Tuesday, May 7, 2013

Taste of Cyber Crime in Developing Nations - The Ugandan Version


Developing nations tasting cyber crime – the Ugandan Version
During the online classes on cyber security at Diplo Foundation a lot was discussed about cyber security and cyber crime. At that time most of the discussion points seemed alien to some of us from developing countries, sorry my country Uganda is not a developing nation but an underdeveloped country with out a cyber security team in police, no CERT teams whatsoever in the nation and a very naive society as regards cyber security. Most of the points of discussion were theories in Uganda, with some formulated guidelines but nothing practical done. Whenever it came to practical examples as regards cyber security, I always had to borrow some from Kenya, our eastern Neighbour.
In just a flash of time, here we are talking about the practicability of cyber security and having life scaring occurrences of cyber crime. A 26 year old girl was kidnapped and whisked away by unknown individuals because of a promised cup of coffee from a facebook chat. People have lost thousands of dollars to unknown individuals who use legitimate email accounts of friends portraying a dangerous situation a friend is going through thus soliciting for funds. Mobile Money, a Mobile cellular service for transfer of money in Uganda, being used to cheat non-suspecting individuals and many more stories that come in a form of 'too good to be true' wins.
The ICT society in Uganda, I should say, has always ignored most of the cyber crime scenarios not because they were petty but because few involved risk to life. A day when a story about the disappearance of a girl come to media, most of the ICT discussion forums developed ideas on how ICT can be used to or otherwise find solution to the rampant cyber crimes in the country and to the suprise of many of us, almost all people had knowledge of the other cyber crimes.
A lot has been said but as members suggested the Uganda police as a centre for solution development. The naked truth which actually hurts came to surface about this point. The national ICT Infrastructure doesn't have systems whatsoever to fight cyber crime. The Police at this time of the day, which is supposed to be spearheading the initiatives for cyber security is still planning on training a critical mass of specialists in cyber security. The Ministry of ICT, that is supposed to think about a National CERT has some thing on paper but nothing physical. It was further discovered that as regards the ministry of finance's commitment towards development of ICTs in the Country through the budgetary allocations, it is still hard for a national body to think about Computer Emergency Response Teams and investments in Cyber security, besides, it has no direct inflows for the country.
In the absence of funds and technical capacity by government and cooperate bodies to fight cyber crime, what are we left for? Should Uganda become a fertile land for cyber crime? Should all cyber criminals relocate to underdeveloped nations like Uganda? The answer is No, and a Big No.
Uganda through education and sensitization can fight cyber crime. As Michelle Rhee
said that the most sustainable way of fighting poverty is through education, I also say that the most sustainable way and method for fighting cyber crime is through education and sensitization of the general mass. We only need to make cyber crime the least profitable business, and trust me, no one will be willing to invest in it. We can only make it least profitable by minimising the would be clientèle. Which is only done through sensitization of the general population to detect and avoid cyber crime.
I would at this moment want to quote one of the contributors; “In times past, mothers and aunties taught their pre-pubescent daughters not go to the well alone, or talk to strangers on the way there. Have the reasons for these admonitions been erased by the coming of modernity?” Literally meaning that in Africa we have always had our own ways of averting normal crime by staying away from possible crime or its source, possibly through taking strangers by caution. This is no longer the way we behave. The y-generation has this power 'to find out', even when the finding involves going through a populated Den. May be if we also revisited our African methods of parenting and applied some of the principles not the methods directly however, some of these cyber crimes will be avoided.
I finally smell, at the end of the day, the solution to cyber crime, particularly the one that targets us common individuals is not technology but vigilance and being on a look out of any abnormal occurrences.
Did I make my point noticeable? I am not sure but I believe other people have some techniques of helping out our naïve society as regards this fresh problem.

Thursday, February 14, 2013

The Internet and the way we find love


When studying computer and collaborative education back then in high school, we used to mention a number of advantages and benefits of the Internet but there was this advantage that, I come to see today, we never used to mention. I am not sure whether the Internet was not yet developed enough to be considered as a means for online dating or we were not mature enough to be given that information.
Yesterday being a 14th of February, a day when some people who celebrate love only once in a year, were expressing love to their loved ones, I got to think about the effects of Internet in the way we express our love. Today some people don't even have the time to make calls, deliver physical gifts but an Internet message suffices. It further goes on how we set out to find this love. How do we get our loved one?
It is with no doubt that some people have found their loved one through the Internet, a phenomenon called Internet dating. Does it really work, is it worth considering as regards serious relationships?
As people call it gambling, some give it the credit of gambling with no down side. With out denial, some people have been lucky enough to find their life partners, loved ones through online dating.
In our traditional under developed nations, it is a thing reserved for the developed nations. I am not sure whether it is because of moral 'reservedness' or Internet penetration hindrances that have maintained this status but it is a matter of serious consideration.
The Internet to some critics, is a factor that has developed this high degrees of laziness and it goes with out query that this factor has also eaten into the way we date today. Our generation is characterised with the need to automate every thing to an extent of going behind a computer screen to find love. Either we are not bold enough or confident enough to present our selves to the prospective lovers, it still shows the power of the Internet.
Caution however has to be exercised as the same Internet we praise can be the mother of disaster. We have heard of men who meet men instead of ladies because of Internet dating, people who go for their first date with the Internet match only to find them selves loosing all their belongings. In the name of love we might meet all sorts of people with vast intentions. The Internet is a collection of all sorts of people with good and bad plans, people who want to use every opportunity to earn a living because of the freedom of expression and anonymity. It is against that background that we have to take due consideration before we jump into this automated love searching.
As I move out to deliver a flower (physical natural flower by the way) to some one, I want us to reflect on the matter of online dating. Whether it really works. Is it where the world is moving in search for love? Will our traditional beliefs in love and relationships die out as we experience higher and better Internet penetrations?

Thursday, January 3, 2013

Removing and ommiting commands from bash command history


You have possibly worked on a linux/unix server and you possibly don't want the security auditor, subordinates, manager, workmate to know what you have been working on. Chances are high that the first place people will go to in case they want to know what you have been doing on a server is the command history.
Many servers now days are using /bin/bash as the default shell and as a default this shell keeps history of all commands run. How then can one make sure that the command run are not recorded in the command history located at ~/.bash_history ?
This is something I have tested with ma system and it works pretty well.

Assumptions:
My command prompt is indicated by the '$' and it is also assumed that you are not a super user on the computer.

First I need to disable bash from caching and recording ma commands.
$ set +o history
When bash cannot record your command history, the last command that you have run at all times is the set command but it will raise question to those who understand it. They will know that you set off command history and possibly you run other commands there after. I then have to remove it from the history it's self.
I shall need to know which history ID it is taking by running
$ history
752 fmt -w 58 odlove.txt
753 man fmt
754 clear
755 cd ~
756 where
757 set +o history
From the output it is seen that command 'set +o history' took position (ID) 757
I can then remove it from the history
$ history -d757
When I run history again you will realise that 'set +o history' is not listed any more.
$ history
751 fmt -w 10 odlove.txt
752 fmt -w 58 odlove.txt
753 man fmt
754 clear
755 cd ~
756 where
I can now run all the commands I want to run in the dark and they will never be brought to light at any one moment.
You have to remember to turn on history because it's absence can also raise questions.
$ set -o history
The system will never at anyone moment ever show that the commands I run in the dark have even ever been executed.
Make sure that in the command history there is no command that is related to history cause it can be enough to show that you know about hiding commands and manipulating the command history.

This method is good in case you are training and doing work on systems that are very sensitive but dangerous for security audits and also a bad habbit.

Stay blessed as you cheat systems.