The Regulation and Use of Artificial Intelligence and 5G Technology to Combat Cybercrime and Financial Crime in South African Banks

Keywords: Cybercrimes, cyber security, financial markets, artificial intelligence, financial institutions

Abstract

Artificial intelligence (AI) and fifth generation network technology (5G) are now being utilised by some companies and financial institutions such as banks to enhance their competitiveness and expand their businesses. The general types of AI include functional AI, interactive AI, text AI, visual AI and analytic AI. The key components of AI include machine learning, fast Internet connectivity, deep learning, neural networks and advanced data analysis. These components may be complemented by the adoption and use of standard 5G cellular networks. 5G utilises broadband Internet access and Internet connection, and is now employed by some banking institutions, especially in developed countries. It is not clear whether South African banking institutions have adopted 5G for their Internet connectivity and operations. AI and 5G may be used to detect and combat cybercrimes in banking institutions. On the other hand, AI and 5G may also be abused by cybercriminals to commit financial crimes such as money laundering and insider trading. In this regard it is submitted that South African policy makers should carefully revise the Cybersecurity Bill B6-2017 (Cybercrimes Bill) to embrace the use of AI and 5G to detect and combat cybercrimes in South African banks. Accordingly, this article examines the adequacy of the Cybercrimes Bill. It also explores the regulation and use of 5G and AI to detect, prevent and combat cybercrimes in banks and other financial institutions in South Africa.

Author Biography

Howard Chitimira, Faculty of Law at the North-West University

Senior Lecturer

North-West University           

References

Bibliography
Literature

Abawajy JH et al Internet and Distributed Computing Advancements: Theoretical Frameworks and Practical Applications (IGI Global Hershey 2012)

Achimugu P et al "Adoption of Information and Communication Technologies in Developing Countries: An Impact Analysis" 2009 JITI 37-46

Armstrong C et al Access to Knowledge in Africa: The Role of Copyright (UCT Press Claremont 2010)

Axelrod EM Violence Goes to the Internet: Avoiding the Snare of the Net (Charles C Thomas Springfield 2009)

Bhateja V et al Intelligent Computing and Communication (Springer Singapore 2020)

Bidgoll H The Internet Encyclopedia Volume 1 (Wiley New Jersey 2004)

Bossler AM and Berenblum T "Introduction: New Directions in Cybercrime Research" 2019 Journal of Crime and Justice 495-499

Brenner SW "Cybercrime Jurisdiction" 2006 Crime Law Soc Change 189-206

Brenner SW Cybercrime: Criminal Threats from Cyberspace (Greenwood Santa Barbara 2010)

Brenner SW "Cybercrime: Re-thinking Crime Control Strategies" in Jewkes Y (ed) Crime Online (Routledge New York 2011) 12-29

Brynjolfsson E and Mcafee AN "The Business of Artificial Intelligence" 2017 HBR 3-11

Burgmann V Globalization and Labour in the Twenty-First Century (Routledge London 2016)

Button M and Cross C Cyber Frauds, Scams and their Victims (Routledge London 2017)

Buys R Cyberlaw: The Law of the Internet in South Africa (Van Schaik Pretoria 2000)

Carlan P, Nored LS and Downey RA An Introduction to Criminal Law (Jones and Bartlett Sudbury 2011)

Casey E Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet (Elsevier London 2011)

Cassim F "Formulating Specialised Legislation to Address the Growing Spectre of Cybercrime: A Comparative Study" 2009 PELJ 36-79

Cassim F "Addressing the Challenges Posed by Cybercrime: A South African Perspective" 2010 JICLT 118-123

Cassim F "Addressing the Growing Spectre of Cyber Crime in Africa: Evaluating Measures Adopted by South Africa and Other Regional Role Players" 2011 CILSA 123-138

Cassim F "Addressing the Spectre of Cyber Terrorism: A Comparative Perspective" 2012 PELJ 381-415

Chawki M et al Cybercrime, Digital Forensics and Jurisdiction (Springer New York 2015)

Chitimira H "The Reliance on Artificial Intelligence Measures to Curb Money Laundering Practices in the South African Banking Institutions and Real Estate Sector" 2020 Acta Universitatis Danubius Juridica 28-43

Cruz-Cunha MM and Portela IM Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance (IGI Global Hershey 2015)

Dawson M and Omar M New Threats and Countermeasures in Digital Crime and Cyber Terrorism (IGI Global Hershey 2015)

Dilek S, Çakır H and Aydın M "Applications of Artificial Intelligence Techniques to Combat Cybercrimes: A Review" 2015 IJAIA 21-34

Dlamini S and Mbambo C "Understanding Policing of Cyber-Crime in South Africa: The Phenomena, Challenges and Effective Responses" 2019 Cogent Social Sciences 1-13

Ennew CT and Waite N Financial Services Marketing: An International Guide to Principles and Practice (Elsevier Oxford 2007)

Ericsson OA, Monserrat JF and Nokia PM 5G Mobile and Wireless Communications Technology (Cambridge University Press Cambridge 2016)

Ezrachi A and Stucke ME "Artificial Intelligence and Collusion: When Computers Inhibit Competition" 2017 U Ill L Rev 1775-1809

Franklin CJ The Investigator's Guide to Computer Crime (Thomas Springfield 2006)

Ghosh S and Turrini E Cybercrimes: A Multidisciplinary Analysis (Springer Berlin 2010)

Goldfarb A and Prince J "Internet Adoption and Usage Patterns are Different: Implications for the Digital Divide" 2008 Information Economics and Policy 2-15

Gordon S and Ford R "On the Definition and Classification of Cybercrime" 2006 Journal in Computer Virology 13-20

Herselman M and Warren M "Cyber Crime Influencing Businesses in South Africa" 2004 Issues in Informing Science and Information Technology 253-266

Johnson TA Forensic Computer Crime Investigation (Taylor and Francis Boca Raton 2005)

Joshi VC Digital Finance, Bits and Bytes: The Road Ahead (Springer Singapore 2020)

Kelemen J, Romportl J and Zackova E (eds) Beyond Artificial Intelligence: Contemplations, Expectations, Applications (Springer Science and Business Media New York 2012)

Kovacich GL and Jones A High-Technology Crime Investigator's Handbook: Establishing and Managing a High-Technology Crime Prevention Program (Elsevier Burlington 2006)

Liang B and Lu H "Internet Development, Censorship, and Cyber Crimes in China" 2010 J Contemp Crim Justice 103-120

Lukonga I Fintech, Inclusive Growth and Cyber Risks: Focus on the MENAP and CCA Regions (International Monetary Fund Washington DC 2018)

Madhusanka L et al A Comprehensive Guide to 5G Security (Wiley Hoboken 2018)

Mbelli TM and Dwolatzky B "Cyber Security, A Threat to Cyber Banking in South Africa: An Approach to Network and Application Security" in IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud) (25-27 June 2016 Beijing) 1-6

Moore R Cybercrime: Investigating High-Technology Computer Crime (Routledge Amsterdam 2010)

Orji UJ Cybersecurity Law and Regulation (Wolf Legal Nijmegen 2012)

Orji UJ "Protecting Consumers from Cybercrime in the Banking and Financial Sector: An Analysis of the Legal Response in Nigeria" 2019 Tilburg L Rev 105-124

Osterburg JW, Ward RH and Miller LS Criminal Investigation: A Method for Reconstructing the Past (Routledge London 2019)

Paula EL et al "Deep Learning Anomaly Detection as Support Fraud Investigation in Brazilian Exports and Anti-Money Laundering" in 15th IEEE International Conference on Machine Learning and Application (18-20 December 2016 Anaheim) 954-960

Petrillo A, De Felice F and Cioffi R Digital Transformation in Smart Manufacturing (InTech Rijeka 2018)

Pitts V Cyber Crimes: History of World's Worst Cyber Attacks (VIJ Books New Delhi 2017)

Pollicino O and Graziella R The Internet and Constitutional Law: The Protection of Fundamental Rights and Constitutional Adjudication in Europe (Routledge London 2016)

Rajput B Cyber Economic Crime in India: An Integrated Model for Prevention and Investigation (Springer Cham 2020)

Reuvid J Easy Steps to Managing Cybersecurity (Legend Press London 2018)

Richardson M Cyber Crime: Law and Practice (Wildy Simmonds & Hill London 2019)

Robinson PH and Baker DJ Artificial Intelligence and the Law: Cybercrime and Criminal Liability (Routledge London 2020)

Savona EU Crime and Technology: New Frontiers for Regulation, Law Enforcement and Research (Springer Dordrecht 2004)

Sharma P E-Governance: The New Age Governance (APH Publishing New Delhi 2004)

Siegel JA and Mirakovits K Forensic Science: The Basics (Routledge London 2016)

Smith RG, Grabosky P and Urbas G Cyber Criminals on Trial (Cambridge University Press London 2004)

Snail S "Cyber Crime in South Africa – Hacking, Cracking, and Other Unlawful Online Activities" 2009 JILT 1-13

Solove DJ The Digital Person: Technology and Privacy in the Information Age (New York University Press New York 2004)

Thomas JH et al Cybercrime and Digital Forensics: An Introduction (Routledge London 2015)

Thornton L et al Telecommunications Law in South Africa (STE Publishers Johannesburg 2006)

Tillman R Global Pirates: Fraud in the Offshore Insurance Industry (Northeastern University Press Boston 2002)

Vacca JR Guide to Wireless Network Security (Springer New York 2006)

Van der Merwe DP et al Information and Communications Technology Law (LexisNexis Durban 2008)

Van Niekerk B and Chandarman R "Students' Cybersecurity Awareness at a Private Tertiary Educational Institution" 2017 AJIC 133-155

Vishnevsky V and Kozyrev D Distributed Computer and Communication Networks: 18th International Conference, DCCN 2015, Moscow, Russia, October 19-22, 2015, Revised Selected Papers (Springer Cham 2016)

Waschke M Personal Cybersecurity: How to Avoid and Recover from Cybercrime (Apress Washington DC 2017)

Wells JT Internet Fraud Casebook: The World Wide Web of Deceit (John Wiley Hoboken 2010)

Zeviar-Geese G "The State of the Law on Cyber-Jurisdiction and Cybercrime on the Internet" 1997-1998 GJIL 119-146

Ziska F Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution (IGI Global Hershey 2018)

Case law
Narlis v South African Bank of Athens 1976 2 SA 573 (A)
S v Mashiyi 2002 2 SACR 387 (Tk)

Legislation
Broadcasting Act 4 of 1999
Constitution of the Republic of South Africa, 1996
Criminal Procedure Act 51 of 1977
Electronic Communications and Transactions Act 25 of 2002
Independent Communications Authority of South Africa Act 13 of 2000
Postal Services Act 24 of 1998
Protection of Personal Information Act 4 of 2013
Public Finance Management Act 1 of 1999
Regulation of Interception of Communications and Provision of Communication-Related Information Act 70 of 2002

Government publications
Cybercrimes Bill B6-2017

International instruments
Council of Europe Convention on Cybercrime ETS No 185 (2001)

Internet sources

Bottomley EJ 2020 Personal Details of 24 Million South Africans may have been Exposed after Attack on Credit Bureau https://www.businessinsider.co.za/the-personal-details-of-millions-of-south-africans-have-just-been-hacked-2020-8 accessed 13 March 2021

Council of Europe 2021 Chart of Signatures and Ratifications of Treaty 185 https://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/185/signatures?p_auth=L3MN1W5t? accessed 24 June 2021

Galal H and O'Halloran D 2020 The Impact of 5G: Creating New Value Across Industries and Society http://www3.weforum.org/docs/WEF_The_
Impact_of_5G_Report.pdf accessed 23 June 2021

Smith C et al 2006 The History of Artificial Intelligence - University of Washington Research Paper https://courses.cs.washington.edu/courses/csep590/06au/projects/history-ai.pdf accessed 24 June 2021

Tamarkin E 2014 South Africa must Pay More Attention to Cybercrime https://issafrica.org/iss-today/south-africa-must-pay-more-attention-to-cybercrime accessed 30 January 2021
Views
  • Abstract 178
  • Pdf 75
  • Xml 33
  • epub 17
Views and downloads are with effect from 11 January 2018
Published
2021-06-30
Section
Special Edition: Corporate and Financial Markets 2021