Cyber
crime had been a hard and puzzling issues to crack in Nigerian security sector
due to lack of expertise and professional skilled ICT personnel in the sector.
The recent crimes hackers commit and go scot free is because of ICT illiteracy
and lack of awareness of modern internet security operative. This is an entire
world of its own that deserves attention, because everything today is going
digital, people no longer do physical banking of cash. But internet transfer of
money, which demands Nigerian Police attention. Though they are trying their
best, because there was one hacker that they fished out at Abia State in
Nigeria who was sentenced to two years Jail or pay a file of N300,000.00 according to Chief Judge for personating and duping
of people through internet that earned him almost $9300.00 US dollars in his local
account’s which he went to court and finally pleaded guilty of the accusation
by the Nigerian Police.
Apart
from these recent crimes, a lot of people have lost their money through the
internet transaction. Even after detecting the fraudsters, the police still
become novice to the cases and crimes committed as they cannot further tracing
of internet crimes with necessary computer MS DOS commands and Network Codes
that will fish out the real truth of such case. This is why they need to
undergo serious intensive training to acquire some professional expertise with
certifications like CCNA (Cisco
Certified Network Administration or Association), CCSP (Cisco Certified Security Professional), CCDP (Cisco Certified Design Professional), CCIP (Cisco Certified Internetwork Professional) and finally CCVP (Cisco Certified Voice
Professional). These are international Global United State recognized
certification that will equip Nigerian police intelligent units to execute
their duties properly; And to include are other non professional networking
training to be eligible to handle these cases.
Unfortunately,
Imagine calling police operative to investigate ICT Crime, they are not able to
do that due to lack of expertise in the field. Even the state of networking
today lacks these multiple levels of protection. The Federal and Local
government do what they can to slow network crime, but they are far 100%
(percent) effective beyond prevention of those crimes. The law enforcement
generally responds to the most serious network intrusions. The average internet
connected houses or business premises are attacked multiple times per day, and
no police force is equipped to handle the multiple volumes of complaints per
day on the internet fraud.
The
losses on computer crime are alarming in under developed world like Nigeria.
This is why the western world discriminates and prohibits citizens of those countries
like Nigeria and India to penetrate their country. Nigerians are banned from
participating in some social internet website and eligible foreign Student’s
financial aid institution due to corruption and Internet scams. On the other
hand, foreign investors are afraid to transact online internet banking while in
Nigeria due to high rate of duping online. It is only in Nigeria that someone
will hack a bank to transfer their fund and go scot free due to lack of well equipped
modern ICT Engineer that will protect the institution from external attack. At the
end of the day, the management of the bank will bear the risk of the theft by
sourcing and replacing those stolen money from people account.
Now
to complement this issue, we need to bring the Nigerian force to complement the
online transaction security in Nigeria. If outside world will have a fraudulent
detective online security force unit like EFCC to report crimes commiteed from
Nigeria by Nigerian citizen, who will also take immediate action in arresting
the culprits, I think online fraudsters will desist from their internet scam business
in Nigeria.
I
will also introduce some MS DOS Commands prompt Codes that will help the police
force intelligent unit in detecting a fraudster on a computer, because people
ceases Wi-Fi these day to do a lot harm to people’s computer and phone through
hacking using plug-in and virus. So follow these steps on your computer system
to detect hacker, block Hacker and report a hacker:
(1)
Go to your MS-DOS
or Command Prompt and type the following command to know intrusion but make
sure that you are not connected to the internet when executing this command. So
you can be able to detect the real hacker:
C:\>NETSTAT –ANO
Once
you type the above command, it will display active connections in the your
computer describing their state Example:
if their state is “Established” , know that a potential
or some potential malicious attack have gained entrance into your system
depending on number of established connection while “LISTENING” and “WAITING” are
still trying to gain entrance .
(2)
The second step
is to note those port numbers they used to established connection into your system
which is under Local addresses column, the port number are the last four or three
digit number after 0.0.0.0:, example 0.0.0.0:1245, the port number is 1245, now
also copy the IP address of the established
connection under Foreign address column which the IP address of the potential
hacker. Now go to your firewall clicking control panel to System and Security
to firewall from window start menu
there you will block the hacker with the IP address and the port Number.
(3)
Having done that
you have to trace the Hacker with the IP Address you copy and the Host name.
through MS-DOS Command: Now type the following command to get the information
about the Hacker:
C:\>
tracert *type IP Address/Host name*
Where IP Address for example = 198.168.1.1
And Host name which is found under PID Column
Of MS DOS= 616, now we have:
C:\>
tracert *198.168.1.1/616*
The above command will trace the hacker’s details and
display it on MS-DOS command. Now note above command will also give you the
details of the hackers and their ISP
address but you should note that the address listed before the final one on
information displayed after executing the command belongs to the Hacker’s ISP (Internet Service Provider)
Company.
(4)
Finally print the
information on MS DOS With the following tommand:
C:\> PRINT
[/D] [[C:] [PATH] FILENAME […]]
Where D= Device (stands for printer)
C= Drive
FILENAME is the name you used to save the information
Or
If this formula did not work for you, right click on
the title bar of the MS DOS and select properties, then adjust the menu as you
like and select under option Quick Edit Mode click ok.
Now select the information and go back to title bar
and right click to copy it. Then go to MS Word and paste. You can print it
easily.
(5)
Submit the
information to your local or state police investigating unit, now your Police
department will contact your ISP (Internet Service Provider) to get the full details
of the attacker and punish him severely. The ISP has the full details of the IP
Address, Location of the attack and other information you printed out about the
attacker which the above code will generate.
I think that this information will help the police force
to carry out their investigation on Cyber crimes.
ONYIA EMEKA
HARFORD
(Writer)
No comments:
Post a Comment