4

Cybercrimes: Threats, Challenges, Awareness, and Solutions in Sierra

RESEARCH ARTICLE RESEARCH Leone DOI: 10.34256/ajir2011 DOI:

Ibrahim Abdulai Sawaneh a,b *

a Department of Management Science and Engineering, Wuhan University of Technology, Wuhan, PR. China

b Department of Science at the Ernest Bai Koroma University of Science and Technology, Magburaka, Sierra Leone, *Corresponding author email: [email protected] DOI: https://doi.org/10.34256/ajir20114

Received: 24-01-2020 Abstract: The internet hosts all online activities either for public or private Accepted: 09-03-2020 usage. It is a powerful online podium where people socialize, make new friends, conduct academic research, perform online business transactions, share sensitive data, communication over the internet, surveillance purpose by security agencies, monitor climatic condition, used in e-healthcare system, online banking, online pay, e-commerce, defense system, and host of others critical infrastructures are the new order of the day. This has attracted online criminals to diverse numerous malicious techniques to invade people’s privacy and also exploit those data. A new game has resulted in these online malicious activities are known as “ or internet crime” which is a rewarding business as of today. Therefore, it has become difficult to protect those online activities as are growing daily, which suggests that effective and appropriate countermeasures are needed to combat those threats and make online activities more secure. The research paper presents the various types of cybercrime activities, countermeasures, and suggestions for online users.

Keywords: Cybercrime, Cyber-Law, Cybercriminals, Cyberspace, Hacking.

1. Introduction Today’s humans largely depend on defense industries, educational sectors, e- technology to perform their numerous duties commerce industries, online financial ranging from household chores to office tasks institutions, surveillance systems, immigration via the internet. This is proven as we largely departments, and several other vital see in government and private institutions infrastructures. Furthermore, the increase in using internet-related technologies as the social media applications used for backbones of those institutions; such as communications and other purposes are other airports, railway stations, aerospace benefits of the globally interconnected industries, manufacturing industries, communities. Citing Newton’s Laws of healthcare sectors, nuclear power plants, Motion, “For every action, there is an equal and

Asian J. Interdicip. Res. 185-195 | 185 Vol 3 Iss 1 Year 2020 Ibrahim Abdulai Sawaneh /2020 opposite reaction”. This implies that every today virtually relied on the internet to do technology has both merits and demerits. The almost everything and this poses great internet also provides both good and bad as challenges to data privacy and data protection. there are good people and bad people who use Several governmental agencies including the cyberspace. Cyberspace uses electronics and Office of the National Security (ONS), Ministry electromagnetic spectrum for storing, of Information and Communications, the modifying, and exchanging data through a Cybercrime Unit of the Criminal Investigation network of networks connected to several Department (CID) of the Sierra Leone Police physical infrastructures. Cybercrimes have Force, the Military Force, the Mobile Network increased drastically despite the preventive Operators (MNO) and other private sectors in measures adopted by governments, Sierra Leone. These agencies are working individuals, and private organizations in the together to establish strong laws on last five years. This is attributed to the fact that cybercrime within Sierra Leone. A reporting as technologies improve, so do the people mechanism of cybercrimes and cyber using them to break new grounds on how to should be reported to the appropriate misuse them. Cybercrime is associated with authority and defaulters should be penalized the doing of a malicious act to commit online according to the laws governing cybercrime fraud which is against the cyber ethics for and in Sierra Leone. The which the culprit is liable to be punished upon paper discusses the types of cybercrimes, its a verdict depending on the geographical preventive measures, and other related topics. location (Hemraj Saini et al, 2012). It is also an The rise in cybercrime globally in the online criminal activity that targets computing last two decades has caused a series of systems, database systems and other online problems costing billions of U.S dollars. It is platforms with malicious intention; such as being viewed as a lucrative business where the manipulating sensitive data, stealing of cybercriminals target their victims important data stored on a computer or online, anonymously using malicious online and gain competitive advantage over their that hides their online activities (Vineet opponents for financial gain or sabotaging Kandpal and ** R. K. Singh, 2013). their opponents’ computing systems and data. Furthermore, with the introduction of Cybercrime is a lucrative business that “” as a form of online payment method, is growing fast since 2010. The online has empowered cybercriminals to further criminals extort valuable data that worth exploit online users. Moreover, the rapid millions of U.S dollars with greater anonymity innovations in technology and sciences pose that has no geographical boundaries either great challenges to security and data privacy, virtual or physical that negatively affects though it also exhibits positive outcomes, such internet users globally. Cybercrime can as making life comfortable. Therefore, the comprise of any act to commit financial frauds research is conducted to provide the basic and non-financial crimes including online techniques that will prevent online users from bullying, designing programs that inflict being targeted by cybercriminals, and possibly viruses on computer systems, and/or minimize such cyber-attacks. disclosing sensitive financial records of others on the internet (Richard Donegan, 2012; Harpreet Singh Dalla, Ms. Greeta, 2013). 2. Research methodology Cybercrime needs to be addressed as the The research uses a descriptive world has embraced technological innovations methodology and employs secondary data in all sectors of human activities. Most nations only. The secondary data consists of related

Asian J. Interdicip. Res. 185-195 | 186 Vol 3 Iss 1 Year 2020 Ibrahim Abdulai Sawaneh /2020 journal articles, internet, and textbooks on attackers to infiltrate into their systems. They cybercrime and cybersecurity. forget that they (users) and cybercriminals use the same source (internet), where they are 3. Various Forms of Cybercrimes exploited knowingly or unknowingly. A is anyone with the technical knowledge and Cyber-Stalking expertise who intrudes into a system in an involves harassing online unauthorized manner. A is users via an electronic communication someone who uses his/her knowledge to platform to commit a crime, and examples break into a computer system. They are also include; email, instant messaging (IM), social known as crackers (Lee, M. 2015). This media group messaging apps, and/or normally results in substantial financial loss messages posted onto a website. The attacker and . These deploy uses malicious software to hide his/her online malicious in various forms to take identity without being exposed to inflicts away important credentials, steal valuable damage to the victim(s). information, search for a systems’ back door, or “use you” to make an even a bigger gain, Cyber Defamation they must first get you or your computer to do something maliciously, like executing a code Cyber defamation is an act conducted (Taylor et al, 2015). using the internet to slander, tort or defames mostly important personalities in societies, Cracking which has not yet been labeled a criminal offenses, but it depends on the country where Cracking is the act involving the such activity is been committed, as the cyber- unauthorized permission to a computer to laws varies from nation to nation. inflict damage to it, and those engaged in such Punishments for 'Cyber defamation' is activities are called “cracker”. different from country to country, as indicated by the fundamental rights enshrined in the E-Mail Spoofing “UN Declaration of Human Rights” and Email spoofing is common nowadays in “European Union Fundamental Human electronic communications. Online Fraudster Rights”. design email messages to falsify the sender's address, to get the receiver to respond, Hacking thereby completing the attack. Once the Hacking is unauthorized access to a recipient accepts the challenge, the computing device to view, copy, or create data cybercriminal launches an attack. with a trace with the intention of not destroying the data or damaging the SMS Spoofing computing device. Humans live in a globally SMS spoofing, which is somewhat a new connected cyber environment where almost innovative technology, utilizes the “Short all devices are interconnected either directly Message Service” (SMS), using “mobile or indirectly via the network of networks “the phones” and “Personal Digital Assistants” internet”. Unfortunately, no system is 100% (PDAs), to trick people as if the messages are secure from a security threat, some internet coming from whom it should come from, by users just make it easy for hackers and hiding the original mobile number (Sender ID)

Asian J. Interdicip. Res. 185-195 | 187 Vol 3 Iss 1 Year 2020 Ibrahim Abdulai Sawaneh /2020 with alphanumeric text. It has both positive and negative effects. Cybersquatting Cybersquatting (domain squatting) by Spoofed Domains the U.S Federal Law called “Anti- It usually occurs as a result of either Cybersquatting Consumer Protection Act”, compromising a DNS or due to typographical register, transfer in, or use the internet domain errors deployed to exploit online users. Just name to extort benefit from the benevolence of typing a wrong letter turns a website into a someone’s trademark. The cyber-squatter hostile ecosystem. Failing to realize such a normally bargains to trade the domain to the mistake, will expose your systems’ person or organization owning the trademark vulnerabilities which hackers will capitalize on enclosed within the name at a magnified rate. and hack into your systems. Cyber Vandalism Vandalism is the intentional act to It is a kind of online fraud where a destroy or damage a property belonging to credit card is stolen and used to charge pre- others, and cyber vandalism referred to the act paid cards. Carding normally implicates the of destroying or damaging data on a network holder of the stolen card buying store-branded when is stopped or disrupted. It may comprise gift cards, which can then be sold or used to any type of physical mischief done to secure other goods to castoff, and those someone’s computer. Such acts include involved in such activities are called “carders”. stealing someone’s computer, a computer part or a peripheral attached to the computer. Bot Networks A network is infected networks Cyber Trespass that compromise several allowing Trespassing refers to entering into an attacker to control them. Some malware someone’s property without his/her tends to transform a victims’ computer into permission. It normally involves a deliberate zombies and use the infected machine to act to commit a crime by encroaching or launch an attack against other systems. infringing people’s assets (land or property) Sometimes, they will result in colossal denial without due permission. Criminal trespass of service attacks, they might be used to break involves the act to commit a crime, and that into other machines either through brute force involves using cyberspace is called a “Cyber or distributed cracking. Trespass”.

Intellectual Property Crimes Internet Time Thefts Intellectual property (IP) theft is the act It is related to hacking, involving the use of the of stealing copyrighted materials including internet to ascribe browsing hours to others trade secrets, trademarks, and other vital by accessing the ISP ID and copyrighted. A copyright is a lawful right illegally without the other person's accorded to the owner of original work, such knowledge. as publisher, storybook, composer, artists or musicians, to replicate it, normally for a limited time.

Asian J. Interdicip. Res. 185-195 | 188 Vol 3 Iss 1 Year 2020 Ibrahim Abdulai Sawaneh /2020

Online Gambling For most sysadmins, the appropriate action is to dust off and nuke it from high orbit; Online gambling is a big business around the world where a bet is placed, meaning format and reimage the machine. received or channeled via the internet, but Essentially, a computing system should always which does not involve the performance of the be backup to prevent breakdowns in customary doings of a financial transaction operations. A virus is released onto a provider, or computer service or computing system when malicious online telecommunications provision. users target their victims.

Fraud and Financial Crimes Computer frauds are any mischiefs or Phishing attacks occur when malicious fraudulent activities trigger to cause harm or attackers insert malware into someone's prevent harm from happening. It can provide machine with the help of the internet. Luckily, benefit by: it can be easily be stopped if users would carefully pay attention. Phishing attacks are • Unauthorized data manipulation – It frequent with the fact that they are most normally occurs with skilled and successful. Sometimes clicking on malware talented employees who illegally especially when you want to download a file or manipulate data in their favor before software on the internet, it redirects you to having access and/or use unauthorized another webpage before downloading. It processes. almost always occurs daily. • Manipulate, alter, destroy, suppress, or steal sensitive data generally to hide unlawful transactions without been Cross-Site Scripting detected. Cross-site scripting attack allows online fraudsters to insert client-side scripts into • Changing or deleting stored data. weak web pages upon clicking grants their browser to execute the scripts. Hackers Cyber deployed them to snip or download and install malware. Cyber extortion happens when a website, e-mail server, or computer device is experienced a constant denial of service Malicious Links and/or other attacks inflicted by mischievous online criminals. It is similar to the The majority of the internet users attack, where the cyber-extorters normally click on malicious hyperlinks in their demand a financial reward and promise to halt emails, webpages or forum post. Attackers the attack and to provide "protection". sometimes insert a malicious link into a discussion thread and wait for a possible victim to click on it. It may sometimes be attack-free or execute malicious code into a A computing system infected with a webpage. virus (s) should never be trusted because it has already been compromised or breached.

Asian J. Interdicip. Res. 185-195 | 189 Vol 3 Iss 1 Year 2020 Ibrahim Abdulai Sawaneh /2020

Network Sniffer media codecs to name a few that hackers post containing malicious code. When internet user A network sniffer is a tool used to detect network problems thereby allows an downloads and runs them, they immediately individual to capture and view the packet level become prone to attack and they are referred data on the network. According to the to as a “potential victim”. International Space Station (ISS), it is a tool that exploits the network interface of a Embedded Media computer to intersect data packets meant for Webmasters always insert media other computers. It is also known as network archives that online users normally click, and monitors and analyzers, and also collect in turn, infects the whole webpage and make it packet-level data and information. vulnerable to attacks. Media players just like an OS regularly require an update. Websites Unfortunately without proper patch Some websites are usually owned by implementation, it would be almost not malicious online fraudsters designed to lure feasible for users to keep their systems up-to- people into trusting such websites or hack into date. genuine websites to cause mayhem. They either motivate users to visit their fate Credit/Debit Card Fraud websites or are already hacking into those Credit card fraud is an online theft and websites via their homepage, favorites, and fraud done via an online payment card (credit bookmarks. or debit cards), with a fraudulent intention in an online transaction. The motive is to Malicious Scripts acquire goods without payment or to get Most webpages contained JavaScript unauthorized funds from an account. with malicious code making the browser vulnerable and thereby granting admin rights Identity Theft to the users provided the browser lacks proper Identity theft is the act of stealing or anti-malware software installed. Therefore, for amassing enough information about you to be on a safer side, without you someone’s identity including email address, permitting attackers to compromise your name, date of birth, place of birth, residential machine, you need to first install anti-malware address to commit identity fraud. Identity theft software to prevent an attacker infiltrating may occur either the victim is alive or into your machine. Modern internet does not deceased. require a specific scripting engine that downloads and runs the code. The user needs Cyber Bullying just to visit a page. You execute JavaScript is the act of using nearly every time you visit a website. electronic communications to intimidate or bully their victims, and it is done by Infected Files transmitting intimidating or threatening Most internet users in Sierra Leone and messages to the oppressed victims (Richard elsewhere sometimes download malicious Donegan, 2012). links containing malware that infect their files; such links or sites include screensavers and

Asian J. Interdicip. Res. 185-195 | 190 Vol 3 Iss 1 Year 2020 Ibrahim Abdulai Sawaneh /2020

Cyber Terrorism interpersonal victimization, and delinquent tendencies, have more exposure. Cyber terrorism is a kind of terrorist activity triggered via the use of the internet, mostly premeditated or politically motivated Denial of Service Attacks mischiefs against information, computing A denial-of-service (DoS) attack occurs systems, and programs, resulting in chaotic when a cybercriminal attempts to make a situations against civilians perpetrated by machine or network inaccessible to its malicious sub-national groups or individuals. legitimate operators by temporarily or indefinitely disrupting services of a host linked Harassment via E-Mails to the internet. DoS attacks are normally done Email harassment normally occurs by “flooding” the resource with a large number when malicious online users continuously of requests (Anand Kumar Shrivastay, Dr. send unwanted electronic messages to others, Ekata, 2013). This limits the server to reply to and most often threatening. There isn’t always some or all authorized requests. Legitimate an exact definition of what a message has to users who want to utilize the pool of resources look or sound like to be harassing. It’s usually are denied access to those resources. A single a matter of circumstance since what one DoS attack is easy to manage, and a distributed person finds offensive or harmful may not denial-of-service attack (DDoS attack) come off that way to someone else. originating from several sources. DDoS attacks involve several computer users willingly Pirated Software joining hands together to take an active part in the attack. The DDoS attack is generally Software piracy is the unauthorized orchestrated using - networks of copying, dissemination, transfer, or use of the breached computers whose users are unaware software. It is a lucrative business prompting that their machines are partaking in an attack. several groups around the world. Malicious online users normally attach high profile web servers, sites or services – Child online payment methods with credit card facilities, banking facilities, revenue collection is a criminal offense departments, or blackmailing (Prince, Mathew, punishable by law in many countries. It is any 2016) with malicious software installed on pictorial representation relating to the use of a computers that grant a third-party total minor, or one appearing to be a minor, control of the system. engaging in sexually clear conduct. Since technology moves much faster than legislation, Website Defacement Attack crimes committed via social media are often A website defacement attack is a prosecuted by applying existing statutes. technique that manipulates a website content Several studies have been conducted without prior knowledge of the web relating to the potential effect of online administrator. This happens when an attacker pornography concerning the youth, assuming disrupts a particular website, modifies its the high rate of exposure, and vulnerabilities contents to deceive people who visit the site. It among the youth including depression, is electronic vandalism to motivate cyber protesters or hacktivists (Romagna, M.; Van

Asian J. Interdicip. Res. 185-195 | 191 Vol 3 Iss 1 Year 2020 Ibrahim Abdulai Sawaneh /2020

Den Hout, N. J. 2017). Several religious and further indicate that most organizations’ data government websites are breached by political are not protected as a result of poor or religious-inspired cybercriminals to spread cybersecurity practices, and make them political or religious beliefs to deface the views vulnerable to (Saroj Mehta & Vikram and beliefs of others. Singh, 2013). SQL injection technique occurred in website defacement intrusion. The invader inserts malicious data in a web form according to Thomas Steinbrenner. Traditionally, SQL Hacktivism originates from two terms injection is easy to protect, as a result of a “hacking” and “activism”. The online criminals programming error on the website. However, who participate in hacking activities to in practice, several websites are exposed due penetrate computing systems or networks to negligent security practices. In contrast, in illegally for either social or political gain. DDoS attacks, a website defacement refers to a The rise of hate speech or radicalism situation in which an intruder gains access to a through digital and social platforms across the target computing system. However, gaining globe has negative consequences: the Arab access to an organization’s web server is Spring of the Middle East, the green revolution different from breaking into that in France (2019), several mass shootings organization’s internal network, because (Texas and Ohio, 2019) in the U.S, the in the Sri webservers are normally hosted on a different Lanka bombing in April 2019, the Christchurch network. mosque massacre in New Zealand are perpetrated using live stream using social Other Break-Ins networking sites (Periscope, Facebook, Break-ins is a process where an ) with online users participating in the attacker breaks into a system than a online debate. Mayor Ada Colau of Barcelona webserver or break into webservers that store amassed massive online support data than a public website. Such break-ins approximately 6,000 people for his electoral happen using methods analogous to those campaign in the public assemblies, with the applied in website defacement. It depends on establishment of the network of cyber the level of IT security on the intended activists. computer. Once an intruder is granted access They attack influential and powerful to a computing system, he will be granted people’s computer networks anonymously and access to other computers within the same sometimes terrorize organizations. The network stealing sensitive data, and install Panama Papers exposures by WikiLeaks and malicious apps that turn the machines into are referred to as zombies for a botnet, or cause other “hacktivism”. Her documents are amassed, destructions. leaked and spread through the internet with political ramifications. The Panama leaks Cyber Attackers orchestrated massive protests making the Several governments are faced with Iceland Prime Minister quit office and calls for numerous challenges with regards to similar action in the U.K. Cybersecurity. Findings indicate a surge in hacks and breaches of data globally. Studies

Asian J. Interdicip. Res. 185-195 | 192 Vol 3 Iss 1 Year 2020 Ibrahim Abdulai Sawaneh /2020

Cyber Espionage store, maintain, monitor, and protect data about those departments or institutions. Espionage is an effort made by either an individual or state to extract sensitive Cybercrime is a global phenomenon information from a rivalry state or individual and has no boundary when it comes to cyber- organization. Cyber espionage is acceptable attack. Even the most advanced nations are not behavior as compared to cyber-attack, which is exempted from being inflicted by unacceptable behavior per international law. cybercriminals. Cybercriminal may even be Several objections have been among the your very employee, or business partner world powers against unacceptable cyber and/or your rivalry institution. This means it espionage prompting fear of a new era of is very difficult to prevent it from occurring informationalization and digitalization war. 100%. It should involve all stakeholders in the Furthermore, the U.S has been advocating for society including government, civil society, new standards for cyber espionage, permitting private sector, GSM operators, and the citizens nations to practice it only for traditional of the global village. Furthermore, massive intelligence purposes to make critical national cyber education is required to better prepare security actions. Cyber espionage is becoming internet users in the country to learn the basic a normal order of the day among the world techniques on how to protect their online data powers. An ex-CIA agent pleaded guilty spying and activities. Cyber courses should also be for China, according to the U.S justice introduced in schools, colleges, and department in May 2019, as the main reason universities to raise cyber awareness among believed for dismantling the U.S espionage online clients. network. Based on the research conducted, about Prosecutors indicated that Jerry Chun 80% of online clients in Sierra Leone lack the Shing Lee was financially motivated to disclose basic skills and techniques to protect their information on the U.S covert assets. About 20 online activities against cybercriminals and informants were murdered or jailed between hackers. Only 10% of people who frequently 2010 and 2012 becoming most catastrophes in used the internet know the basic knowledge the U.S intelligence in modern times. and impact of cybercrimes. About 10% of online users remain neutral. For the government of Sierra Leone to 4. Discussions and Results protect the country’s cyberspace, strong cyber- Sierra Leone, which is an emerging and laws should be enacted, and perpetrators of third world country along the west coast of such an act should be severely punished with Africa has little foundation in sciences and fines and imprisonment. Moreover, those technology. It just started embracing agencies in charge of protecting the nations’ technological innovations immediately after information, should be given the required the civil war that ravaged the country for 11 training and education to be able to fight years in 2002. The government in the last cybercrimes and cybercriminals. Also, a global decade has embraced technological cyber – laws that could encourage all nations innovations and sciences, which is evident in to fight the common enemy; cybercrimes and all government ministries having a separate cybercriminals. department for IT officers, web administrators and software analysts to design, develop,

Asian J. Interdicip. Res. 185-195 | 193 Vol 3 Iss 1 Year 2020 Ibrahim Abdulai Sawaneh /2020

Figure 1 Cyber perception in Sierra Leone Category Percentage Comments (%) No cyber 80% Population with no knowledge on the knowledge impacts of cybercrime

Cyber knowledge 10% People with cyber knowledge Neutral 10% People who have either knowledge or no knowledge of cybercrimes in the country Survey result of 2019

5. Conclusion 1. Strong cyber – laws should be legislated and culprits punish per the laws of The world today is a hostile cyber Sierra Leone; environment where individual or entity 2. The global community should also and/or individual nations conduct espionage legislate universal cyber – laws that activities either to gain competitive advantage would govern all nations on planet or for financial gain. Most nations in Africa earth; including Ghana, Kenya, Uganda, South Africa, 3. Cyber education and awareness should Nigeria, and the industrial world have applied be incorporated into schools, colleges, tougher policies to fight cybercrimes. Sierra and universities by the Ministry of Leone as a nation needs to move at a faster Basic Education, Ministry of Higher and pace to provide a safe and secure cyber Technical Education and Tertiary ecosystem that will fascinate prospective Education Commission of Sierra Leone; investors into the country. 4. Regular workshops/seminar/training Furthermore, if strong cyber laws are should be conducted for all security legislated, it will help boost the economy and apparatus within the country; alleviate poverty, and also improve on the lives 5. All GSM operators within the country of average Sierra Leoneans. The government should carefully monitor their clients’ should also embark on massive sensitization activities and report to the appropriate on the use of the internet, and how to protect authorities if found wanting of any their personal and government sensitive related cybercrime offenses; information from cybercriminals. 6. IT officers should be incorporated in all government departments and private

sectors within the country; 6. Recommendation 7. The central bank of Sierra Leone should The following recommendations are monitor all online financial transactions highlighted by the researcher as a way to conducted by the various banks in the mitigate cybercrimes within Sierra Leone: country; 8. The government should also invest

heavily in scientific and academic

Asian J. Interdicip. Res. 185-195 | 194 Vol 3 Iss 1 Year 2020 Ibrahim Abdulai Sawaneh /2020

researches and ensure that all Prince, Mathew (2016). Empty DDoS Threats: universities in the country make Meet the Armada Collective”. Cloudflare. research as a key aspect of teaching; Richard Donegan, (2012) Bullying and 9. The government should finally identify Cyberbullying: History, Statistics, Law, potentials and awarded them Prevention, and Analysis, The Elon scholarships to study abroad in world Journal of Undergraduate Research in top universities and return home to Communications. 3, 33-42. implement those morals in our Romagna, M., Van Den Hout, N.J., (2017). educational sectors. “Hacktivism and Website Defacement: Motivations, Capabilities and Potential References Threats”. Proceedings of the 27th Virus Anand Kumar Shrivastav, Ekata, (2013) ICT Bulletin International Conference: 41 – Penetration and Cybercrime in India: A 50. Review, International Journal of Saroj Mehta & Vikram Singh, (2013) Study of Advanced Research in Computer Science Awareness about Cyber Laws in the and Software Engineering, 3, 414-419. Indian Society, International Journal of Harpreet Singh Dalla, Geeta, (2013) Cyber Computing and Business Research, 4. Crime – A Threat to Persons, Property, Taylor, R. W., Fritsch, E. J., & Liederbach, J. Government, and Societies, International (2015). Digital crime and digital Journal of Advanced Research in terrorism. (3rd ed.). Upper Saddle River, Computer Science and Software NJ: Pearson. Engineering, 3. Taylor, R. W., Fritsch, E. J., & Liederbach, J. Hemraj Saini, Yerra Shankar Rao, Panda, T.C., (2015). Digital crime and digital (2012) Cyber-Crimes and their Impacts: terrorism. (3rd ed.). Upper Saddle River, A Review, International Journal of NJ: Pearson. Engineering Research and Applications, Vineet Kandpal and Singh, R.K., (2013) Latest 2, 202-209 Face of Cybercrime and Its Prevention In Lee, M. (2015). The evolution of cybercrime: India, International Journal of Basic and From Julius Caesar and Prince Philip to Applied Sciences, 2, 150-156. state-sponsored malware. International Business Times. Retrieved from: http://ibtimes.co.uk.

Declaration of Interest: The author declares that no conflict of interest related to this article. Acknowledgments: The author acknowledges the supports of Prof. Edwin J. J. Momoh, Vice-Chancellor, and Principal of the Ernest Bai Koroma University of Science and Technology (EBKUST), Prof. Paul Abass Kamara, Chairman Board of trustee of the Institute of Advanced Management and Technology (IAMTECH), Prof. Prince Sorie Conteh, Director of Research at the University of Sierra Leone (FBC), and Prof. Roseline E. Uyanga, Chief

Executive Officer at IAMTECH for promoting quality education, academic research and mentoring young talents in the country. Special gratitude goes to Mrs. Elizabeth Guma-Sawaneh for her moral supports.

Funding: NIL

About The License

Asian Journal of Interdisciplinary Research, Vol. 3, Issue 1, pp. 185-195, Online ISSN 2581-8430. Copyright ©

IOR Press 2020. This work is licensed under a Creative Commons Attribution 4.0 International License

Asian J. Interdicip. Res. 185-195 | 195