Cyber Crime -- Bangladesh Perspective
-
Upload
ahsan-habib-sinha -
Category
Documents
-
view
287 -
download
4
Transcript of Cyber Crime -- Bangladesh Perspective
Bangladesh Police 1
WelcomeTo
Our Presentation
2
Presented to:
Kamrul HasanLecturer
Department of BBAState University of Bangladesh
3
We are:
Ahsan Habib SinhaID:UG01-17-08-010Rakib AhamedID:UG01-17-08-009Golam Md. Nur Hasan AliID:UG01-17-08-088Riad ArfinID:UG01-17-08-033Asma ul HusnaID:UG01-17-08-001
Bangladesh Police 4
5
Cyber crime: Definition (1)Council of Europe
Criminal offences committed against or with the help of computer networks
Offence against the confidentiality, integrity and availability of computer data and systems.
6
Offences against computer data and systems- Illegal access - Illegal interception - Data interference - System interference - Misuse of devices
Cyber crime: Definition (2)Cyber Crime Convention
7
Computer related offences- Computer-related forgery - Computer-related fraud - Offences related to child pornography - Offences related to infringements of copyright and related rights
Cyber crime: Definition (2)Cyber Crime Convention
8
Cyber crime : Definition (3)
General crimes by using new technologies
- Defamation New crimes using Internet-based
technologies- Fraud on on-line trade
Attacks upon the computer systems and networks themselves
- Illegal access
9
Financial Institutions 67%
Education 18%
Government 10%
Non-Profit Organisation 5%
Cyber crime incidents by organisation
Increase in Cyber Crime
Source: Niser
Cyber crime 2002 2003 %Hacking threats 262 367 40Virus 260 449 73
10
Major Cybercrimes Unauthorised access to a computer
system Unauthorised access to data or
information Introduces or causes to introduce viruses Tampering with computer source
documents Cause Damage to Computer system or
causes any disruption Denies access to any person authorised to
access the computer system Spread of viruses
11
Hacker Traits:
• Curiosity and/or desire to learn
• Gang mentality
• Psychological needs
• Misguided trust in other individuals
• Altruistic reasons
• Revenge and malicious reasons
12
Why do hackers hack?
• Emotional issues
• Desire to embarrass the target
• Joyriding
• Scorekeeping
• Espionage (industrial, political)
• Because they can…
13
Targets:
Financial data
Intellectual Property
Personal data
System Access
Theft, modification or sale, blackmail
Theft, sale, personal gain
Modification, sale
Sabotage, backdoors, exploitation
14
CELLULAR PENETRATION BETWEEN CELLULAR PENETRATION BETWEEN SELECTED COUNTRIES 2002SELECTED COUNTRIES 2002
84.4979.14
67.9562.11
48.81
37.3
26.04
16.09
1.220
10
20
30
40
50
60
70
80
90
UK Singapore Korea, Rep Japan USA Malaysia Thailand China India Source: ITU@2003
15
To provide legal certainty for e-transactions
undertaken by businesses or Government, two new
legislations will be introduced:-
I. Electronic Transactions Bill – to address electronic transactions and communications.
II. E-Government Activities Bill – to support and promote electronic government.
ENACTMENT OF NEW LAWS
16
What the law of Bangladesh says: if a person intentionally causes loss
or damage to any other person or organisation by any act which destroys, deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it by any means, would be considered to have engaged in hacking.
17
What makes us difficult to investigate cybercrime? Increase in the number of
cyber crime HARDLY imagined what happens
Lack of resources Trained investigators Equipments
The nature of the Internet Speed of Cybercrime Damage of Cybercrime Transnational nature of cyberspace Volatility nature of digital evidence
18
The Bangladesh Scenario
Malicious Mail to Foreign Diplomatic Mission and Other VIPs
Pornography Use of e-mail for illegal activities Use of Internet for transmitting false and
malicious information Use of Internet for Prostitution Use of Internet for Women & Child
Trafficking
19
e – Readiness for Police
The various government across the globe are investing to bring the Police Force to meet the challenges of the Borderless Cyber Crime,
Government of Bangladesh has also taken to make the Police Force e- Ready.
20
ICT Law in Bangladesh
•ICT Act 2006
•Amendment of Telecommunication Act 2001
21
ICT Act 2006 Eliminates barriers to e-commerce, Promotes legal and business
infrastructures to secure e-transactions,
Facilitates electronic filing in government agencies and
Ensures efficient delivery of electronic records from government offices
22
ICT Act 2006 Help maintain the latest technology by
freeing it from nuisance as punitive provisions Publishing obscene or defamatory information in electronic form
The law ensures five years imprisonment and a fine of up to Taka 5 crore for offenders for the first conviction and that could be extended to 10 years imprisonment and Taka 10 crore as fine for each subsequent offence of the same nature.
23
ICT Act 2006
Powers of Police Officers and Other Officers
Establishment of Cyber Appellate Tribunal
24
Special Provisions for LEA under Amended Telecom Act
Telecom Service Providers including Internet service providers are considered as intermediaries
All such Service Providers to maintain log of all their customers.
Such data to be produced on demand by Service Providers to any designated enquiry officer from Law Enforcement Agency (LEA)
25
How could we co-operate each other regionally or internationally?
@1. By exchanging information
2. By building investigation capability
3. By arranging Regional Working Parties
26
Cooperation, sharing of knowledge and practical experience
Promotion of standardization of methods Establish good practice guidelines
Working Parties on IT Crimes may concentrate :
27
Recommendations
Cooperation, sharing of knowledge and practical experience
Promotion of standardization of methods Establish good practice guidelines To share the current crime scenes Establishment of digital forensic laboratory
for investigation and detection of cyber crime.
To train trainers or teachers on IT crime investigation
28
Recommendations
Usage of Interpol Criminal Information System and Interpol Secure Web Site https://www.interpol.int
Effective usage of National Central Reference Points
To initiate IT related projects.
29
ConclusionAct as Global police rather than Regional or national police to fight against cyber crime
Rise of cyber crime insists the law enforcers to work as global police rather than regional or national police only. Citizens of 21st centuries need to fight together against their common enemies. The Police Force through global partnership need be able to meet the challenges of the technology to curb all crimes including Cyber Crime.
30
Any Any Questions?Questions?
31