cybercrimes in tanzania

73
1 TABLE OF CONTENTS Certification....................................................... .................................................................... ..................i Declaration......................................................... .................................................................... .................ii Copyright........................................................... .................................................................... .................iii Acknowledgement..................................................... .................................................................... ........iv Dedication.......................................................... .................................................................... .................v Abstract............................................................ .................................................................... ..................vi CHAPTER ONE................................................................. .................................................................... ....1 1.0 Introduction...................................................... .................................................................. ..........1 1.1 Background to the Problem........................................................... ...............................................2 1.2 Statement to the Problem........................................................... .................................................5

Upload: fikiriligangab

Post on 30-Oct-2014

204 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cybercrimes in Tanzania

1

TABLE OF CONTENTS

Certification.............................................................................................................................................i

Declaration..............................................................................................................................................ii

Copyright................................................................................................................................................iii

Acknowledgement.................................................................................................................................iv

Dedication...............................................................................................................................................v

Abstract..................................................................................................................................................vi

CHAPTER ONE.........................................................................................................................................1

1.0 Introduction..................................................................................................................................1

1.1 Background to the Problem..........................................................................................................2

1.2 Statement to the Problem............................................................................................................5

1.3 Objectives of the Study.................................................................................................................6

1.4 Significance of the Study...............................................................................................................7

1.5 Literature Review..........................................................................................................................7

1.6 Hypothesis of the Study................................................................................................................9

1.7 The Scope of the Study.................................................................................................................9

1.8 Research Methodology...............................................................................................................9

CHAPTER TWO......................................................................................................................................11

2.1 Introduction................................................................................................................................11

2.2 Cybercrimes, Criminals and the Need for Specific Laws.............................................................11

2.2.1 Law and Computer Technology...............................................................................................12

2.2.2 Cybercrimes and Criminals......................................................................................................12

2.3 THE INTERNATIONAL CRIMINAL LAW REFORM IN COMBATING CYBERCRIMES........................13

2.3.1 The United Nations...........................................................................................................13

2.4 THE AFRICAN AND REGIONAL CRIMINAL LAW REFORM IN COMBATING CYBBERCRIMES.........15

2.4.1 The African Union.............................................................................................................15

2.4.2 The East African Community.............................................................................................16

Page 2: Cybercrimes in Tanzania

2

2.5 THE EFFORTS TAKEN BY INDIVIDUAL EAST AFRICAN COUNTRIES IN ADOPTING CYBER LAWS AND COMBATING CYBERCRIMES..........................................................................................................17

2.5.1 Kenya................................................................................................................................18

2.5.2 Uganda..............................................................................................................................18

2.5.2 Tanzania...........................................................................................................................18

CHAPTER THREE....................................................................................................................................20

3.1 Introduction................................................................................................................................20

3.2 Evidence.....................................................................................................................................20

3.3 Digital Evidence and Cybercrimes..............................................................................................21

3.4 The Nature of Electronic Evidence.............................................................................................23

3.5 Challenges brought by Electronic/Digital Evidence....................................................................25

3.5.1 Authentication.................................................................................................................25

3.5.2 Integrity............................................................................................................................27

3.5.3 Confidentiality..................................................................................................................28

3.6 Relevancy and Admissibility of Digital Evidence in Tanzanian Courts.......................................28

CHAPTER FOUR.....................................................................................................................................32

4.1 Introduction.................................................................................................................................32

4.2 Conclusion....................................................................................................................................32

4.3 Recommendations.......................................................................................................................32

4.3.1 The Need to Enacting Cyber laws.....................................................................................33

4.3.2Training of Judges, Lawyers and Law Enforcers................................................................34

4.3.3 Judicial Response............................................................................................................34

4.3.4 Raising Public Awareness and Education........................................................................35

4.3.5 The Need for firms to secure their Networked Information...........................................35

4.3.6 Coordination and Cooperation........................................................................................35

Bibliography.............................................................................................................................36

Page 3: Cybercrimes in Tanzania

3

CERTIFICATION

The undersigned certify that has read and hereby recommends and approve for acceptance by

the Faculty of Law of Tumaini University – Makumira, a Research paper titled “AN

ASSESSMENT OF LEGAL SYSTEM IN RELATION TO THE INCREASING RATES OF

CYBER CRIMES IN TANZANIA ” in partial fulfilment of requirement for the award of the

bachelor of laws degree of Tumaini University-Makumira, Arusha.

Page 4: Cybercrimes in Tanzania

4

DECLARATION AND SUPERVISION

I, Fikiri Liganga, do hereby declare that this research paper is my own original work and has

not been presented in any University in full or partial fulfilment of academic requirement for

any degree or equivalent.

Signed at Arusha this.........day of .........2012

Signature.......................

Fikiri Liganga

This research paper was supervised by Frank Akyoo, Lecturer, Faculty of Law, Tumaini

University-Makumira.

I have read this paper and approve it for final marking.

Signature...............

F. Akyoo

Date..................

Page 5: Cybercrimes in Tanzania

5

COPYRIGHT

All rights reserved. This research work is a copyright material protected under the Berne

Convention, the Copyright and Neighbouring Rights Act, Cap 218 R.E. 2002 and other

International and National enactments in that behalf, written on intellectual property. No part

of this work may be reproduced, stored in any retrieval system, or transmitted in any form

by any means, electronic, mechanical, photocopying, recording or otherwise without prior

written permission of the researcher or The Faculty of Law of Tumaini University-Makumira

in that behalf.

All rights reserved © 2012

Page 6: Cybercrimes in Tanzania

6

ACKNOWLEDGEMENT

One person who hands without assistance and contribution from other people cannot do as a

hard work as this research would seem to be. Many people have contributed in accomplishing

this research. Few of them are mentioned but all who accompanied me in one way or another

are regarded and their assistance is of vital role in doing this research.

I would first of all thank my Heavenly Father for his close presence to me since I was born to

date and be with me ever since I set my feet at Tumaini University-Makumira.

I would like also to thank my family for their moral and financial support during my studies. I

would like to thank my parents in a very special way for their courage and prayer throughout

my lifetime and during my studies at this Institution. It is hard to pay them back but I pray

they are blessed by the Almighty God.

Special thanks to my supervisor, Mr. Frank Akyoo for his kind supervision, fatherly heart and

material support in accomplishment of this research. Also his guidance and criticism played a

vital role for this research to be presentable.

I also appreciate the contribution of Dean, Faculty of Law, Tumaini University - Makumira

for his support and courage. Special thanks to my roommates; Daniel D. Sanka, Gabriel

Wansato and Dennis Ngutu for their moral support and criticism to this research.

Finally, I would like to express my appreciation to my fellow third year students, Faculty of

Law at Tumaini University, Makumira (2012) for their cooperation throughout three years of

studying. I wish them all the best.

Page 7: Cybercrimes in Tanzania

7

DEDICATION

This work is dedicated to my family, my precious parents Zubeda Rashidi Kunamba and Dr.

Ntauka, my lovely sister Fatima Faraji, my elder brother Abillahi Omari and my lovely

younger brother Ninde Liganga.

Their Love, Labour and Courage are untold.

Page 8: Cybercrimes in Tanzania

8

ABSTRACT

The ICT revolution is shaping our world in ways it has been difficult to predict and to

appreciate. The remarkable achievements in the Information and Communication

Technology (ICT) sector is really a matter of pride in Tanzania and the world as a whole, but

cybercrime, as its associated problem, is causing serious concern. Cybercrime, also known as

‘Internet crime’ or ‘computer crime’, is a modern crime, which is growing and expanding at

the highest speed. As a result, incidences of cybercrimes are increasing geometrically

worldwide and Tanzania in particular.

The country’s image has also suffered because of the immoral activities of some Tanzanians

and other foreigners that have now turned ICT technology into a cheap conduit for the

commission of the offences. Few incidences have been reported to the police and few cases

taken to court.

Although, some cases are in court, however, existing laws in Tanzania have not sufficiently

considered the online society in cyberspace. The offences have changed from traditional

crimes to cybercrimes; Evidence has also changed from tangible to intangible. The ways of

prosecuting, collecting, preserving and tendering evidence in court have also changed. This

situation challenges existing traditional laws in Tanzania.

The researcher in this work has digested various issues by making a comparative study with

other jurisdictions that have taken serious measures in addressing cyber issues. In analysing

the issues, the researcher has realised that Tanzanian laws are inadequate to curb cyber

related issues. Finally, the researcher has provided recommendations on the possible

measures to curb the situation.

Page 9: Cybercrimes in Tanzania

9

CHAPTER ONE

1.0 INTRODUCTION

The term "cybercrime" is also known as the "computer crime" or "computer-related crime”,

or "high-tech crime." However, they can be used interchangeably. Cybercrime is understood

as "criminal acts committed using electronic communication networks and information

systems or against such networks and systems."1 The term cybercrime is not different from

the concept of conventional crime. Both include conduct which causes breach of rules of law

and counterbalanced by the sanction of the state.2 However, they somehow differ from one

another.

The primary difference is that; cybercrimes operates by using new technology that involves

computer systems in a cyber- culture context.3 This involvement of the computer technology

creates new challenges that require legal systems and legislation be amended.4

Cybercrime is global in character; offenders can take advantage of gaps in existing laws to

avoid apprehension and prosecution. Therefore, in so far as this is concerned, Tanzania needs

to have in place all the necessary legal tools including an arsenal of clearly defined

cybercrime offences for use in prosecuting cyber criminals and procedural rules governing

evidence gathering and investigation.5

Cybercrimes are associated with the use and development of Information Communication

Technology (ICT) which has improved the efficiency and flexibility in providing services and

many organizations are increasingly relying on it, which evidently handles a very critical part

of the organisations’ core services.6 The exponential growth of this technology, the increase

in its capacity and accessibility, and the decrease in its cost, has brought about revolutionary

changes in commerce, communication, entertainment and the rise of a modern crime known

as cyber crime.7

1The cybercrime convention committee, cybercrime and the European Union, 2007 at Pg. 42Rathinasabapathy, G and Rajendran, L, Cyber crimes and information frauds: Challenges for LIS professionals, Butterworths, Lexis 1991 Pg. 132.3Ibid4Bakari, J.K. A Holistic Approach for Managing ICT Security in non Commercial Organization, Doctoral Thesis, Stockholm University Sweden. 2007 Pg. 35Ibid6See note 4 above7Grabosky,P, Cyber crime and Information Warfare; paper presented at the transnational crime conference convened by the Australian Institute of Criminology in association with the Australian Federal Police and Australian customs service, 2000 at Pg. 3

Page 10: Cybercrimes in Tanzania

10

This work, therefore, focuses at providing an overview of the recent developments in

Information Communication Technology in Tanzania and its legal impact on domestic laws

and the security of internet users. Furthermore, it provides a critical analysis of the efforts

taken by Tanzania in addressing cyber issues and the challenges it faces so far.

1.1 THE BACKGROUND TO THE PROBLEM

The problem of cybercrime in Tanzanian can be traced far back in 1960s. By that time,

following the need to protect information technologies, the government enacted legislations

to regulate Information Communication Technology (ICT). Examples of these pieces of

legislation include; Post and Telecommunications Corporation Act, the Broadcast Receiving

Apparatus (Licensing) Act,8 and the Tanganyika Broadcasting Corporation (Dissolution)

Act.9

In 1970’s, following the advancement of science and technologies in the world, which was

associated with the massive use of computers, the government foresaw the danger of

information system in the country being affected by such advancement. As a result, the

government banned the importation of computers in the country.10 This mission failed and as

a result several computers were imported. Because of this, the government enacted the Posts

and Telecommunications Corporation Act in 1977 to cope with those changes.

The process continued and it reached the time where the technological changes outpaced the

law regulating Information Communication Technologies (ICT) in the country. In other

words, the laws by that time were not meant to incorporate internet issues. They were indeed

meant to deal with paper-based transactions.

Until now Tanzania does not have specific legislations dealing with cyber laws and most of

the laws that are in place were enacted before cyber security was an issue. Therefore,

statutory laws have remained in yesterday while the society and technology are moving at a

speed of light. This situation contravenes the very purpose of the law and disturbs its

functions in the society as well.

8Act No. 6 of 19649Act no. 11 of 196510The website of Eileen P. Drew and F. Gordon on the Information Technology in Selected Countries: Reports from Ireland, Ethiopia, Nigeria and Tanzania found at http://www.lrct.go.tz/documents/jpurnal.pdf retrieved on the 21st December 2011.

Page 11: Cybercrimes in Tanzania

11

It is a known fact that law is a dynamic concept that keeps on changing in keeping pace with

changes in society. Flexibility provides some measure of discretion in law to make it

adaptable to social conditions.11 If law is rigid and unalterable, it may not respond to changes

spontaneously which may lead to resentment and dissatisfaction among the subjects and may

even result in violence or revolution.12

Furthermore, some cases may go unpunished due to the absence of clear and responsive laws.

For example, in early May of 2000, a computer virus known as the "love bug" emerged and

spread rapidly around the globe.13 The virus that was designed to disseminate itself and to

destroy various kinds of files on a victim's computer infected about 270,000 computers and

forced the shutdown of computers at large corporations such as Ford Motor Company and

Dow Chemical Company, as well as the computer system at the House of Lords in the first

hours after it was released.14

If one goes clearly through this particular experience, he will, without hesitation, find that the

challenges, which were posed by “love bug” virus in Philippines is a good lesson for other

countries around the world including Tanzania.

Although, the judiciary in Tanzania has tried in certain instances to resolve the challenges of

ICT; however, it has done this by interpreting and applying the existing statutory and

common law principles in ways and manners that incorporate the existing social realities.15

While the Evidence Act of 1967,16 Penal Code17 and the Criminal Procedure Act,18 remain

operational, developments in such areas as information technology have gone way beyond

what those statutes could have envisaged at the time of their enactment. The advent of the

computer has brought with it new forms of record keeping in software - microfilms,

11Paranjape, N.V. Studies in jurisprudence and Legal theory, Central Law Publications, 2004, Pg.13612Ibid13Abdallah .A, The impact of ICT revolution in Tanzania’s legal system: A critical analysis of cybercrimes and computer forensic evidence. A compulsory research paper submitted in partial fulfilment for the requirement for the degree of master of laws ( LLM) by thesis of the open university of Tanzania, p. 9614Brenner, S.W. Cybercrime investigation and prosecution; the role of Penal and Procedural law . Macmillan Publications, 2001, Pg.215This was stated i the case of Tanzania Cotton Marketing Board v Cogecot Cotton Company SA [1997] TLR No. 16516CAP 6 of the Laws of Tanzania (R.E 200217CAP 16 of the Laws of Tanzania(R.E 2002)18CAP 20 of the Laws of Tanzania (R.E 2002)

Page 12: Cybercrimes in Tanzania

12

microchips, diskettes, and flash discs that are not by any means within the former

understanding of the word “document”19 which was a written matter on a surface.

While cybercrimes pose a significant threat to the development of electronic transactions,

Tanzanian laws do not recognize criminal activities on the internet. For example, laws on

consumer protection, sales and supply of goods in Tanzania protect consumers in off-line

business only and do not apply to online businesses especially when it comes to the matter of

distance contracts.

Current laws do not protect consumers against risks involved in the distance selling and

buying business because online or distance contracts were not in practice in Tanzania by the

time these laws were enacted. It is further, noted that, Tanzanian laws neither cover on-line

contracts nor recognize cyber space. The laws provide that; the contract must be in writing

and duly signed or authenticated before a witness.20 This requirement is hardly applicable in

cyber space.

The existing laws facilitate paper –based transactions, which apparently are not applicable to

technological changes that are currently taking place in requirement of an information

society.21 Furthermore, the government and institutions relying on ICT have not

accommodated the increased capacity, efficiency and security risk in ensuring the delivering

of public services at the safe environment.22

The report from the Tanzanian Police Force shows that there is an increase in reported cases

of computer related crimes in the country. A good example is the increase of number of

traders forging receipt of imported goods using computers in order to evade tax. The incident

of theft that occurred at Barclays bank where an organised group of business people stole

US$1.8 million equivalent of 2.4 billions Tanzania shillings using computer technology is a

continuation of computer crimes taking place in Tanzania.23

19The term document is defined under section 3(1) of the Evidence Act 1967 (CAP 6 R.E 2002) to mean; any writing, handwriting, typewriting, printing, Photostat, photograph and every recording upon any tangible thing, any form of communication or representation by letters, figures, marks or symbols or by more than one of these means which may be used for the purpose of recording any matter provided that such recording is reasonably permanent and tangible.20 See note 13 above.21The website of Cyber security in Tanzania- Country report, available at http://www.itu.int/osg/spu/cybersecurity//contributions/tanzania-ulanga-paper- visited on 29th March 2012.22See note 13 at pg. 3923See note 13 above.

Page 13: Cybercrimes in Tanzania

13

Although, cybercrime is a worldwide problem, in developed countries such as USA and the

UK, the government and institutions relying on ICT have tried to employ in- house

Computer forensic experts who realise the risks of having an attack before it occurs or before

the security breach and have enacted cyber laws which define clearly cybercrime offences.24

As the industrial revolution rendered obsolete aspects of law based on notions of an agrarian

society, so a legal system focusing on issue of ownership, control and use of physical objects

must reorientate itself to suit the requirement of an information society.25

That has never been done in Tanzania and it remains clear, however, that regulation of ICT in

Tanzania is still at an initial stage, and much needs to be done in the ICT legal framework.

1.2 STATEMENT TO THE PROBLEM

The problem of cybercrimes in Tanzania is, like in many other jurisdictions, increasingly

fatal. As computers have developed in the country, so have also criminal offences associated

with their use. But the laws in Tanzania have never changed to reflect these dangerous

advancements.

The existing traditional penal laws such as the Penal Code26 have nothing to do with the

increasing cybercrimes yet. These traditional laws were not written with the on-line society

with Cyberspace in mind causing the problem of their applicability on cybercrime. It is a

common understanding that the information structure in Cyberspace represents values which

should be protected, also by criminal law measures. But the provisions in existing traditional

criminal laws are still meant to ignore the protection of these values and instead they only

describe qualified unethical behaviours that the societies have decided to be criminal

offences. There is, until now, no specific provision in the penal code which addresses

cybercrime as an offence under the Code.

There are also issues associated with admissibility of electronic evidence. It is clearly known

that in every criminal case, parties are required to tender evidences before the court of law. In

Tanzania, the law regulating the principles of evidence is governed by Evidence Act.27 The

Act provides for the best evidence rule that ‘Documents must be proved by primary evidence

except as otherwise provided in this Act.’28 The term primary evidence is defined under

24Ibid, pg. 4325See note 13 above,at pg. 4526CAP 16 of the Laws of Tanzania (R.E 2002)27CAP 6 of the Laws of Tanzania (R.E 2002)28Section 66 of Evidence Act, CAP 6 of laws R.E 2002.

Page 14: Cybercrimes in Tanzania

14

section 64(1) to mean the document itself produced for the inspection of the court. According

to sections 67 and 68,29 secondary evidence may be admitted in court where the original

cannot be found.

From the analysis of the provisions above, it seems that the term ‘evidence’ assumes the

existence of a tangible thing, which under normal circumstances entails a piece of paper. The

ordinary construction given to the term evidence in the Act excludes evidence derived from

electronic transactions. It is thus suited only to a paper-based economy. It can therefore be

correctly stated that the Evidence Act was enacted to govern paper-based transactions. The

Act, however, does not take into account of the electronic evidences as being admissible.

Probably it is because by the time this Act was enacted, the advancement of information

technology was not such high. But the trend has changed since 1990’s and still nothing

exhaustive has been done to the Act to reflect those changes.

1.3 OBJECTIVES OF THE STUDY

In this work, the researcher intends to explore the legal system in relation to the increasing

rate of cybercrimes activities in the country. The researcher has managed to probe into

whether the current legal framework in Tanzania is adequate and sufficient in responding to

the changes in information technology which accelerates cybercrimes in the country.

The specific objectives of this study were;

1.3.1 To examine the extent to which the current legal framework in Tanzania

has achieved in fighting against cybercriminals.

1.3.2 To examine the factors hindering the fight against cybercrimes in

Tanzania.

1.3.3 To propose a suitable legal framework that is responsive to technological

changes with a view to reducing problems associated with cybercrimes in Tanzania.

1.4 SIGNIFICANCE OF THE STUDY

The general study provides a thorough review of the legal framework regulating criminal

matters in the country with a view to determining the extent to which it is responsive to the

advancement of science and technology which introduces new forms of criminal activities.

The gap identified in this study is that; while the changes in information technology

29Ibid

Page 15: Cybercrimes in Tanzania

15

associated with the massive use of computers has led to new tactics of criminal activities,

most laws in Tanzania are left behind these changes.

The study presents an argument that without provisions in the existing laws with as much

clarity and specificity as possible, and not relying on vague interpretations of the existing

laws, the problem of cybercrimes will continue to exist. To this end, the protection of

information and communication in Cyberspace will continue being at risk.

1.5 LITERATURE REVIEW

Several writers have, in one way or another, contributed towards addressing the problem

which this researcher intended to work on. Some of these writers are worthy reviewing as

follows hereunder;

Adam Mambi30 in his article shows how most African countries, Tanzania inclusive, lack

effective legal framework to combat cybercrimes. Then the article explores what initiatives

may be taken to tackle cybercriminals in Africa. Lastly, the article shows the possible

obstacles towards the implementation of those initiatives.

Adam Mambi31 in his book further contends that; the Tanzanian legal system is far behind in

adopting regulatory steps to secure electronic transactions. He gives examples of digital

signatures, reforms to business laws, and dispute settlement which have not yet been

promulgated. The book further explores how our laws should be in order for them to be able

to fight against cybercriminal activities in the country.

Andrew Mollel and Zakayo Lukumay32 in their book show that the Tanzanian Evidence Act

does not recognise electronic evidence as being admissible in Tanzanian Courts. They also

show how the problem can be cured, that is by amending some of the provisions of the Act so

that it also takes into account of the electronic evidence. Finally the book outlines the cause

as to why the Tanzanian Evidence Act is in the nature as it stands now.

David I. Bain33 in his book shows how it is difficult to fight against cybercrimes if the

country does not have a specific statute to deal with electronic transactions. He further gives

30`?Adam Mambi, Public Policy, Legal Issues on cyber Security in Africa, Dakar, Senegal, 2009 pg. 1931Adam Mambi, ICT Law Book: A Source book For Information and Communication Technologies and Cyber Law In Tanzania and East African Community, Mkuki na Nyota Publishers: Dar Es Salaam, Tanzania, 2010 pg.13.32Andrew Mollel et el, Electronic Transactions and Law of Evidence in Tanzania, Peramiho Printing Press: Iringa Tanzania, 2007 pg. 1433David I Bainbridge, Introduction to Information Technology Law, 6th Ed. Pearson Education Limited: England, 2008 pg. 417

Page 16: Cybercrimes in Tanzania

16

comparative study of the United Kingdom (U.K), where it was after the enactment of the

Computer Misuse Act of 1990 from which cybercrimes were effectively regulated. Prior to

that, cybercrimes had increasing effects in the United Kingdom society.

Dr. Eve Hawa Suinare34 in her article shows the efforts made by the Tanzanian Legal

Framework in fighting against cybercrimes. She gives examples of sections 40, 76 and 78 of

the Tanzanian Evidence Act which were amended to recognise electronic evidence as being

admissible in courts of law. However, she further gives a caution that; it is still in doubt as to

whether the electronic equipments such as a computer or server would be acceptable as

evidence under Section 40A of the amended Evidence Act especially where it has been used

to store information which is subject to the legal proceedings.

Edward A35 in his book explores the difficulties facing the traditional copyright laws in

dealing effectively with computer mediated communications. The book further gives

initiatives to be employed to cure the problem as that there must be specific laws to deal with

copyright issues arising out from the electronic transactions or modifying the existing laws to

cope with the change.

Erick Agwe-Mbarika Akuta36 in their journal shows how most governments in African

countries are caught off guard as a result of the manifestations of Cybercrime, its far reaching

and potentially devastating capacity for harm. They also show how African countries are

unable to keep up with the alarming rate at which cybercrimes have diffused.

John Ubena37 in his article shows how Tanzania is running the risk of being the

cybercriminals’ haven because there is no legislation in place to govern or address the issues

of cyber world. He further gives a comparative analysis with other countries like United

Kingdom which has adopted the Convention on Cyber Crimes and has enacted the Computer

Misuse Act of 1990. He concludes that there are no laws of the specificity to cybercrimes in

Tanzania.

34Eve Hawa Suinare, Electronic Evidence and its Admissibility in Tanzania Courts, World Series Group Publications: 2007 pg.2335Edward A. Cavazos et el, Cyber-Space and the Law: Your Rights and Duties in the On-Line World, MIT Press: Cambridge, London 1996 pg.47. 36Erick Agwe-Mbarika Akuta et el Combating Cybercrimes in Sub-Sahara Africa: A Discourse onLaw, Policy and Practice, International Research Journals: 2011 pg 137The website of John Ubena on Why Tanzania Needs Electronic Communications Legislation?, Law Keeping up with Technology, found at http://www.Irct.go.tz/documents/journal.pdf retrieved on 23rd December 2011.

Page 17: Cybercrimes in Tanzania

17

Richard A.38 in his book shows how difficult governing internet is. He further argues that

even covering cybercrimes is also difficult. He states that this difficulty can be overcome

only by enacting specific cybercrime statutes instead of relying on the vague interpretation of

the existing criminal statutes.

Saidi M. Kalunda39 in his article shows how cybercrime is uncovered in Tanzania. He

explores that Tanzania lacks a robust legal regime on cybercrime that is why it is increasingly

affected with the cybercriminals’ activities.

1.6 HYPOTHESIS OF THE STUDY

In this study the following have been established by the researcher;

▪ The current Tanzania’s legislations on criminal matters are not sufficient in dealing

with cybercrimes issues.

▪ The legislature have done no effort on the existing legal framework for them to

reflect technological advancements.

1.7 SCOPE OF THE STUDY

This study is basically confined in the following sources; the Penal Code40 the Law of

Evidence Act,41 the Criminal Procedure Act42 and case laws. The main focus in this study is

Tanzania. However, in some instances a comparative study has been made from other

communities apart from Tanzania such as Kenya, and other African communities for this

problem is also considered worldwide.

1.8 RESEARCH METHODOLOGY.

This research has employed two methods which are library research and field research.

Library research has been used to develop the theoretical part of the research. These libraries

include Tumaini University-Makumira Library for general theoretical development,

International Criminal Tribunal for Rwanda (ICTR) Library for complementary of materials

read at Tumaini University- Makumira Library. The relevant materials which have been

relied from these libraries include books, articles, journals, and reports of the researchers

done on the cybercrimes and the laws. Internet has also been relied on to download relevant 38Richard A. Spinello, Cyber Ethics: Morality and the Law In Cyber Space, 3rd Ed. Jones and Bartlett Publishers: Massachusetts, London, 2006. Pg. 27-2839Saidi M. Kalunde The Status of Cybercrimes in Tanzania, Strasbourg, France, 2011 pg 5.40As amended by the Sexual Offences Special Provisions Act CAP 16 R.E 200241CAP 6 of laws R.E 2002 42CAP 20 of laws R.E 2002

Page 18: Cybercrimes in Tanzania

18

materials that have been considered to back up the reading particularly on the latest updated

information regarding the cybercrimes and the law.

All these sources have assisted the researcher to build up and develop the theoretical part of

the research and collect insights of what other researchers have done to discover the extent of

their findings, the way forward and the areas which demand further research in cybercrimes

and the law.

CHAPTER TWO

A COMPARATIVE ANALYSIS ON LEGAL AND INSTITUTIONAL FRAMEWORK IN

COMBATING CYBERCRIMES IN TANZANIA

2.1 Introduction

In this chapter, the researcher shows how far Tanzanian legal system has gone in fighting

cybercrimes. However, in so doing, a comparative study from other jurisdictions is made.

Page 19: Cybercrimes in Tanzania

19

The researcher has tried to evaluate what has been done at international and regional level, so

that the same be incorporated at national level.

2.2 CYBERCRIMES, CRIMINALS AND THE NEED FOR SPECIFIC LAWS

Cybercrimes have been disturbing and necessitating the slight changes in legal systems of

different jurisdictions due to effects it has posed so far in those countries. Almost every

country around the globe has experienced the effects brought by it. Different International

and regional bodies have adopted various efforts so that they get rid of this new form of

crimes.

Following its global nature, it is crucial that the fight against cybercrime be cooperative as

well. Every country should employ cooperative measures with other countries or institutions

with the aim to achieving a measurable overthrow of this form of criminality. It is also

important for each country to learn experience from other jurisdictions on how this new form

of crimes can be fought against.

The rationale of this chapter is, therefore, to give a detail of cybercrimes and how cyber

criminals go about it. It also makes a comparative analysis of the efforts undertaken by

different International and Regional Institutions in combating cybercrimes. Finally, it shows

the steps taken by Tanzanian government in combating cybercrimes and areas which attracts

more concern.

In order to comprehend cybercrime and to determine how this new form of criminality be

fought, this chapter also traces the origin of cybercrimes, and the cyber-criminals. The

question as to why the science and technological evolution necessitates the need to having

specific laws to regulate the electronic transactions has been discussed in this chapter as well.

2.2.1 Law and Computer Technology

The quarter century between 1945 and 1970 is the first stage in the evolving relationship

between law and computer technology, which is now generally referred to as information

technology.43 Although, early uses of computers were mainly mathematical, the globe has

43Gringras, C, The Laws of the Internet, 2nd edition, Butterworth’s, Lexis, 2003 pg. 15

Page 20: Cybercrimes in Tanzania

20

moved a very long way from the notion of the computer as a calculating machine to an

important machine in various aspects of human life.44 The scope of the machine’s capabilities

has expanded to the extent that virtually any item of information, sound pictures, text or

graphics is in a series of zeros and ones in to a digital format.45

Although, legal aspect of the use of ICT have been addressed and dealt with by academics in

the Nordic countries since the late 1960s,46 it is only since 1990s that ICT related legal

problems have gained more general attention all around the world.47 The basic reason is that

the technology and its use has achieved a higher grade of penetration and are thus bringing

problem out from the room of academics to the practical sphere of everyday life.48

From legal point of view, these activities challenge the continuing relevance and

effectiveness of traditional legal provisions. The actions taken by International organisation

have activated some countries to either amend or enact laws to cope with IT revolution. Legal

harmonisation has been a major emphasis on the work of various international organisations.

2.2.2 Cybercrime and Criminals

As technology develops, the world must adapt. Crime is an ever present problem, and with

the proliferation of computer and computer technologies, crime using computers has become

widespread. Computer crime, or cybercrime, is defined as any criminal activity in which

computers, or a computer network, are the method or source of a crime. This encompasses a

wide variety of crimes, from hacking into databases and stealing sensitive information to

using computers to set up illegal activities.49 Cybercrime encompasses the use of a computer

as a tool in the perpetration of a crime, as well as situations in which there has been

unauthorised access to the victim’s computer, or data.50

Because cyber criminals can launch coordinated attacks from all over the globe, catching

them often requires the collaboration of many people, and this becomes more difficult as

44See note 7 above, pg 132-139, see also Watney, M. Understanding Electronic Surveillance as an investigatory method in conducting criminal investigations on the internet, 4th Ed, Butterworths, 2006, pg.113. 45Lloyd J.J, Information Technology Law, 3rd Ed. Butterwoths, Edinburgh Duldin, London, 2001, pg. 3.46Ibid, at pg. 4.47The website of Heidari, M. on. Malicious codes in depth, available in http://www.securitydocs.com accessed on 9th March 201248Seipel I.J, Law and Information Technology, Information Communication Technology Commission Report Stockholm, 2002, pg. 44-45.49See note 13 above, at p 10950Fick J, Cybercrime in South Africa: Investigating and Prosecuting Cyber crime and the benefits of public-private partnerships, Butterworths, London, 2009, pg. 4.

Page 21: Cybercrimes in Tanzania

21

cyber crime continues to grow. Cyber defenders have to constantly develop new tools, new

technologies, new procedures and even new fields of study just to keep up with cyber

criminals.51

2.3 The International Criminal Law reform in Combating Cybercrime

In this part the researcher discusses the efforts undertaken at international level, particularly

under the United Nations, in addressing and fighting against cybercrimes. In so doing, the

researcher has also tried to show how, in fighting against cybercrimes, the United Nations

differs from other international and regional organisations.

2.3.1 The United Nations

The United Nations is the only global organisation that forms a forum of its 191 member

states with fuller functions. Compared with professional organisation, the United Nations

does not limit its activities to certain domains. Compared with regional organisations, the

United Nations does not limit its activities to certain states (in the field of cyber security

protection and cybercrime prevention). The actions of the United Nations have unique

advantages in coordinating international positions.52

In 1985, the General Assembly Resolution 40/71 of 11 December called upon Governments

and international organisations to take action in conformity with the recommendation of the

commission on the legal value of computer records of 1985, in order to ensure legal security

in the background of the broadest possible use of information processing in international

transactions.

In 1990, the General Assembly of the United Nations adopted the guidelines concerning

computerized personal data files. It proposed to respond appropriately to protect the files

against both natural and artificial dangers.53

The international review of criminal policy: United Nations Manual on the Prevention and

Control of Computer-Related Crime called for further international work and presented a

proper statement of the problem. It stated that; at the international level, activities shall be

51See note 13 above, at p 10952Ibid, at p 111.53The website of United Nations on Criminalisation of Computer wrong doing –United Nations, found at www.un.org/events/11thcongress/docs/bkkcp19e.pdf, accessed on 25th March 2012.

Page 22: Cybercrimes in Tanzania

22

undertaken, including harmonisation of substantive law, and establishing a jurisdictional

base.54

Also, the UNCITRAL Model Laws55 and other related Model Laws can be useful in seeking

solutions to the above stated legal problems. For instance, some of the core provisions of the

UNCITRAL Model Law stipulate that; ‘information shall not be denied legal effect, validity

or enforceability solely on the grounds that it is in a form of a data message.’56 The

subsequent article provides that; legal requirement for writing,57 signature,58 and the use of

originals59 can be satisfied by the use of appropriate data messages and that rules of evidence

should not deny the admissibility of data messages solely because of their form.60 Countries

with common law principles that lack cyber laws like Tanzania can create a legal framework

that can take into account some relevant provisions of UNCITRAL Model Laws and other

related cyber laws.

In 2007, the United Nations adopted the United Nations Convention on the use of electronic

communications in International Contracts. Some relevant provisions of this convention that

are worth mentioning as far as electronic communications and digital signatures are

concerned are;

Legal recognition of electronic communications is dealt with by Article 8 which provides

that; ‘A communication or a contract shall not be denied validity or enforceability on the sole

ground that it is in the form of an electronic communication.’61 The question of electronic

evidence as compared to physical world evidence is stipulated under Article 9 which states

that; ‘Nothing in this Convention requires a communication or a contract to be made or

evidenced in any particular form.’62

54The website of United Nations on Criminalisation of Computer wrong doing –United Nations, found at www.un.org/events/11thcongress/docs/bkkcp19e.pdf, accessed on 25th March 2012.55The United Nations Commission on International Trade Law (UNCITRAL) is the core legal body of the United Nations system in the field of international trade law. Its mandate is to remove legal obstacles to international trade by progressively modernizing and harmonizing trade law.56See note 31above. 3557Article 6 of the UNCITRAL Mode Law, guide to enactment, 1996.58Ibid, article 759See note 58 above, article 860Ibid, article 961 See note 56 above62 Ibid

Page 23: Cybercrimes in Tanzania

23

On the other hand, legal issues and uncertainties as to the determination of time and place of

dispatch and receipt of electronic communications are covered under Articles 6, 8, and 10 of

the Convention.63

2.4 The African and the Regional Criminal Law reform in Combating Cybercrime

In this part the researcher concentrates much on discussing the measures taken by the African

Union in fighting cybercrimes. The researcher also discusses what has been made at regional

level, mainly, under the East African Community, in achieving the same goals.

2.4.1 The African Union

The African Union (AU) is now working to keep in place the legislation to combat

cybercrimes in Africa.64 Cyber criminals have over the years considered Africa as a fertile

continent to commit their criminal acts which had given the continent a bad name.65 For that

reason, the AU want to ensure that an e-legislation protocol is developed under close

cooperation with the EAC, and it will ensure that it is adopted by member states in order to

curb the menace. cyber security in Africa would provide improved and easy economic and

commercial activities such as e-laws, e-signatories, arbitration laws, e-commerce, e-

transaction and other e-services which will improve good governance on the continent.66

The African Union has also adopted the Draft African Union Convention on the

Establishment of a Credible Legal Framework for Cyber Security in Africa . The Draft

Convention gives effect to a Resolution of the last session of the Assembly of Heads of State

and Government of the African Union, and seeks to harmonize African cyber legislations on

electronic commerce organization, personal data protection, cyber security promotion and

cyber crime control.67

63 Ibid64The United Nations Economic Commission for Africa (UNECA) report, on 3rd April 201265This was said by Aida Opoku-Mensah, the director, ICT, Science and Technology division of the UNECA, in Addis Ababa at the closing press conference of the second meeting of Committee on Development Information, Science and Technology.66The website of UN, on UNECA, AU to provide e-legislation against cyber crimes in Africa, found at http://www.businessdayonline.com/NG/index.php/news/world-news/20982-uneca-au-to-provide-e-legislation, accessed on 6th April 2012.67Article 23(1) of the draft convention which states that ‘Each Member State shall adopt such legislative measures as it deems effective, to define material criminal offenses as acts which affect the confidentiality, integrity, availability and survivability of ICT systems and related infrastructure networks; as well as procedural measures deemed effective for the arrest and prosecution of offenders. Member States shall be called upon to take on board, where necessary, the approved language choice in international cyber crime legislation models such as the language choice adopted by the Council of Europe and the Commonwealth of Nations.’

Page 24: Cybercrimes in Tanzania

24

In pursuance of the principles of the African Information Society Initiative (AISI) and the

African Regional Action Plan for the Knowledge Economy (ARAPKE), the Draft

Convention is intended not only to define the objectives and broad orientations for the

Information Society in Africa, but also to strengthen existing legislations in Member States

and the Regional Economic Communities (RECs) on the Information and Communication

Technologies.68

It defines the security rules essential to establishing a credible digital space in response to the

major security related obstacles to the development of digital transactions in Africa. It lays

the foundation for an African Union-wide cyber ethics and enunciates fundamental principles

in the key areas of cyber security. It also defines the basis for electronic commerce, puts in

place a mechanism for combating intrusions into private life likely to be generated by the

gathering, processing, transmission, storage and use of personal data and sets broad

guidelines for incrimination and repression of cyber crime.

Its adoption would capitalize African and international experiences in cyber legislations and

speed up relevant reforms in African States and the RECs.

2.4.2 The East African Community

The East African Community has also started to take efforts in addressing cyber related

issues. In January 2008, the East African Community (EAC) held the first regional task force

meeting on cyber laws in Arusha, Tanzania.69 At the meeting, attendees from four EAC

member states; Burundi, Kenya, Uganda, and Tanzania, discussed a range of issues relating

to the need to reform national laws to address the increasing use of the internet as a medium

for electronic commerce and administration.70

The task force noted and recommended that the process of law reform be coordinated at a

regional level and harmonized and benchmarked against international best practice. The task

force also recommended that a comparative review of the existing laws and bills of partner

states be undertaken and a regional legal framework be developed for harmonisation of cyber

laws.71

68The website of the UN on the Draft African Union convention on the Establishment of a Credible Legal Framework for Cyber Security in Africa, found at http://www.uneca.org/aisi/elegislation/documents/Draft_ accessed on 6th April 2012.69Walden, I. East African Community Task Force on Cyber Laws, May 2008.70See note 69 above71Ibid

Page 25: Cybercrimes in Tanzania

25

In terms of developing a draft legal framework for EAC partner states, the task force

recommended that the process be divided into two phases. In phase I, cyber law reform

would focus on five topics: Electronic transactions, electronic signature and authentication,

data protection and privacy, consumer protection and computer crime. Phase II would address

topics such as intellectual property and taxation.72

The second meeting of the EAC regional task force on cyber laws was held on 23 rd – 25th

June 2008 in Kampala, Uganda. It was jointly organised by EAC and UNCTAD and

supported by the Finnish government. This meeting was held as a follow up to the first

meeting of the EAC task force on cyber laws held on 28 th – 30th January in Arusha, Tanzania.

However, in the meeting, it was revealed that nothing in this area had changed since the first

task force meeting in January 2008.73

2.5 The Efforts Taken by Individual East African Countries in Adopting Cyber Laws

and Combating Cyber Crimes.

In this part, after discussing the overall efforts taken at Africa and regional level, the

researcher discusses the efforts taken by countries forming part to the East African

Community. This is done to selected East African countries, namely; Kenya, Uganda, and,

finally, Tanzania.

2.5.1 Kenya

The government has already initiated the process of enacting cyber legislation. The Kenya

Communication (Amendment) Bill, published in August of 2008, provides for regulation of

telecoms, posts, broadcasting, electronic transactions and domain names. In the same month,

the bill went through the first reading in Parliament.74

2.5.2 Uganda

The Government of Uganda has drafted electronic laws, the electronic transaction Bill, the

Computer Misuse Bill and The Electronic Signature Bill. The bills were approved by the 72Supra note 66 above73Report of the second EAC regional task force meeting on cyber laws, Golf course Hotel Kampala Uganda, June 200874See note 73 above

Page 26: Cybercrimes in Tanzania

26

Cabinet on 16th January 2008, and went to Parliament for debate. The bills are in conformity

with the proposed East African Community (EAC) framework on cybercrimes.75

2.5.3 Tanzania

The process commenced in 2006 with the submission of a proposal for the enactment of

cyber laws by the Tanzania Law Reform Commission to the Ministry of Justice and

Constitutional Affairs.76 It proposed separate bills on cybercrimes, regulation of electronic

transactions and communications, privacy and data protection and the amendment of the

Evidence Act 1967.77 Only some of these recommendations were taken into action.

The second development was the creation of a merged Tanzania Regulatory Authority

(TCRA) to oversee postal and electronic communication industries on the mainland. The

Commission for Human Rights and Good Governance Act78 provides for the admissibility of

electronic evidence. However, this is not adequate and the bills proposed by the Tanzania

Law Reform Commission still need to be enacted.

It was revealed by the Law Reform Commission legal officer who provided the position of

the commission as far as cyber laws are concerned.79 He said; ‘Tanzanian Law Reform

Commission has completed a report on electronic commerce, that examines all the issues of

concern, but there is no draft legislation.’80 However, under part IX of the Written Laws

(Miscellaneous) Act 2007, reforms have been adopted in respect of the use of electronic

evidence in certain context.81

In the report, the commissioner is intending to review the laws affected by the development

and use of E-commerce. The rationale behind is to protect the consumers and facilitate

business transactions. The commission recommended also on the enactment of the new laws

to cover the crucial area that has a high impact on the economic development in Tanzania and

75 Ibid76See note 13 above, at pg 10477Economic Commission for Africa, first meeting of the committee on Development Information, Science and Technology(CODIST), Addis Ababa, Ethiopia, 2009 at Pg.978Act No. 16 of 200779See note 13 above, at, pg 122 80See 13 note 81Ibid, at pg 122

Page 27: Cybercrimes in Tanzania

27

East Africa in general. The laws proposed include Law of Contract Act,82 the Bill of Exchange

Act,83 Sale of Goods Act84 and Banking and Financial Institutions Act.85

CHAPTER THREE

THE IMPACT OF CYBERCRIMES ON THE TANZANIA’S LEGAL SYSTEM

3.1 Introduction

This chapter generally discusses on how the emergency of this new form of crime

(cybercrimes), as associated with the development of Information Communication

Technology, impacts on the Tanzanian legal system. The researcher focuses much on the law

of evidence as the main area which brought many challenges as a result of criminal activities.

To that end, the discussion will provide a critical analysis of digital evidence and how it

82CAP 345 of the Laws of Tanzania (R.E 2002)83CAP 215 of the Laws of Tanzania (R.E 2002)84CAP 214 of the Laws of Tanzania (R.E 2002)85CAP 342 of the Laws of Tanzania (R.E 2002)

Page 28: Cybercrimes in Tanzania

28

differs from paper based evidence. Moreover, the discussion will provide challenges

associated with Electronic/Digital Evidence in Tanzania.

On top of that, analysis will be made on the improvements made to the law of evidence and

suggest which more is to be done so as to make the law fully compatible with the

admissibility of electronic evidence in Tanzanian courts.

3.2 Evidence

The legal definition or question of evidence is of different schools of thoughts. In the original

sense, the word ‘evidence’ signifies the state of being evident, that is to be plain, or apparent.

In other words, the means which tend to prove or disprove any matter of fact the truth of

which is for judicial investigation.86

The Evidence Act, 196787 defines the term evidence as being, ‘the means by which an alleged

matter of fact, and the truth of which is submitted to investigation, is proved or disproved,

and without prejudice to the proceeding generally, includes statements and admissions by

accused person’.88 From this definition, it is clear that the term evidence signifies two main

senses; first, that which is received in court to prove or disprove an alleged matter of fact

which is inquired in court, secondly, those rules of law used in judicial proceedings, which

lay down as to what matter is or is not admissible.89

There are various methods or kinds of evidence, few of which are oral evidence, direct

evidence, circumstantial evidence, real evidence, intrinsic and extrinsic evidence, hearsay

evidence, original evidence, conclusive evidence, derivative evidence, documentary

evidence, primary and secondary evidence.90 Due to technological advancement, computer

digital evidence has emerged as another category of evidence in the list.91

3.3 Digital Evidence and Cybercrime

Digital or Electronic Evidence means any data stored or transmitted using a computer that

supports or refutes a theory that addresses critical elements of the offense such as intent or

86Mapunda, B.T.Evidence part one, Relevancy of facts, 2005 Pg. 187CAP 6 of the Laws of Tanzania (R.E 2002)88Section 3 of the Evidence Act, CAP 6 of the Laws (R.E 2002). 89See note 13 above, at pg. 9690The website of Terry M. Anderson on Criminal Evidence: Principles and Cases, found at www.amazon.com/Criminal-Evidence-Principles-Thomas-Gardner/dp accessed on 1st April 201291Ibid

Page 29: Cybercrimes in Tanzania

29

alibi.92 Digital evidence has previously been defined as any data that can establish that a

crime has been committed or can provide a link between a crime and its victim or a crime and

its perpetrator.93 However, these definitions focus too heavily on proof and neglect data that

simply further an investigation.

The use of digital evidence has increased in the past few decades as courts have allowed the

use of emails, digital photographs, TM transaction logs, word processing documents, and

instant message histories, files saved from accounting programmes, spreadsheets, internet

browser histories, databases, the contents of computer memory, computer backups, computer

printouts, global positioning system tracks, logs from a hotel’s electronic door locks, and

digital video or audio files.94

As compared to the more traditional evidence, the digital evidence tends to be more

voluminous, more difficulty to destroy, easily modified, easily duplicated, potentially more

expensive, and more readily available.95

In today’s era of rapid growth, information technology is encompassing all occupations all

over the world. These technological developments in internet and computer globally has led

to the growth of new forms of transnational crime especially internet related.96 These crimes

have virtually no boundaries and may affect any country across the globe.97 Moreover,

criminals are using technology to facilitate their offenses and avoid apprehension, creating

new challenges for attorneys, judges, law enforcement agents, forensic examiners, and

92An alibi is evidence showing that a defendant was somewhere other than the scene of a charged crime at the time that the crime occurred. Film and TV characters often pronounce the word "alibi" with a sneer, suggesting that alibi claims are inherently untruthful. In reality, an alibi is a perfectly respectable legal defence. Defendants may offer an alibi defence without giving up their constitutional right to remain silent. Any witness who can place the defendant at a location other than the scene of the charged crime can provide an alibi. Alibi can be used in formal contexts, such as providing evidence to the police for a crime that has been committed and they can also be used in informal contexts, such as in conversation between friends. Alibis vary in how convincing they are. For example, teenagers are well known for pretending to be at each other's houses while sneaking out for the night, so sensible parents check with the parents of the other child before believing an alibi. Yet sometimes false alibis can cover up dishonest behaviour for years, and are often so convincing that online alibi services are even available for people trying to get away with something. An alibi can be useful to clear your name. But using a false alibi is deceitful, and will eventually land you in trouble. Using a friend as a false alibi can cost you and/or your friendship, and if you haven't told your friend in advance that you intend to use them as an alibi, may not effectively cover up what you are trying to hide. Found at http://addictions.about.com/od/legalandethicalissues/g/What-Is-An-Alibi.htm, accessed on 4th April 2012.93Casey, E. Digital evidence and computer crime: forensic science, computers and the internet, 2004, pg. 2394See note 93 above, at pg.2495Ibid96See note 13 above, at pg 10097Ibid

Page 30: Cybercrimes in Tanzania

30

corporate security professionals.98 Organized criminals around the globe are using technology

to maintain records, communicate, and commit crimes.

Digital evidence can be useful in a wide range of criminal investigations including homicides,

sex offenses, missing persons, child abuse, drug dealing, and harassment. In addition, civil

cases can hinge on digital evidence, and digital discovery is becoming a routine part of civil

disputes. Computerized records can help establish when events occurred, where victims and

suspects were, whom they communicated with, and may even show their intent to commit a

crime.99

Robert Duralls’s Web Browser history showed that he had searched for terms such as ‘‘kill

+spouse,’’ ‘‘accident + deaths,’’ and ‘‘smothering’’ and ‘‘murder’’ prior to killing his wife.

These searches were used to demonstrate premeditation and increase the charge to first –

degree murder. Sometimes information stored on a computer is the only clue in an

investigation. In one case, e-mail messages were the only investigative link between a

murderer and his victim.100

For example, in the American Maryland case,101 Maryland women named Sharon Lopatka

told her husband that she was leaving to visit friends. However, she left a terrifying note that

caused her husband to inform police that she was missing. During their investigation, the

police found hundreds of e-mail messages between Lopatka and a man named Robert Glass

concerning their torture and death fantasies. The contents of the e-mail led investigators to

Glass’s trailer in North Carolina and they found Lopatka’s shallow grave nearby. Her hands

and feet had been tied and she had been strangled. Glass pled guilty, claiming that he killed

Lopatka accidentally during sex.102

The researcher found it necessary to refer to the American case due to lack of a relevant

Tanzanian case to illustrate the point elaborated above.

Digital data are all around us and should be collected in any investigation routinely. More

likely than not, someone involved in the crime used a computer, personal digital assistant,

mobile telephone, or accessed the internet. Therefore, every corporate investigation should

98Ibid99Ibid, at pg.102100Supra note 13 above.101 (1996) 48 Cal. App. 4th 1822 [56 Cal. Rptr. 2d 498]102See note 13 above, at pg 103

Page 31: Cybercrimes in Tanzania

31

consider relevant information stored on computer systems used by their employees both at

work and at home.

Every search warrant should include digital evidence to avoid the need for a record warrant

and the associated lost time and evidence. Even if digital data do not provide a link between a

crime and its victim or a crime and its perpetrator, they can be useful in an investigation.

Digital evidence can reveal how a crime was committed, provide investigative leads, disprove

or support witness statements, and identify likely suspects.103

3.4 The Nature of Electronic Evidence

Different from paper based documents, which are visible and tangible, much of electronic

evidence are invisible with naked eye. It takes a number of technological steps for electronic

evidence to be determined. It tends to be hidden among immense data files. This evidence is

measured by kilobytes, megabytes, gigabytes, and terabytes.104 Thus, in the electronic or

digital world, the information is divided in two parts. The binary strings of zero and one that

make up the genetic code of data and allow information to be fruitful and multiply, and allow

people to create, manipulate and share data.105

In the event one sends this information to another person using computers, the information is

transmitted through many phases. First, the sender creates it. Then the information to be

communicated is broken down in to small packets that contain some portion of the contents

of the communication as well as the sender and recipient’s Internet Protocol addresses and

some accounting information.106

The packets are individually transmitted from the sender’s computer to a nearby packet

switch and then forward to the next available switch in the direction of their ultimate

destination. Different packets may take different routes through the network as they travel

from the sender to recipient, depending on link availability and loading in the network. Upon

receipt, the packets are reassembled into an exact replica of the original file.107

Therefore, information passes through several stages of disassembly, storing and forwarding

and reassembly, before becoming available to the recipient. The recipient may store the file

103Ibid, at pg.103104See note 32 above, at pg. 77105See note 32 above, at pg. 77106Ibid107Ibid

Page 32: Cybercrimes in Tanzania

32

for future reference for some period before deleting it. The issue is how to ensure

trustworthiness, reliability, integrity, and security of electronic evidence. It is argued that,

since digital evidence usually takes the form of writing, or at least a form, which can be

analogous to writing, it must be authenticated and satisfy the requirements of the best

evidence rule.108

3.5 Challenges Brought by Electronic or Digital Evidence

The problem with electronic evidence lies in the temporary nature of digital data.109It is very

easy to view, copy, modify, or destroy a digital record; be it a number, document, or image.

Digital technology permits perfect reproduction and easy dissemination of print, graphics,

sound, and multimedia combination, the combination of a high percentage of a fraud with

employee involvement and the possibility that an individual can modify raw data with

immediate access to the system.110

In addition, evidence collected from the system has a questionable and unverifiable level of

integrity.111 By their very origin and nature, mode of transmission, storage and usage,

electronically generated evidence pose certain challenges when used in evidence, challenges

bordering on authenticity, integrity and confidentiality of the pieces of evidence.112

3.5.1 Authentication

108When dealing with the contents of writing, recording, or photograph courts sometimes require the original evidence. This was originally intended to prevent a witness from misrepresenting such materials by simply accepting their testimony regarding the contents. With the advent of photocopiers, scanners, computers, and other technology that can create effectively identical duplicates, copies became acceptable in place of the original, unless "a genuine question is raised as to the authenticity of the original or the accuracy of the copy or under the circumstances it would be unfair to admit the copy in lieu of the original" (Best Evidence Rule).Because an exact duplicate of most forms of digital evidence can be made, a copy is generally acceptable. In fact, presenting a copy of digital evidence is usually more desirable because it eliminates the risk that the original will be accidentally altered. Even a paper printout of a digital document may be considered equivalent to the original unless important portions of the original are not visible in printed form. For example, a printed Microsoft Word document does not show all of the data embedded within the original file such as edits and notes. See Casey op.cit, Ch 7.2109See note 32 above, at pg. 78110See note93 above, at pg. 30111See note 32 above112Ibid

Page 33: Cybercrimes in Tanzania

33

Authentication means satisfying the court that (a) the contents of the record have remained

unchanged, (b) that the information in the record does in fact originate from its purported

source, whether human or machine, and (c) that extraneous information such as the apparent

date of the record is accurate. As with paper records, the necessary degree of authentication

may be proved through oral and circumstantial evidence113, if available, or via technological

features in the system or the record.114

Authentication is actually a two-step process, with an initial examination of the evidence to

determine that it is what its proponent claims and, later, a closer analysis to determine its

probative value.115 In the initial stage, it may be sufficient for an individual who is familiar

with the digital evidence to testify to its authenticity.

For instance, the individual who collected the evidence can confirm that the evidence

presented in court is the same as when it was collected. Alternatively, a system administrator

can testify that log files presented in court originated from her/his system. In some cases, the

defence will cast doubt on more malleable forms of digital evidence, such as logs of online

chat sessions.116

Normally, when information is entered on a computer memory, or an e-mail is sent or an

order is placed for goods or services through the internet, the sender is unable to authenticate

the information he has sent by way of a signature. It is the same if he speaks with another

person on the telephone, leaves a message on that other person’s voicemail or sends a text

message (sms). Even if he uses a password or an acronym they may not be peculiar to him

the way a signature written by him would be.117

The password or acronym can also be endorsed or used by anybody else who knows them far

more easily than a signature can be imitated. A voice on the phone can also be imitated. In a

work place, any person can enter information into a computer memory, purporting it to be

entered by another person.118

113Circumstantial Evidence is a testimony by witnesses as to the circumstances from which an inference is to be drawn as to the fact in issue. In case of absence of direct evidence then circumstantial evidence can be resorted to. It is the evidence which relates to a series of other facts than the fact in issue, but by experience has been found so associated with the fact-in-issue in relation to cause and effect that it leads to a satisfactory conclusion.114See note 93 above115See note 113 above?See note 93 above116See note 93 above117Ibid118Ibid

Page 34: Cybercrimes in Tanzania

34

As a result, when customer’s account records are called up in a bank’s computer system there

is hardly any way of knowing which person made which entry. This makes it difficult to

ascertain whether that person was an appropriate officer to make the entry. Even if one of

several appropriate officers makes a wrong entry, it may not be traceable to him since he has

not signed it, because there is no way he would have done so.119

This means that if such a false entry or message is presented to the Court, there will hardly be

a way of detecting the false nature and the Court can easily be misled. The presence of

signatures in equivalent non-electronic documents or materials makes them more authentic

and harder to forge or imitate. Of course, signatures can be forged on non-electronic

documents but a Court can compare an allegedly forged signature with other signatures of the

same person and come to an intelligent decision on the point. If the Court is unable to decide

on the matter, a signature expert can be called in and detect if there is any forgery.120

Furthermore, even in the absence of a signature, if a document is written in long hand, a

comparison with the alleged writer’s other writings can be done. For an entry in software

(bank account entries, e-mail, websites), there is no opportunity for those steps to be taken.121

Electronically generated materials therefore do not lend themselves to effective tests of

authenticity that are normally possible with the conventional documents.122

Once digital evidence is admitted, its reliability is examined to determine its probative value.

For instance, if there is concern that the evidence was tampered with prior to collection, these

doubts may reduce the weight assigned to the evidence. In several cases, attorneys have

argued that digital evidence was untrustworthy simply because there was a theoretical

possibility that it could have been altered or fabricated.123

However, as judges become more familiar with digital evidence, they are requiring evidence

to support claims of untrustworthiness. Even when there is a reasonable doubt regarding the

reliability of digital evidence, this does not necessarily make it inadmissible, but will reduce

the amount of weight it is given by the court.124

3.5.2 Integrity

119See note 112 above120See note 93 above121See note 93 above122Chukwuemerie, A.I. Affidavit Evidence and Electronically Generated Materials in Nigerian Courts Volume 3, 2006 at Pg. 185123See note 93 above124Ibid

Page 35: Cybercrimes in Tanzania

35

Integrity is another problem of authenticity. It can however be seen as more of an issue of

whether or not the information has got distorted or tampered with even after it emanated

from a correct source. An audio or visual tape can be edited or tampered with through the

introduction or removal of some bits and superimposition of images. Through any such

interference, the later form of the contents is fundamentally different from the first or original

form.125

Through hacking of computers, crashing through passwords and kindred wrongdoings,

information stored in computer memories and e-mails can be altered even without the

knowledge of the maker, sender and, or receiver as the case may be. Telefaxes can be

intercepted and possibly changed just as text messages can be intercepted, listened in to and

even edited by an unscrupulous operator. On the other hand, if a letter is sent through the

post office or through a courier service, it may be only remotely possible, if at all, for it to be

tampered with. A hard copy of a document is generally more difficult to tamper with than an

electronic copy.126

3.5.3 Confidentiality.

Confidentiality ensures that only authorised parties’ access computer-related assets. That is,

only those who should have access to something will actually get that access. By “access”

here it means not only reading but also viewing, printing, or simply knowing that a particular

asset exists. Confidentiality is sometimes called secrecy or privacy.

The electronically generated materials hardly enjoy confidentiality since they are legitimately

or illegitimately accessible to third parties or undesirable readers or users. Any information

posted on the internet or used in what has come to be called e-filing of Court processes and

e-trial and related procedures, is accessible to many more people than the immediate parties

and Court staff that directly deal with or treat the documents.127

3.6 Relevancy and Admissibility of Digital Evidence in Tanzanian Courts

125 Ibid126See note 120 above127Ibid

Page 36: Cybercrimes in Tanzania

36

In a simple language, relevancy determines whether one fact is related to another. A fact is

relevant to case when it is related to the facts in issue. Lord Simon attempted to define the

term ‘relevant evidence’, in the case of DPP v. Kilbourne128 as follows;

‘Evidence is relevant if it is logically probative or disapprobative of some matter

which requires proof....evidence which makes the matter which requires proof more or less

probable’129

However, a classic definition of relevance is contained under Article 1 of Stephen’s Digest of

the Law of Evidence according to which the relevance means;

‘any two facts to which it is applied are so related to each other that according to the

common course of events one either taken by itself or in connection with other facts proves or

renders probable the past, present or the future existence or non existence of the other.’130

Evidence must be sufficiently relevant to be admissible but sufficiently relevant evidence is

only admissible as far as it is not excluded by any rule of law of evidence. Admissibility

presupposes relevancy and is found on the law and not logic. The consequence of this is that

some evidence, however relevant it may be, it may as well be excluded. It is the law that

determines whether a particular fact can be admitted or accepted in evidence.131 With

increased computerisation and ICT, courts have been forced to admit digital evidence.132

The Tanzanian law of Evidence Act133 does not have provisions recognizing electronic

documents as admissible evidence whether primary or secondary. Yet Tanzanian companies

take orders, conclude contracts, send invoices and generally conduct business electronically

without additional documentation to support the business transacted electronically.134

Only minor amendments have been made to the Tanzania Evidence Act to give partial

recognition to evidence generated electronically. Part IX of the amending Act proposes to

amend the Evidence Act.135 The amendment was done to include new sections 40A, 78A, and

128[1973] A.C.729 at Pg. 756129See note 13 above, at pg 111130See note 86 above, at Pg. 7131See note 86 above132Juma,I.H. Admissibility of Electronically obtained evidence at Pg. 2133Act No. 6 of 1967, CAP 6 of the Laws (R.E 2002)134The website of Rex Attorneys on Tanzania: Admissibility Of Electronic Evidence, found at http:// www.mondaq.com/article.asp?articleid accessed on 9th April 2012135CAP 6 of the Laws of Tanzania (R.E 2002)

Page 37: Cybercrimes in Tanzania

37

78B.136 Nevertheless, this initiative alone is seriously inadequate in so far as electronic

transactions and their nature are concerned.

In the first place, the amendment does not cover all aspects of challenges posed by electronic

transactions on the law of evidence. Only some few sections of the Evidence Act were

amended, leaving untouched a number of other provisions of the same law which relate to

documentary evidence.137

The amendment is also inadequate if one takes into account the fact that there are various

other laws in the country which touch upon the documents as potential pieces of evidence.138

Furthermore, the amendment does not cover all issues relating to ICT, electronic commerce

and Internet transactions in general, particularly in relation to legal certainty.

Another shortcoming of the above amendment is lack of mechanism for authenticity. Since

one of the main concerns in the admissibility of electronically generated documents centres

on the question of their security, reliability and credibility, any attempt to provide legal

recognition of this type of documents has to go hand-in-hand with the provision for

mechanisms of authentication, so as to reduce the risks resulting from the above concerns.139

The current amendment of the Tanzania Evidence Act140 does not mention anything about the

manner of authentication of electronically obtained documents when they are used as

evidence.

It was not until 2000 when the wisdom of the High Court of Tanzania was called upon to rule

whether electronic evidence is admissible as best evidence in the case of Trust Bank Ltd v.

Le-Marsh Enterprises Ltd.141. In this case, Nsekela J (as he then was), adopting the view of

the English Judge in the Barker’s case, extended the definition of bank records to include

computer print-outs. He noted, further, that; ‘the law must keep abreast of technological

changes as they affect the way of doing business.’ This was a departure from the strict rule of

best evidence rule.

136See note 133 above, at pg 90137Ibid, pg. 91138See note 133 above, at pg. 91139See note 133 above, at pg. 91140CAP 6 of the Laws of Tanzania (R.E 2002) 141Commercial case No. 4 of 2000 (Unreported)

Page 38: Cybercrimes in Tanzania

38

On the role of the courts in admitting electronic evidence, the judge stated that; ‘the court

should not be ignorant of modern business methods and shut its eyes to the mysteries of the

computer.’142 This decision shows the judicial activism and the role of Judiciary in filling the

gaps left by the legislature.

The ruling by Nsekela J (as he then was) above presupposes that courts should not be blind of

technological advancement in so far as they affect the legal system of the country. They

should play their role in making sure that cybercriminals do not go unpunished on a mere

ground that laws do not effectively cover cybercrimes matters.

Subsequently, cases involving computer-generated evidence have been referred to courts of

law. For instance, Tanzania Bena Co. Ltd v. Bentash Holdings Ltd143 relates to e-mail

evidence. In this case, parties exchanged communications by way of e-mails on purchase of a

farm and crushes. The e-mails were tendered in court and admitted as one of the exhibits. The

court (Per Kimalo J, as he then was), found that the exchange of e-mails between the parties

draws a conclusion that the defendant took possession of the farm and crushes.144 In other

words, the e-mails were admitted as admissible electronic evidence.

Another case is that of National Bank of Commerce v. Milo Construction Co. Ltd and two

others145 which involved a claim on recovery of an amount of money alleged to have arisen

out of an overdraft facility. It was alleged that the plaintiff defaulted repayment of the said

facility. Two statements were tendered in court. One was the processed easy bank computer

program, and the other was the processed inflexible banking computer program. The court

found discrepancies between the two statements as some entries were not reflected in one of

the statements. The plaintiff did not adduce sufficient explanation on the discrepancies. The

court therefore found that the plaintiff has failed to prove the exact amount the first defendant

borrowed from the plaintiff.

The analysis of this case reveals that the plaintiff had bank-produced statements generated by

two different computer programs. The later program did not have features similar to the

earlier one. Unfortunately, the Bank failed to lead expert evidence to clear the discrepancies

noted. The court was therefore justified in rejecting the claim in the absence of sufficient

explanations regarding the operation of the two computer programs. One would expect the

142See note 13 above, at pg.113143Commercial case No. 71 of 2001 (Unreported)144See note 133 above, at pg. 113145Commercial case No.293 of 20002(Unreported)

Page 39: Cybercrimes in Tanzania

39

bank to make use of the software programmers who created the two computer programs.

Perhaps it is an opportune moment for the courts to make use of forensic experts, who would

assist it in analysing computer related evidence.146

The Legislature, on the other hand, responded by enacting Electronic Evidence Amendment

Act 2007147 which provided provision for the reception of electronic evidence in courts of law

in Tanzania. The new section has been added in the Tanzania Evidence Act 1967, the said

section is section 40 A.

This section provides, inter alia, that; in any criminal proceedings, information retrieved from

computer systems, networks or servers; or records obtained through surveillance of means of

preservation of information including facsimile machines, electronic transmission and

communication facilities shall be admissible as evidence.

CHAPTER FOUR

CONCLUSION AND RECOMENDATIONS

4.1 Introduction

The researcher, after making a thorough examination on how the advancement of science and

technology have impacted on the Tanzanian legal system, comes up with the following

conclusion and recommendations.

4. 2 CONCLUSION

This research aimed at examining the current legal system in Tanzania as far as cybercrimes

are concerned. That was to be done through examining the efforts taken to combat

cybercrimes and areas for more concern. Comparison as to what has been done in other

jurisdictions to fight against cybercrimes was inevitable as well.

Some of the laws which the researcher has examined are; The Evidence Act,148 Criminal

Procedure Act,149 and the Penal Code,150 whereby the researcher observed and concludes that

146See note 133 above, at pg. 114147Act No. 46 of 2007148CAP 6 of the Laws of Tanzania (R.E 2002)149CAP 20 of the Laws of Tanzania (R.E 2002)150CAP 6 of the Laws of Tanzania (R.E 2002)

Page 40: Cybercrimes in Tanzania

40

none of these laws deals with the issue of cybercrimes with overriding specificity and

seriousness as required.

The researcher has come to the conclusion that the existing laws in Tanzania are not capable

enough to combat cybercrimes. The amendments made to some of the laws such as the

Evidence Act, are still not adequate enough to keep pace with the increasing rate of

cybercrimes.

The researcher has also examined that, following the lack of specific cyber laws, and

continued relying on the vague interpretation of existing criminal laws, Tanzania is

increasingly becoming the cybercriminals’ haven as cyber activities are getting roots therein.

4.3 RECOMMENDETATIONS

After coming across all challenges brought by technological development worldwide and

Tanzania, there is no room for Tanzania to isolate itself from the rest of the world. Serious

efforts should be taken by responsible organs to bring cyber laws within the jurisdiction of

this country. To curb these challenges, the researcher has come up with the following

recommendations to be considered;

4.3.1 The Need to Enacting Cyber Laws

The only quick and sure attempt by which Tanzania will defeat cybercrimes is the enactment

of specific laws dealing with cybercrimes and not relying on the vague interpretation of the

existing penal laws.

Tanzania will need to learn experience of other countries like India, South Africa, Nigeria

and the UK that have accommodated the challenges of Information Communication

Technology through enactment of legislation that address properly issues relating to

cyberspace. Tanzania can also enjoy the lesson from the provisions of Convention on Cyber

Crime,151 Model Law on Electronic Evidence,152 and the Commonwealth Model Law on

Computer and Related Crime.153 The government should be flexible enough to cope with the

changes that are taking place rather than using traditional legislations in the digital age.

151Convention on Cybercrime ,Budapest, 23.XI.200152The Uncitral model law on electronic commerce, with guide to enactment 1996 with additional article 5 bis as adopted in 1998153Bourne, 2002

Page 41: Cybercrimes in Tanzania

41

Speaking in 2005 on the need for the law to adapt itself to the times for the achievement of

justice, the Nigerian Honourable Justice, Pats-Acholonu of the Supreme Court stated,154

‘The beauty of the law in a civilised society is that....It should be progressive and act

as a catalyst to social engineering. Where it relies on mere technicality or out-moded or

incomprehensible procedures and immerses itself in a jacket of hotchpotch legalism that is

not in tune with the times, it becomes anachronistic and it destroys or desecrates the temple

of justice it stands on’ 155

In addition to that, we can also benefit from the wisdom of Lord Denning, who said that;156

‘What is the argument on the other side? Only this that no case has been found in

which it had been done before. That argument does not appeal to me in the least. If we never

do anything which has not been done before, we shall never get anywhere. The laws will

stand still whilst the rest of the world goes on and that will be bad for both’157

The arguments by these two scholars all suggest the need of having a specific law on a

particular matter and the need for those laws to change timely following the changes in the

social circumstances. Tanzania can be said be one of the big targets of these arguments as far

as cybercrimes are concerned.

4.3.2. Training of the Judges, Lawyers and Law Enforcers.

There is no doubt that, most of the lawyers, magistrates, judges and law enforcers got their

education and training while cybercrime was not an issue. To ensure that justice is not only

done but seen to be done, training of these people is very important to equip them with basic

knowledge of cyber law.

4.3.3. Judicial Response

The researcher recommends that judges should continue to play a vital role in extending the

existing principles governing paper-based documents and authentication to cover documents

and signatures in electronic form. It is recommended that judges should categorically hold

154Chukwuemerie, A.I. Affidavit Evidence and Electronically Generated Materials in Nigerian Courts Volume 3, 2006 at Pg. 198155Ibid156Ibid157See 154 note above, at Pg. 198

Page 42: Cybercrimes in Tanzania

42

that evidence in a computer hard disk, flash disk; compact disk or floppy disk is relevant and

admissible to prove or disprove a fact in issue in legal proceedings.

The effect of this is to allow parties to present in court not only computer printouts, but also a

piece of information in the above mentioned devices. For instance, in the case of National

Bank of Commerce v. Milo Construction Co. Ltd and two others,158 the court missed the

opportunity of inspecting the two computer programs which generated the statement that

were admitted in court.

The examination of the two programs, with the aid of a forensic expert, would have cleared

the doubts whether replacing an old computer program for a new one leads to having two

different standards of calculating interest resulting in two different statements. With the

absence of a computer forensic, a person knowledgeable with the operation of the two

computer programs could have been called to testify in his respect.

The similar view was taken in an English case of R v. Shepherd.159 Though his case was

criminal in nature, but the principle set is relevant to the point under discussion. It was held

that; ‘proof that a computer was reliable could be provided by calling a witness who was

familiar with its operation in the sense of knowing what the computer was required to do and

who could say that it was doing it properly, and such a witness need not be someone

responsible for the operation of the computer.’160

4.3.4. Raising Public Awareness and Education

There is a need of educating the whole community on the harms of cybercrimes and the

techniques applied by the cyber criminals. For example, as most of the organisations and

financial institutions are operating with the assistance of computer, people should be

educated on how they can handle their computers and passwords for the sake of securing

their information.

Tanzanians are characterized by generosity that affects not only material exchange, but also

information exchange. Because of this generosity, you may ask to know about one thing and

end up with a lot of more information being provided. One with malicious may be tempted to

misuse the information. Furthermore, in connection with culture, there was observed lack of

158Commercial case No. 293 of 2002 (Unreported)159(1993)1 All ER 213160See note 133 above, at pg. 119

Page 43: Cybercrimes in Tanzania

43

discipline concerning password that appears to be a very significant problem. It is very

common to have passwords shared among employees.

4.3.5. The Need for Firms to secure their networked information

The first thing organisations can do is to take reasonable steps to ensure that their networks

are well protected. Even where laws are adequate, organisations dependent on their network

must make their own information and systems secure. This can be done through the

installation of software such as antivirus software and firewalls.

4.3.6. Coordination and Cooperation

There is no doubt that cybercrime is global in nature, to curb this problem, Tanzania will

need to cooperate with other countries and international organisations to effect this war. In

addition, Tanzania will have also to ratify the convention on cybercrime and to invite legal

and IT experts within and outside Tanzania to address the issue and thereafter to provide

ways of handling this global harm.

Page 44: Cybercrimes in Tanzania

44

BIBLIOGRAPHY

BOOKS

Adam Mambi, ICT Law Book: A Source book For Information and Communication Technologies and Cyber Law In Tanzania and East African Community, Mkuki na Nyota Publishers: Dar Es Salaam, Tanzania, 2010

Andrew Mollel et el, Electronic Transactions and Law of Evidence in Tanzania, Peramiho Printing Press: Iringa Tanzania, 2007

Casey, E. Digital evidence and computer crime: forensic science, computers and the internet, 2004.

Chukwuemerie, A.I. Affidavit Evidence and Electronically Generated Materials in Nigerian Courts Volume 3, 2006.

David I Bainbridge, Introduction to Information Technology Law, 6th Ed. Pearson Education Limited: England, 2008

Dr. Eve Hawa Suinare, Electronic Evidence and its Admissibility in Tanzania Courts, World Series Group Publications: 2007

Edward A. Cavazos et el, Cyber-Space and the Law: Your Rights and Duties in the On-Line World , MIT Press: Cambridge, London 1996.

Page 45: Cybercrimes in Tanzania

45

Fick J, Cybercrime in South Africa: Investigating and Prosecuting Cyber crime and the benefits of public-private partnerships, Butterworths, London, 2009.

Grabosky, P. Cybercrime and Information Warfare, Paper presented at the Transnational Crime Conference convened by the Australian Institute of Nexis, UK. Edinburgh Dublin. Sciences, 2009 – Vol. 6, No. 4.

Gringras, C, The Laws of the Internet, 2nd edition, Butterworth’s, Lexis, 2003.

Klodwig Mgaya, Development of Information Technology in Tanzania, United Nations University (UNU) Press: Tokyo, Japan, 1994.

Lloyd J.J, Information Technology Law, 3rd Ed. Butterworth’s, Edinburgh Duldin, London, 2001.

Mapunda, B.T.Evidence part one, Relevancy of facts, 2005.

Richard A. Spinello, Cyber Ethics: Morality and the Law In Cyber Space, 3rd Ed. Jones and Bartlett Publishers: Massachusetts, London, 2006.

Seipel I.J, Law and Information Technology, Information Communication Technology Commission Report Stockholm, 2002.

Watney, M. Understanding Electronic Surveillance as an investigatory method in conducting criminal investigations on the internet, 4th Ed, Butterworths, 2006

CASES

DPP v. Kilbourne (1973) A.C.729 at Pg. 756

Maryland case (1996) 48 Cal. App. 4th 1822 [56 Cal. Rptr. 2d 498]

National Bank of Commerce v. Milo Construction Co. Ltd and two others, Commercial case No.293 of 20002(Unreported)

R v. Shepherd. (1993)1 All ER 213

Trust Bank Ltd v. Le-Marsh Enterprises Ltd, Commercial case No. 4 of 2000 (Unreported)

Tanzania Bena Co. Ltd v. Bentash Holdings Ltd, Commercial case No. 71 of 2001 (Unreported)

ELECTRONIC SOURCES

Page 46: Cybercrimes in Tanzania

46

The website of John Ubena on Why Tanzania Needs Electronic Communications Legislation?, Law Keeping up with Technology, found at http://www.Irct.go.tz/documents/journal.pdf retrieved on 23rd

December 2011.

The website of Eileen P. Drew and F. Gordon on the Information Technology in Selected Countries: Reports from Ireland, Ethiopia, Nigeria and Tanzania found at http://www.lrct.go.tz/documents/jpurnal.pdf retrieved on the 21st December 2011. The website of the UN on the Draft African Union convention on the Establishment of a Credible Legal Framework for Cyber Security in Africa, found at http://www.uneca.org/aisi/elegislation/documents/Draft_ accessed on 6th April 2012.

The website of Heidari, M. on. Malicious codes in depth, available in http://www.securitydocs.com accessed on 9th March 2012

The website of United Nations on Criminalisation of Computer wrong doing –United Nations, found at www.un.org/events/11thcongress/docs/bkkcp19e.pdf, accessed on 25th March 2012.

The website of UN, on UNECA, AU to provide e-legislation against cyber crimes in Africa , found at http://www.businessdayonline.com/NG/index.php/news/world-news/20982-uneca-au-to-provide-e-legislation, accessed on 6th April 2012.

The website of Terry M. Anderson on Criminal Evidence: Principles and Cases, found at www.amazon.com/Criminal-Evidence-Principles-Thomas-Gardner/dp accessed on 1st April 2012.

The website of Rex Attorneys on Tanzania: Admissibility Of Electronic Evidence, found at http:// www.mondaq.com/article.asp?articleid accessed on 9th April 2012

JOURNALS/ THESIS

A. Abdallah, The impact of ICT revolution in Tanzania’s legal system: A critical analysis of cybercrimes and computer forensic evidence. A compulsory research paper submitted in partial fulfilment for the requirement for the degree of master of laws ( LLM) by thesis of the open university of Tanzania.

Adam Mambi, Public Policy, Legal Issues on cyber Security in Africa, Dakar, Senegal, 2009

Dr. Eve Hawa Suinare, Electronic Evidence and its Admissibility in Tanzania Courts, World Series

Group Publications: 2007

Erick Agwe-Mbarika Akuta et el Combating Cybercrimes in Sub-Sahara Africa: A Discourse on Law,

Policy and Practice, International Research Journals: 2011.

Saidi M. Kalunde, The Status of Cybercrimes in Tanzania, Strasbourg, France, 2011

Page 47: Cybercrimes in Tanzania

47

Walden, I. East African Community Task Force on Cyber Laws, May 2008.

REPORTS

Report of the second EAC regional task force meeting on cyber laws, Golf course Hotel Kampala Uganda, June 2008

The United Nations Economic Commission for Africa (UNECA) report, on 3rd April 2012

NATIONAL LEGISLATIONS

Broadcast Receiving Apparatus (Licensing) Act No. 6 of 1964

Broadcasting Corporation (Dissolution) Act of 1965 No. 11 of 1965

Broadcasting Services Act of 1993

Commission for Human Rights and Good Governance Act No. 16 of 2007

Communications Act N0 18 of 1993

Evidence Act of 1967 (CAP 6 of Laws R.E 2002)

Penal Code CAP 16 of the Laws (R.E 2002)

The Communications Regulatory Authority Act N0 12 of 1994

The Posts and Telecommunication Act of 1993(R.E 2010)

The Posts and Telecommunications Corporation Act of 1977

FOREIGN LEGISLATIONS

The Computer Misuse Act of the United Kingdom of 1990

CONVENTIONS

Draft African Union Convention on the Establishment of a Credible Legal Framework for Cyber Security in Africa, version 01/01of 2011.

Page 48: Cybercrimes in Tanzania

48

United Nations Convention on International Trade Law (UNCITRAL) Model Law, guide to enactment, 1996.

United Nations Convention on the use of electronic communications in International Contracts of 2007.

The Convention on Cybercrimes of 2004