Cyber Crime and Its Impact in Bangladesh

download Cyber Crime and Its Impact in Bangladesh

of 22

Transcript of Cyber Crime and Its Impact in Bangladesh

  • 8/12/2019 Cyber Crime and Its Impact in Bangladesh

    1/22

    Cybercrime and Its Impact in

    Bangladesh

    Course Code: CSE-101

    Course Title: Introduction to Computer Science

    Submitted To:

    Md. Rahimullah miah

    Lecturer

    Department of Business Administration

    Leading University, Sylhet

    Submitted By:

    Safwan Ahmed Chowdhury

    ID-1411010053

    Semester: 1st

    Section-B

    Department of BusinessAdministration.

    Leading University, Sylhet

    Date of Submission: 20-05-2014

  • 8/12/2019 Cyber Crime and Its Impact in Bangladesh

    2/22

    DEDICATION

    I dedicate my assignment to my loving mother who inspires and encourages me to

    concentrate on my study.

    Safwan Ahmed Chowdhury

    ID: 1411010053

    Semester: 1st

    Department of Business Administration.

    Leading University, Sylhet

  • 8/12/2019 Cyber Crime and Its Impact in Bangladesh

    3/22

    DECLARATION

    I hereby declare that the project work entitled E-LEARNING SYSTEMS submitted to the

    Leading University is a record of an original work done by me under the guidance of sir

    Md. Rahimullah miah, Faculty Member, Leading University, Department of Business

    administration and this project work has not performed the basis for the award of any

    Degree or diploma/ associate ship/fellowship and similar project if any.

    Safwan Ahmed Chowdhury

    ID: 1411010053

  • 8/12/2019 Cyber Crime and Its Impact in Bangladesh

    4/22

    ACKNOWLEDGEMENT

    I would like to express my special appreciation and thanks to my advisor/course

    teacher MD. RAHIMULLAH SIR, you have been a tremendous mentor for me. I

    would like to thank you for encouraging my research and for allowing me to grow as

    a research scientist. Your advice on both research as well as on my career have been

    invaluable.

    I would also like to thank my loving friends. I also want to thank you for letting my

    defense be an enjoyable moment, and for your brilliant comments and suggestions.

    A special thanks to my family. Words can not express how grateful I am to my

    mother and family members for all of the sacrifices that youve made on my behalf.

    Your prayer for me was what sustained me thus far.

    Finally I thank my God, my brother, for letting me through all the difficulties. I have

    experienced your guidance day by day. I will keep on trusting you for my future.

    Thank you, Lord.

  • 8/12/2019 Cyber Crime and Its Impact in Bangladesh

    5/22

    Abstract

    Cyber and technology related crime is on the increase and current trends indicate

    that it will be a significant issue in Bangladesh. It has already been seen that a

    glomming threat becomes visible in the arena of information technology. Recently

    the hacking of RAB website and e-mail threats of former prime minister are

    example for few of them.

    In contrast, cybercrime is becoming a threat to government itself. Due to lack of

    necessary legislation to tackle such type of crime, cyber criminals are almost in the

    safe side to commit such crime. In the Information and Communication Technology

    Act. 2006, there are several clauses against cybercrime. But this Information and

    Communication Technology act is not the concert one. By enacting this act, there isa chance to become safe side after committing crimes. So, considering these facts a

    comprehensive Cybercrime Protection Act should be imposed.

    This report incorporates the impacts of cybercrime in Bangladesh especially focuses

    on the area of Personal life, Workplace as well as Policy making Bodies or thinkers.

    We believe the report would help all relevant concerns and especially policy makers.

  • 8/12/2019 Cyber Crime and Its Impact in Bangladesh

    6/22

    Contents1.1 INTRODUCTION .......................................................................................................... 7

    1.2 Background ..................................................................................................................... 7

    1.3 Problems .......................................................................................................................... 8

    1.4 Objectives ........................................................................................................................ 8

    1.5 Scopes and Limitation .................................................................................................... 9

    2.0 TYPES OF CYBERCRIME WITH THE PROFILE OF CYBER CRIMINALS

    AND VICT IMS AND REASONS ..................................................................................... 10

    2.1 Types of Cybercrime .................................................................................................... 10

    2.2 Reasons of cybercrime .................................................................................................. 11

    2.3 The following are the category of Cyber criminals .................................................... 12

    2.4 Victims of Cybercrime .................................................................................................. 12

    3.0 IMPACT OF CYBERCRIME AGAINST INDIVIDUALS ...................................... 13

    3.1 Impacts against individuals .......................................................................................... 13

    3.2 Impacts against individuals property .......................................................................... 14

    3.3 IMPACT OF CYBERCRIME AGAINST ORGANIZATIONS .............................. 16

    3.4 IMPACT OF CYBERCRIME AGAINST THE GOVERNMENT .......................... 17

    3.5 NECESSARY LEGISLATIONS IN BANGLADESH TO TACKLE

    CYBERCRIME ................................................................................................................... 18

    4.1 CONCLUSION ............................................................................................................. 20

    4.2 RECOMMENDATION S ............................................................................................. 20

    4.3 BIBLIOGRAPHY ......................................................................................................... 21

  • 8/12/2019 Cyber Crime and Its Impact in Bangladesh

    7/22

    Introduction

    1.1 INTRODUCTION

    This report is the outcome of the study on Cybercrime and Its Impact inBangladesh. Commissioned by the Course Instructor of the BusinessCommunication Prof. M. Z. Mamun, this study has been conducted in May 2009.The information generated by means of the study is cross-cutting across variouschapters presented in the report. Therefore, it may appear that there is a lot ofduplication of information. This has been done knowingly as it is essential becausethe target audiences of the study and the issues addressed are very much related witheach other.

    1.2 Background

    In the words attributed to the Greek Philosopher, Heraclitus, there is nothingpermanent but change. These words, written almost 2500 years ago, are very truetoday: we are living in a constantly changing world. The most rapid pace of changethat we see is in the world of computer or the information and communicationtechnology. Over the last fifteen years, the increase in technology and the use ofcomputer, in both the personal and business sector has increased remarkably. Thistechnology advance has ensured that the twenty first century is the information age.

    With all the possibilities that the new technology offers for progress anddevelopment, the same technology can be used for malicious and criminal purposes.A couple of years ago, fishing spelled with F was a pleasant activity with a fishingrod or a net where you could land yourself a nice meal for you and your family.Today, phishing, spelled with PH is an activity with a fake website or email where

    one can land credit card or bank account details.

    We are extremely dependent on the cyber1 world for both our professional andpersonal work. With this growing dependency on information and communicationtechnologies (ICT), there has emerged new threats to network and informationsecurity. There is an ever-growing vulnerability to cybercrime in todays world. This

    is also true for Bangladesh where the number of internet users is growing rapidlyand where ICT is important for the economy.

  • 8/12/2019 Cyber Crime and Its Impact in Bangladesh

    8/22

    1.3 Problems

    Cybercrime generally refers to criminal activity where a computer or network is thesource, tool, target, or place of a crime. These categories are not exclusive and many

    activities can be characterized as falling in one or more. Although the termcybercrime is more properly restricted to describing criminal activity in which thecomputer or network is a necessary part of the crime, this term is also sometimesused to include traditional crimes, such as fraud, theft, blackmail etc., in whichcomputer or networks are used. As the use of computers has grown, cybercrime hasbecome more important.

    Cybercrime, as a transnational crime, is a global issue with a global impact.

    Increased sophistication of cybercrime attacks and vulnerability of informationavailable online is a serious concern for institutions, law enforcement agencies and

    other stakeholders.

    Victims of these attacks are not just private citizens or organizations with limited

    resources available to protect themselves but very large companies.

    1.4 Objectives

    The overall purpose of the study was to identify the impact of cybercrime in

    Bangladesh with regard to technological enhancement.The study has embarked upon the specific objectives are to assess:

    Types of cybercrime with the profile of cyber criminals and victims; Impact of cybercrime against individuals; Impact of cybercrime against organizations; Impact of cybercrime against the Government; Necessary Legislations in Bangladesh to tackle Cybercrime.

  • 8/12/2019 Cyber Crime and Its Impact in Bangladesh

    9/22

    1.5 Scopes and Limitation

    Cybercrime does not know the border. The same technology that brings people ofthe world closer together has a darker side, making it easier for criminal ormalicious elements to steal, destroy, corrupt, defraud and exploit. They do not haveto be near they can do so from another country or continent. Internet technology hascome to Bangladesh quite late. But, the country does not leg behind when it comesto cybercrimes. As most of the organizations in Bangladesh are very keen to use theopportunity of the internet technology, the potential threats can not be ruled out. Dueto availability and comparatively cheaper prize of a personal computer, interest touse them for day to day personal business is being grown up. Considering the aboveviews, the study was conducted at all levels (corporate and/or personal) in whereICT has arrived with its prospect.

    The study has suffered certain limitations as below:

    The duration of the study was very short. More in-depth investigation wouldhave resulted better outputs;

    Lack of resources has hampered the study to some extent; Access to information is very difficult. In most cases, concerned persons

    were very rigid to share adequate information.

  • 8/12/2019 Cyber Crime and Its Impact in Bangladesh

    10/22

    Details Findings

    2.0 TYPES OF CYBERCRIME WITH THE PROFILE OF CYBER

    CRIMINALS AND VICT IMS AND REASONS

    Cyber crime is the latest and perhaps the most complicated problem in the cyberworld. Cyber crime may be said to be those species, of which, genus is theconventional crime, and where either the computer is an object or subject of theconduct constituting crime. Any criminal activity that uses a computer either as an

    instrumentality, target or a means for perpetuating further crimes comes within theambit of cyber crime.

    2.1 Types of Cybercrime

    All crimes performed by abuse of electronic media or otherwise, with the purpose ofinfluencing the functioning of computer or computer system. The followings are the

    top listed types of cybercrime:

    Hacking

    Hacking is a simple term means illegal intrusion into a computer system without the

    permission of the computer owner/user. Hackers usually do that with the intention of

    obtaining confidential information.

    Virus Dissemination

    Virus itself is software that attacks other software. It may cause for data loss,deduction of bandwidth speed, hardware damage etc. Trojan Horse, Time Bomb,

    Logic Bomb, Rabbit are the malicious software.

    Software Piracy

    Theft of software through the illegal coping of genuine programs or distribution of

    products intended to pass for the original.

    Pornography

    Pornography is the first consistently successful e-commerce product Deceptive

    marketing tactics and mouse trapping technologies pornography encouragecustomers to access their website. Anybody including children can log on to theinternet and access website with pornographic contents with a click of a mouse.

  • 8/12/2019 Cyber Crime and Its Impact in Bangladesh

    11/22

    Credit Card Fraud

    You simply have to type credit card number into www page of the vendor for online

    transaction. If electronic transactions are not secured the credit card numbers can be

    stolen by the hackers who can misuse this card by impersonating the credit card

    owner.

    2.2 Reasons of cybercrime

    Hart in his work The Concept of Law has said human beings are vulnerable so

    rule of law is required to protect them. Applying this to the cyberspace we may say

    that computers are vulnerable so rule of law is required to protect and safeguard

    them against cyber crime.

    The reasons for the vulnerability of computers may be said to be:

    Capacity to store data in comparatively small space

    The computer has unique characteristic of storing data in a very small space. This

    affords to remove or derive information either through physical or virtual mediummakes it much easier.

    Easy to access

    The problem encountered in guarding a computer system from unauthorized accessis that there is every possibility of breach not due to human error but due to thecomplex technology. By secretly implanted logic bomb, key loggers that can stealaccess codes, advanced voice recorders; retina imagers etc. that can fool biometricsystems and bypass firewalls can be utilized to get past many a security system.

    Complex

    The computers work on operating systems and these operating systems in turn arecomposed of millions of codes. Human mind is fallible and it is not possible that

    there might not be a lapse at any stage. The cyber criminals take advantage of theselacunas and penetrate into the computer system.

    Negligence

    Negligence is very closely connected with human conduct. It is therefore very

    probable that while protecting the computer system there might be any negligence,

    which in turn provides a cyber criminal to gain access and control over the computer

    system.

    Loss of evidence

    Loss of evidence is a very common & obvious problem as all the data are routinely

    destroyed. Further collection of data outside the territorial extent also paralyses this

    system of crime investigation.

  • 8/12/2019 Cyber Crime and Its Impact in Bangladesh

    12/22

    Profile of Cyber Criminals

    The cyber criminals constitute of various groups/ category. This division may be

    justified on the basis of the object that they have in their mind.

    2.3 The following are the category of Cyber criminals

    Children and adolescents between the age group of 6 18 years

    The simple reason for this type of delinquent behaviour pattern in children is seenmostly due to the inquisitiveness to know and explore the things. Other cognatereason may be to prove themselves to be outstanding amongst other children in theirgroup. Further the reasons may be psychological even. E.g. the Bal Bharati (Delhi)case was the outcome of harassment of the delinquent by his friends.

    Organized hackers

    These kinds of hackers are mostly organized together to fulfill certain objective. The

    reason may be to fulfill their political bias, fundamentalism, etc. The Pakistanis aresaid to be one of the best quality hackers in the world. They mainly target the Indiangovernment sites with the purpose to fulfill their political objectives. Further theNASA as well as the Microsoft sites is always under attack by the hackers.

    Professional hackers / crackers

    Their work is motivated by the colour of money. These kinds of hackers are mostlyemployed to hack the site of the rivals and get credible, reliable and valuableinformation. Further they are ven employed to crack the system of the employerbasically as a measure to make it safer by detecting the loopholes.

    Discontented employees

    This group includes those people who have been either sacked by their employer or

    are dissatisfied with their employer. To avenge they normally hack the system of

    their employee.

    2.4 Victims of Cybercrime

    In general, victims of cybercrime are:

    i.

    Desperados and greedy peopleii. Gullibleiii. Unskilled and Inexperiencediv. Unlucky people

  • 8/12/2019 Cyber Crime and Its Impact in Bangladesh

    13/22

    Impact of Cybercrime

    3.0 IMPACT OF CYBERCRIME AGAINST INDIVIDUALS

    Cyber crimes committed against people include various crimes like transmission ofchild-pornography and harassment through e-mail. The trafficking, distribution,posting, and dissemination of obscene material including pornography constitute oneof the most important cyber crimes known today. Cyber harassment is a distinctcyber crime. Harassment can be sexual, racial, religious, or other. This also brings usto another related area--violation of citizen which is a crime of grave nature.

    3.1 Impacts against individuals

    Cyber-stalking

    The Oxford dictionary defines stalking as "pursuing stealthily". Cyber stalking

    involves following a person's movements across the Internet by posting messages

    (sometimes threatening) on the bulletin boards frequented by the victim, entering the

    chat-rooms frequented by the victim, constantly bombarding the victim with emails

    etc.

    Pornography

    Pornography on the net may take various forms. It may include the hosting ofwebsite containing these prohibited materials. Use of computers for producing theseobscene materials. Downloading through the Internet, obscene materials. Theseobscene matters may cause harm to the mind of the adolescent and tend to depraveor corrupt their mind. Two known cases of pornography are the Delhi Bal Bharaticase and the Bombay case wherein two Swiss couple used to force the slum childrenfor obscene photographs. The Mumbai police later arrested them.

    Defamation

    It is an act of imputing any person with intent to lower the person in the estimation

    of the right-thinking members of society generally or to cause him to be shunned or

    avoided or to expose him to hatred, contempt or ridicule. Cyber defamation is notdifferent from conventional defamation except the involvement of a virtual medium.

    E.g. the mail account of Rohit was hacked and some mails were sent from his

    account to some of his batch mates regarding his affair with a girl with intent to

    defame him.

  • 8/12/2019 Cyber Crime and Its Impact in Bangladesh

    14/22

    E- mail spoofing

    A spoofed e-mail may be said to be one, which misrepresents its origin. It shows it's

    origin to be different from which actually it originates. Recently spoofed mails were

    sent on the name of Mr. Na.Vijayashankar (naavi.org), which contained virus.

    Rajesh Manyar, a graduate student at Purdue University in Indiana, was arrested for

    threatening to detonate a nuclear device in the college campus. The alleged e- mailwas sent from the account of another student to the vice president for studentservices. However the mail was traced to be sent from the account of Rajesh

    Manyar.

    Fraud & Cheating

    Online fraud and cheating is one of the most lucrative businesses that are growing

    today in the cyber space. It may assume different forms. Some of the cases of onlinefraud and cheating that have come to light are those pertaining to credit card crimes,

    contractual crimes, offering jobs, etc.

    Recently the Court of Metropolitan Magistrate Delhi found guilty a 24-year-oldengineer working in a call centre, of fraudulently gaining the details of Campa'scredit card and bought a television and a cordless phone from Sony website.Metropolitan magistrate Gulshan Kumar convicted Azim for cheating under IPC,but did not send him to jail. Instead, Azim was asked to furnish a personal bond ofRs 20,000, and was released on a year's probation.

    3.2 Impacts against individuals property

    Computer vandalism

    Vandalism means deliberately destroying or damaging property of another. Thuscomputer vandalism may include within its purview any kind of physical harm doneto the computer of any person. These acts may take the form of the theft of acomputer, some part of a computer or a peripheral attached to the computer or byphysically damaging a computer or its peripherals.

    Transmitting virus/worms

    Viruses are programs that attach themselves to a computer or a file and then

    circulate themselves to other files and to other computers on a network. Theyusually affect the data on a computer, either by altering or deleting it. Worms, unlike

    viruses do not need the host to attach themselves to. They merely make functional

    copies of themselves and do this repeatedly till they eat up all the available space on

    a computer's memory. E.g. love bug virus, which affected at least 5 % of the

    computers of the globe. The losses were accounted to be $ 10 million. The world's

    most famous worm was the Internet worm let loose on the Internet by Robert Morris

    sometime in 1988. Almost brought development of Internet to a complete halt.

  • 8/12/2019 Cyber Crime and Its Impact in Bangladesh

    15/22

    Logic bombs

    These are event dependent programs. This implies that these programs are created to

    do something only when a certain event (known as a trigger event) occurs. E.g. evensome viruses may be termed logic bombs because they lie dormant all through the

    year and become active only on a particular date (like the Chernobyl virus).

    Trojan attacks

    This term has its origin in the word Trojan horse. In software field this means anunauthorized programme, which passively gains control over anothers system byrepresenting itself as an authorized programme. The most common form ofinstalling a Trojan is through e-mail. E.g. a Trojan was installed in the computer of alady film director in the U.S. while chatting. The cyber criminal through the webcam installed in the computer obtained her nude photographs. He further harassedthis lady.

    Web jacking

    This term is derived from the term hi jacking. In these kinds of offences the hackergains access and control over the web site of another. He may even mutilate orchange the information on the site. This may be done for fulfilling politicalobjectives or for money. E.g. recently the site of MIT (Ministry of InformationTechnology) was hacked by the Pakistani hackers and some obscene matter wasplaced therein. Further the site of Bombay crime branch was also web jacked.Another case of web jacking is that of the gold fish case. In this case the site washacked and the information pertaining to gold fish was changed. Further a ransom ofUS $ 1 million was demanded as ransom. Thus web jacking is a process where bycontrol over the site of another is made backed by some consideration for it.

    Internet time thefts

    Normally in these kinds of thefts the Internet surfing hours of the victim are used upby another person. This is done by gaining access to the login ID and the password.E.g. Colonel Bajwas case- the Internet hours were used up by any other person.This was perhaps one of the first reported cases related to cyber crime in India.However this case made the police infamous as to their lack of understanding of thenature of cyber crime.

    Intellectual Property crimes / Distribution of pirated software

    Intellectual property consists of a bundle of rights. Any unlawful act by which theowner is deprived completely or partially of his rights is an offence. The common

    form of IPR violation may be said to be software piracy, copyright infringement,trademark and service mark violation, theft of computer source code, etc.

    The Hyderabad Court has in a land mark judgment has convicted three people and

    sentenced them to six months imprisonment and fine of 50,000 each for

    unauthorized copying and sell of pirated software

  • 8/12/2019 Cyber Crime and Its Impact in Bangladesh

    16/22

    3.3 IMPACT OF CYBERCRIME AGAINST ORGANIZATIONS

    Unauthorized control/access over computer system

    This activity is commonly referred to as hacking. The Indian law has however given

    a different connotation to the term hacking, so we will not use the term"unauthorized access" interchangeably with the term "hacking" to prevent confusion

    as the term used in the Act of 2000 is much wider than hacking.

    Possession of unauthorized information

    In June 2012, Cyber pirates hacked into the Internet account of Barisal DC officemarking the first cybercrime in the Barisal region. The computer hacking incidentwas revealed after the DC office received a heavily bloated Internet bill and lodged acomplaint with the Bangladesh Telegraph and Telephone Board (BTTB), which isthe internet service provider for the DC office. The hackers, who somehow got hold

    of the password of the account, accessed it from several places in town including anIT firm, residences of an ADC and a joint secretary, and a Pharmaceutical company.

    Software Pirate and Copyright

    Results of an anonymous experiment conducted on more than 4,800 students in SanDiego were presented at the American Psychological Association conference. It saysthat 38 percent of teenagers were involved in software piracy. In the context of

    Bangladesh most of the computer users are in the habit of using pirated software.

    Financial Institutions are at risk

    Bangladesh's financial institutions are at risk from hackers. In the country financialinstitutions have introduced various online features like online banking, stockexchange transactions but are not able to provide the highest security. Source saidthe cyber criminal networks through Internet have attacked our country's technologyinfrastructure. Recently, hackers interrupted the DSE transaction, which cost thesmall entrepreneurs dearly.

  • 8/12/2019 Cyber Crime and Its Impact in Bangladesh

    17/22

    3.4 IMPACT OF CYBERCRIME AGAINST THE GOVERNMENT

    Cyber terrorism is one distinct kind of crime in this category. The growth of internethas shown that the medium of Cyberspace is being used by individuals and groupsto threaten the international governments as also to terrorize the citizens of acountry. This crime manifests itself into terrorism when an individual "cracks" into a

    government or military maintained website. In a report of www.expressindia.comitwas said that internet was becoming a boon for the terrorist organizations.

    Cyber terrorism against the government organization

    At this juncture a necessity may be felt that what is the need to distinguish betweencyber terrorism and cybercrime. Both are criminal acts. However there is acompelling need to distinguish between both these crimes. A cyber crime isgenerally a domestic issue, which may have international consequences; howevercyber terrorism is a global concern, which has domestic as well as internationalconsequences. The common form of these terrorist attacks on the Internet is bydistributed denial of service attacks, hate websites and hate emails, attacks onsensitive computer networks, etc. Technology savvy terrorists are using 512-bitencryption, which is next to impossible to decrypt. The recent example may be citedof Osama Bin Laden, the LTTE, attack on Americas army deployment systemduring Iraq war.

    Cyber terrorism may be defined to be the premeditated use of disruptive activities,

    or the threat thereof, in cyber space, with the intention to further social, ideological,religious, political or similar objectives, or to intimidate any person in furtherance of

    such objectives.

    Another definition may be attempted to cover within its ambit every act of cyber

    terrorism. A terrorist means a person who indulges in wanton killing of persons or inviolence or in disruption of services or means of communications essential to thecommunity or in damaging property with the view to

    (1) putting the public or any section of the public in fear; or(2)affecting adversely the harmony between different religious, racial, language or

    regional groupsor castes or communities; or

    (3) coercing or overawing the government established by law; or(4)endangering the sovereignty and integrity of the nation

    and a cyber terrorist is the person who uses the computer system as a means or

    ends to achieve the above objectives. Every act done in pursuance thereofis an act of cyber terrorism.

  • 8/12/2019 Cyber Crime and Its Impact in Bangladesh

    18/22

    Trafficking

    Trafficking may assume different forms. It may be trafficking in drugs, humanbeings, arms weapons etc. These forms of trafficking are going unchecked becausethey are carried on under pseudonyms. A racket was busted in Chennai where drugswere being sold under the pseudonym of honey. Traffickers use computer andinformation technology as an effective communication tool. They use IRC chat

    rooms in which people from anywhere the world come together and chat with eachother. Criminals use it for meeting co-conspirators.

    3.5 NECESSARY LEGISLATIONS IN BANGLADESH TO TACKLE

    CYBERCRIME

    Cyber crime can involve criminal activities that are traditional in nature, such astheft, fraud, forgery, defamation and mischief, all of which are subject to penal lawsof a country. The abuse of computers has also given birth to a gamut of new agecrimes that are addressed by the special laws enacted to penalize these crimes. For

    example, in Banlgadesh Tatha O Jogajog Projukty Ain 2006 (Information andCommunication Technology Act, 2006) defines certain offences which does notcover by the Penal Code. And so it can be said that the Penal Code, 1860 is noteffective enough in dealing with cybercrimes.

    Addl. IGP Mr. N.B.K. Tripura in his speech on the occasion of inauguratingRegional Cybercrime Seminar held on 5 November 2012 at hotel Sheraton, Dhakasaid that- A case study of a computer virus, released by a young hacker in early2005, highlights the huge imbalance between the crime and the punishment causedby the lack of adequate legislative measures to deal with the issue.

    The parliament of Bangladesh has enacted Information and CommunicationTechnology Act, 2006 which defines certain activities as crime. The activities which

    made punishable under the Information and Technology Act of 2006 shall be thecybercrimes for the territory of Bangladesh. The activities are-

    Mischief of computer and computer system Alteration of source code of commuter Hacking in computer system Publication of false, indecent and defamatory statement or information in

    electronic form

    Access in reserve system False representation and concealment of information False electronic signature certificate Transmission of secrecy Disclosing electronic signature for cheating Committing crime through computer.

  • 8/12/2019 Cyber Crime and Its Impact in Bangladesh

    19/22

  • 8/12/2019 Cyber Crime and Its Impact in Bangladesh

    20/22

    Conclusion and Recommendations

    4.1 CONCLUSION

    Basically, no notable cyber crime has yet been committed in Bangladesh. Thegradual dependence and extensive use of computer and information technology bythe financial institutions like bank, insurance company, and other non-governmentorganizations increase the fear of commission of cyber crime here. Computer hasbeen used as a tool of crime like making forged certificates and documents for anumber of years in Bangladesh though the incident of targeting computer orcomputer system is very unusual.

    Capacity of human mind is unfathomable. It is not possible to eliminate cybercrimefrom the cyberspace. It is quite possible to check them. History is the witness that nolegislation has succeeded in totally eliminating crime from the globe. The only

    possible step is to make people aware of their rights and duties (to report crime as acollective duty towards the society) and further making the application of the lawsmore stringent to check crime. Undoubtedly the Act is a historical step in the cyberworld. Further it cannot be denied that there is a need to bring changes in theInformation Technology Act to make it more effective to combat cybercrime. It canbe concluded with a word of caution for the pro-legislation school that it should bekept in mind that the provisions of the cyber law are not made so stringent that itmay retard the growth of the industry and prove to be counter-productive.

    4.2 RECOMMENDATION S

    In the view of foregoing detail findings, discussion on the key findings andsubsequent conclusions, a number of recommendations have been offered. It issuggested that the offered recommendations are prioritized before going into action.Some recommendations have policy implication and so those should be dealt withcautiously with inclusion of strong policy advocacy strategy in the process.

    Following recommendations are being offered:

    Clear and self-explanatory Standard Operating Procedure to beimposed immediately for the Cybercrime Unit;

    A comprehensive induction program should be developed for all theconcerns of ICT and implement it as pilot basis;

    A separate Cybercrime Protection Act should be enacted; There must be a clear operating procedure to run Cybercaf and

    VOIP in Bangladesh.

  • 8/12/2019 Cyber Crime and Its Impact in Bangladesh

    21/22

    4.3 BIBLIOGRAPHY

    1. The Penal Code, 1860 (Act No. XLV of 1860)2. The Information and Communication Technology Act, 20063. Report on Regional Cybercrime Seminar, Dhaka (2012)4. Boham and Haley (2002)5. Kumar VinodWinning the Battle against Cyber Crime6. Kapoor G.V. - Byte by Byte7. Mehta Dewang- Role of Police In Tackling Internet Crimes8. Duggal PawanThe Internet: Legal Dimensions9. Monjur Kader: Criminology (Cybercrime)

  • 8/12/2019 Cyber Crime and Its Impact in Bangladesh

    22/22