SlideShare a Scribd company logo
2
Most read
3
Most read
8
Most read
Presentation Topic
Present Trend of Cyber Crime in
Bangladesh: Regulatory Gaps
and Future Directions.
Presented To:
Dr. Jakerul Abedin
Department of Law & Justice,
Southeast University.
Presented By
Debashish Mojumder
Md. Main Uddin
Sohan Khan
Mahmudul Hasan
Md. Firoz Mahmud
Content
1. Introduction
2. What is Cyber Crime?
3. Internet and Cyber Crime
4. Types of Cyber Crime
5. Present Trend of Cyber Crime
6. Impact of Cyber Crime
7. Reasons of Cyber Crime
8. Cyber Law in Bangladesh
9. Regulatory Gaps
10. Necessary Legislations in Bangladesh to Tackle Cyber Crime
11. Conclusion
12. Future Directions or Recommendation
Introduction
Cyber crime is an activity done using computers and
internet. We can say that it is an unlawful acts wherein
the computer either a tool or target or both.
 What is Cyber Crime?
Debarati Halder and K. Jaishankar define
cybercrimes as: "Offences that are committed against
individuals or groups of individuals with a criminal
motive to intentionally harm the reputation of the
victim or cause physical or mental harm, or loss, to the
victim directly or indirectly, using modern
telecommunication networks such as Internet and
mobile phones.
 Examples of Cyber Crime:
Copyright Infringement
Child Pornography
Piracy
Cyber extortion
Identity Theft
Phishing
Carding
 Internet Crime:
The Internet is known as the
World Wide Web. The Internet
may also be used to engage in
other activities such as sending
and receiving emails, trading
files, exchanging instant
messages, chatting online,
streaming audio and video, and
making voice calls.
 Examples of Computer Crimes:
Improperly accessing a computer, system, or network;
Modifying, damaging, using, disclosing, copying, or taking programs
or data;
Introducing a virus or other contaminant into a computer system;
Using a computer in a scheme to defraud;
Interfering with someone else's computer access or use;
Using encryption in aid of a crime;
Falsifying email source information; and
Stealing an information service from a provider.
 Types of Cyber Crime
CYBERCRIMES IN TWO WAYS BASED ON USE OF COMPUTER:
THE COMPUTER AS A TARGET: Using a computer to attack other computers.
E.g. Hacking, Virus/Worm attacks, DOS attack etc.
THE COMPUTER AS A WEAPON: Using a computer to commit real world crimes.
E.g. Cyber Terrorism, Credit card frauds, Pornography etc.
TYPES OF CYBERCRIME:
1. Unauthorized use of a computer
2. Cybercrime may be committed by creating or releasing a malicious
computer program.
(E.g. computer virus, Trojan horse).
3. Cybercrime may be committed by stalking in cyberspace.
 BROAD CLASSIFICATION:
The subject of Cybercrime may be broadly classified into three groups. These are-
AGAINST INDIVIDUALS
A. Person &
B. Property of an individual
AGAINST ORGANIZATION
A. Government.
B. Firm, Company, Group of Individuals.
AGAINST SOCIETY AT LARGE
A. Polluting the youth through indecent exposure.
B. Pornography
C. Financial crimes.
D. Sale of illegal articles, online gambling, etc.
 Misuse of Information Technology
Unauthorized access and hacking
Virus dissemination
Software piracy
Credit card fraud
Illegal sales of articles
Email bombing
Email spoofing
Cyber deformation
Email spamming
Pornography
 Present Trend of Cyber Crime:
1. Bangladesh Bank Heist 2016
2. Skype Scandal over International War Crime Tribunal
3. Bangladesh Computer society website hacked in 2012
4. Stealing the transaction report of Dhaka Stock Exchange
5. Partho threatening prime minister Sheikh Hasina through
email in 2004
6. Inserting porn movies to the Bangladesh National
Parliament website.
 Impact of cyber crime:
1. Impact against individual
2. Impact against individuals property
3. Impact against organization
4. Impact against government
5. Impact against society
 Reasons of cyber crime:
1. Easy to access
2. Weak security
3. Negligence
4. Loss of evidence
5. Weak gateway security
6. Bad intention of uses Internet
7. Unfamiliarity of technology
8. Absence of proper filter
& Others
 Cyber Law in Bangladesh:
1. Bangladesh plans for strict Cyber-Crime laws
2. The Information and Communication
Technology Act, 2006
Drafted Act
1. The Digital Security Act, 2016
 Regulatory Gaps:
(i) The Act remains silent about various intellectual property rights like copy right, trade mark
and patent right of e-information and data.
(ii) The enactment has a major effect on e-commerce and m-commerce in Bangladesh. But it
keeps itself mum as to electronic payment of any transaction.
(iii) The legislation was initially supposed to be applied to crimes committed all over the
world; but nobody knows how this can be achieved in practice.
(iv) Spamming has become a peril in the west as such they have made anti spamming
provisions in cyber law. However, there is no anti spamming provision in our Act.
(v) Domain name is the major issue which relates to the internet world thoroughly. But the
ICT Act, 2006 does not define ‘domain name’ and the rights and liabilities relating to this.
(vi) The Act does not address any crime committed through using mobile phones.
(vii) This law made e-mails as evidence, conflicting with the country’s Evidence Act that does
not recognize as e-mails as evidence.
 Cyber Tribunal:
According to section 68 of the Information and Communication
Technology Act, 2006 for the speedy and effective disposal of
cases under this Act, Government shall establish one or more
cyber tribunal.
Cyber tribunal shall take a case for trial –
a) Upon the report of a police officer not below the rank of sub-
inspector or
b) Upon a complaint made by a controller appointed under this
Act or by any other person authorized by the controller.
 Cyber Appellate Tribunal:
The Government shall establish one or more cyber appellate
tribunal. The appellate tribunal shall be constituted by one
chairman and two members appointed by the Government.
They shall be appointed for 3-5 years.
Cyber Appellate Tribunal shall have no original jurisdiction.
It shall only hear and dispose of appeals from the order and
judgment of the Cyber Tribunal and Sessions Court in
appropriate cases. The decision of the appellate tribunal shall
be final.
 Conclusion:
Basically, no notable cyber crime has yet been committed in
Bangladesh. The gradual dependence and extensive use of computer
and information technology by the financial institutions like bank,
insurance company, and other non-government organizations
increase the fear of commission of cyber crime here. Computer has
been used as a tool of crime like making forged certificates and
documents for a number of years in Bangladesh though the incident
of targeting computer or computer system is very unusual.
 Future Directions:
suggest the government to enact cyber law in our country to prevent cyber
criminals from committing cyber crime in Bangladesh.
suggest Government to establish one digital forensic laboratory in our country for
investigation and detection of cyber crime.
urgent need to develop a cyber crime legislation that will protect cyber security in
Bangladesh.
Cyber police force is also needed in order to detect cyber criminals.
providing training for a group of professionals and developing software.
There is also a need to have more projects on cyber crime legislation and
enforcement capacity building and training courses through out the country.
Field Visit:
With Director of Legal & Licensing Division of BTRC
Thanks to All

More Related Content

PPTX
Cyber crime-in-bangladesh
PPTX
Cyber security and prevention in Bangladesh
PPTX
Cyber crime
PPTX
Cyber Crime
PDF
Cyber Security law in Bangladesh
PPTX
Cyber crime
PPTX
Cyber crime - What is and types.
PPTX
Introduction to Cyber Crime
Cyber crime-in-bangladesh
Cyber security and prevention in Bangladesh
Cyber crime
Cyber Crime
Cyber Security law in Bangladesh
Cyber crime
Cyber crime - What is and types.
Introduction to Cyber Crime

What's hot (20)

PPTX
Cybercrime
PPTX
Cyber law in bangladesh
PPT
Nature of crime
PPTX
Cyber Security & Crime In Bangladesh
PPTX
Cyber Tribunal and Cyber Appellate Tribunal in Bangladesh
PPTX
Cyber crime and security in pakistan
PPT
What is terrorism
PPTX
Cyber crime- a case study
PPSX
Cyber crime and cyber security
PPT
Rule of law in bangladesh
PPTX
CYBER TERRORISM
PPTX
Cyber crime ppt
PPT
Cyber Crime
PPT
Human Trafficking | History & Waves | Prevention | HT in Pakistan |
PPT
CYBER-CRIME PRESENTATION.ppt
PPTX
Cyber crime
PPTX
Cyber crime ppt new
PPTX
Cyber Crime
PPTX
Cyber Crime
Cybercrime
Cyber law in bangladesh
Nature of crime
Cyber Security & Crime In Bangladesh
Cyber Tribunal and Cyber Appellate Tribunal in Bangladesh
Cyber crime and security in pakistan
What is terrorism
Cyber crime- a case study
Cyber crime and cyber security
Rule of law in bangladesh
CYBER TERRORISM
Cyber crime ppt
Cyber Crime
Human Trafficking | History & Waves | Prevention | HT in Pakistan |
CYBER-CRIME PRESENTATION.ppt
Cyber crime
Cyber crime ppt new
Cyber Crime
Cyber Crime
Ad

Similar to Present Trend of Cyber Crime in Bangladesh (20)

PPTX
PPTX
Cybercrime final-ppt
PPTX
cyber crime in bangladesh
PPTX
Cyber crime & security
PPTX
Cybercrime a growing threat of 21 st century !!!
PPTX
Cybercrime (sociology)
PPTX
Cyber crime
PPTX
Computer Crime
PPTX
Cyber crime
PPTX
presentation_on_cyber_crimes_slides.pptx
PPTX
Cyber crime ppt
PDF
Cybercrimeppt 160421074211
PPTX
Cyber crime and issues
PPTX
Cyber crime-140128140443-phpapp02
PPTX
Cyber crime-140128140443-phpapp02
PPTX
Cyber crime types & laws
PPTX
Cyber Crime
PPTX
Unit-3 Cyber Crime PPT.pptx
PPTX
BDNOG17 Plenary Session, Security Concerns: A perspective in Smart Bangladesh
PPTX
Module 1.pptx
Cybercrime final-ppt
cyber crime in bangladesh
Cyber crime & security
Cybercrime a growing threat of 21 st century !!!
Cybercrime (sociology)
Cyber crime
Computer Crime
Cyber crime
presentation_on_cyber_crimes_slides.pptx
Cyber crime ppt
Cybercrimeppt 160421074211
Cyber crime and issues
Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02
Cyber crime types & laws
Cyber Crime
Unit-3 Cyber Crime PPT.pptx
BDNOG17 Plenary Session, Security Concerns: A perspective in Smart Bangladesh
Module 1.pptx
Ad

Recently uploaded (20)

PPTX
Digital Security in Cyber Law and Mitigating Cyberxrimes
PPTX
Lecture Notes on Family Law - Knowledge Area 5
PDF
Vinayaka Mission Law School Courses and Infrastructure.pdf
PDF
Constitution of India and fundamental rights pdf
PPTX
Ethiopian Law of Contract short note.pptx
PPTX
Aligarh Muslim University’s Minority Status A Legal Tug of War.pptx
PPTX
Unit-1: Historical Perspective: Constitutional Developments since 1858 to 1947
PDF
TRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING-PDF-FILE.pdf
PDF
Endemic species [Recovered].pdf,,,,,,,,,,,,,,,,,,,,
PDF
Notes to accompany the TMT and FRAND Overview Slides
PPT
3. INDUTRIAL RELATIONS INTRODUCTION AND CONCEPTS.ppt
PPTX
PART-3-FILIPINO-ADMINISTRATIVE-CULTURE.pptx
PPTX
BUSINESS LAW AND IT IN CONTRACT SIGNING AND MANAGEMENT
PDF
OpenAi v. Open AI Summary Judgment Order
PDF
CRIMINAL PROCEDURE BY HON. JUSTICE BAH.pdf
PDF
Louisiana Bar Foundation 2023-2024 Annual Report
PPTX
ART OF LEGAL WRITING IN THE CBD [Autosaved].pptx
PPT
Criminal law and civil law under of collage corriculum
DOCX
FOE Reviewer 2022.docxhgvgvhghhghyjhghggg
PPTX
RULE_4_Out_of_Court_or_Informal_Restructuring_Agreement_or_Rehabilitation.pptx
Digital Security in Cyber Law and Mitigating Cyberxrimes
Lecture Notes on Family Law - Knowledge Area 5
Vinayaka Mission Law School Courses and Infrastructure.pdf
Constitution of India and fundamental rights pdf
Ethiopian Law of Contract short note.pptx
Aligarh Muslim University’s Minority Status A Legal Tug of War.pptx
Unit-1: Historical Perspective: Constitutional Developments since 1858 to 1947
TRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING-PDF-FILE.pdf
Endemic species [Recovered].pdf,,,,,,,,,,,,,,,,,,,,
Notes to accompany the TMT and FRAND Overview Slides
3. INDUTRIAL RELATIONS INTRODUCTION AND CONCEPTS.ppt
PART-3-FILIPINO-ADMINISTRATIVE-CULTURE.pptx
BUSINESS LAW AND IT IN CONTRACT SIGNING AND MANAGEMENT
OpenAi v. Open AI Summary Judgment Order
CRIMINAL PROCEDURE BY HON. JUSTICE BAH.pdf
Louisiana Bar Foundation 2023-2024 Annual Report
ART OF LEGAL WRITING IN THE CBD [Autosaved].pptx
Criminal law and civil law under of collage corriculum
FOE Reviewer 2022.docxhgvgvhghhghyjhghggg
RULE_4_Out_of_Court_or_Informal_Restructuring_Agreement_or_Rehabilitation.pptx

Present Trend of Cyber Crime in Bangladesh

  • 1. Presentation Topic Present Trend of Cyber Crime in Bangladesh: Regulatory Gaps and Future Directions.
  • 2. Presented To: Dr. Jakerul Abedin Department of Law & Justice, Southeast University. Presented By Debashish Mojumder Md. Main Uddin Sohan Khan Mahmudul Hasan Md. Firoz Mahmud
  • 3. Content 1. Introduction 2. What is Cyber Crime? 3. Internet and Cyber Crime 4. Types of Cyber Crime 5. Present Trend of Cyber Crime 6. Impact of Cyber Crime 7. Reasons of Cyber Crime 8. Cyber Law in Bangladesh 9. Regulatory Gaps 10. Necessary Legislations in Bangladesh to Tackle Cyber Crime 11. Conclusion 12. Future Directions or Recommendation
  • 4. Introduction Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both.
  • 5.  What is Cyber Crime? Debarati Halder and K. Jaishankar define cybercrimes as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet and mobile phones.
  • 6.  Examples of Cyber Crime: Copyright Infringement Child Pornography Piracy Cyber extortion Identity Theft Phishing Carding
  • 7.  Internet Crime: The Internet is known as the World Wide Web. The Internet may also be used to engage in other activities such as sending and receiving emails, trading files, exchanging instant messages, chatting online, streaming audio and video, and making voice calls.
  • 8.  Examples of Computer Crimes: Improperly accessing a computer, system, or network; Modifying, damaging, using, disclosing, copying, or taking programs or data; Introducing a virus or other contaminant into a computer system; Using a computer in a scheme to defraud; Interfering with someone else's computer access or use; Using encryption in aid of a crime; Falsifying email source information; and Stealing an information service from a provider.
  • 9.  Types of Cyber Crime CYBERCRIMES IN TWO WAYS BASED ON USE OF COMPUTER: THE COMPUTER AS A TARGET: Using a computer to attack other computers. E.g. Hacking, Virus/Worm attacks, DOS attack etc. THE COMPUTER AS A WEAPON: Using a computer to commit real world crimes. E.g. Cyber Terrorism, Credit card frauds, Pornography etc. TYPES OF CYBERCRIME: 1. Unauthorized use of a computer 2. Cybercrime may be committed by creating or releasing a malicious computer program. (E.g. computer virus, Trojan horse). 3. Cybercrime may be committed by stalking in cyberspace.
  • 10.  BROAD CLASSIFICATION: The subject of Cybercrime may be broadly classified into three groups. These are- AGAINST INDIVIDUALS A. Person & B. Property of an individual AGAINST ORGANIZATION A. Government. B. Firm, Company, Group of Individuals. AGAINST SOCIETY AT LARGE A. Polluting the youth through indecent exposure. B. Pornography C. Financial crimes. D. Sale of illegal articles, online gambling, etc.
  • 11.  Misuse of Information Technology Unauthorized access and hacking Virus dissemination Software piracy Credit card fraud Illegal sales of articles Email bombing Email spoofing Cyber deformation Email spamming Pornography
  • 12.  Present Trend of Cyber Crime: 1. Bangladesh Bank Heist 2016 2. Skype Scandal over International War Crime Tribunal 3. Bangladesh Computer society website hacked in 2012 4. Stealing the transaction report of Dhaka Stock Exchange 5. Partho threatening prime minister Sheikh Hasina through email in 2004 6. Inserting porn movies to the Bangladesh National Parliament website.
  • 13.  Impact of cyber crime: 1. Impact against individual 2. Impact against individuals property 3. Impact against organization 4. Impact against government 5. Impact against society
  • 14.  Reasons of cyber crime: 1. Easy to access 2. Weak security 3. Negligence 4. Loss of evidence 5. Weak gateway security 6. Bad intention of uses Internet 7. Unfamiliarity of technology 8. Absence of proper filter & Others
  • 15.  Cyber Law in Bangladesh: 1. Bangladesh plans for strict Cyber-Crime laws 2. The Information and Communication Technology Act, 2006 Drafted Act 1. The Digital Security Act, 2016
  • 16.  Regulatory Gaps: (i) The Act remains silent about various intellectual property rights like copy right, trade mark and patent right of e-information and data. (ii) The enactment has a major effect on e-commerce and m-commerce in Bangladesh. But it keeps itself mum as to electronic payment of any transaction. (iii) The legislation was initially supposed to be applied to crimes committed all over the world; but nobody knows how this can be achieved in practice. (iv) Spamming has become a peril in the west as such they have made anti spamming provisions in cyber law. However, there is no anti spamming provision in our Act. (v) Domain name is the major issue which relates to the internet world thoroughly. But the ICT Act, 2006 does not define ‘domain name’ and the rights and liabilities relating to this. (vi) The Act does not address any crime committed through using mobile phones. (vii) This law made e-mails as evidence, conflicting with the country’s Evidence Act that does not recognize as e-mails as evidence.
  • 17.  Cyber Tribunal: According to section 68 of the Information and Communication Technology Act, 2006 for the speedy and effective disposal of cases under this Act, Government shall establish one or more cyber tribunal. Cyber tribunal shall take a case for trial – a) Upon the report of a police officer not below the rank of sub- inspector or b) Upon a complaint made by a controller appointed under this Act or by any other person authorized by the controller.
  • 18.  Cyber Appellate Tribunal: The Government shall establish one or more cyber appellate tribunal. The appellate tribunal shall be constituted by one chairman and two members appointed by the Government. They shall be appointed for 3-5 years. Cyber Appellate Tribunal shall have no original jurisdiction. It shall only hear and dispose of appeals from the order and judgment of the Cyber Tribunal and Sessions Court in appropriate cases. The decision of the appellate tribunal shall be final.
  • 19.  Conclusion: Basically, no notable cyber crime has yet been committed in Bangladesh. The gradual dependence and extensive use of computer and information technology by the financial institutions like bank, insurance company, and other non-government organizations increase the fear of commission of cyber crime here. Computer has been used as a tool of crime like making forged certificates and documents for a number of years in Bangladesh though the incident of targeting computer or computer system is very unusual.
  • 20.  Future Directions: suggest the government to enact cyber law in our country to prevent cyber criminals from committing cyber crime in Bangladesh. suggest Government to establish one digital forensic laboratory in our country for investigation and detection of cyber crime. urgent need to develop a cyber crime legislation that will protect cyber security in Bangladesh. Cyber police force is also needed in order to detect cyber criminals. providing training for a group of professionals and developing software. There is also a need to have more projects on cyber crime legislation and enforcement capacity building and training courses through out the country.
  • 21. Field Visit: With Director of Legal & Licensing Division of BTRC