Professional Documents
Culture Documents
` PAGES
COVER PAGE
TITLE PAGE
DECLARATION
CERTIFICATION
DEDICATION
ACKNOWLEDGEMENT
TABLE OF CONTENTS
TABLE OF CASES
TABLE OF STATUTES
ABBREVIATIONS
ABSTRACT
CHAPTER ONE
INTRODUCTION
1.1 Background of the Study
1.2 Statement of the Problem
1.3 Objective/purpose of the Study
1.4 Scope of the Study
1.5 Significance of the Study
1.6 Research Methodology
CHAPTER TWO
LITERATURE REVIEW AND HISTORY OF CONCEPTS
2.1 Introduction
2.2 Literature Review
2.3 History of Concepts
2.4 Conclusion
CHAPTER THREE
CYBERCRIMES IN NIGERIA
3.1 Introduction
3.2 Cyber crimes in Nigeria
3.3 Existing Legal Regime for Combating Cyber crimes
3.4 The Nigerian Cyber Security Bill 2011: An Analysis
and Critic
3.5 Conclusion
CHAPTER FOUR
COMPARISON OF INTERNATIONAL PERSPECTIVES OF
CYBERCRIMES AND THE NIGERIAN CYBERSECURITY BILL 2011
4.1 Introduction
4.2 International Legislative Framework on Cyber crimes
4.3 Cybercrime Legislation in other Jurisdictions
4.4 Conclusion
CHAPTER FIVE
SUMMARY, CONCLUSION AND RECOMMENDATIONS
5.1 Summary
5.2 Conclusion
5.3 Recommendations
BIBLIOGRAPHY
CHAPTER ONE
INTRODUCTION
Notwithstanding the inadequacies of cyber law in Nigeria, the crimes
issues that may arise are the purpose of this research work, the
and voice can all be digitized. Along with these geometric changes in
place, for instance the introduction of the Global System for Mobile
services such as the MP3 players, IPod, cell phones with internet
nook and cranny of our society and no one can predict the next
as well as cyber piracy are few of the vices that have become recurring
the entire web space. This ugly trend acts as a cankerworm against
vices. It also has the potential to serve as a breeding ground for cyber
recruit, train and plan terrorist attacks with just laptops and internet
access.
seeks to show that currently the legal regime is not well suited to face
law in the country and a Bill2 has been lying dormant in the National
this Bill. The researcher argues that law enforcement officials cannot
effectively pursue cyber criminals unless they have the legal tools
necessary to do so.
This research work will show that the rise in Cybercrimes in Nigeria
2 Cybersecurity Bill, 2011. Other related Bills which aimed at checking Cybercrimes include: Computer Security and
Information Infrastructure Protection Bill (2005), the Cybercrime Bill (2004), the EFCC Act (Amendment) Bill
(2010), the Electronic Fraud and Prohibition Bill (2008), the Nigerian Computer Security and Protection Agency Bill
(2009), and the Cyber Security and Data Protection Agency (Establishment) Bill (2008).
3 This include: corruption, ethnicity, nepotism, electoral violence, religious conflict, youth restiveness and
on the young ones. Further, this work will show that currently Nigeria
has no law regulating activities on the cyber space and the only laws
which appear close to the problem are the EFCC Act 4, Money
Laundering Act5 and the Advanced Fee Fraud Act6. The researcher
adequacies or otherwise.
mechanisms in Nigeria
in Nigeria
will be x-rayed.
because, this study will be of benefit to every user of the internet. The
and policy makers will find this work very handy in their attempt to
find a solution to this problem. Similarly, this work will assist law
study will also help law researchers and even those in related
needed for the research of this work. The research will combine both
CHAPTER TWO
2.1 INTRODUCTION
the concept; criticisms on the works of some writers and at the end
8 Anah B.H, "Cybercrimes" in Nigeria: causes, effects and the way out; AREN journal of science and Technology
Vol2. NO.7. August 2012 P.626
9 Ibid
10 See countries like USA
crime". The term crime does not in modern criminal law have any
community or the state (public wrong). For me, the most acceptable
11 Farmer L., "crime definitions" in Cane and Conoghan (editors). The New Oxford Companion to Law, Oxford
University Press 2008, P.263
12 Such definitions as provided by Section 243 (2) of the Trade Union and Labour Relations (Consolidated) Act 1992
account thefts.20
Most of the cybercrimes are being committed with the aid of the
insight into the nature of the conduct that falls within the umbrella
There has been confusion on the criteria used to determine the term
ethics.
through which they were committed. However, due to the nature and
and the cyber universe, it made the traditional universe tremble like
25 Ibid
26 ibid
27 ubiquity, global reach, universal standards, information reachness, interactivity, information density,
be categorized as cybercrimes.28
just by filling the wrong data into hardcopy version of tax forms which
crime as long as the penal codes and any other legislation clearly
stipulate it as involving not only the use of computers but the use of
28 Ashery M., “Introduction to Cybercrime: Security, Prevention and Detection of Cybercrime in Tanzania”, LL.M-ICT
law (thesis) 2013 Tumaini University Iringa College
29 Ibid P.203
30 Girasa, R.J., Cyber Law: National and International Perspectives, Prentice Hall Publishers, 1st Ed, New Jersey,
2001
At the Tenth United Nations Congress on the Prevention of Crime and
or network.33
the direct usage of a computer by the criminal as one of the first famous
31 Talwant S., District & sessions Judge, Cyber Law & Technology, Delhi- India
32 Tenth United Nations Congress on the Prevention of Crime and Treatment of Offenders, Vienna A/CONF.187/10,
10-17 April 2000, P.4
33 Ibid
34 Magim C.J, “The 2001 Council of Europe Convention on Cybercrime: An efficient tool to fight Crime in
criminal cannot only use a computer to commit his crime but can also use
Computer (UNIAC), and other Punch Card Tabulation Machines had some
inherent security advantages. They were stand alone systems, huge and
very expensive and besides, not many people knew what a computer really
introduced around the 1960s with a business model of renting out the
the data and programs stored in it vulnerable, and thus, the first doors to
hacking were opened. The first hackers group came from Massachusetts
Institute of Technology (MIT) in 1961, shortly after MIT got its first PDP-
35 Ibid
36 United States V Morris (1991) The accused invaded the security system through a worm as to measure the
weakness of MIT which in turn prevented the use of Federal interest computers, thereby causing loss. He was
held guilty.
37 See S V. Douvenga case no 111/150/2003, dated 2003/08/19 Northern Transvaal Regional Division 93 Cr APPR
25, 02 Dec 2003, the accused who used the trust position entrusted by her company to send more than 30,000
client address to her fiancé at the opposition company, was found guilty
1.38 During the 1970s, while computers were slowly getting
idea of breaking it. One of the first known Phreaks was Nelson from
MIT who wrote softwares to generate tones that helped access the
phone company’s long distance service and make free calls. The
stalking a trunk line, and kicking off the operator line that enabled
making free long distance calls. Steve Wozniak and Steve Jobs
was soon followed with a thirst for full fledged hacking by some
the Radio Shack’s TRS-80 and the IBM PC brought more powerful
computing to people who were eager to find new ways to exploit the
were made for seamless interaction between them. ARPA Net was one such
effort and during its design, security was not in issue to research scientists
as they thought that the small number of nodes on the network limited
UNIX systems. The worm spread all across the United States and infected
systems and brought the internet to a standstill.39 This was the wakeup
call to internet users who realized that some amidst them haboured
malicious intent.
institutions were amongst the first large scale computer users in the
computer crime from the early development. The founder and father
Institute (SRI) International and was the main author of the first
Trojan horse virus was released in 1998 by hacking group called “Cult of
was the attack on the Federal Bureau of Labour Statistics in 1998, which
requests. The website was brought down that frustrated the economists
The worms and viruses released in the twenty first century posses a higher
is the “Love letter” worm that caught on in May 2000 caused companies
2.4 CONCLUSION
“Ever since men began to modify their lives by using technology, they have
42 Computer Crime - Criminal Justice Resource Manual 1979. This manual became an encyclopedia also for law
enforcement outside US
43 See an overview of his archies, www.cybercrimelaw.nnet His first book on the subject was: “computer Crime”
(1976)
44 Lessons of “Love” Virus still sinking in
2011, P.30
established that a discourse on the concept Cybercrime is indeed not an
easy task as there are conflicting ideas on what it is. But a clear
CHAPTER THREE
CYBERCRIMES IN NIGERIA
3.1 INTRODUCTION
Nigeria. It will further examine the existing legal regime for combating
For better or worse, the internet has largely grown beyond the
anonymous free-for-all that was seen in the early years. There are
the “Nigerian” Email Scam46. The E-mail scam may come in any
with the increase in the use of cell phones, scam emails are now
47 The researcher has within a space of one month, received 10 email scams via facebook from different persons
asking her to come to the rescue of a young girl who is supposedly in the custody of a priest.
threatening behaviour.48 Cyber stalking is a form of harassment
unknown person who threatened her life, to kill her, to rape her
nations.
be immediately identified.
internet users.
51 Sergeant J., “Police Raid on Global Internet Child Pornography Club”, Computer Pornography Vol.1 Issue 1 (2006)
p.16
for himself or another person; obtain any property or an interest
cybercriminal.52
credit card numbers. This term comes from the fact that internal
most common ploy is to copy web pages code from a major site
and use that code to set up a replica page that appears to be part
of the company’s site. A fake e-mail is sent out with a link to this
page which solicits the user’s credit and data or password when
account balance. This machine has grown beyond the traditional role
mentioned above. Through ATM card, one can purchase items online.
credit card and calling card numbers stolen from online databases. At
times, the criminals steal the PIN of the users and with their cards,
use them to withdraw all the money in their accounts. This has made
problem that only gets bigger.54 Cyber piracy has two different
etc.56 Some internet users think that hacking is harmless fun and
the American and Canadian visa lotteries have been used to lure
abroad and these scammers are aware of this, and they respond
lotteries are also done through the mobile phones these days. It
some questions (in most cases these questions are very easy to
cannot be verified.
59 Adeloye L.A. “E-banking as New Frontiers for Banks”, Sunday Punch 2008, September 14, p.25
60 EFCC/NBS/(2009), (2010) Business Survey on Crime & Corruption and Awareness of EFCC in Nigeria, Summary
Report.
61 Atherton M., “Criminals Switch Attention from cheques and Plastic to Internet Transactions”, The Sunday Times
like any other country will remain worm breeding grounds for cartels
essence.
CYBERCRIMES
to fall short of liabilities. This is not to say that cyber criminals are
free to operate in the country. Despite this limitation, there are laws
of this Act;
scam etc.
Some of the Acts the commission enforces pursuant to the said section
include; the Corrupt Practices and other Related Offences Act 2000, EFCC
Act 2004, Banks and other Financial Institutions Act 2004, Recovery of
Public Property (special military Tribunal) LFN 2004, The Failed Banks
Furthermore, the Act provides a very wide meaning for the phrase
include:
seen in Nigeria. For instance, the illict activities of the “Yahoo boys” are
crimes which EFCC Act can deal with. This provision has been an anchor
Ors65 reputed to have carried out the third world biggest single scam with
numerous others pending in court. In this case, the accused persons were
$181.6 million and they were all found guilty and sentenced accordingly.
their owners. Another close offence is found in Section 1(1) of the Advanced
Fee Fraud Act which was enacted to ease the proof of crimes and the EFCC
fee fraud particularly through the use of scam letters to defraud people.
419 provides that “any person who by any false pretence, and with
who by means of any fraudulent trick or device obtains from any other
goods than he would have paid or delivered but for such trick or device, is
presented false invoice to the customs and obtained the release of his
Moreso, Sections 239(2)(a) and 240A of the Criminal Code Act70 prohibits
67 ONWUDIWE V. FEDERAL REPUBLIC OF NIGERIA Suit No: SC-41/2003; (2006) 10NWLR (pt 988) 382 where the
Supreme Court laid down ingredients of false pretence.
68 Criminal Code Act Cap C38 LFN 2004
69 (1959) 4 F.S.C 48
70 LFN 2004
any house, room or place which is used for the purpose of any money or
kept or used or any person who has the use or management of such
for one year, and to a fine of one thousand naira. This Section can enable
persons as would not heed to this Section. On the other hand, Section
240 defines “Public Lottery” to mean a lottery to which the public or any
class of the public has, or may have access and every lottery shall, until
lot. Section 240A(c) provides that every person who writes, prints,
exceeding six (6) months. This section recognizes lotteries done with the
use of computers or on the internet as being an offence and can be used
“it must be clearly understood that our Evidence Act is now more
than 50 years old and is completely out of touch with the realities of
made it possible for facts for which direct oral evidence can be given
document, the computer from which it was generated and the person
71 In EGBUE V. ARAKA (1996) 2 NWLR (pt 433) 688 CA. at 710 Para A
72 (1969) 1 NMLR 194, SC
who generated it or manages the relevant activities captured in the
evidence.
AND A CRITIC
The Cyber Crime Bill 2013 popularly known as the Cybersecurity Bill
2011 is a 27 page Bill which has gone through various drafts and
programs in Nigeria.
7373 Odi, J.D, Legal Practitioner at Awomolo & Associates Jude_dan_odi @ yahoo.com; OJdaniel.ng@gmail.com
Section 1(2) further provides that the Act shall be enforced by law
enforcement agencies”.
The sponsor of the Bill, Aisha Modibbo in her lead debate on the Bill,
the Bill is imprisonment for a period of two years or a fine not less
74 Rotimi A., “Rep Passes Anti-Cybercrime Bill for Second Reading”, Daily Independent, Nov. 27, 2012
75 Okunma E.N., “Criticism: 2011 Cybercrime Bill”, Telecommunications Engineering Project, University of
Witwatersrand Johannesburg South Africa 2013, p.1
I can have a flutter that, if the security outfits to be used
are going to be affective as supposed, the population in
Nigeria prison might increase because if someone gains
access to your computer system and causes damage to it
or a little malfunction, then the person is convictable
under this said Bill. The Bill is so complex that if I asked
an IT staff to install Windows Vista and he went ahead
with his discretion to install Windows 7 which is causing
my system to mal-function, the staff stands a chance of
me charging him to court under Unauthorized
Modification of Computer Program or Data (Section
8)76
Service providers also have a place in the said Bill if they fail to
Section 23): forgetting that every career has it’s inflexible times. The
states that “All service providers under this Act shall have the
years”
Shifting pen to the System Interference Law (Part III Section 9),
designs, adapts for use, distributes, or offers for sale, procures for
76 Ibid
component, which is designed primarily to overcome security
with the intent to unlawfully utilize such item to contravene this Act,
commits an offence and liable upon conviction to a fine not less than
both such fine and imprisonment”. This section fails to note that
also, will be illegal in Nigeria. This particular law will also hinder the
offence which has been disclosed in the course of the lawful exercise
of the powers under this Act”. The implication here is serious privacy
of doing in this clime, the hard line of a critic to any ‘big man’ or ‘oga
the governor on Face book. If passed into law in its current state, the
Cyber Crime Bill would allow extreme abuse of power by office
Initiative Nigeria, as a “grave threat to free speech”. I fear that the Bill
this Bill are unreasonably unfair as the Rich could get away or
discharged once they pay the fines attached the crimes, while the
poor wallow in jail. The words of St. Augustine should ring true –
3.5 CONCLUSION
77 Nwachukwu E., “Nigeria: Gagging Critics or Fighting Cybercrime?” Global Voices Advocacy, posted 10 december
2013, 23:34 GMT. Assessed 28/6/2014
cybercrime for complemented solution On this proposed law, the
passed into law by the National Assembly in other that there can be
CHAPTER FOUR
COMPARISON OF INTERNATIONAL PERSPECTIVE OF
CYBERCRIMES AND THE NIGERIAN CYBERSECURITY BILL
2011
4.1 INTRODUCTION
jurisdictions.
CYBERCRIMES
78 Stern S., & Solange G.H, A Global Treaty on Cyber Security and Cybercrime, 2nd Ed., AUT Oslo, 2011, p. 57
messages blocked by the network. There has to be something to
79 McConnell, International Cybercrime and Punishment? Archaic Laws Threaten Global Information, December
2000, Washington D.C, P.1
international nature of computer crime.80 It recommends that
the internet. Under Article 37, the committee of minister of the Council of
Europe, with the consent of the contracting states may invite any state
which is not a member of the council and which has not participated in its
does not in itself confer on the treaty a binding force in Nigeria unless it is
Draft Convention which Nigeria is a signatory to. Thus, the Bill in one fell
swoop, seeks to enact the Nigeria’s version of UK’s Computer Misuse Act
1990, Terrorist Act 2001, Copyright Designs and Patent Act 1988 (with its
Publications Act (as amended) etc. Nigeria should also consider the
United Kingdom
In the Uk, the English courts concluded that their existing laws did not
enactment of the Computer Misuse Act85 1990. However, this Act was soon
Computer Misuse Act was amended and came into force in England and
Wales on the 1st October 2008. Modifications to the CMA were included in
the Police and Justice Act86, these changes were then themselves amended
order. Though the Police and Justice Act deals mostly with policing reform,
raised from six months to two years in prison, making the offence serious
(DOS) previously something of a legal grey area are now clearly criminal
amended Act criminalizes the act of distributing hacking tools for criminal
purposes.90
little judicial support. This was relevant to fraud cases but could not be
offences have been introduced by the home office as well as the advent of
the National Hi-tech crime Unit. This brings the police, the private sector
United States
US secret service and the FBI have jurisdiction over offences committed
by case court analysis rather than applying strict written codified rules.
91 Op cit p.214
92 Hereinafter referred to as NIIPA or “the 1996 Act”
93 Section 1030 of the Title 18 of NIIPA
94 Hereinafter referred to as ECPA
The case of US V. GORSHOV95 raises controversy about a country’s
some Russian nations were identified as hackers who had been breaking
the FBI agents and information was retrieved from Russian companies by
the FBI agents without warrant. The District court found that there had
Russian law. Bold attempts are being made in the USA to respond to the
new Bill, which if passed will penalize economically foreign countries that
choose or fail to put a stop to cyber criminal activity originating from within
their borders. These discuss shows that the United States is taking the
lead in addressing cybercrime. The advent of the new Bill also illustrates
95 2001 WL 1024026
abreast with advancing computer technology. The ratification of the
India
and enforced on 17th May, 2000. The Act provides a legal framework for
the security of all electronic records and activities carried out by electronic
means. The IT Act 2000 also provides legal recognition of digital signatures
and has been criticized for not effectively addressing cyber harassment
4.4 CONCLUSION
international arena and should also consider the adoption of the Council
effectively.
CHAPTER FIVE
5.1 SUMMARY
This work has examined the views and opinions of writers and
Cybercrimes in Nigeria which are the EFCC Act, Criminal Code Act,
5.2 CONCLUSION
Nigeria has been criticized for dealing inadequately with cybercrimes
Aids crisis, the fuel crisis, political instability and traditional crimes
such as murder, rape and theft, with the result that the right against
evidence into our laws and also recognizing electronic crimes etc.
circumstance.
necessary.
5.3 RECOMMENDATIONS
to:
crime take this issue to the forefront of the initiatives with a view of
ensuring that the best brains on the issue not only from a legal and
the horizon so that laws that constitute the framework are not
3. The Cyber Security Bill 2011 now known as Cybercrime Bill 2013
this Bill before it can be passed into law by the National Assembly in