GNCS Global
Network for Cyber Solution
GSM Global
System of Mobile network
IWS Internet
World State
ICT Information
and Communication Technology
ISPON Institution of Software Practitioners
of Nigeria
NWLR Nigerian
Weekly Law Report
QB Queens
Bench
USA United
State of America
UK United
Kingdom
BIBLIOGRAPHY
Books
Carter D.L: Targeting
Fraud and Detecting Fraud (New York:
SRIBNER,1999).
Malone M.G,
Hacktirism and Secury: the
National Infrastructure (New York.
JAVA. 2002).
Mbam B.C.E: Fundamentals
of Computer & Information Technology: Copycraft hot. Ltd, Abakaliki
(2008).
Taylor R, et al. Computer
Crime (Texas University of North Texas, 2004
Walden I. Computer
Crimes and Digital Investigations (UK: OUP, 2007)
Dictionary
Bryan A.G. Black’s
Law Dictionary 9th ed. (USA. Thomson West, 2009)
Journals / Articles
Anderson N.: “World’s
Worst Internet Law” Internet Law Journal Vol. 1 No. 1 (2006).
Goredema C.: “Measuring
Money Laundry in Southern Africa” A Journal on Money Laundry Vol. 14 No5.
(2004).
Jaishaukar K. “Cyber
Criminology Evolving a Novel Literature” International Journal of Cyber
Criminology Vol. Issue 1 (2007).
Parker D.: “Fighting
Computer Crime Cyber crime Journal” Vol. 1 No. 1 (2002).
Remo J. “Report
on Cyber Stalking” American Journal Criminology Vol. 21 No.4 (2001).
Internet Sources
Adebiyi A. Internet Crime (2009). The
Nigerian Perspective. http://www.Tomalegal retrieve.com/articles.html.
(Visited August 12, 2011).
Brain Cash: “The Economic Impact of
Cyber-Attack CRS Report for Congress”. http://www.crs.org
(Visited 2011, May 19).
Carter D. “Computer
Crime Categories”, FBI Law Enforcement Journal Vol. 64 No. 21 1995.
Council of Europe’s Convention on Cyber
crime. http://www.Coe.int. (Visited 2011 May 30).
Obot U.S.: “The
rule of the CBN in the Fight Against Cyber crime Draft” Keynote address
Deliverd at the Ist West African Summit on Cyber Crime 2010 held at Transcorp
Hilton Hotel Abuja November 30, 2010.
Ovia J.: (2000)
“Internet Bank Practices and potentials in Nigeria”, A Seminar Paper at a
Seminar Organized by the institute of Chartered Accountants (ICAN), Lagos
Sheraton Hotels & Towers Ikeja September 2005.
Vatis M, (1998) “Congressional
Statement of the Directional Infrastructure Protection Centre”.
Senate/Judiciary Subcommittee papers. Washington D.C http://www.fbi.gov/Vatis.html (Visited
Seminar Papers).
Victor F. B., & Olumide O.O “E-coime
in Nigeria, Trends, Tricks, and Treatment”. http://www.openj.gate/articles
(Visited 2011, June 12)
NEWSPAPER
Adeloye L.A. E. “banking
as New Frontiers for Bank”: Sunday Punch Newspaper September 14, P. 25.
Okere C.: “Cyber
crime in Nigeria” Guardian Newspaper August 13, 2008 P.39.
Olakunle A:. “Loss
of Economic Revenues to Computer Crime”. The Vanguard Newspaper March 18, 2001
P.31.
RELATED ARTICLES
Click on the related links below and read more.
We can keep you updated on this information, please Subscribe for Free by entering your email address in the space provided.