Sei sulla pagina 1di 36

CYBER CRIME IN BANGLADESH

Presented to:
Dr. A.S.M. Ali Ashraf Assistant Professor Department of International Relations University of Dhaka 1. Rabib Noor (Roll 06) 2. Tuhin Chowdhury(Roll 07) 3. Mubin-Ul-Haque(Roll 36) 4. Muntasir Hasan(Roll 37) 5. Habibur Rahman(Roll 40) 6.Muhammad Ariful Islam Malik(Roll 48)

Presented by:

Overview Of Our Presentation


1. Introduction
2. Reasons behind this crime 3. Effects 4. Classification and different modes 5. Existing Laws in Bangladesh 6. Prevention

Crime & Cyber Crime


Crime is the breaking of rules or laws for which some governing authority can ultimately prescribe a conviction. Crimes may also result in cautions, rehabilitation or be uninformed. Individual human societies may each define crime and crimes differently, in different localities (state, local, international), at different time stages of the so-called "crime"

Crime & Cyber Crime


Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes conducted through the Internet.

For example; hate crimes, telemarketing and Internet fraud, identity theft, and credit card account thefts are considered to be cyber crimes when the illegal activities are committed through the use of a computer and the Internet.

DISTINCTION BETWEEN CONVENTIONAL AND CYBER CRIME


apparently no distinction between cyber and conventional crime. However on a deep introspection we may say that there exists a fine line of demarcation. The demarcation lies in the involvement of the medium in cases of cyber crime. The cyber crime is that there should be an involvement, at any stage, of the virtual cyber medium.

A Short Look in World History


These are the lists of the major events in the use of computers and computer networks to commit criminal acts, starting in the 1970's to the present day. John Draper discovers the give-away whistle in Captain Crunch cereal boxes reproduces a 2600Hz tone. Draper builds a blue box that, when used with the whistle and sounded into a phone receiver, allows phreaks to make free calls.

First Cyber Crime Case in Dhaka Court


According to this case one girl has been betrayed by two young men. ( 30 Nov 2010) Two young men identified them as an editor of a news magazine. And they said that they will recruit that girl for a job. And they recruit her. Some days later one of the persons among two give proposal to marry the girl. And girl refuses it. Then another friend of this person makes some photograph of the girl and publishes the modified images unethically to another false Facebook account. After few days girl get a proposal from a real world man for marry. And then that two criminal publish the unethical images to that man who was going to marry that girl.

The news link:


http://www.bdnews24.com/bangla/details.php?cid=2&id=142938&hb=4

Causes of Cyber Crime:


1. Capacity to store data in comparatively small spaceThe computer has unique characteristic of storing data in a very small space. This affords to remove or derive information either through physical or virtual medium makes it much more easier.

Causes of Cyber Crime:


2. Easy to access The problem encountered in guarding a computer system from unauthorized access is that there is every possibility of breach not due to human error but due to the complex technology. By secretly implanted logic bomb, key loggers that can steal access codes, advanced voice recorders; retina imagers etc. that can fool biometric systems and bypass firewalls can be utilized to get past many a security system.

Causes of Cyber Crime:


3.Complex The computers work on operating systems and these operating systems in turn are composed of millions of codes. Human mind is fallible and it is not possible that there might not be a lapse at any stage. The cyber criminals take advantage of these lacunas and penetrate into the computer system.

Causes of Cyber Crime:


4.Negligence Negligence is very closely connected with human conduct. It is therefore very probable that while protecting the computer system there might be any negligence, which in turn provides a cyber criminal to gain access and control over the computer system.

Causes of Cyber Crime:


5. Loss of evidence Loss of evidence is a very common & obvious problem as all the data are routinely destroyed. Further collection of data outside the territorial extent also paralyses this system of crime investigation.

EFFECTS
Against Individuals: i. Harassment via e-mails. ii. Cyber-stalking. iii. Dissemination of obscene material. iv. Defamation. v. Unauthorized control/access over computer system. vi. Indecent exposure vii. Email spoofing viii. Cheating & Fraud

EFFECTS
Against Property: i. Computer vandalism. ii. Transmitting virus. iii. Netrespass iv. Unauthorized control/access over computer system. v. Intellectual Property crimes vi. Internet time thefts

EFFECTS
Social Harassment Against Society at large: i. Pornography ( basically forced and hidden pornography). ii. Polluting the youth through indecent exposure. iii. Trafficking iv. Financial crime v. Sale of illegal articles vi. Online gambling vii. Forgery

CLASSIFICATION
The subject of cyber crime may be broadly classified under the following three groups They are 1. Against Individuals a. their person & b. their property of an individual 2. against Organization a. Government c. Firm, Company, Group of Individuals. 3. Against Society at large

MODES OF CYBER CRIME IN BANGLADESH


Unauthorized access to computer systems or networks / Hacking-

MODES OF CYBER CRIME IN BANGLADESH


Theft of information contained in electronic form-

MODES OF CYBER CRIME IN BANGLADESH


Email bombing This kind of activity refers to sending large numbers of mail to the victim, which may be an individual or a company or even mail servers there by ultimately resulting into crashing.

MODES OF CYBER CRIME IN BANGLADESH


Data diddling This kind of an attack involves altering raw data just before a computer processes it and then changing it back after the processing is completed. The electricity board faced similar problem of data diddling while the department was being computerized.

MODES OF CYBER CRIME IN BANGLADESH


Virus / worm attacks-

MODES OF CYBER CRIME IN BANGLADESH


Internet theftsMost occurred crime in our country.

MODES OF CYBER CRIME IN BANGLADESH


Trojan attacks-

EXISTING LAWS
Cyber laws are contained in the Information and Communication Technology Act, 2006. Therefore this Act provide the legal infrastructure for e-commerce others legal solution relating with cyber crime in Bangladesh. The said Act enable Legal recognition of electronic transaction Legal recognition of digital signature Acceptance to contract expressed by electronic means e-commerce and electronic form, Publication of official gazette in the electronic form,

EXISTING LAWS
Objectives of the ICT Act, 2006 To help to establish uniformity of rules, regulations and standards regarding the authentication and integrity of electronic records. To facilitate electronic commerce eliminate barriers to electronic commerce resulting from uncertainties over writing a

EXISTING LAWS
Weakness of the ICT Act, 2006 The law does sometimes regulate the social norm and then control of information technology.

The law does give proper solution about the Intellectual Property Right and this law does not discuss of the rights and liability of domain name holders which is the first step of entering into the e-commerce

EXISTING LAWS
Advantages of Cyber law This Act has some disadvantages and also some advantages.

This Act has provided us few advantages like as under the ICT Act, 2006, conduct important issues of security, which are so critical to the success of electronic transactions.

EXISTING LAWS
Advantages of Cyber law The Act has given a legal definition to the concept of secure digital signatures

Required to have been passed through a system of a security procedure

EXISTING LAWS
Internet have grown in our country, the need has been felt to enact the appropriate cyber laws, which are indispensable to legalize and regulate Internet in Bangladesh.

The existing laws of Bangladesh even with the most gene rous and moderate interpretation, could not be interpreted in the light of the promising cyberspace. We hope concern authority should take some steps to develop our existing cyber law.

Prevention
Bangladesh is planning stringent measures to fight cyber crimes amid the rapid expansion of information and communication technology and telecommunications. Bangladesh taken steps afresh to facilitate fair and secured use of the information technology as the country lacks a complete law to deal with cyber crimes.

Prevention
'Digital Bangladesh' by the year 2021, had approved in principle to amend previous legislation calling for jail terms and heavy financial penalties to tackle new forms of crime. Certainly newer steps to minimize the crime.

Prevention
The proposed law has suggested provisions for a maximum 10 years in jail and taka 10 million ( 150, 000 US dollars) in fines for hacking into computer networks and putting false and libelous information or indecent materials online. Source: http://www.newagebd.com/2009/apr/ 21/front.html

Prevention
To control the rapidly increasing growth of the cyber crimes, a special committee has been established by the Bangladesh Telecommunication Regulatory Commission and the purpose of the formation of this committee is to deal with the computer systems To check the over growing incidents of hacking and destruction of the official sites, the Bangladesh Computer Security Incidence Response Team has been formed.

Prevention
The government has also taken the decision of the establishment of a special Cyber Tribunal in Dhaka and this will deal with cyber crimes like, hacking of computer system online, extortion and fraudulence. The government bounds to take this decision on the issue of the leakage of 230 e-mails and 17-hour secret conversation on Skype between International Crimes Tribunal 1 Chairman and a Bangladeshi emigrant in Brussels.

Prevention
Aware the citizens to be careful while using internet services.

Potrebbero piacerti anche