Enhancing Cybercrime Investigations in Ghana: A Mobile Broadband Framework for Unmasking Perpetrators through Digital Footprints and User Profile Synthesis

Abstract:
Uncovering the
origin of cybercrimes in Ghana continue to be a challenge for law enforcement
agencies. Existing solutions had primarily focused on unmasking crime source
within the Public Data Network (PDN) using methods such as geolocation of
public Internet Protocol (IP) address or the Domain Name Server (DNS) lookup
methods. Unfortunately, these approaches fall short at uncovering cybercrime
sources from the mobile broadband (MBB) domain. This paper proposed a framework
aimed at answering the question of processes around the MBB’s packet data
protocol (PDP) context procedure and its corresponding private IP attribution
to User Equipment (UE) that might mask the UE’s identity in a PDN. The study's
outcome includes digital footprints collection like IP addresses and
Transmission Control Protocol ports during PDP context and UE data sessions to
cloud server in the PDN. Exploratory data analysis reveals the uniqueness of
every session, i.e., making traceability feasible from a PDN to distinct
sources in the MBB domain. This paper proposes a comprehensive framework by recommending
the collection of datasets from the MBB domain infrastructure at three logical
interfaces with network probes. Additionally, the study suggests enhancing the
dataset with call detail records and leveraging Edgar Frank Codd's relational
data model to synthesise the fragmented datasets to a unique entity thereby ensuring
the unmasking of a cybercrime committed in a PDN effectively traceable to the
MBB domain entity. This innovative approach adds to the knowledge of cybercrime
investigations in Ghana's cybersecurity endeavours.
References:
[1]. ITU, Facts and Figures, 2024, International Telecommunications Union,
https://www.itu.int/en/mediacentre/Pages/PR-2024-11-27-facts-and-figures.aspx
[2]. NCA, 2023, "Quarterly Statistical Bulletin on Communications in
Ghana", National Communications Authority, 8(4), https://nca.org.gh/wp-content/uploads/2024/05/Q2-2023-Quarterly-Statistical-Bulletin-Final-Version.pdf
[3]. Ennin, D., Mensah, R. O., 2019, Cybercrime in Ghana and the Reaction
of the Law, JL Pol'y & Globalization, vol. 84, no. 36
[4]. Gyesi, Z. K., 2020, Increased cybercrimes due to lack of successful
investigations and prosecutions, Graphic, https://www.graphic.com.gh/news/general-news/increased-cybercrimes-due-to-lack-of-successful-investigations-and-prosecutions-dr-antwi-boasiako.html
[5]. Alhassan, M. M., Adjei-Quaye, A., 2017, Computer & Cyber
Forensics: A Case Study of Ghana. American Scientific Research Journal for
Engineering, Technology, and Sciences (ASRJETS), 28(1), 167-176.
[6]. Rid, T., Buchanan, B., 2015, Attributing cyber attacks. Journal of
strategic studies, 38(1-2), 4-37.
[7]. IC3, 2023, Federal Bureau of Investigation: Internet Crime Report, Internet
Crime Complaint Centre
[8]. Obeng, C., Kumah, P. K., Asiedu, H. B., Senior, F. A. O., 2023,
“Understanding Cybercrime in Developing Economies: Insights from Agona Swedru,
Ghana”, Communications, 10(1), 1-10.
[9]. Ghanaian Times, 2023, “Ghana loses GHC49.5m to Cyber Fraud in six months”,
https://www.ghanaiantimes.com.gh/ghana-loses-ghc49-5m-to-cyberfraud-in-six-mths
[10]. Jiri Techet, 2024, Network Analyzer, https://techet.net/netanalyzer
[11]. Softonic, 2024, Softonic, https://packet-capture.en.softonic.com/android
[12]. Wireshark, 2024, Wireshark Foundation, https://www.wireshark.org
[13]. Oracle, 2024, MySQL, https://www.mysql.com
[14]. cPanel, 2024, cPanel, https://cpanel.net
[15]. Ságvári, B., Gulyás, A., & Koltai, J., 2021, Attitudes towards
participation in a passive data collection experiment. Sensors, 21(18), 6085
[16]. Starrin, B., Hagquist, C., Larsson, G., & Svensson, P. G., 1993,
“Community types, socio-economic structure and IHD mortality—a contextual
analysis based on Swedish aggregate data”, Social Science & Medicine,
36(12), 1569-1578
[17]. Morgenthaler, S., 2009, Exploratory data analysis, Wiley
Interdisciplinary Reviews: Computational Statistics, vol. 1, pp. 33-44
[18]. Kamble, D., Rathod, S., Bhelande, M., Shah, A., & Sapkal, P.,
2024, “Correlating forensic data for enhanced network crime investigations:
Techniques for packet sniffing, network forensics, and attack detection. J.
Auton. Intell”, 7, 1272.
[19]. Sikder, R., Uddin, M. J., & Halder, S., 2016, An efficient
approach of identifying tourist by call detail record analysis, In 2016
International Workshop on Computational Intelligence (IWCI), IEEE, pp. 136-141
[20]. GSMA, 2014, GPRS Security Guide for Users, GSM Association, Vol.
3.1, https://www.gsma.com/newsroom/wp-content/uploads/SG.16-v3.1.pdf
[21]. DPA, 2012, "Ghana - Data Protection Act 2012"
[22]. Data Protection Commission of Ghana, 2024, "Home", https://dataprotection.org.gh
[23]. Chen, P. P. S., 1976, The entity-relationship model—toward a unified
view of data, ACM transactions on database systems (TODS), 1(1), 9-36.