The Fight against Cybercrime in Cameroon
With the on-going Anglophone crisis in the two English-speaking regions of Cameroon, individuals, businesses and the government are increasingly becoming at risk of being targeted by cyber criminals. Amid this challenge, Cameroon has enacted a law relating to Cyber Security and Cyber Criminality (hereinafter referred to as the Cyber law) and trained personels to fight cybercrime. In spite of these measures, cybercrime is still rampant and the question is why? This contribution therefore examines the measures put in place to combat cybercrime with the aim of showing that the measures are inadequate. Also, the contribution explains why cybercrime is prevalent in Cameroon and concludes with measures to prevent and minimise the impacts of cybercrime (recommendations). This paper aims to raise awareness and improve knowledge of data protection rules, especially among investigating officers, students, specialists and non-specialist legal practitioners who have to deal with data protection issues in their work.
B. Mbodiam and M. Cisse. “Business in Cameroon” www.businessincameroon.com/pdf/Bc5/pdf, Jun.4, 2019 [Feb. 12, 2018].
K. Ngalla. 2016. “Cameroon’s Dilemma in Fighting Cybercrime” African Independent Business Journal. Vol 1, p1. Available: https://antic.cm/index.php/en/component/k2/item/348 [June. 3, 2019].
Law N° 2010/012 of 21 December 2010 relating to Cyber Security and Cyber Criminality (hereinafter referred to as Cyber law).
National Agency for Information and Communication Technologies (ANTIC).
UNGA Resolution: Creation of a Global Culture of Cyber Security and taking stock of national efforts to protect critical information infrastructure, A/RES/64/211.
M.Gercke. (2012, September 12). Understanding Cybercrime: Phenomena, Challenges and Legal Response. (2nd edition)’ [On-line]. Pp4-12). Available: itu.int/ITU-D/cyb/cybersecurity/legislation.htm [date accessed Jun. 4, 2019].
“Carter, Computer Crime Categories: How Techno-Criminals Operate”, FBI Law Enforcement Bulletin, 1995, p21. Available: www.fiu.edu/~cohne/Theory%20F08/Ch%2014%20-%20Types%20of%20computer%20crime.pdf, Apri. 25, 1995 [Jun.4, 2019].
The text of the Stanford Draft is published in: The Transnational Dimension of Cyber Crime and Terror, p225, http://media.hoover.org/documents/0817999825_221.pdf, [Jun. 4, 2019].
M.Gercke. (2012, September 12). Understanding Cybercrime: Phenomena, Challenges and Legal Response. (2nd edition)’ [On-line]. p12). Available: itu.int/ITU-D/cyb/cybersecurity/legislation.htm [date accessed Jun. 4, 2019].
. Sections 60 to 85 Cyber law.
.N. Assongmo. “Cameroon is a Country vulnerable to cyber-criminality” USENET: https.//www.google.com/amp/s/www.businessincameroon.com/index.php, Sept. 9, 2016 [Mar. 24, 2019].
. Voa.com. “Cameroon urged to Act against cybercrime” USENET: https://www.google.com/amp/151740.htm, Feb. 10, 2011 [Feb.10, 2018].
Law No. 2016/007 of 12 July 2016 relating to the Penal Code.
Regulation No. 01/CEMAC/UMAC/CM of 4th April 2003 on the Prevention and Suppression of Money Laundering and Financing Terrorism in Central Africa.
Decree No. 2013/0399PM of 27th February 2013.
. Part one provides content to key terms such as cipher, encryption, and security audit just to name a few. Part two deals with electronic security and cyber security. This part places on the Ministry of Post and Telecommunication the duty to formulate and implement policies relating to electronic communication security. The National Agency for Information and Communication Technologies, hereinafter referred to as the Agency, is responsible for the regulation of electronic security activities in collaboration with the Telecommunications Regulatory Board. Part three identifies crimes that may be committed through the internet and their various penalties and part four relates to international cooperation with other countries.
. Section1, Cyber Law.
. T.Danziger and C.Danziger. “Art and Law”Art news (Jul. 17, 2018), 2.
. European Commission. “EU Data Protection Reform: Better Data Protection Rights for European Citizens”. Internet: europa.eu/dataprotection,May.12, 2011 [May. 12.2019].
. Section 39, Cyber Law.
. 23 March 1976.
. Cameroon Constitution of Law No. 96-06 of 18 January 1996 to amend the Constitution of 2 June 1972 and the Law of 2010 on Cyber Security and Cyber Criminality.
. Advocate General Sharpston described the case as involving two separate rights: the ‘classic’ right to the protection of privacy and a more ‘modern’ right, the right to data protection. See CJEU, Joined cases C-92/09 and C-93/02, Volker und Markus Schecke GbR v. Land Hessen, Opinion of Advocate General Sharpston, 17 June 2010, para. 71. 5. S
. The Preamble, Cameroon Constitution.
. Sections 152, 305 and 280-281 of the Penal Code criminalise actions of contempt or assault against anyone.
. Section 42,Cyber Law states that ‘The confidentiality of information channelled through electronic communication and information systems networks, including traffic data, shall be ensured by operators of electronic communication and networks information systems’.
. Section 3 (24), Cyber Law.
. A-G v Guardian Newspaper Ltd (No. 2) 13 October 1988, 85.
. Section 45, Cyber Law.
. Section 61, Cyber Law.
Section 44 (1), Cyber Law.
. Section 47, Cyber Law.
Section 39 (1), Cyber Law.
. Ibid, section 52 (1).
. See sections 57-126 of Law No. 2005/007 of 27 July 2005.
. Ibid, Section 82.
Section 74 (1), Cyber Law punishes with imprisonment from one to two years and a fine from one to two million.
. Section 74 (4), Cyber Law punishes with imprisonment from six months to two years or a fine from one to five million CFA francs or both of such fine and imprisonment.
. Section 78 (1) punishes with imprisonment from six months to two years or a fine from five to ten million CFA francs or both of such fine and imprisonment.
. Court of First Instance of Buea (CFIB)/017b/2015 unreported.
. CFIB/015f/2012 unreported.
. Section 72, Cyber Law.
. Court of First Instance of Buea/011A/2013 unreported.
. Section 73 (2), Cyber Law provides ‘Whoever deliberately accepts to receive electronic communications payment using a forged or falsified payment, credit or cash withdrawal card shall be punished in accordance with Subsection 1 above’.
. Section 8 (1), Cyber Law provides “… ANTIC shall be the Root Certification Authority (2) … ANTIC shall be the Certification Authority of the Public Administration.”
. Section 16, Cyber Law.
. Sections 13 and 32 (2), Cyber Law.
. Sections 32 (3), Cyber Law. It is left for the experts to define the conditions and terms for the conduct of security audit.
. Section 13 (2), Cyber Law. See Decree No.2012/1643PM of 14 June 2012 on the Conditions and Modalities of Security Audit of Electronic Communication and Information Systems Networks for the conditions for the conduct of audit.
. Section 14, Cyber Law.
. Section 6 (1), Cyber Law.
. Section 24, Cyber Law.
. Sections 25 31 and 46, Cyber Law.
. 33, Cyber Law. The risks which users are to be informed of are not known by users.
. Section 3 (41), Cyber Law. Processing is carried out in good faith and entails in particular the collection, storage, use, revision, disclosure, archiving and destruction of data, regardless of the means applied and procedure
. Section 3 (41), Cyber Law.
. Ibid, Section 53.
. Ibid, Section 3 (42) defines Connection data as ‘data relating to the access process in an electronic communication’.
. Ibid, Section 3 (43) defines Traffic data as ‘data relating to an electronic communication indicating the origin, destination, route, time, date, size and duration or type of underlying service’.
. Decree No. 2002/092 of 8th April 2002.
. Section 7(1), Cyber Law.
. See Decree No. 2012/180/PR of 10th April 2012.
. The seminars were organized differently. In Buea, it was organized on the 16 of September 2017, Douala, 4-5 of May 2017 and Bertoua from the 25-27 May 2017.
. The Seminar was organized in the month of November of 2012.
. http://antic.cm/index.php/en/component/k2/item/348, [Feb.10, 2018].
. Voa.com. “Cameroon urged to Act against cybercrime”. Internet: https://www.google.com/amp/151740.htm, Feb. 10, 2011 [Feb.10, 2018].
. Section 73 (1), Cyber Law.
. The Budpast Convention of 23rd November 2001.
. See accessed 12 August 2018.
. CFIB/015f/2012 unreported.
. In cracking down on cyber crime, the government created in 2015 a center for digital forensic and cyber security under the University of Buea in partnership with the Ministry of Post and Telecommunication and university of Bloomsburg in the U.S. according to the director of the centre, Joan Waka, their mission is to “train young Cameroonians on how to protect the country’s cyberspace”.
. CFIB/015f/2012 unreported.
. An interview conducted with a scammer in my neighbour in Limbe.
. E. Akuta and J.Ongloa. (2011, Oct). “Combating Cyber Crime in Sub-Saharan Africa: A Discourse on Law, Policy and Practice.”J Peace Gender and Development studies. [On- line]. Pp129-137.
. Interview conducted on the 12 of July 2018.
. Section 6 (1), Cyber Iaw.
. The duty of information and communication operators to conserve data for 10 years is repeated in various sections of the law, that is, sections 25, 35, 42 and 46. The repetition of these sections brings the law to 90 sections.
. Africa.ICT. “Full text in English: cyber security& cyber criminality law”. Internet: www.africt.com, [Sept. 23, 2019].
C. Michael. Scene of the Cybercrime. Location: Syngress Publishing Inc, London, 2008, pp35.
Copyright (c) 2019 International Journal of Computer (IJC)
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors who submit papers with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
- By submitting the processing fee, it is understood that the author has agreed to our terms and conditions which may change from time to time without any notice.
- It should be clear for authors that the Editor In Chief is responsible for the final decision about the submitted papers; have the right to accept\reject any paper. The Editor In Chief will choose any option from the following to review the submitted papers:A. send the paper to two reviewers, if the results were negative by one reviewer and positive by the other one; then the editor may send the paper for third reviewer or he take immediately the final decision by accepting\rejecting the paper. The Editor In Chief will ask the selected reviewers to present the results within 7 working days, if they were unable to complete the review within the agreed period then the editor have the right to resend the papers for new reviewers using the same procedure. If the Editor In Chief was not able to find suitable reviewers for certain papers then he have the right to reject the paper.
- Author will take the responsibility what so ever if any copyright infringement or any other violation of any law is done by publishing the research work by the author
- Before publishing, author must check whether this journal is accepted by his employer, or any authority he intends to submit his research work. we will not be responsible in this matter.
- If at any time, due to any legal reason, if the journal stops accepting manuscripts or could not publish already accepted manuscripts, we will have the right to cancel all or any one of the manuscripts without any compensation or returning back any kind of processing cost.
- The cost covered in the publication fees is only for online publication of a single manuscript.