Cyber Crime -- Bangladesh Perspective

Preview:

Citation preview

Bangladesh Police 1

WelcomeTo

Our Presentation

2

Presented to:

Kamrul HasanLecturer

Department of BBAState University of Bangladesh

3

We are:

Ahsan Habib SinhaID:UG01-17-08-010Rakib AhamedID:UG01-17-08-009Golam Md. Nur Hasan AliID:UG01-17-08-088Riad ArfinID:UG01-17-08-033Asma ul HusnaID:UG01-17-08-001

Bangladesh Police 4

5

Cyber crime: Definition (1)Council of Europe

Criminal offences committed against or with the help of computer networks

Offence against the confidentiality, integrity and availability of computer data and systems.

6

Offences against computer data and systems- Illegal access - Illegal interception - Data interference - System interference - Misuse of devices

Cyber crime: Definition (2)Cyber Crime Convention

7

Computer related offences- Computer-related forgery - Computer-related fraud - Offences related to child pornography - Offences related to infringements of copyright and related rights

Cyber crime: Definition (2)Cyber Crime Convention

8

Cyber crime : Definition (3)

General crimes by using new technologies

- Defamation New crimes using Internet-based

technologies- Fraud on on-line trade

Attacks upon the computer systems and networks themselves

- Illegal access

9

Financial Institutions 67%

Education 18%

Government 10%

Non-Profit Organisation 5%

Cyber crime incidents by organisation

Increase in Cyber Crime

Source: Niser

Cyber crime 2002 2003 %Hacking threats 262 367 40Virus 260 449 73

10

Major Cybercrimes Unauthorised access to a computer

system Unauthorised access to data or

information Introduces or causes to introduce viruses Tampering with computer source

documents Cause Damage to Computer system or

causes any disruption Denies access to any person authorised to

access the computer system Spread of viruses

11

Hacker Traits:

• Curiosity and/or desire to learn

• Gang mentality

• Psychological needs

• Misguided trust in other individuals

• Altruistic reasons

• Revenge and malicious reasons

12

Why do hackers hack?

• Emotional issues

• Desire to embarrass the target

• Joyriding

• Scorekeeping

• Espionage (industrial, political)

• Because they can…

13

Targets:

Financial data

Intellectual Property

Personal data

System Access

Theft, modification or sale, blackmail

Theft, sale, personal gain

Modification, sale

Sabotage, backdoors, exploitation

14

CELLULAR PENETRATION BETWEEN CELLULAR PENETRATION BETWEEN SELECTED COUNTRIES 2002SELECTED COUNTRIES 2002

84.4979.14

67.9562.11

48.81

37.3

26.04

16.09

1.220

10

20

30

40

50

60

70

80

90

UK Singapore Korea, Rep Japan USA Malaysia Thailand China India Source: ITU@2003

15

To provide legal certainty for e-transactions

undertaken by businesses or Government, two new

legislations will be introduced:-

I. Electronic Transactions Bill – to address electronic transactions and communications.

II. E-Government Activities Bill – to support and promote electronic government.

ENACTMENT OF NEW LAWS

16

What the law of Bangladesh says: if a person intentionally causes loss

or damage to any other person or organisation by any act which destroys, deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it by any means, would be considered to have engaged in hacking.

17

What makes us difficult to investigate cybercrime? Increase in the number of

cyber crime HARDLY imagined what happens

Lack of resources Trained investigators Equipments

The nature of the Internet Speed of Cybercrime Damage of Cybercrime Transnational nature of cyberspace Volatility nature of digital evidence

18

The Bangladesh Scenario

Malicious Mail to Foreign Diplomatic Mission and Other VIPs

Pornography Use of e-mail for illegal activities Use of Internet for transmitting false and

malicious information Use of Internet for Prostitution Use of Internet for Women & Child

Trafficking

19

e – Readiness for Police

The various government across the globe are investing to bring the Police Force to meet the challenges of the Borderless Cyber Crime,

Government of Bangladesh has also taken to make the Police Force e- Ready.

20

ICT Law in Bangladesh

•ICT Act 2006

•Amendment of Telecommunication Act 2001

21

ICT Act 2006 Eliminates barriers to e-commerce, Promotes legal and business

infrastructures to secure e-transactions,

Facilitates electronic filing in government agencies and

Ensures efficient delivery of electronic records from government offices

22

ICT Act 2006 Help maintain the latest technology by

freeing it from nuisance as punitive provisions Publishing obscene or defamatory information in electronic form

The law ensures five years imprisonment and a fine of up to Taka 5 crore for offenders for the first conviction and that could be extended to 10 years imprisonment and Taka 10 crore as fine for each subsequent offence of the same nature.

23

ICT Act 2006

Powers of Police Officers and Other Officers

Establishment of Cyber Appellate Tribunal

24

Special Provisions for LEA under Amended Telecom Act

Telecom Service Providers including Internet service providers are considered as intermediaries

All such Service Providers to maintain log of all their customers.

Such data to be produced on demand by Service Providers to any designated enquiry officer from Law Enforcement Agency (LEA)

25

How could we co-operate each other regionally or internationally?

@1. By exchanging information

2. By building investigation capability

3. By arranging Regional Working Parties

26

Cooperation, sharing of knowledge and practical experience

Promotion of standardization of methods Establish good practice guidelines

Working Parties on IT Crimes may concentrate :

27

Recommendations

Cooperation, sharing of knowledge and practical experience

Promotion of standardization of methods Establish good practice guidelines To share the current crime scenes Establishment of digital forensic laboratory

for investigation and detection of cyber crime.

To train trainers or teachers on IT crime investigation

28

Recommendations

Usage of Interpol Criminal Information System and Interpol Secure Web Site https://www.interpol.int

Effective usage of National Central Reference Points

To initiate IT related projects.

29

ConclusionAct as Global police rather than Regional or national police to fight against cyber crime

Rise of cyber crime insists the law enforcers to work as global police rather than regional or national police only. Citizens of 21st centuries need to fight together against their common enemies. The Police Force through global partnership need be able to meet the challenges of the technology to curb all crimes including Cyber Crime.

30

Any Any Questions?Questions?

31