Professional Documents
Culture Documents
Bangladesh Police
Presented to:
Kamrul Hasan Lecturer Department of BBA State University of Bangladesh
We are:
Ahsan Habib Sinha ID:UG01-17-08-010 Rakib Ahamed ID:UG01-17-08-009 Golam Md. Nur Hasan Ali ID:UG01-17-08-088 Riad Arfin ID:UG01-17-08-033 Asma ul Husna ID:UG01-17-08-001
Bangladesh Police
Offences
systems
- Illegal access - Illegal interception - Data interference - System interference - Misuse of devices
6
Computer
related offences
- Computer-related forgery - Computer-related fraud - Offences related to child pornography - Offences related to infringements of copyright and related rights
7
General crimes by using new technologies - Defamation New crimes using Internet-based technologies - Fraud on on-line trade Attacks upon the computer systems and networks themselves - Illegal access
8
% 40 73
9
Source: Niser
Major Cybercrimes
Unauthorised access to a computer system Unauthorised access to data or information Introduces or causes to introduce viruses Tampering with computer source documents Cause Damage to Computer system or causes any disruption Denies access to any person authorised to access the computer system Spread of viruses
10
Hacker Traits:
Emotional issues
Desire to embarrass the target Joyriding Scorekeeping Espionage (industrial, political)
12
Targets:
Financial data
Intellectual Property Personal data
System Access
13
14
To
provide
legal
certainty
for
e-transactions
if a person intentionally causes loss or damage to any other person or organisation by any act which destroys, deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it by any means, would be considered to have engaged in hacking.
16
Lack of resources
Speed of Cybercrime Damage of Cybercrime Transnational nature of cyberspace Volatility nature of digital evidence
17
Malicious Mail to Foreign Diplomatic Mission and Other VIPs Pornography Use of e-mail for illegal activities Use of Internet for transmitting false and malicious information Use of Internet for Prostitution Use of Internet for Women & Child Trafficking
18
19
20
21
Help maintain the latest technology by freeing it from nuisance as punitive provisions Publishing obscene or defamatory information in electronic form The law ensures five years imprisonment and a fine of up to Taka 5 crore for offenders for the first conviction and that could be extended to 10 years imprisonment and Taka 10 crore as fine for each subsequent offence of the same nature.
22
23
Cooperation, sharing of knowledge and practical experience Promotion of standardization of methods Establish good practice guidelines
26
Recommendations
Cooperation, sharing of knowledge and practical experience Promotion of standardization of methods Establish good practice guidelines To share the current crime scenes Establishment of digital forensic laboratory for investigation and detection of cyber crime. To train trainers or teachers on IT crime investigation
27
Recommendations
Usage of Interpol Criminal Information System and Interpol Secure Web Site
https://www.interpol.int
28
Conclusion
Act as Global police rather than Regional or national police to fight against cyber crime
Rise of cyber crime insists the law enforcers to work as global police rather than regional or national police only. Citizens of 21st centuries need to fight together against their common enemies. The Police Force through global partnership need be able to meet the challenges of the technology to curb all crimes including Cyber Crime.
29
Any Questions?
30
31