Journal of Research in Peace, Gender and Development Vol. 1(4) pp. 129-137, May 2011 Available online@http://www.interesjournals.org/JRPGD Copyright ©2011 International Research Journals Review Combating Cyber Crime in Sub-Sahara Africa; A Discourse on Law, Policy and Practice Eric Agwe-Mbarika Akuta1*, Isaac Monari Ong’oa2, Chanika Renee Jones3 1,2 Nelson Mandela School of Public Policy, Southern University Baton Rouge 3 Criminal Justice Department, Southern University Baton Rouge Accepted 05 April 2011 Prior to the arrival of ICTs in Sub Sahara Africa (SSA), Africa was seen as the Dark Continent. The development of ICTs was therefore expected to connect Africa to the rest of the world, and establish it as part of the Global community. This endeavor exposed Africa to the unintended consequences of the Internet (cybercrime). The manifestations of cybercrime, it’s far reaching and potentially devastating capacity for harm caught most governments off guard because the existing laws, legislations and institutions were unable to keep up with the alarming rate at which cybercrime has diffused. Most governments have struggled to put in place safeguards that can help combat this malaise. While efforts are under way, they have been largely ineffective at repealing cyber crime. This statement begs the question, what support can be rendered to strengthen the position of stakeholders in their fight against cybercrime in SSA. This study sought to address that question by examining three principal issues: First, it identified the various stakeholders involved in the fight against cybercrime in SSA. Second, it examined the existing laws, policies and practices employed by stakeholders to combat this malaise. Third, it discussed the impediments that these stakeholder structures and institutions face in countering cybercrime. A sound knowledge of these principal issues will provide policy makers and stakeholders with an in-depth understanding of the various structures and their existing efforts to combat cyber crime. Keywords: Cybercrime, information and communication technology, Sub-Sahara Africa INTRODUCTION With a new decade beginning, the continent of Africa which was regarded as “backwards” has been able to get a leap into the world of ICT. This leap has not come without a heavy price. The rapid rate of diffusion of cybercrime in Africa has been a call for concern. This concern even gets more sickening when literature indicate that, out of the top ten countries in the world with a high level of cybercrime prevalence, Sub Sahara Africa *Corresponding author email: akutaeric@yahoo.com is host to four of these countries (Nigeria, Cameroon, Ghana and South Africa). This rate of cybercrime prevalence has triggered a renaissance in the fight against cybercrime in SSA. This fight involves not only law enforcement agencies, but all stakeholders. Stakeholders in the fight against cyber crime in Sub Sahara African countries range from the average man on the street that knows and fraternizes with cyber criminals to the President of the various countries who enact decrees and sign laws passed by the legislature. This fact highlights the wide scope of whom and what is involved in combating this malaise. 130 J. Res. Peace Gend. Dev. For the purpose of this study, we will limit ourselves to the various organized structures and institutions that are at the fore front of combating cybercrime namely: the various economic blocs; Economic Community of West Africa States (ECOWAS), Economic Community of Central African States, (CEMAC), East African Community, (EAC) and Southern African Development Community (SADC), various National Assemblies, Law Enforcement Agencies, the Judiciary Systems, Crime Commissions, and the International Police. The aforementioned stakeholders see cybercrime as a problem that is indeed wide spread but as indicated, we will delimit the following geographic area: the cybercrime “capital” of the world and other well known hot spots for illegal cybercrime activities. This include: Nigeria, Cameroon, South Africa, Kenya and other SSA countries like Zambia and Botswana, will be discussed. This research will be undertaken by examining the key factors that influence discourse on law, policy and practice as it pertains to cybercrime. Research question What support can be rendered to strengthen the position of stakeholders in the fight against cybercrime in SSA? To realize this research question, the following specific research questions will be investigated: Who are the various stakeholders involved in the fight against cybercrime in SSA? What laws, policies and practices have been employed so far, by stakeholders to combat this malaise? And what snags have these stakeholders met in the process of implementing these laws and policies? METHODOLOGY This paper employs the secondary research technique of data collection and analysis. This will involve the collection and review of relevant documentation on the perpetration of cybercrime in SSA. Data to be exploited includes; published reports; conference abstracts; newspaper articles and other media coverage; information accessed through the internet; official records from government and quasi-governmental institutions involved in the fight against cybercrime; information from international organizations like the International Police(INTERPOL), and the United Nations. In this article, after a review of the recent literature on the efforts directed towards the fight against cybercrime in Sub-Sahara Africa, we will proceed to present our findings, impediments, and discuss the measures that can be employed by stakeholders to combat cybercrime in SSA, by using the integrated approach. With this approach, we will begin by stating each finding, examine the impediments that limit its ability to stage a successful fight against cybercrime and then propose recommendations that can be employed to better fight cybercrime in SSA. Primary stakeholders involved In most regions of the world, including Sub-Saharan Africa, there exist two main primary stake holders involved in the fight against cybercrime; law enforcement agencies made up of both the local and international police and the anti-crime commissions made of commissions from various national states and regional blocs. Law Enforcement has a long history and it came to existence as a creation of Emperor Caesar who established the first standing police in his praetorian guard. With the evolution of the Criminal Justice System, this special group of individuals were trained and charged with the role of being guarantors and enforcers of established laws (Kipkorir, 2011). This idea is believed to have diffused to SSA and other parts of the world. For instance, Kenya Police Department, (2010) sites three branches of the Kenya Police force that carry these duties: the regular Kenyan Police in charge of law enforcement and traffic control; the Administration Police, responsible for law and order in the rural areas; and the General Service Unit which is a mobile Para-military police force, used for the apprehension of dangerous, syndicated criminals. Winslow (2010), intimates that, in the regular force, there is a department of Criminal Investigation that investigates and prosecutes cybercriminal activities. Nigeria has a national and unified Police Force with two main departments; Criminal Investigation that takes care of crime detection and prevention, and Mobile Police unit used to track down hardened criminals. This is accompanied by two axillaries; the Special Constabulary and Traffic Warden Service (Nigeria Police Force, 2010). Cameroon on the other hand has a more complex law enforcement system based on its French and English background that stems from colonization. In the fore front of law enforcement is the police and the gendarmerie. The police has three units; the Public Security, Mobile Intervention Wing, and the Special Branch Police unit that is in charge of crime investigation. The gendarmerie on the other hand also gets involved in public security but is regarded as less-citizen friendly (Winslow 2010). South Africa on the other hand did restructure its police service in 2010 and now has six divisions. Amongst these divisions are the Crime Intelligence and detection division which handles all crime investigations. Under this division is found the electronic Crime group that is charged with internet and internet related crimes. Also present, is the Operations division that handles the day to day security Akuta et al. 131 issues like regular law and order (South African Police Service, 2010). According to INTERPOL, (2011), also present in SSA countries is the International Police known more commonly by its acronym INTERPOL. This organization facilitates cross border police cooperation, supports and assists all organizations, and authorities whose missions are to prevent and combat international crime. With its national bureaus, it carries functions in the 188 member countries. In SSA, these bureaus are controlled by the four regional bureaus in Yaoundé for Central Africa, Abidjan for West Africa, Nairobi for East Africa and Harare for Southern Africa (INTERPOL, 2011). Apart from the Law Enforcement Agencies mentioned above, other primary stake holders in the fight against cyber crime are the Anti Crime Commissions that have been formed at international, regional and national levels. Internationally, The United Nations Office on Drug and Crime, (2011) created the Commission on Crime Prevention and Justice (CCPCJ) in 1971 which has been constantly reviewed to meet the needs of the time. With the prevalence of cyber crime, CCPCJ has been equipped with cyber specialists to allow them the ability to combat national and trans-national crimes. This commission has aligned with several regional groups and nation states to foster the fight against crime in general and cyber crime in particular. At the regional level, the East African Community Task Force on Cyber Laws (EAC) is concerned with crafting and enacting cyber laws that are effective across the East African Region (United Nations Conference on Trade and Development, 2010). While these regional groupings are forging ahead, SSA nation states like Nigeria, Kenya, Ghana, South Africa, Cameroon etc have not been left behind in the fight against cyber crime. Nigeria, which is regarded as the hub or safe haven for cyber crime in the world, has witnessed the creation of two outstanding crime commissions; the Economic and Financial Crimes Commission (EFCC) created in 2003 and the Nigerian Cyber-Crime Working Group (NCWG). While the EFCC is involved in all economic and financial related crimes, the NCWG which was created in 2004 implements the objectives set up by the National Cyber-security Initiative (NCI) has its eyes more fixed on cyber related crimes (Maska, 2009). According to the Financial Intelligence Center (2008), The Financial Intelligence Center (FIC) established in 2002 is a center that works hand in glove with law enforcement agencies to fight cyber crime and cyber related crime in South Africa. This center relates with the South African police through the cyber crime unit (CCU) and revenue services, the prosecuting authority, the asset forfeit and special investigation units. It is a positive step to have these stake holders in place but their existence and efforts depend also on the existing laws, policies and the way they are implemented (Fick, 2009). Existing laws and policies Cyber crime is relatively a new form of crime that is rocking the world today. Research has shown that, computer and related criminality have become the phenomenon of the end of the twentieth century and is rapidly developing in the 21st century. This trend is believed to continue and will plunge the world in a host of disarray (Ojedokun, 2005). With the advent of computers came computer related crimes. This caught the world and SSA off guard because there were no laws to prosecute cyber criminals. Existing laws regarded computers as property and could only prosecute crimes that involved stealing the whole computer system or destruction of the computer but had no jurisdictional powers over information hackers. Ojedukun (2005) points out that, there is no way law enforcement officers within African countries could take action against cyber criminals unless countries first enact laws that criminalize the activities in which these offenders engage. Kithi, (2002), indicates that, internet abuse is rising in Africa and there is no law or the common existing laws are grossly inadequate to reduce it. For instance, in Kenya where there is a significant rise in cyber crime, as of 2002, there existed no laws to deal with cyber criminals. Existing laws were inadequate and did not specify how perpetrators of cyber crime were supposed to be prosecuted when arrested. In the same way, Makhanya (2001) argues that, as of 2005, laws in South Africa were ill equipped to handle internet related crimes. The 1977 Criminal Procedure Act had nothing to do with the internet when it was being design and so did not make any stipulations that could cure this 21st century malaise. These laws being common laws did not take into account offences that involved the theft and abuse of data as well as programs found on the computer (Makhanya, 2001). It is interesting to observe that, many SSA governments have had a reawakening stemming from the speed and volume of cyber crime diffusion within and without territorial boundaries. This renaissance is compelling SSA state governments and regional organizations to enact legislations, laws and form commissions that not only deal with specific crimes but that deal with cyber crimes as a whole (Kioni, 2008). In 1998, the Kenyan parliament did pass the Kenya Communication Act (KCA) to address Information and Communication Technology (ICT) mishaps. An increase use of the Internet and its rapid diffusion was accompanied by crimes that were not virtualized when the 1998 Act was being drafted. This act did not address specific issues concerning cybercrime. For this reason, the KCA was amended twice in 2009 to meet the demands of the time (Wanjiku, 2009). According to the Communication Commission of Kenya (CCK), (2009) the first amendment in section 83U- 132 J. Res. Peace Gend. Dev. Z criminalized unauthorized access and interception to computer data and service, modification of computer material, access with intent to commit offences and unlawful possession of devices and data. This amendment also stipulated jail term for the aforementioned cybercrimes. The second amendment commonly known as the E- Transaction’s Act of 2009, went a step further to look at limitations to contract formations in the internet environment, and liabilities of service providers, privacy, security and the use of electronic records and signature to governments. It also addressed the definition of cybercrime and punishment as well as e-signature and private policies (C C K, 2009). Nigeria on the other hand, has been at the spot light from the international community for its involvement in cyber crime. It is ranked as the third in the world behind st the United States and Britain, and the 1 within the African continent in the rate of cybercrime prevalence. This conspicuous position has been a catalyst in the way the nation has handled issues concerning cybercrime (Adomi, 2008 & Boateng et al, 2010). In 2003, following a presidential degree, there was legislative action that established the Economic and Financial Crimes Commission of 2004. This commission was vested with the powers to investigate, prosecute and penalize all economic and financial crimes relating to terrorism, money laundering, and drug trafficking and advanced fee fraud. Although these stipulations did not specifically mention cybercrime, EFCC does partner with other organizations in the combat against cybercrime because nowadays, most economic and financial crimes are committed with the use of the internet (Longe & Chiemeke, 2008). To make up for the lapses of the EFCC Act, and to specifically address the issue of cyber and cyber related crimes, the Nigerian parliament passed the Computer Security and Critical Information Infrastructure Protection Bill in 2005. This bill which is commonly referred to as the cybercrime bill aims to secure computer systems and networks and protect critical information, infrastructure by criminalizing certain computer based activities (Chawki, 2009). Chawki, (2009); Oriola, (2005) continue to point out that, with the diverging nature of cyber crime and a significant increase in number of advanced fee fraud cases recorded, the Advanced Fee Fraud and other Fraud related offences Act was passed in 2006. This Act prescribed ways to combat online scams and other related cybercrimes by stating harsher penalties of imprisonment of at least 5years and at most 15years without the option of a fine. This case is similar to that of the Republic of South Africa which like Nigeria has been ranked among the top ten countries in world in cybercrime prevalence (Africa News Monitoring Team, 2010). As the most advanced economy on the African continent as a whole and SSA in particular, South Africa has had its own share of a fast rise in the unintended consequences of the development of ICT. “This rapid expansion of computer connectivity has provided opportunities for criminals to exploit security vulnerabilities in the on-line environment in fast rising economies like South Africa (Broadhurst, 2006). To catch up with this malaise, the South Africa government passed the Electronic Communications and Transactions Act of 2002 (Cole et al, 2008). Chapter thirteen of the act brings out a clear cut definition of cybercrimes and stipulated penalties for each offence. These crimes were grouped into four categories: those involving unauthorized access to data, interception and interference with data and computer related extortion, fraud and forgery. Understanding the trans-national nature in which cybercrime operates, South Africa aligned with other European countries as the only African country to sign and ratify the council of Europe’s treaty on cybercrime. This treaty obliges member states to criminalize offenders that indulge in any form of cybercrime and also cooperate with each other to investigate and punish culprits guilty of cyber and cyber related crimes (Cole et al, 2008). After Nigeria as hub of cybercrime in SSA, Cameroon tailgates Ghana as king of cybercrime prevalence in Central Africa. A 2010 report by the McAfee cyber security firm cites Cameroon as the world’s riskiest destination for internet surfers with more than a third (36.7%) of websites hosted in Cameroon being suspicious (McAfee Inc, 2009). In line with this, the country through its Ministry of Post and Telecommunications and the National Agency for Information and Communication Technologies advanced a bill to parliament that allows them to set up a cyber police force, define major crimes, determine legal procedures to help fight cybercrime. Also, the Cameroon parliament voted a bill to set up a cyber police force to fight the alarming rate of cybercrime in the nation (Mforgham, 2010). Botswana passed the Cybercrime and Computer Related Crimes Bill of 2007. This bill defines the jurisdiction of Botswana in crimes that affect its citizens and brings out extradition conditions and procedures of cyber criminals (Cole et al, 2008). The bill also holds accountable Botswana nationals for infringements committed not only in Botswana but outside the borders of Botswana (Botswana National Assembly, 2007). Zambia came up with the Computer Misuse and Crimes Act of 2004 to handle cybercrime issues. This dealt with the criminalization of systems’ intrusion, interception of data, and system disruption. It also went further to institute harsh penalties for cybercrimes including prison sentences of up to twenty five years (Cole et al, 2008). The enactment of outstanding legislatures and crafting of policies with extremely harsh punitive measures will Akuta et al. 133 serve at nothing if the implementation process is taunted. Practice To ensure the desired implementation or in order for the laws, and policies to be effective as intended, several SSA countries have taken practical steps to facilitate the implementation process. In Nigeria, the creation of the EFCC in itself was a bold step towards the fight against cyber crime. EFCC’s ascension into power in Nigeria ushered in the creation of specialized units that saw the effective investigation, prosecution of offenders and training of staff. These include: the general and assert investigation unit, the legal and prosecution unit and the training unit. While the training unit has been able to organize sessions where law enforcers have been trained on ways of eradication of crime, the investigation unit created a monitoring and intelligence unit that assisted in the gathering of information to facilitate investigation (Anadi & Jones, 2011). To facilitate the investigation of cybercrime, the Operation Eagle Claw was launched. In this operation, a software that facilitates the sniffing out of fraudulent emails called the eagle claw software was developed and deployed (Oates, 2009). It also instituted and carried an aggressive campaign on educating the public on whistle blowing and the ills of cyber crime. This was done through the use of local media, public and private institutions and all levels of educational establishments (Maska, 2009). Recognizing that the fight against cybercrime cannot be won by a single nation or organization, the EFCC with the assistance of the Nigerian government has partnered with other countries and organizations to explore collective ways of combating this malaise. These include partnering with the United Nations, other African and West African countries, African Development Bank, INTERPOL, Microsoft, Western Union, Yahoo, Google, and Coca cola (Chawki, 2009 & ANMT, 2010). The creation of a central agency to enforce crime laws, and the regulation of cybercafés by banning the operation of overnight cybercafé services has been a strong step towards curbing cybercrime. These efforts have been buttressed among other things by the amount of funds received by various anti-crime commissions. In 2004, the EFCC received an initial funding of about two million US dollars from the Nigerian Federal government and about thirty two million US dollars from 2005-2009 from the European Union. In the same year (2004), NCWG received about seven hundred thousand US dollars from the Nigerian Federal government to allow them the ability to smoothly carry on their responsibilities (Adomi, 2008 & Adeleye, 2009). The signing of an accord to create and the eventual creation of a sub-regional bureau of INTERPOL in Yaoundé for the Central Africa region to help fight transborder crime like cyber crime, vehicle theft, piracy amongst others has been a major boost to the law enforcement agency. This was accompanied by the President of Cameroon signing and providing visa waiver status for all personnel operating on INTERPOL passport. He also called on all Central African leaders to do same so as to allow swift apprehension of cyber and cyber related criminals (INTERPOL, 2009). Also, there has been a mass effort on the part of the Cameroon government to fight crime from a trans-border point of view. The government together with INTERPOL organized a working session that involved all police chiefs in Central Africa to discuss, be educated and adopt steps that can be taken by the region to fight trans-border crimes. This included partnering with international organizations like the United Nations, and the creation of specialized units and training of specialized law st enforcement officers on how to handle 21 century crime (Mosima, 2009). According to Mukinda, (2009), like Nigeria, Kenya revamped its Cyber Crime Unit of the police force by embarking on a program to get its law enforcement officers adequately trained with specialized skills to handle cyber crime offenders. In 2009, 18 police officers were sponsored to receive a four months special training in the United States on how to handle emerging internetbased criminal trends and the use of specialized equipment to track down criminals. This was followed by a retraining of other members of the Cyber Crime Unit by their colleagues who had been trained in the US. In the same way, Kenya Network Information Center (KENIC) which works under the auspices of the Ministry of Information and Communication and the Kenya police, has established a Computer Security Incidence Response Team (CSIRT). This response team relays computer and network related security threats, and vulnerabilities to the local internet communities, and send out a weekly news letter of recorded activities to members on the CSIRT mailing list (KENIC, 2006). Impediments and plausible explanations The formation of commissions, crafting of laws and policies to fight cybercrime in SSA has been on the rise within the last decade. This fight still has a long way to go. From the reviewed literature above, we found that the challenges SSA countries face alike other parts of the world range from issues that involve all stake holders. These issues ranged from problems involving the common man on the street to the presidents of various nations. Due to the varied nature of these challenges we limited our findings to the various institutions and bodies that are directly involved in the fight against cyber crime. Cybercrimes are international in nature and do not respect political boundaries. As a result several SSA countries tried to come up with coordinated efforts within their regions, in Africa and the world in general. These 134 J. Res. Peace Gend. Dev. efforts have seen Africa Regional blocks like EAC, CEMAC, ECOWAS and SADC work towards harmonizing their laws, holding working sessions to train law enforcement officers and partnering with other International organizations and companies to fight cybercrime. This strategy has somehow been a success because through regional seminars and workshops, countries were able to share knowledge on types of laws and implementation strategies with each other. However serious coordination had only been there by word of mouth rather than actions and there was little done on the part of the African Union (AU) as a whole in bringing countries together to fight this malaise. There is a need for the AU to rise up to the challenge and take cyber crime as a continental war. Like there is an AU Peace Keeping Force that handles issues of conflict in Africa, AU needs to organize itself and come out with an AU police force that will be given adequate training on cybercrime issues. This force will then be deployed to various countries with a high prevalence of cybercrime like Nigeria, Ghana, Cameroon and South Africa. There is a need for AU to declare war on cyber crime if the continent needs to be salvaged from this malaise and not leave at the mercy of regional blocs and individual countries. The need for an AU Special Police Force against cyber and cyber related crimes even grows stronger when one observes the fact that, law enforcement is impeded by national borders while cyber criminals are not. While internet is borderless for criminals, law enforcement officers must respect the boundaries and sovereignty of other nations as well as face the difficulties of disparity in legal systems and law (DiGregory, 2000). The legal systems of SSA countries were based on the remnants of colonization. While countries in the former British Africa, like Nigeria, Ghana, Kenya, Uganda etc had their laws tied to the British common law, others like Ivory Coast, Gabon, DR Congo, etc were tied to the French civil law. This got further complicated with countries like Cameroon that saw France and Britain as colonial masters thus function with both civil and common laws respectively. With this disparity in legal systems, different SSA countries treated cyber criminals differently. As DiGregory, (2000) puts it, when the laws of one country criminalize certain activities and another country’s laws do not in the same magnitude, cooperation in solving crime and prosecuting perpetrators may not be easy to come by. According to the Chair of EFCC Farida Waziri, because of the pressure and level of prosecution of cybercriminals in Nigeria, a reasonable number of cyber criminals have started migrating to other West African states to perpetrate their malicious acts (ANMT, 2010). This has seen a rise in prevalence of cybercrime in some countries that share a common border with Nigeria. The present ranking of Ghana and Cameroon as being among the top ten countries in the world with a high cybercrime prevalence rate as reported by Ghana’s Daily Graphic is testimony to Mrs. Waziri’s claim (ANMT, 2010). In view of this, like aforementioned, the AU needs to come in, bring together all member countries, establish and pass universal laws and penalties that govern all trans-border crimes. This will send a message to cybercrime perpetrators that SSA is no safe haven for cybercrime perpetration because the same crime will be prosecuted and punished alike all over the continent. While this is being anticipated, countries that have passed tough laws on cybercrime but still see their nationals migrate to other countries should follow the example of Botswana. In 2007, Botswana passed the Cybercrime and Computer Related Crimes Bill of 2007. This bill defines the jurisdiction of Botswana in crimes that affect its citizens and brings out extradition conditions and procedures of cyber criminals (Cole et al, 2008). The bill also holds accountable Botswana nationals for infringements committed not only in Botswana but outside the borders of Botswana (Botswana National Assembly, 2007). Once Botswana’s example is followed, nationals of all SSA countries will understand that, irrespective of where they indulge in cyber crime or other trans-border crimes, they are still subject to prosecution under their country’s legal system once they return home or extradited. This will go a long way to eliminate the idea that SSA is a paradise for cyber crime perpetration. Putting together a unique Special Police force and harmonizing laws to define criminal behavior and coming together under the umbrella of AU is inadequate to solve the cybercrime problem. We realized that, SSA countries had tried to partner with certain organizations and developed countries to get equipment needed for detection and investigation. Nigeria for example, had partnered with the Queensland Police Department (Gedda, 2008), Irrespective of these efforts; SSA is still considerably backward in equipment to fight cybercrime. The quality of law enforcement officers needed is only as good as the tools that are at their disposal. Many of the criminal cases that are out there are investigated and solved with the use of E-evidence. With the availability of new technologies, criminals have the ability to encrypt communications, hide their identities, and function anonymously. This can only be cracked down by a police force that has the required technology to decipher this. There is a strong and desperate need for state governments to provide funding to the anti-cybercrime agencies involved to enable them purchase modern technological equipment that will match them to the strength of the crimes committed and not continue to play a catch-up game. It is interesting to note that, some SSA countries are working towards avoiding the catch-up game by getting their law enforcement officers for in-service and specialized training. In 2009 Kenya sent 18 police officers to the US for in-service training on ways of using modern Akuta et al. 135 Conceptual model LAW ENFORCEMENT LEGISLATORS Shared Knowledge ANTI CRIME Base Cybercrime Laws + Policies = Perpetration Rate Practices COMMISSIONS RESEARCHERS equipment to detect and investigate cybercrime. This is a laudable move that needs to be encouraged (Mukinda, 2009). Despite the presence of the 18 specialized trained police officers, in January, 2011, the Kenya police website was hacked by cybercriminals. This brings us to pose the question, what can 18 specialized police officers do in a country that is experiencing unprecedented growth in the ICT sector? Southwood, 2010 indicates that, as of 2010, Kenya had about 3.5 million Internet users and a daily internet use growth of 2% in 2007 to 5% in 2009 as indicated by a market research company known as Synovate. There is a need for nation states to retrain more specialized police officers in cybercrime related fights. Also, computer studies and issues concerning cybercrime should be one of the top disciplines on the curriculum of Police Academies. Another issue of serious concern is the high levels of computer illiteracy among law enforcement officers. Most law enforcement officers never had the opportunity to use a computer, talk less of having computer lessons while in the Police Academy. This is partly due to the fact that, entry levels into police academy are very low. Entry level into the lowest rank of the police academy in SSA countries is very low. For instance, in Cameroon, to be qualified to get into the Police Academy at the lowest rank which is Police Constable, candidates are expected to have completed secondary school with at least a pass in three papers of the General Certificate of Education (GCE) Exams (tenth grade). In Kenya, to get into the lowest rank of the police academy which is constable; candidates are expected to have completed Secondary school with at least a C- grade in the Kenya Certificate of Secondary Education Exams (twelfth grade). This bring us to the question; how can we expect a tenth grader or a twelve grader with a few months of law enforcement training to measure up with university students or and graduates in the ability to operate the internet? SSA countries need to change their criteria for recruitment of students into the Police Academy. Student recruits into these academies should be selected from college graduates with degrees in IT, Criminal Justice, and IT related fields. As represented on the model above, we believe that, if the various stakeholders: law enforcement, legislators, anticrime commissions and researchers, come together and share a common knowledge, there will be a high probability that up to date laws and policies will be crafted by legislatures. The implementation process of these laws and policies will also receive some fine tuning based on findings from various researchers. Once all these are put together, it is evident that the rate of cybercrime perpetration will plummet. Outline for future research This paper was most concerned with the identification of stake holders involved in the fight against cybercrime. It also tried to discuss the present situation in SSA as concerns laws, legislations, policies, and how they are implemented. Although it did try to identify the impediments that the institutions and implementation process has suffered from, it did fall short of having a detailed examination to see how far these steps have been successful. It is our wish to subsequently continue this work to see how successful these steps taken by 136 J. Res. Peace Gend. Dev. various stakeholders in SSA countries have been successful. Amongst other things, we are suggesting a case study approach for an outcome evaluation on the implementation process and achievements of the various crime commissions in SSA. Also to be considered is the fact that, since cybercrime is a trans-border crime, we also recommend to other researchers a replication of this research in other parts of the world. This will at the long run provide findings in all corners of the globe and make the existence of a safe haven for cybercrime extinguished. REFERENCES Adeleye S (2009). EFCC may lose $32million EU funding, Nigerian Compass. Retrieved January13, 2011 from http//www. compassnewspaper.com /~compas/NG/index.php?option=com _content&view=article&id=10237: efcc-may-lose-32m-eufunding&Itemid. Adomi E, Igun S (2008). Combating Cyber crime in Nigeria; the Electronic Library 26 (5):716-725 Aning K (2007). Are there Emerging West African Networks? The Case of Ghana; Global Crime 8 (3): 193-212 Africa News Monitoring Team- ANMT (20110, Nigeria, Ghana in world cybercrime rankings, retrieved Feb., 7, 2011 from http://www.africanews.com/site/Nigeria_Ghana_in_world_cyber_cri me_ranking/list_messages/36409 Boateng R, Longe O, Mbarika V (2010). Cybercrime and Criminality in Ghana: Its Forms and Implications. Proceedings of the sixteenth Americas Conference on Information Technology, August 12-15, Lima, Peru Broadhurst RG (2006). ‘Content Cybercrimes: Criminality and Censorship in Asia’Indian J Criminol,34(1,2):11-30. Retrieved Feb., 7, 2011 from http://ceps.anu.edu.au/publications/pdfs/broadhurst_pubs/broadhur st-content_cybercrimes.pdf Botswana National Assembly (2007). Cybercrime and Computer Related Crimes Act of 2007. Chawki M (2009). Nigeria Tackles Advanced Fee Fraud. J Info Law and Technol 1:1-18 Communication Commission of Kenya (2009). The Kenya Information and Communication Act, retrieved Feb., 7, 2011 from http://www.cck.go.ke/regulations/downloads/KenyaInformationCommunications-Act-Final.pdf Cole KM, Chetty C, Larosa F, Rietta D, Schmitt, Goodman S (2008). Cyber security in Africa; an Assessment, Sam Nunn School of Inter Affairs DiGregory K (2000). Fighting Cybercrime-What are the Challenges Facing Europe? Meeting before the European Parliament; United States Department of Justice Retrieved Jan 8, 2011 from http://www.justice.gov/criminal/cybercrime/EUremarks.htm Ehimen O, Bola A (2010). Cybercrime in Nigeria; Bus Intelligence J,3:93-98 Gedda R (2008). Queensland, Nigeria and Industry Partner to Fight Cybercrime; Computer World Kenya Retrieved Feb, 22 2011, from http://www.computerworld.co.ke/articles/2008/05/22/queenslandnigeria-and-industry-partner-fight-cybercrime Financial Intelligence Centre-FIC (2008). Organization Profile, Retrieved Feb., 7, 2011 from https://www.fic.gov.za/SiteContent/ContentPage.aspx?id=1 Fick Jacqueline (2009). Cybercrime in South Africa: Investigating and prosecuting cybercrime and the benefits of public-private partnerships, Council of Europe octopus interface conference cooperation against cybercrime 10-11 March 2009, Strasbourg, France. Retrieved Feb., 7, 2011 from http://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/Do cuments/Reports Presentations/2079if09pres_JaquiFick_southafrica.pdf Financial Intelligence Centre (2008). Organization Profile, Retrieved Feb., from https://www.fic.gov.za/SiteContent/ContentPage.aspx?id=17, 2011 Horn P (2006). It’s Time to Arrest Cybercrime; Business Week Online Retrieved Feb. 7, 2011 from http://www.businessweek.com/technology/content/feb2006/tc20060 202_832554.htm INTERPOL (2011). About INTERPOL; http//www.interpol.int/public/icpo/default.asp Kenya Police Department (2010). Structure and Organization of Kenya Policewww.kenyapolice.go.ke Kipkori D, (2011). Our Police Should have Authority to Hunt and Kill Criminals; The Standard; retrieved February 28, 2011 from http//www.standradmedia.co.ke Kioni (2008). Are cybercrime laws in Kenya adequate? Kenya –byte; the Kenyan ICT sector issues and opinions, Retrieved Feb., 7, 2011 from http://kenya byte.blogspot.com/2008/10/are-cyber-crime-lawsin-kenya-adequate.html Longe O, Chiemeke S (2008). Cybercrime and Criminality in NigeriaWhat Roles are Internet Access Points in Playing? European J. Soc. Sci. 6 (4): 132-139 McAfee Inc (2009). McAfee Reveals the Riskiest Web Domains to Surf and Search, McAfee’s Third Annual Report Retrieved January 23, 2011 from http://www.mcafee.com/us/about/news/2010/q4/20101026-02.aspx Mforgham S (2010). Cameroon to set Up Cyber Police Force; Africa News.com. Retrieved on January 14, 2011 from http://www.africanews.com/site/Cameroon_to_set_up_cyber_police _force/list_messages Mforgham S (2010). Cameroon:22 Internet Fraudsters Arrested, Africa News, Retrieved February18, 2011 from http://www.africanews.com/site/Cameroon_22_Internet_fraudsters_ arrested/list_messages Mosima E (2009). Fighting Trans-National Crime Police Officers Mobilized, Cameroon Tribune; Retrieved January 27, 2011 from http://allafrica.com/stories/200909090372.html Mukinda, F., (2009), Kenya Police Retrain 18 Officers to Fight Cybercrime; the nation, retrieved February 12, 2011 from www.nation.co.ke/News/-/1056/510···16uhn/-/ Maska MU (2009). Building national cybersecurity capacity in Nigeria: the journey so far, Regional cybersecurity forum for Africa and Arab states, Tunis, 2009, Retrieved Feb., 7, 2011 from http://www.itu.int/ITU-D/cyb/events/2009/tunis/docs/maska-nigeriacybersecurity-june-09.pdf Makhanya P (2001). Hackers stealing millions from KZN firms. Computer/IT, Retrieved June 21, 2010, from http://www.iol.co.za/index.php?click_id=115&art_id=ct20010514212 507126C1626355 Nigeria Police Department (2011). Structure of the Nigeria Police www.npf.gov.ng/about/structure.aspx Oates J (2009). Operation Eagle Claw Nets 18 Nigerian Spammers, the A Register Retrieved January 27, 2011 from http://www.theregister.co.uk/2009/10/23/nigeria_police_success Ojedokun A (2005). the Evolving Sophistication of Internet Abuses in Africa, the International Information and Library Review, 37:11-17 Okuttah M (2010). East Africa: EAC Eyes Trade Growth with Cyber Laws, Business Daily (Nairobi) Retrieved February 5, 2011 from http://allafrica.com/stories/201006240090.html Oluwu D (2009). Cyber-crimes and the Boundaries of Domestic Legal Responses: Case for an Inclusionary Framework for Africa, J. Infor., Law and Technol.,1:1-18 Oriola T (2005). Advanced Fee Fraud on the Internet: Nigeria’s Regulatory Response. J. Infor., LAW & Technol, 21:237-248 Ribadu N (2007). Cybercrime and Commercial Fraud: A Nigerian Perspective. Proceedings of the fortieth annual session of UNCITRAL on Modern Law for Global Commerce July 9-12 Vienna Austria South Africa Police service (2010). Core Functions/Components; Akuta et al. 137 http//www.saps.gov.za Southwood R (2010). National Survey Shows Kenyan Internet Market Heading Towards 'Critical Mass’; All Africa.com; Retrieved February 17, 2011 from htt://allafrica.com/stories/ 201001290913.html United Nations Office of Drugs and Crime (2011). the Commission on Crime Prevention and Criminal Justice; http//www.unodc.org/unodc/en/commissions/CCCPJ/index.html UNCTAD (2010, June 21). East African community adopts framework for cyberlaws to foster regional trade, investment, UNCTAD/PRESS/IN/2010/023. Retrieved Feb., 7, 2011 from http://www.unctad.org/Templates/Webflyer.asp?docID=13379&intIte mID=2068&lang=1 Wanjiku R (2009). Kenya Communication Amendment Act (2009); Progressive or Retrogressive? Association for Progressive Communications (APC) Wanyama P (2010). Kenya: Battle against Rising Cybercrime should not infringe on the Citizens’ Right to Privacy; Daily Nation on the Web, Retrieved December 28, 2010 from http://allafrica.com/stories/201010270986.html