Enhancing Cybercrime Investigations in Ghana: A Mobile Broadband Framework for Unmasking Perpetrators through Digital Footprints and User Profile Synthesis

Download Article

DOI: 10.21522/TIJAR.2014.12.02.Art019

Authors : Daniel Adjei Odai

Abstract:

Uncovering the origin of cybercrimes in Ghana continue to be a challenge for law enforcement agencies. Existing solutions had primarily focused on unmasking crime source within the Public Data Network (PDN) using methods such as geolocation of public Internet Protocol (IP) address or the Domain Name Server (DNS) lookup methods. Unfortunately, these approaches fall short at uncovering cybercrime sources from the mobile broadband (MBB) domain. This paper proposed a framework aimed at answering the question of processes around the MBB’s packet data protocol (PDP) context procedure and its corresponding private IP attribution to User Equipment (UE) that might mask the UE’s identity in a PDN. The study's outcome includes digital footprints collection like IP addresses and Transmission Control Protocol ports during PDP context and UE data sessions to cloud server in the PDN. Exploratory data analysis reveals the uniqueness of every session, i.e., making traceability feasible from a PDN to distinct sources in the MBB domain. This paper proposes a comprehensive framework by recommending the collection of datasets from the MBB domain infrastructure at three logical interfaces with network probes. Additionally, the study suggests enhancing the dataset with call detail records and leveraging Edgar Frank Codd's relational data model to synthesise the fragmented datasets to a unique entity thereby ensuring the unmasking of a cybercrime committed in a PDN effectively traceable to the MBB domain entity. This innovative approach adds to the knowledge of cybercrime investigations in Ghana's cybersecurity endeavours.


References:

[1].  ITU, Facts and Figures, 2024, International Telecommunications Union, https://www.itu.int/en/mediacentre/Pages/PR-2024-11-27-facts-and-figures.aspx

[2].  NCA, 2023, "Quarterly Statistical Bulletin on Communications in Ghana", National Communications Authority, 8(4), https://nca.org.gh/wp-content/uploads/2024/05/Q2-2023-Quarterly-Statistical-Bulletin-Final-Version.pdf

[3].  Ennin, D., Mensah, R. O., 2019, Cybercrime in Ghana and the Reaction of the Law, JL Pol'y & Globalization, vol. 84, no. 36

[4].  Gyesi, Z. K., 2020, Increased cybercrimes due to lack of successful investigations and prosecutions, Graphic, https://www.graphic.com.gh/news/general-news/increased-cybercrimes-due-to-lack-of-successful-investigations-and-prosecutions-dr-antwi-boasiako.html

[5].  Alhassan, M. M., Adjei-Quaye, A., 2017, Computer & Cyber Forensics: A Case Study of Ghana. American Scientific Research Journal for Engineering, Technology, and Sciences (ASRJETS), 28(1), 167-176.

[6].  Rid, T., Buchanan, B., 2015, Attributing cyber attacks. Journal of strategic studies, 38(1-2), 4-37.

[7].  IC3, 2023, Federal Bureau of Investigation: Internet Crime Report, Internet Crime Complaint Centre

[8].  Obeng, C., Kumah, P. K., Asiedu, H. B., Senior, F. A. O., 2023, “Understanding Cybercrime in Developing Economies: Insights from Agona Swedru, Ghana”, Communications, 10(1), 1-10.

[9].  Ghanaian Times, 2023, “Ghana loses GHC49.5m to Cyber Fraud in six months”, https://www.ghanaiantimes.com.gh/ghana-loses-ghc49-5m-to-cyberfraud-in-six-mths

[10]. Jiri Techet, 2024, Network Analyzer, https://techet.net/netanalyzer

[11]. Softonic, 2024, Softonic, https://packet-capture.en.softonic.com/android

[12]. Wireshark, 2024, Wireshark Foundation, https://www.wireshark.org

[13]. Oracle, 2024, MySQL, https://www.mysql.com

[14]. cPanel, 2024, cPanel, https://cpanel.net

[15]. Ságvári, B., Gulyás, A., & Koltai, J., 2021, Attitudes towards participation in a passive data collection experiment. Sensors, 21(18), 6085

[16]. Starrin, B., Hagquist, C., Larsson, G., & Svensson, P. G., 1993, “Community types, socio-economic structure and IHD mortality—a contextual analysis based on Swedish aggregate data”, Social Science & Medicine, 36(12), 1569-1578

[17]. Morgenthaler, S., 2009, Exploratory data analysis, Wiley Interdisciplinary Reviews: Computational Statistics, vol. 1, pp. 33-44

[18]. Kamble, D., Rathod, S., Bhelande, M., Shah, A., & Sapkal, P., 2024, “Correlating forensic data for enhanced network crime investigations: Techniques for packet sniffing, network forensics, and attack detection. J. Auton. Intell”, 7, 1272.

[19]. Sikder, R., Uddin, M. J., & Halder, S., 2016, An efficient approach of identifying tourist by call detail record analysis, In 2016 International Workshop on Computational Intelligence (IWCI), IEEE, pp. 136-141

[20]. GSMA, 2014, GPRS Security Guide for Users, GSM Association, Vol. 3.1, https://www.gsma.com/newsroom/wp-content/uploads/SG.16-v3.1.pdf

[21]. DPA, 2012, "Ghana - Data Protection Act 2012"

[22]. Data Protection Commission of Ghana, 2024, "Home", https://dataprotection.org.gh

[23]. Chen, P. P. S., 1976, The entity-relationship model—toward a unified view of data, ACM transactions on database systems (TODS), 1(1), 9-36.