You are on page 1of 7

Cybercrime and Its Impact inBangladesh Title Fly ii Cybercrime and Its Impact in Bangladesh Title Page Prepared

for: Prof. M. Z. ManumCourse Instructor: Business CommunicationMBA Program Prepared by: Md. Tanvir HasanID. 091051019Md. Azizul HaqueID. 091052005Taranna AnsarID. 091051029Naznin Akther RunaID. 091051034Belal HossainID. 091052007ULAB, DhakaMay 10, 2009 iii Preface Cyber and technology related crime is on the increase and current trends indicate that itwill be a significant issue in Bangladesh. It has already been seen that a glomming threatbecomes visible in the arena of information technology. Recently the hacking of RABwebsite and e-mail threats of former prime minister are example for few of them.In contrast, cybercrime is becoming a threat to government itself. Due to lack of necessary legislation to tackle such type of crime, cyber criminals are almost in the safeside to commit such crime. In the Information and Communication Technology Act.2006, there are several clauses against cybercrime. But this Information andCommunication Technology act is not the concert one. By enacting this act, there is achance to become safe side after committing crimes. So, considering these facts acomprehensive Cybercrime Protection Act should be imposed.This report incorporates the impacts of cybercrime in Bangladesh especially focuses onthe area of Personal life, Workplace as well as Policy making Bodies or thinkers. Webelieve the report would help all relevant concerns and especially policy makers. iv Abbreviation and Acronyms AFP Australian Federal PoliceBP Bangladesh PoliceBTTB Bangladesh Telegraph and Telephone BoardCID Criminal Investigations DepartmentICT Information and Communication TechnologyIOP Investigations, Operations and ProsecutionsIRC Internet Relay ChatTEDS Training and Executive Development Specialist

Executive Summary 1. Introduction Cybercrime has already become a going concern in both private as well as public sectorin Bangladesh. During the last decade private and public sector has done a revolutionwith the use of technical enhancement. Due to unauthorized intervention to the system,company loses huge confidential information which caused a large amount of financiallose. It has already been identified that especially Financial Institutions are in the mostthreading organization for cybercrime that at the same time reflects to the personal life.Some development partners has started working how to tackle cybercrime and improveeffective communications. 2. Methodology Employing the following qualitative methods has collected the relevant information: Literature Review (secondary source of information; journals, reports etc.) In-depth interviews were made with the Manager and others of Cybercaf. Focus Group Discussion with the students of private university. Key Informant Interview with the Member of Cybercrime unit. 3. Types of Cybercrime Cyber crime is the latest and perhaps the most complicated problem in the cyber world.Cyber crime may be said to be those species, of which, genus is the conventional crime,and where either the computer is an object or subject of the conduct constituting crime.Any criminal activity that uses a computer either as an instrumentality, target or a meansfor perpetuating further crimes comes within the ambit of cyber crime. 4. Impact of Cybercrime against Individuals Cyber crimes committed against people include various crimes like transmission of childpornography and harassment through e-mail. The trafficking, distribution, posting, anddissemination of obscene material including pornography constitute one of the mostimportant cyber crimes known today. Cyber harassment is a distinct cyber crime.Harassment can be sexual, racial, religious, or other. This also brings us to another relatedarea--violation of citizen which is a crime of grave nature. 5. Impact of Cybercrime against Organizations This activity is commonly referred to as hacking. The Indian law has however given adifferent connotation to the term hacking, so we will not use the term "unauthorizedaccess" interchangeably with the term "hacking" to prevent confusion as the term used inthe Act of 2000 is much wider than hacking Bangladesh's financial institutions are at risk from hackers. In the country financialinstitutions have introduced various online features like online banking, stock exchangetransactions but are not able to provide the highest security. Source said the cybercriminal networks through Internet have attacked our country's technology

infrastructure.Recently, hackers interrupted the DSE transaction, which cost the small entrepreneursdearly. 6. Impact of Cybercrime against the Government Cyber terrorism is one distinct kind of crime in this category. The growth of internet hasshown that the medium of Cyberspace is being used by individuals and groups to threatenthe international governments as also to terrorize the citizens of a country. Cyberterrorism may be defined to be the premeditated use of disruptive activities, or the threatthereof, in cyber space, with the intention to further social, ideological, religious, politicalor similar objectives, or to intimidate any person in furtherance of such objectives. 7. Necessary Legislations in Bangladesh Cyber crime can involve criminal activities that are traditional in nature, such as theft,fraud, forgery, defamation and mischief, all of which are subject to penal laws of acountry. The abuse of computers has also given birth to a gamut of new age crimes thatare addressed by the special laws enacted to penalize these crimes. For example, inBangladesh Tatha O Jogajog Projukty Ain 2006 (Information and CommunicationTechnology Act, 2006) defines certain offences which does not cover by the Penal Code.And so it can be said that the Penal Code, 1860 is not effective enough in dealing withcybercrime. 7. Conclusion Capacity of human mind is unfathomable. It is not possible to eliminate cybercrime fromthe cyberspace. It is quite possible to check them. History is the witness that nolegislation has succeeded in totally eliminating crime from the globe. The only possiblestep is to make people aware of their rights and duties and further making the applicationof the laws more stringent to check crime. Undoubtedly the Act is a historical step in thecyber world. Further it cannot be denied that there is a need to bring changes in theInformation Technology Act to make it more effective to combat cybercrime. It can beconcluded with a word of caution for the pro-legislation school that it should be kept inmind that the provisions of the cyber law are not made so stringent that it may retard thegrowth of the industry and prove to be counter-productive. 8. Recommendations Clear and self-explanatory Standard Operating Procedure to be imposedimmediately for the Cybercrime Unit; A comprehensive induction program should be developed for all the concerns of ICT and implement it as pilot basis; A separate Cybercrime Protection Act should be enacted

Section A: Introduction and Methodology 1.0 INTRODUCTION This report is the outcome of the study on Cybercrime and Its Impact in Bangladesh .Commissioned by the Course Instructor of the Business Communication Prof. M. Z.Mamun, this study has been conducted in May 2009. The information generated bymeans of the study is cross-cutting across various chapters presented in the report.Therefore, it may appear that there is a lot of duplication of information. This has beendone knowingly as it is essential because the target audiences of the study and the issuesaddressed are very much related with each other. 1.1 Background In the words attributed to the Greek Philosopher, Heraclitus, there is nothing permanentbut change. These words, written almost 2500 years ago, are very true today: we areliving in a constantly changing world. The most rapid pace of change that we see is in theworld of computer or the information and communication technology. Over the lastfifteen years, the increase in technology and the use of computer, in both the personal andbusiness sector has increased remarkably. This technology advance has ensured that thetwenty first century is the information age.With all the possibilities that the new technology offers for progress and development, thesame technology can be used for malicious and criminal purposes. A couple of years ago,fishing spelled with F was a pleasant activity with a fishing rod or a net where youcould land yourself a nice meal for you and your family. Today, phishing, spelled withPH is an activity with a fake website or email where one can land credit card or bank account details.We are extremely dependent on the cyber 1 world for both our professional and personalwork. With this growing dependency on information and communication technologies(ICT), there has emerged new threats to network and information security. There is anever-growing vulnerability to cybercrime in todays world. This is also true forBangladesh where the number of internet users is growing rapidly and where ICT isimportant for the economy. 1.2 Problems Cybercrime generally refers to criminal activity where a computer or network is thesource, tool, target, or place of a crime. These categories are not exclusive and manyactivities can be characterized as falling in one or more. Although the term cybercrime ismore properly restricted to describing criminal activity in which the computer or network is a necessary part of the crime, this term is also sometimes used to include traditionalcrimes, such as fraud, theft, blackmail etc., in which computer or networks are used. Asthe use of computers has grown, cybercrime has become more important.Cybercrime, as a transnational crime, is a global issue with a global impact. Increasedsophistication of cybercrime attacks and vulnerability of information available online is aserious concern for institutions, law enforcement agencies and other stakeholders. Victims of these attacks are not just private citizens or organizations with limitedresources available to protect themselves but very large companies

Objectives The overall purpose of the study was to identify the impact of cybercrime in Bangladeshwith regard to technological enhancement.The study has embarked upon the specific objectives are to assess: Types of cybercrime with the profile of cyber criminals and victims; Impact of cybercrime against individuals; Impact of cybercrime against organizations; Impact of cybercrime against the Government; Necessary Legislations in Bangladesh to tackle Cybercrime 1.4 Scopes and Limitation Cybercrime does not know the border. The same technology that brings people of theworld closer together has a darker side, making it easier for criminal or maliciouselements to steal, destroy, corrupt, defraud and exploit. They do not have to be near theycan do so from another country or continent. Internet technology has come to Bangladeshquite late. But, the country does not leg behind when it comes to cybercrimes. As most of the organizations in Bangladesh are very keen to use the opportunity of the internettechnology, the potential threats can not be ruled out. Due to availability andcomparatively cheaper prize of a personal computer, interest to use them for day to daypersonal business is being grown up. Considering the above views, the study wasconducted at all levels (corporate and/or personal) in where ICT has arrived with itsprospect. The study has suffered certain limitations as below: The duration of the study was very short. More in-depth investigation would haveresulted better outputs; Lack of resources has hampered the study to some extent; Access to information is very difficult. In most cases, concerned persons werevery rigid to share adequate information.

1.5 Hypothesis Technology is used by both Crooks and Cops! Cybercrimes such as online hacking,software piracy, virus dissemination, child pornography, credit card fraud etc. representnew crime methods, and continue to grow at an alarming rate. These create new andsevere problems that are very complex to tackle. Organizations are being cheated with alot of money as well as information. At the same time, they are engaging huge resourcesto hinder it 1.6 Rationale Cybercrime has already become a going concern in both private as well as public sectorin Bangladesh. During the last decade private and public sector has done a revolutionwith the use of technical enhancement. Due to unauthorized intervention to the system,company loses huge confidential information which caused a large amount of financiallose. It has already been identified that especially Financial Institutions are in the mostthreading organization for cybercrime that at the same time reflects to the personal life.Some development partners has started working how to tackle cybercrime and improveeffective communications.In the view above, it can be assumed that this report in general will be helpful for allconcerned. In particular, development partners will be able to identify the how it affectsin every arena of our country. Persons will be able to become aware having idea how itimpacts to human life. Finally, policy makers will be having a clear idea on the impacts of cybercrime to all arenas that will enable to prepare and implement a comprehensivestrategy or action plan 2.0 METHODOLOGY By design, this is an exploratory type of qualitative study attempts to unearth the indepthof cybercrime in Bangladesh. 2.1 Study Area The study has been carried out in all sectors where technological intervention has alreadybecome as essential. The below table shows the organizations covered within the purviewof the study: Sl. Details Cybercaf 2 i. HotSpot Cybercaf in Mirpurii. Blue Planet.Com in Dhanmondiiii. Global Windows in UttaraBanksiv. Dhaka Bank Private Universityv. Eastern Universityvi. University of Asia PacificGovernment Agenciesvii. Cybercrime Unit at CID, BP 2.2 Target Audiences In order to collect relevant information for the study following target audiences werebrought within purview of the study (Appendix 1): Manager of Cybercaf

Technical Experts of Cybercaf Automatic Trailer Machine administrator in Bank Students of Computer Science of different universities Members of Cybercrime Unit at CID, Bangladesh Police Members of general public 2.3 Data Collection Method Employing the following qualitative methods has collected the relevant information: Literature Review (secondary source of information; journals, reports etc.) In-depth interviews were made with the Manager and others of Cybercaf. Focus Group Discussion with the students of private university. Key Informant Interview with the Member of Cybercrime unit

You might also like