Anda di halaman 1dari 17

CYBER CRIME IN

BANGLADESH: LAWS AND PRACTICES

Research Monogram

Submitted to
Dr. Md. Hashibul Alam Prodhan
Professor
Department of Law
Rajshahi University

Submitted by
Hasan Muhtady
Student of LLM
Roll 10039024
Registration No 1027
Session 2009- 2010
Department of Law
Rajshahi University
E-mail: hasan.muhtady@gmail.com

Department of Law
Rajshahi University

Researchers Declaration
We do hereby ceremonious declare that the research titled CYBER CRIME IN
BANGLADESH: LAWS AND PRACTICES is an original research work
completed by us under the supervision of Dr. M. Hasibul Alam, Professor,
Department of law, University of Rajshahi. It is neither copied out from
anybodys work nor published fully or partly in any journal in Bangladesh or
outside Bangladesh.
This work has not been submitted to any department or institution for any
degree or diploma in any from in Bangladesh or in abroad.
Hasan Muhtady
LLM
Department of Law

Acknowledgement
I am grateful to Allah for the good health and wellbeing that were necessary to
complete this present research.
I wish to express my sincere thanks to Dr. M. Hasibul Alam, Professor of
Department of Law, for providing me with all the necessary facilities for the
research.
We are grateful to all our respondents who have helped us with the preparation
of this report, we thank specially to departmental seminar library, Central library
of Rajshahi University for their cooperation. We also indebted to all our group
members and friends, whose comments and suggestions have added
significance to clarify of the report.

Hasan Muhtady
LLM
Department of Law

Abstract
This present developing world with the advantages of technology
cybercrime is now a deeply serious crime. It is, nowadays, becoming a
serious matter of concern all over the world. This paper describes the
nature of cybercrime which is committed in Bangladesh. As the use of
internet in Bangladesh is not as wide as other developed countries, crime,
however, related to internet is in emerging stage herein this country. The
study is exploratory in nature. Methodological triangulation (face to face
interview and case study) has been applied to collect pertinent data from
various kinds of man in Bangladesh. Like all other countries in
Bangladesh this crime is growing rapidly. Our present law are not
sufficient to stop this crime. Without the precaution of our citizen and the
ICT ministry we can not stop this crime. Presently we can see that in our
country many strong hackers group of our country are started cybercime
in whole world. It is revealed from the study that, though cyber crime is
not in serious condition in research area, the respondents are victimized
sometime by hacker, pornography sites and computer virus through
internet. It is continuously growing attention of the majority people of the
study area.

TABLE OF CONTENTS
Chapter 1
1.1 Introduction
1.2 Conditions of Cybercrime in Bangladesh
1.3 Research objectives
1.4 Methodology of research
1.5 Scope and limitation of the study
1.6 Literature review
1.7 Conclusion
Chapter 2: Background and general concept
2.1 Definition of Crime and Cybercrime
2.2 Development of Cybercrime
2.3 Nature of Cybercrime
2.4 Areas of Cybercrime
Chapter 3: Reasons and Classifications
3.1 Reasons behind Cybercrime
3.2 Classification of Cybercrime
3.3 Mode and Manner of Committing Cybercrime
3.4 Copyright and Trademark related offence
3.5 Future Cybercrime
Chapter 4: Cybercrime in Bangladesh
4.1 Recently committed Cybercrimes in Bangladesh
4.2 Cyber security in Bangladesh
4.3 Effect of Cybercrime in Bangladesh
4.4 Lack of Mechanism Control
Chapter 5: Cyber laws in Bangladesh
5.1 Enacted laws relating Cybercrime
5.2 Others laws preventing Cybercrime
5.3 Enforcements of Laws in Bangladesh
5.4 Implementation of Laws and Challenges
5.5 Other steps in preventing Cybercrime
Chapter 6:
6.1 International laws on Cybercrime
6.2 Recommendations
6.3 Conclusion

Chapter One
Introductory Discussion
1.1 Introduction:
It is certainly believed that present world cant think without internet and communication
technology. Computer and internet makes our life faster in both positive and negative side.
Cyber-crime refers to any crime that involves a computer and a network . The internet, along
with its advantages, has also exposed us to security risks that come with connecting to a large
network. Computers today are being misused for illegal activities like e-mail espionage,
credit card fraud, spams, and software piracy and so on, which invade our privacy and offend
our senses. Issues surrounding this type of crime have become high-profile, particularly those
surrounding hacking, copyright infringement Child pornography, and child grooming. Cybercrime is criminal activity done using computers and the Internet. This includes anything from
downloading illegal music files to stealing millions of dollars from online bank accounts. It is
not surely said that, from when the cybercrime was started but in 1999 at Taiwan a virus was
attracted named CIH, made the topic of cyber-crime familiar to the whole world. But at the
present world it cant be said that what the massive bad effect in the area is cyber-crime.
In the present time people become more dependent on computer and internet, as result, we
cant not think our daily activities without this technological help. This makes a criminal easy
to commit crime by using a computer from sitting any far place of the world. For committing
this crime the criminal need not to take any special risk. A cyber-criminal can destroy
websites and portals by hacking and planting viruses, carry out online frauds by transferring
funds from one corner of the globe to another, gain access to highly confidential and sensitive
information, cause harassment by e-mail threats or obscene material, play tax frauds, indulge
in cyber pornography involving children and commit innumerable other crimes on the
Internet. It is said that none is secure in the cyber world. The security is only for the present
moment when we are actually secure. With the growing use of the Internet, cyber-crime
would affect us all, either directly or indirectly.
The Convention on Cybercrime, Budapest, 23 November 2001, is the first convention which
was made to control cyber-crime world widely. The United Nation pass a Resolution on
combating the criminal misuse of information technologies was adopted by the General
Assembly on December 4, 2000 including as followings: (a) States should ensure that their
laws and practice eliminate safe havens for those who criminally misuse information
technologies. (b) Legal systems should protect the confidentiality integrity and availability of
data and computer systems from unauthorized impairment and ensure the criminal abuse is
penalized. Beside this many countries made new laws to control cyber-crime. In United
States and United Kingdoms there are specific cyber laws. In Indian, the Information
Technology Act and Indian Evidence Act control the cyber related crimes.
In the side of Bangladesh the Government responded by coming up with the first cyber law of
Bangladesh The Information and Communication Technology Act (ICT), 2006. The
Cabinet of Minister of Bangladesh has approved the Information and Communication
Technology bill (ICT), 2006 on February 2005 and it has been enacted on 8th October, 2006.
The ICT Act defines various terms. Which are innovative in the legal lexicon in Bangladesh..

In Bangladesh, there are no many laws relating to cyber-crime. Some provisions also inserted
in the Amendment of Telecommunication Act 2001 to control cyber-crime.

1.2 Conditions of Cybercrime in Bangladesh


In the present time it can be seen that beside the all over the country the technological
development also makes Bangladesh faster than before. As a result many cyber related crime
have started to be committed. The ICT Act 2006 tried to take this type of crime under control.
There are some provision which directly define some crime and also some provision to
ensure punishment to the criminals by taking some special measurements. Chapter I of the
ICT Act 2006 specifically defines some term which are used in ICT sector and cyber
legislation for clearing the concept. Chapter II of the Act specifically stipulates that any
subscriber may authenticate an electronic record by affixing his digital signature. Chapter III
is for application to the attribution, acknowledgement and dispatch of electronic records
among parties. Chapter V of the said Act gives a scheme for regulation of Certifying
Authorities. Chapter VII & VIII of the ICT Act talks about penalties, adjudication,
investigation, judgment and punishment for various offences and the penalties for damage to
computer, computer systems etc. There are some crimes which have discussed in this Act this
are unauthorized copying, extracting and downloading of any data, database, introduction of
virus, damage to computer system, hacking, tampering, electronic forger, publication of
information which is obscene in electronic form, breach of confidentiality and privacy and
publishing false digital signature certificate.

1.3 Research objectives:


The on-going study is aimed to deep study into the legal framework of cyber law of
Bangladesh as the countries laws and cyber-crimes. This thesis would be conduct over the
cyber-crime which is held in Bangladesh. The legal steps against the cyber-crime will control
the crimes. In view of the studies the goal is formulated in some specific objectives as
follows:
(i) To find out the importance of cyber-tribunal in Bangladesh and all over the world;
(ii)To find out the existing problems of cyber law in our country to control cyber-crimes;
(iii)
To know about cyber-crime in Bangladesh details.
(iv)
To promote effectiveness of the government and law enforcing agencies to
control cyber-crimes; and
(v)To identify the ways of making control over cyber-crime to stop the great loss of
economy.
In this point, it will be clear the present conditions of cyber-crime in Bangladesh. Beside this
the activities which does not cover under the law, will also find out. In this regard, the study
will review and analyse the literature, laws and practices of Bangladesh in accordance with
the methodology of the study and the relevant data.

1.4 Research Methodology:


The success of a research depends upon its methodology. This study will explain the recent
cyber-crimes which are happened in Bangladesh. And what kinds of stapes are taken by the
authority also will be examined. This study will examine the evolution of the law of cybercrime. In order to give complete shape to the study, a range of research methods would be
used:
(i) Review of literature and instruments on the cyber law;
(ii)Analysing the legal framework which control the cyber-crime in Bangladesh;
(iii)Review on records and reports published by cyber-tribunal in Bangladesh;
(iv)Analysing various data which are published and also analysing about the new crimes
to get proper solutions; and
(v)Case studies relating to cyber-crimes.
Discussion on the conceptual issues will be based on the literature including books, journals,
electronic materials, statutory law and case law.

1.5 Scope and limitation of the study:


The scope of the study is very much wider in the present situation of our country. There
various offences occurred in everyday because of internet. But the law of Bangladesh does
not cover all the crimes relating to cyber offences. Due to shortage of time, investment and a
less control, researcher cannot go for a wide way. Therefore I have to depend on the
information available in the web side of the laws relating to cyber-crime.

1.6 Literature review:


Since the technology is changing day by day and demand of new laws is growing due to meet
different new crimes arising from development of technology. Cyber-crime became a subject
of discussion and research from the days of the formation of peaceful society, innumerable
books and articles are written on this topic in side of Bangladesh. Moreover, most of the
previous literature is written by academics having shortage of information and the new
coming crimes. The books regarding cyber-crimes are found in different libraries and online.
.
On the legal relationship some other books, which bear much significance are ;
Oporad Biggan porichity By Prof. Dr. Borhan Uddin Khan , A text Book on Cyber law of
Bangladesh By Dr. Zulfiquar Ahmed, ICT Policy of Bangladesh Govt. publication. A book
of R. K. Chaubey, An Introduction to Cyber Crime and Cyber Laws is an important book to
analysing the main kinds of cyber-crimes.
Apart from these works, a list of other books, articles, documents, statutes, and journals on
different aspects of the role may be found but none of them has dealt with this research topic
in the light and details as it has been intended to be done in this work. In none of them could
be found an unbiased and in-depth treatment of this burning research area.

1.7 Conclusion:
Cybercrime is the crime which is wider than any other crime. Beside of law, technological
development is needed for stopping this crime. Developing country like Bangladesh many
people are not aware about this serious crime. Beside personal damages, economical damages
are also happen. The national security is in danger by cause of cybercrime. There are many
laws in all over the world also in Bangladesh to stop this heinous crime but we have no
control over cyberspace as a result this boundless crime getting more opportunities to
commit. By the end of this study it will be clear to us about the present condition of cyber
crime in Bangladesh, the laws relating this crime, and how far those laws are able to stop this
modern crime.

Chapter- Two
Background and general concept
2.1 Definition of Crime and Cybercrime:
The cybercrime is that kinds of crime which is not a crime like others. This crime can be
committed from any part of the world. So before this issue we need to know what is crime
under law. A crime is an act or the commission of an act that is forbidden or the omission of a
duty that is commanded by a public law and that makes the offender liable to punishment by
that law; especially : a gross violation of law.
A crime is an offence against a public law. This word, in its most general sense, includes all
offences, but in its more limited sense is confined to felony.
The term offence may be considered as having the same meaning, but is usually understood
to be a crime not indictable but punishable, summarily or by the forfeiture of a penalty.
Most reports, guides or publications on cybercrime begin by defining the term cybercrime.
One common definition describes cybercrime as any activity in which computers or networks
are a tool, a target or a place of criminal activity. One example for an international approach
is Art. 1.1 of the Draft International Convention to Enhance Protection from Cyber Crime and
Terrorism (CISAC) that points out that cybercrime refers to acts in respect to cyber systems.
Some definitions try to take the objectives or intentions into account and define
cybercrime more precisely, defining cybercrime as computer-mediated activities which are
either illegal or considered illicit by certain parties and which can be conducted through
global electronic networks
This demonstrates that there are considerable difficulties in defining the term cybercrime.
The term cybercrime is used to describe a range of offences including traditional computer
crimes, as well as network crimes. As these crimes differ in many ways, there is no single
criterion that could include all acts mentioned in the Stanford Draft Convention and the
Convention on Cybercrime, whilst excluding traditional crimes that are just committed using
hardware. The fact that there is no single definition of cybercrime need not be important, as
long as the term is not used as a legal term.

2.2 Development of Cybercrime:


The popularity of the Internet is growing exponentially. The first recorded cyber crime took
place in the year 1820. That is not surprising considering the fact that the abacus, which is
thought to be the earliest form of a computer, has been around since 3500 B.C. in India, Japan
and China. The era of modern computers, however, began with the analytical engine of
Charles Babbage. In 1820, Joseph-Marie Jacquard, a textile manufacture in France, produced
the loom.This resulted in a fear amongst Jacquards employees that their traditional
employment and livelihood were being threatened. They committed acts of sabotage to
discourage Jacquard from further use of their new technology. This is the first recorded cyber
crime. Interpol was the first international organization dealing with computer crime and penal

legislation. In conjunction with an Interpol Conference in 1981, a survey of Interpol member


countries on computer crime and penal legislation identified several problems in the
application of existing penal legislation. The Council of Europe appointed in 1985 another
expert committees in order to discuss the legal issues of computer-related crime. A summary
of the guidelines for national legislatures with liability for international acts only, was
presented in the Recommendation of 1989. The UN adopted a resolution on computer crime
legislation at 8th U.N. Congress on the Prevention of Crime and the Treatment of Offenders
in Havana, Cuba, in 1990. The United Nations Manual on the Prevention and Control of
Computer-related Crime was published in 1994. The last part of this historic presentation is
the Wurzburg conferences organized by the University of Wurzburg in 1992. These
conferences led to 29 national reports, and recommendations for the development of
computer crime legislations. Most countries in Europe adopted new penal laws according to
the recommendation in the 1980s and 90s. Similar development occurred in the U.S.A.
Canada and Mexico. Also in Asia, where Japan, Singapore, Korea and Malaysia were the
leading countries. Today computers have come a long way, with neutral networks and nanocomputing promising to turn every atom in a glass of water into a computer capable of
performing a Billion operations per second.

2.3 Nature of Cybercrime:


The term cybercrime includes a wide variety of crime. Recognised crimes cover a broad
range of offences, making it difficult to develop a typology or classification system for
cybercrime. An interesting system can be found is found in the Council of Europe
Convention on Cybercrime. The Convention on Cybercrime distinguishes between four
different types of offences:
Offences against the confidentiality, integrity and availability of computer data and systems;
Computer-related offences;
Content-related offences and
Copyright-related offences;

Chapter-Three
Reasons and Classifications
3.1 Reasons behind Cybercrime
There we can seeThe reasons for the vulnerability of computers may be said to be:
Capacity to store data in comparatively small spaceThe computer has unique characteristic of storing data in a very small space. This affords to
remove or derive information either through physical or virtual medium makes it much more
easier.
Easy to accessThe problem encountered in guarding a computer system from unauthorised access is that
there is every possibility of breach not due to human error but due to the complex technology.
By secretly implanted logic bomb, key loggers that can steal access codes, advanced voice
recorders; retina imagers etc. that can fool biometric systems and bypass firewalls can be
utilized to get past many a security system.
3.ComplexThe computers work on operating systems and these operating systems in turn are composed
of millions of codes. Human mind is fallible and it is not possible that there might not be a
lapse at any stage. The cyber criminals take advantage of these lacunas and penetrate into the
computer system.
4.NegligenceNegligence is very closely connected with human conduct. It is therefore very probable that
while protecting the computer system there might be any negligence, which in turn provides a
cyber criminal to gain access and control over the computer system.
5. Loss of evidenceLoss of evidence is a very common & obvious problem as all the data are routinely
destroyed. Further collection of data outside the territorial extent also paralyses this system of
crime investigation.

3.2 Classification of Cybercrime


The term cybercrime includes a wide variety of crime. Recognised crimes cover a broad
range of offences, making it difficult to develop a typology or classification system for
cybercrime. An interesting system can be found is found in the Council of Europe
Convention on Cybercrime. The Convention on Cybercrime distinguishes between four
different types of offences:
Offences against the confidentiality, integrity and availability of computer data and systems;
Computer-related offences;
Content-related offences and

Copyright-related offences;
Now this types of crimes are classified in different categories. This types of cybercrimes are
happening all over the world. With the change of time new types of cybercrime are adding
with this crime. The main crimes are now defined here.
Offences Against the Confidentiality, Integrity and Availability of Computer Data and
Systems:
3.2.1. Illegal Access (Hacking, Cracking):
Since the development of computer networks, their ability to connect computers and offer
users access to other computer systems, computers have been used by hackers for criminal
purposes. Hackers need not be present at the crime scene; they just need to circumvent the
protection securing the network. In many cases of illegal access, the security systems
protecting the physical location of network hardware are more sophisticated than the security
systems protecting sensitive information on networks, even in the same building. The illegal
access to computer systems hinders computer operators from managing, operating and
controlling their systems in an undisturbed and uninhibited manner. In most cases, illegal
access (where law seeks to protect the integrity of the computer system itself) is not the endgoal, but rather a first step towards further crimes, such as modifying or obtaining stored data
(where law seeks to protect the integrity and confidentiality of the data).
3.2.2 Data Espionage:
Espionage or spying involves individual obtaining information that is considered secret or
confidential without the permission of the holder of the information. Denial of Service attacks
normally is an attack on a computer network using hundreds, even thousands of computers
sending data to the network at the same time causing the network to crash. Hackers use
special programs to hijack computers and coordinate such attacks.
3.2.3. Illegal Interception:
The use of ICTs is accompanied by several risks related to the security of information
transfer. Unlike classic mail order operations within a country, data transfer processes over
the Internet involve numerous providers and different points where the data transfer process
could be intercepted. The weakest point for intercept remains the user, especially users of
private home computers, who are often inadequately protected against external attacks.
3.2.4. Data Interference:
Attacks or obtaining of this information can result in financial losses. Besides deletion, the
alteration of such information could also have major consequences. Previous legislation has
in some not completely brought the protection of data in line with the protection of tangible
objects. This enabled offenders to design scams that do not lead to criminal sanctions
3.2.5 Content related Offences:
Many times content from any computer network and any system may be copied illegally by
the cyber criminal. They use this data in their own name, this type of crime generally happen
in our country, this is totally illegal in our country, but no one try to stop this crime.
3.2.6. Child Pornography:
By the use of computer child pornography is very easily occurred. Child pornography is a
form of child sexual exploitation. The Internet is becoming the main instrument for the trade
and exchange of material containing child pornography. The major reasons for this

development are the speed and efficiency of the Internet for file transfers, its low production
and distribution costs and perceived anonymity. Pictures placed on a webpage can be
accessed and downloaded by millions of users worldwide. One of the most important reasons
for the success of web pages offering pornography or even child pornography is the fact
that Internet users are feeling less observed while sitting in their home and downloading
material from the Internet. Unless the users made use of means of anonymous communication
the impression of a missing traceability is wrong. Most Internet users are simply unaware of
the electronic trail they leave while surfing.
Data diddling :
This kind of an attack involves altering raw data just before it is processed by a computer and
then changing it back after the processing is completed.
Racism, Hate Speech, Glorification of Violence
Religious Offences
Illegal Gambling and Online Games
Libel and False Information
Spam and Related Threats
Other Forms of Illegal Content
Copyright and Trademark related Offences
Copyrightrelated Offences
Trademarkrelated Offences
Computer related m Offences
Fraud and Computerrelated Fraud
Computerrelated Forgery
Identity Theft
Misuse of Devices
Combination Offences
Cyberterrorism:
Cyberterrorism is the act of Internet terrorism in terrorist activities, including acts of
deliberate, large-scale disruption of computer networks, especially of personal computers
attached to the Internet, by the means of tools such as computer viruses.
Cyberterrorism is a controversial term. Some authors choose a very narrow definition,
relating to deployments, by known terrorist organizations, of disruption attacks against
information systems for the primary purpose of creating alarm and panic. By this narrow
definition, it is difficult to identify any instances of cyberterrorism.
Cyberwarfare:
Cyberwarfare is Internet-based conflict involving politically motivated attacks on information
and information systems. Cyberwarfare attacks can disable official websites and networks,
disrupt or disable essential services, steal or alter classified data, and criple financial systems
among many other possibilities.
Cyberlaundering:
Cyber laundering is a new way to hide the proceeds of crime and the advance of
technological solutions of electronic payments and online gambling has eliminated the need
for time and space as compared to the traditional way of money laundering to achieve
Cyberlaundering.
Virus attack:
A computer virus is a computer program that can infect other computer programs by
modifying them in such a way as to include a (possibly evolved) copy of it. Viruses can be

file infecting or affecting boot sector of the computer. Worms, unlike viruses do not need the
host to attach themselves to.

3.3 Mode and Manner of Committing Cybercrime:


There are various modes or methods by which cybercrime can be committed. Generally
illegally enter in another computer network and making anything wrong to their data that may
be deleting or change or anything. Now some of the methods are described below.
1. Denial of Service attack:
The computer of the victim is flooded with more requests than it can handle which cause it to
crash. Distributed Denial of Service (DDoS) attack is also a type of denial of service attack,
in which the offenders are wide in number and widespread. E.g. Amazon, Yahoo.
2. Data diddling:
This kind of an attack involves altering raw data just before a computer processes it and then
changing it back after the processing is completed. The electricity board faced similar
problem of data diddling while the department was being computerised.
3. Unauthorized access to computer systems or Hacking:
This kind of offence is normally referred as hacking in the generic sense. However the
framers of the Information and Communication Technology Act, 2006 have nowhere used
this term so to avoid any confusion we would not interchangeably use the word hacking for
unauthorized access as the latter has wide connotation.
4. Theft of information contained in electronic form:
This includes information stored in computer hard disks, removable storage media etc. Theft
may be either by appropriating the data physically or by tampering them through the virtual
medium.
5. Virus / worm attacks:
Viruses are programs that attach themselves to a computer or a file and then circulate
themselves to other files and to other computers on a network. They usually affect the data on
a computer, either by altering or deleting it. Worms, unlike viruses do not need the host to
attach themselves to.
6. Email bombing:
This kind of activity refers to sending large numbers of mail to the victim, which may be an
individual or a company or even mail servers there by ultimately resulting into crashing.
7. Trojan attacks:
This term has its origin in the word Trojan horse. In software field this means an
unauthorized programme, which passively gains control over anothers system by
representing itself as an authorized programme. The most common form of installing a Trojan
is through e-mail. E.g. a Trojan was installed in the computer of a lady film director in the
U.S. while chatting. The cyber criminal through the web cam installed in the computer
obtained her nude photographs. He further harassed this lady.

8. Internet time thefts:


Normally in these kinds of thefts the Internet surfing hours of the victim are used up by
another person. This is done by gaining access to the login ID and the password. E.g. Colonel
Bajwas case- the Internet hours were used up by any other person. This was perhaps one of
the first reported cases related to cybercrime in India. However this case made the police
infamous as to their lack of understanding of the nature of cybercrime.

3.5 Future Cybercrime


Chapter Four
Cybercrime in Bangladesh
4.1 Recently committed Cybercrimes in Bangladesh:
In Bangaldesh Cybercrime has drawn public attention for the last couple of years. At present,
the Skype conversation and blogging are burning issues of our country. Pornography video
and picture upload happen in our country as a regular basis. We should act hand in hand to
stop criminal activities.
Bangladesh does not have enough natural resources and has been trying to achieve the
economic development through the utilization of ICT industry. Over the last few years, many
nations have taken advantage of the opportunities afforded by ICT within a policy
framework, laid down guidelines and preceded with the formulation of a national ICT
strategy as a part of the overall national development plan. Bangladesh intends to use ICT as
the key-driving element for socio-economic development. The present government has also
declared the vision-2021 i.e. within 2021 this country will become Digital Country and the
per capita income will be equal to a middle income country. But the government as well as
other concerns should consider crimes that may be committed in this world with the
expansion of internet and other networks to convert this country into a digital country.
The first recorded cyber crime took place in the year 1820. That is not surprising considering
the fact that the abacus, which is thought to be the earliest form of a computer, has been in
India, Japan and China around since 3500 B.C. The era of modern computers, however,
began with the analytical engine of Charles Babbage. In 1820, Joseph-Marie Jacquard, a
textile manufacturer in France, produced the loom. This device allowed the repetition of a
series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's
employees that their traditional employment and livelihood were being threatened. They
committed acts of sabotage to discourage Jacquard from further use of the new technology.
This is the first recorded cyber crime in the world history. A recent survey showed that a new
cyber crime is being registered every 10 seconds in Britain. The situation of other countries in
the world is almost the same and in some cases it is more critical and miserable. On July 4,
2009 two dozens of websites of South Korea and United States of Americas were under
cyber attack and the attack was remarkably successful in limiting public access to victim web
sites such as government web sites, treasury department, federal trade commission and secret
service. They were continuously reporting problems days after the attack started during the
July 4 holiday.
IT experts believe that about 90 percent of cyber crimes stay unreported. In case of
Bangladesh, the situation is getting worsening day by day. The most common cyber attacks
and crimes are listed below in Bangladesh:

1. Blackmailing girl by capturing their nude photographs and video on the sly and
threatening to expose publicly. Such incidents are caused frequently by their boyfriends and
others.
2. A number of community websites have been introduced, which the young girls and boys
are using to exchange phone numbers for Posting hidden videos or even pictures with nudity
etc.
3. Hacking in the website of Bangladesh Computer Society, which took place after a few
days of a 3 day-long Regional Seminar on Cyber Crime in Dhaka.
4. E-mail threatening the current Prime Minister Sheikh Hasina from a cyber cafe.
5. Hacking into the Internet account of Barisal DC office in 2003 AD, the incident was
revealed after the DC office received a heavily bloated Internet bill and lodged a complaint
with the Bangladesh Tar and Telephone Board (BTTB).
6. Hacking took place in the website of Bangladesh Rapid Action Battalion (RAB) in 2008,
during the access to www.rab.gov.bd, the website read: "Hacked by Shahee_Mirza."
7. Hacking the mail of BRAC Bangladesh13
8. Stealing the transaction report of Dhaka Stock Exchange through hacking.
9. Inserting naked pictures to the website of Bangladesh National Parliament.
10. Inserting naked pictures to the website of Jamate Islami Bangladesh.
11. Inserting naked pictures to the website of The Daily Jugantor.
12. E-mail threatening to World Bank Dhaka Office.

4.2 Cyber security in Bangladesh


4.3 Effect of Cybercrime in Bangladesh
4.4 Lack of Mechanism Control
Chapter 5: Cyber laws in Bangladesh
5.1 Enacted laws relating Cybercrime
5.2 Others laws preventing Cybercrime
5.3 Enforcements of Laws in Bangladesh
5.4 Implementation of Laws and Challenges
5.5 Other steps in preventing Cybercrime
Chapter 6:
6.1 International laws on Cybercrime
6.2 Recommendations
6.3 Conclusion
www.cybercrimejournal.co.nr

Anda mungkin juga menyukai