This module is a resource for lecturers

Exercises and case studies

This section contains material that is meant to support lecturers and provide ideas for interactive discussions and case-based analysis of the topic under consideration.

Exercise # 1: Type of Criminal Group that Engages in Cyber Organized Crime

There are several types of organized criminal groups that engage in cybercrime.

Find a recent case involving an organized criminal group that engaged in cyber organized crime. What type of a group is it? Why do you think so?

[This exercise needs to be completed before class].

Exercise # 2: Darknet Law Enforcement Operations

Several law enforcement agencies took down darknet marketplaces (e.g., Silk Road 2.0, Pandora, AlphaBay, and Hansa). These takedowns, as well as the scam markets that appeared on the darknet, sowed seeds of mistrust in these sites.

Why is trust important in the use of darknet sites? Please explain your response.

Exercise # 3: Cryptocurrencies

There are a variety of cryptocurrencies on the market.

Discussion Questions

  • Which cryptocurrency is primarily used by citizens of your country?
  • Why is it used?
  • Are there any other cryptocurrencies used? If so, please identify and discuss them.
  • How are cryptocurrencies used by cyber organized criminals?

Having answered these questions:

  • Choose one cryptocurrency. If you wanted to buy 0.05 of that cryptocurrency in your country's currency, how much would that cost?
  • How would you buy this?
  • Do you need to provide any identifying information and/or an identification to purchase the cryptocurrency?
  • Access a darknet market. What can you buy on a darknet market with 0.05 of the cryptocurrency of your choice?

[Note: For the last question, you may need to download, ToR or I2P , depending on the darknet market you will access].

Regional perspective: Eastern and Southern Africa

Case study (Uganda Revenue Authority Electronic Fraud)

In 2011, the Uganda Revenue Authority (URA) discovered its computer system had been compromised after finding a suspicious entry in the vehicle registration database. It followed an internal investigation that uncovered one of the biggest cybercrimes the country ever experienced, with losses calculated by the Public Prosecutor in Shs 2,4 billion (over 500,000 US dollars).

Preliminary investigations discovered that more than 150 cars had number plates, but none had paid taxes. The bank receipts, which tax collectors had used to clear the vehicles, were forged. Investigators followed the trail to establish ownership of the vehicles. According to URA documents, three of them, which were supposed to be re-exported to Burundi, were in the hands of a company trusted to Mr. Nsubuga.

The police arrested Mr. Nsubuga, together with three other persons (one of whom was later released), in a car parked nearby the URA premises. Three laptops, an inverter, an external hard disk and other electronic gadgets were seized. Within one week of the arrest of the suspects, a fourth man, Mr. Byamukama was picked up at his place of work at MTN - a Ugandan major telecommunication company - and his work computer was seized.

Forensic analysis of the electronic devices discovered that they had been used to gain access to URA computers and servers. Specific programs used for vehicle registration and foreign trade procedures, as well as staff user’s login access information, were also found in one of the sized laptops.

The four defendants were indicted on four charges derived from the Computer Misuse Act and two charges drawn from the East African Community Customs Management Act.

The Anti Corruption Division of the High Court of Uganda sentenced Mr. Nsubuga and Mr. Byamukama to 12 years of imprisonment on count II (Electronic Fraud, contrary to section 19 of the Computer Misuse Act), 8 years of imprisonment on counts I,III, and IV (count I: Unauthorized use and interception of computer services, contrary to sections 15(1) and 20 of the Computer Misuse Act; Count III: Unauthorized access to data, contrary to sections 12(2) and 20 of the Computer Misuse Act; Count IV: Producing, selling or procuring, designing and being in possession of devices, computers, computer programmes designed to overcome security measures for protection of data, contrary to sections 12(3) and 20 of the Computer Misuse Act), and a fine of 4.500 US dollars. The other two defendants were acquitted.

Case-related files

Significant feature

  • Cybercrime

Discussion questions

  • Analyze the perpetrators’ different roles, modus operandi and their internal organization. Refer to the content studied in previous Modules.
  • Argue in favor, or against, the punishment imposed by the Court. Focus on the social consequences of the crime perpetrated in this case.
  • Identify the factors that make your jurisdiction/country/region vulnerable to cybercrime as well as those that mitigate the risk.
Next: Possible class structure
Back to top