You are on page 1of 31

Welcome To Our Presentation

Bangladesh Police

Presented to:
Kamrul Hasan Lecturer Department of BBA State University of Bangladesh

We are:
Ahsan Habib Sinha ID:UG01-17-08-010 Rakib Ahamed ID:UG01-17-08-009 Golam Md. Nur Hasan Ali ID:UG01-17-08-088 Riad Arfin ID:UG01-17-08-033 Asma ul Husna ID:UG01-17-08-001

Bangladesh Police

Cyber crime: Definition (1) Council of Europe

Criminal offences committed against or with the help of computer networks


Offence against the confidentiality, integrity and availability of computer data and systems.
5

Cyber crime: Definition (2) Cyber Crime Convention

Offences

against computer data and

systems
- Illegal access - Illegal interception - Data interference - System interference - Misuse of devices
6

Cyber crime: Definition (2) Cyber Crime Convention

Computer

related offences

- Computer-related forgery - Computer-related fraud - Offences related to child pornography - Offences related to infringements of copyright and related rights
7

Cyber crime : Definition (3)

General crimes by using new technologies - Defamation New crimes using Internet-based technologies - Fraud on on-line trade Attacks upon the computer systems and networks themselves - Illegal access
8

Cyber crime incidents by organisation


Financial Institutions Education Government Non-Profit Organisation 67% 18% 10% 5%

Increase in Cyber Crime


Cyber crime Hacking threats Virus 2002 262 260 2003 367 449

% 40 73
9

Source: Niser

Major Cybercrimes

Unauthorised access to a computer system Unauthorised access to data or information Introduces or causes to introduce viruses Tampering with computer source documents Cause Damage to Computer system or causes any disruption Denies access to any person authorised to access the computer system Spread of viruses
10

Hacker Traits:

Curiosity and/or desire to learn


Gang mentality Psychological needs Misguided trust in other individuals Altruistic reasons Revenge and malicious reasons
11

Why do hackers hack?


Emotional issues
Desire to embarrass the target Joyriding Scorekeeping Espionage (industrial, political)

Because they can

12

Targets:

Financial data
Intellectual Property Personal data

Theft, modification or sale, blackmail Theft, sale, personal gain


Modification, sale

System Access

Sabotage, backdoors, exploitation

13

CELLULAR PENETRATION BETWEEN SELECTED COUNTRIES 2002


90 80 70 60 50 40 30 20 10 1.22 0
UK Singapore Korea, Rep Japan USA Malaysia

84.49 79.14 67.95 62.11 48.81 37.3 26.04 16.09

Source: ITU@2003 India Thailand China

14

ENACTMENT OF NEW LAWS

To

provide

legal

certainty

for

e-transactions

undertaken by businesses or Government, two new legislations will be introduced:I. Electronic

Transactions Bill to address electronic transactions and communications.

II. E-Government Activities Bill to support and

promote electronic government.


15

What the law of Bangladesh says:

if a person intentionally causes loss or damage to any other person or organisation by any act which destroys, deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it by any means, would be considered to have engaged in hacking.
16

What makes us difficult to investigate cybercrime?

Increase in the number of cyber crime

HARDLY imagined what happens

Lack of resources

Trained investigators Equipments

The nature of the Internet


Speed of Cybercrime Damage of Cybercrime Transnational nature of cyberspace Volatility nature of digital evidence
17

The Bangladesh Scenario


Malicious Mail to Foreign Diplomatic Mission and Other VIPs Pornography Use of e-mail for illegal activities Use of Internet for transmitting false and malicious information Use of Internet for Prostitution Use of Internet for Women & Child Trafficking
18

e Readiness for Police


The various government across the globe are investing to bring the Police Force to meet the challenges of the Borderless Cyber Crime, Government of Bangladesh has also taken to make the Police Force eReady.

19

ICT Law in Bangladesh


ICT Act 2006
Amendment of

Telecommunication Act 2001

20

ICT Act 2006


Eliminates barriers to e-commerce, Promotes legal and business infrastructures to secure etransactions, Facilitates electronic filing in government agencies and Ensures efficient delivery of electronic records from government offices

21

ICT Act 2006

Help maintain the latest technology by freeing it from nuisance as punitive provisions Publishing obscene or defamatory information in electronic form The law ensures five years imprisonment and a fine of up to Taka 5 crore for offenders for the first conviction and that could be extended to 10 years imprisonment and Taka 10 crore as fine for each subsequent offence of the same nature.
22

ICT Act 2006


Powers of Police Officers and Other Officers Establishment of Cyber Appellate Tribunal

23

Special Provisions for LEA under Amended Telecom Act


Telecom Service Providers including Internet service providers are considered as intermediaries All such Service Providers to maintain log of all their customers. Such data to be produced on demand by Service Providers to any designated enquiry officer from Law Enforcement Agency (LEA)
24

How could we co-operate each other regionally or internationally?


1. By exchanging information

2. By building investigation capability

3. By arranging Regional Working Parties


25

Working Parties on IT Crimes may concentrate :

Cooperation, sharing of knowledge and practical experience Promotion of standardization of methods Establish good practice guidelines

26

Recommendations

Cooperation, sharing of knowledge and practical experience Promotion of standardization of methods Establish good practice guidelines To share the current crime scenes Establishment of digital forensic laboratory for investigation and detection of cyber crime. To train trainers or teachers on IT crime investigation
27

Recommendations

Usage of Interpol Criminal Information System and Interpol Secure Web Site
https://www.interpol.int

Effective usage of National Central Reference Points To initiate IT related projects.

28

Conclusion
Act as Global police rather than Regional or national police to fight against cyber crime

Rise of cyber crime insists the law enforcers to work as global police rather than regional or national police only. Citizens of 21st centuries need to fight together against their common enemies. The Police Force through global partnership need be able to meet the challenges of the technology to curb all crimes including Cyber Crime.
29

Any Questions?
30

31

You might also like