CYBER CRIME IN BANGLADESH: LAWS AND PRACTICES
Research Monogram
Submitted to Dr. Md. Hashibul Alam Prodhan Professor Department of Law Rajshahi University
Submitted by Hasan Muhtady Student of LLM Roll 10039024 Registration No 1027 Session 2009- 2010 Department of Law Rajshahi University E-mail:
[email protected]
Department of Law Rajshahi University
Researcher’s Declaration We do hereby ceremonious declare that the research titled “CYBER CRIME IN BANGLADESH: LAWS AND PRACTICES” is an original research work completed by us under the supervision of Dr. M. Hasibul Alam, Professor, Department of law, University of Rajshahi. It is neither copied out from anybody’s work nor published fully or partly in any journal in Bangladesh or outside Bangladesh. This work has not been submitted to any department or institution for any degree or diploma in any from in Bangladesh or in abroad. Hasan Muhtady LLM Department of Law
Acknowledgement I am grateful to Allah for the good health and wellbeing that were necessary to complete this present research. I wish to express my sincere thanks to Dr. M. Hasibul Alam, Professor of Department of Law, for providing me with all the necessary facilities for the research. We are grateful to all our respondents who have helped us with the preparation of this report, we thank specially to departmental seminar library, Central library of Rajshahi University for their cooperation. We also indebted to all our group members and friends, whose comments and suggestions have added significance to clarify of the report.
Hasan Muhtady LLM Department of Law
Abstract This present developing world with the advantages of technology cybercrime is now a deeply serious crime. It is, nowadays, becoming a serious matter of concern all over the world. This paper describes the nature of cybercrime which is committed in Bangladesh. As the use of internet in Bangladesh is not as wide as other developed countries, crime, however, related to internet is in emerging stage herein this country. The study is exploratory in nature. Methodological triangulation (face to face interview and case study) has been applied to collect pertinent data from various kinds of man in Bangladesh. Like all other countries in Bangladesh this crime is growing rapidly. Our present law are not sufficient to stop this crime. Without the precaution of our citizen and the ICT ministry we can not stop this crime. Presently we can see that in our country many strong hackers group of our country are started cybercime in whole world. It is revealed from the study that, though cyber crime is not in serious condition in research area, the respondents are victimized sometime by hacker, pornography sites and computer virus through internet. It is continuously growing attention of the majority people of the study area.
TABLE OF CONTENTS Chapter 1 1.1 Introduction 1.2 Conditions of Cybercrime in Bangladesh 1.3 Research objectives 1.4 Methodology of research 1.5 Scope and limitation of the study 1.6 Literature review 1.7 Conclusion Chapter 2: Background and general concept 2.1 Definition of Crime and Cybercrime 2.2 Development of Cybercrime 2.3 Nature of Cybercrime 2.4 Areas of Cybercrime Chapter 3: Reasons and Classifications 3.1 Reasons behind Cybercrime 3.2 Classification of Cybercrime 3.3 Mode and Manner of Committing Cybercrime 3.4 Copyright and Trademark related offence 3.5 Future Cybercrime Chapter 4: Cybercrime in Bangladesh 4.1 Recently committed Cybercrimes in Bangladesh 4.2 Cyber security in Bangladesh 4.3 Effect of Cybercrime in Bangladesh 4.4 Lack of Mechanism Control Chapter 5: Cyber laws in Bangladesh 5.1 Enacted laws relating Cybercrime 5.2 Others laws preventing Cybercrime 5.3 Enforcements of Laws in Bangladesh 5.4 Implementation of Laws and Challenges 5.5 Other steps in preventing Cybercrime Chapter 6: 6.1 International laws on Cybercrime 6.2 Recommendations 6.3 Conclusion
Chapter One Introductory Discussion 1.1 Introduction: It is certainly believed that present world can’t think without internet and communication technology. Computer and internet makes our life faster in both positive and negative side. Cyber-crime refers to any crime that involves a computer and a network . The internet, along with its advantages, has also exposed us to security risks that come with connecting to a large network. Computers today are being misused for illegal activities like e-mail espionage, credit card fraud, spams, and software piracy and so on, which invade our privacy and offend our senses. Issues surrounding this type of crime have become high-profile, particularly those surrounding hacking, copyright infringement Child pornography, and child grooming. Cybercrime is criminal activity done using computers and the Internet. This includes anything from downloading illegal music files to stealing millions of dollars from online bank accounts. It is not surely said that, from when the cybercrime was started but in 1999 at Taiwan a virus was attracted named CIH, made the topic of cyber-crime familiar to the whole world. But at the present world it can’t be said that what the massive bad effect in the area is cyber-crime. In the present time people become more dependent on computer and internet, as result, we can’t not think our daily activities without this technological help. This makes a criminal easy to commit crime by using a computer from sitting any far place of the world. For committing this crime the criminal need not to take any special risk. A cyber-criminal can destroy websites and portals by hacking and planting viruses, carry out online frauds by transferring funds from one corner of the globe to another, gain access to highly confidential and sensitive information, cause harassment by e-mail threats or obscene material, play tax frauds, indulge in cyber pornography involving children and commit innumerable other crimes on the Internet. It is said that none is secure in the cyber world. The security is only for the present moment when we are actually secure. With the growing use of the Internet, cyber-crime would affect us all, either directly or indirectly. The Convention on Cybercrime, Budapest, 23 November 2001, is the first convention which was made to control cyber-crime world widely. The United Nation pass a Resolution on combating the criminal misuse of information technologies was adopted by the General Assembly on December 4, 2000 including as followings: (a) States should ensure that their laws and practice eliminate safe havens for those who criminally misuse information technologies. (b) Legal systems should protect the confidentiality integrity and availability of data and computer systems from unauthorized impairment and ensure the criminal abuse is penalized. Beside this many countries made new laws to control cyber-crime. In United States and United Kingdom’s there are specific cyber laws. In Indian, the Information Technology Act and Indian Evidence Act control the cyber related crimes. In the side of Bangladesh the Government responded by coming up with the first cyber law of Bangladesh – The Information and Communication Technology Act (ICT), 2006. The Cabinet of Minister of Bangladesh has approved the Information and Communication Technology bill (ICT), 2006 on February 2005 and it has been enacted on 8th October, 2006. The ICT Act defines various terms. Which are innovative in the legal lexicon in Bangladesh..
In Bangladesh, there are no many laws relating to cyber-crime. Some provisions also inserted in the Amendment of Telecommunication Act 2001 to control cyber-crime.
1.2 Conditions of Cybercrime in Bangladesh In the present time it can be seen that beside the all over the country the technological development also makes Bangladesh faster than before. As a result many cyber related crime have started to be committed. The ICT Act 2006 tried to take this type of crime under control. There are some provision which directly define some crime and also some provision to ensure punishment to the criminals by taking some special measurements. Chapter I of the ICT Act 2006 specifically defines some term which are used in ICT sector and cyber legislation for clearing the concept. Chapter II of the Act specifically stipulates that any subscriber may authenticate an electronic record by affixing his digital signature. Chapter III is for application to the attribution, acknowledgement and dispatch of electronic records among parties. Chapter V of the said Act gives a scheme for regulation of Certifying Authorities. Chapter VII & VIII of the ICT Act talks about penalties, adjudication, investigation, judgment and punishment for various offences and the penalties for damage to computer, computer systems etc. There are some crimes which have discussed in this Act this are unauthorized copying, extracting and downloading of any data, database, introduction of virus, damage to computer system, hacking, tampering, electronic forger, publication of information which is obscene in electronic form, breach of confidentiality and privacy and publishing false digital signature certificate.
1.3 Research objectives: The on-going study is aimed to deep study into the legal framework of cyber law of Bangladesh as the countries laws and cyber-crimes. This thesis would be conduct over the cyber-crime which is held in Bangladesh. The legal steps against the cyber-crime will control the crimes. In view of the studies the goal is formulated in some specific objectives as follows: (i) To find out the importance of cyber-tribunal in Bangladesh and all over the world; (ii)To find out the existing problems of cyber law in our country to control cyber-crimes; (iii) To know about cyber-crime in Bangladesh details. (iv) To promote effectiveness of the government and law enforcing agencies to control cyber-crimes; and (v)To identify the ways of making control over cyber-crime to stop the great loss of economy. In this point, it will be clear the present conditions of cyber-crime in Bangladesh. Beside this the activities which does not cover under the law, will also find out. In this regard, the study will review and analyse the literature, laws and practices of Bangladesh in accordance with the methodology of the study and the relevant data.
1.4 Research Methodology: The success of a research depends upon its methodology. This study will explain the recent cyber-crimes which are happened in Bangladesh. And what kinds of stapes are taken by the authority also will be examined. This study will examine the evolution of the law of cybercrime. In order to give complete shape to the study, a range of research methods would be used: (i) Review of literature and instruments on the cyber law; (ii)Analysing the legal framework which control the cyber-crime in Bangladesh; (iii)Review on records and reports published by cyber-tribunal in Bangladesh; (iv)Analysing various data which are published and also analysing about the new crimes to get proper solutions; and (v)Case studies relating to cyber-crimes. Discussion on the conceptual issues will be based on the literature including books, journals, electronic materials, statutory law and case law.
1.5 Scope and limitation of the study: The scope of the study is very much wider in the present situation of our country. There various offences occurred in everyday because of internet. But the law of Bangladesh does not cover all the crimes relating to cyber offences. Due to shortage of time, investment and a less control, researcher cannot go for a wide way. Therefore I have to depend on the information available in the web side of the laws relating to cyber-crime.
1.6 Literature review: Since the technology is changing day by day and demand of new laws is growing due to meet different new crimes arising from development of technology. Cyber-crime became a subject of discussion and research from the days of the formation of peaceful society, innumerable books and articles are written on this topic in side of Bangladesh. Moreover, most of the previous literature is written by academics having shortage of information and the new coming crimes. The books regarding cyber-crimes are found in different libraries and online. . On the legal relationship some other books, which bear much significance are ; Oporad Biggan porichity By Prof. Dr. Borhan Uddin Khan , A text Book on Cyber law of Bangladesh By Dr. Zulfiquar Ahmed, ICT Policy of Bangladesh – Govt. publication. A book of R. K. Chaubey, An Introduction to Cyber Crime and Cyber Laws is an important book to analysing the main kinds of cyber-crimes. Apart from these works, a list of other books, articles, documents, statutes, and journals on different aspects of the role may be found but none of them has dealt with this research topic in the light and details as it has been intended to be done in this work. In none of them could be found an unbiased and in-depth treatment of this burning research area.
1.7 Conclusion: Cybercrime is the crime which is wider than any other crime. Beside of law, technological development is needed for stopping this crime. Developing country like Bangladesh many people are not aware about this serious crime. Beside personal damages, economical damages are also happen. The national security is in danger by cause of cybercrime. There are many laws in all over the world also in Bangladesh to stop this heinous crime but we have no control over cyberspace as a result this boundless crime getting more opportunities to commit. By the end of this study it will be clear to us about the present condition of cyber crime in Bangladesh, the laws relating this crime, and how far those laws are able to stop this modern crime.
Chapter- Two Background and general concept 2.1 Definition of Crime and Cybercrime: The cybercrime is that kinds of crime which is not a crime like others. This crime can be committed from any part of the world. So before this issue we need to know what is crime under law. A crime is an act or the commission of an act that is forbidden or the omission of a duty that is commanded by a public law and that makes the offender liable to punishment by that law; especially : a gross violation of law. A crime is an offence against a public law. This word, in its most general sense, includes all offences, but in its more limited sense is confined to felony. The term offence may be considered as having the same meaning, but is usually understood to be a crime not indictable but punishable, summarily or by the forfeiture of a penalty. Most reports, guides or publications on cybercrime begin by defining the term “cybercrime”. One common definition describes cybercrime as any activity in which computers or networks are a tool, a target or a place of criminal activity. One example for an international approach is Art. 1.1 of the Draft International Convention to Enhance Protection from Cyber Crime and Terrorism (CISAC) that points out that cybercrime refers to acts in respect to cyber systems. Some definitions try to take the objectives or intentions into account and define cybercrime more precisely, defining cybercrime as “computer-mediated activities which are either illegal or considered illicit by certain parties and which can be conducted through global electronic networks” This demonstrates that there are considerable difficulties in defining the term “cybercrime”. The term “cybercrime” is used to describe a range of offences including traditional computer crimes, as well as network crimes. As these crimes differ in many ways, there is no single criterion that could include all acts mentioned in the Stanford Draft Convention and the Convention on Cybercrime, whilst excluding traditional crimes that are just committed using hardware. The fact that there is no single definition of “cybercrime” need not be important, as long as the term is not used as a legal term.
2.2 Development of Cybercrime: The popularity of the Internet is growing exponentially. The first recorded cyber crime took place in the year 1820. That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C. in India, Japan and China. The era of modern computers, however, began with the analytical engine of Charles Babbage. In 1820, Joseph-Marie Jacquard, a textile manufacture in France, produced the loom.This resulted in a fear amongst Jacquard’s employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of their new technology. This is the first recorded cyber crime. Interpol was the first international organization dealing with computer crime and penal
legislation. In conjunction with an Interpol Conference in 1981, a survey of Interpol member countries on computer crime and penal legislation identified several problems in the application of existing penal legislation. The Council of Europe appointed in 1985 another expert committees in order to discuss the legal issues of computer-related crime. A summary of the guidelines for national legislatures with liability for international acts only, was presented in the Recommendation of 1989. The UN adopted a resolution on computer crime legislation at 8th U.N. Congress on the Prevention of Crime and the Treatment of Offenders in Havana, Cuba, in 1990. The United Nations Manual on the Prevention and Control of Computer-related Crime was published in 1994. The last part of this historic presentation is the Wurzburg conferences organized by the University of Wurzburg in 1992. These conferences led to 29 national reports, and recommendations for the development of computer crime legislations. Most countries in Europe adopted new penal laws according to the recommendation in the 1980s and 90s. Similar development occurred in the U.S.A. Canada and Mexico. Also in Asia, where Japan, Singapore, Korea and Malaysia were the leading countries. Today computers have come a long way, with neutral networks and nanocomputing promising to turn every atom in a glass of water into a computer capable of performing a Billion operations per second.
2.3 Nature of Cybercrime: The term “cybercrime” includes a wide variety of crime. Recognised crimes cover a broad range of offences, making it difficult to develop a typology or classification system for cybercrime. An interesting system can be found is found in the Council of Europe Convention on Cybercrime. The Convention on Cybercrime distinguishes between four different types of offences: • Offences against the confidentiality, integrity and availability of computer data and systems; • Computer-related offences; • Content-related offences and • Copyright-related offences;
Chapter-Three Reasons and Classifications 3.1 Reasons behind Cybercrime There we can seeThe reasons for the vulnerability of computers may be said to be: Capacity to store data in comparatively small spaceThe computer has unique characteristic of storing data in a very small space. This affords to remove or derive information either through physical or virtual medium makes it much more easier. Easy to accessThe problem encountered in guarding a computer system from unauthorised access is that there is every possibility of breach not due to human error but due to the complex technology. By secretly implanted logic bomb, key loggers that can steal access codes, advanced voice recorders; retina imagers etc. that can fool biometric systems and bypass firewalls can be utilized to get past many a security system. 3.ComplexThe computers work on operating systems and these operating systems in turn are composed of millions of codes. Human mind is fallible and it is not possible that there might not be a lapse at any stage. The cyber criminals take advantage of these lacunas and penetrate into the computer system. 4.NegligenceNegligence is very closely connected with human conduct. It is therefore very probable that while protecting the computer system there might be any negligence, which in turn provides a cyber criminal to gain access and control over the computer system. 5. Loss of evidenceLoss of evidence is a very common & obvious problem as all the data are routinely destroyed. Further collection of data outside the territorial extent also paralyses this system of crime investigation.
3.2 Classification of Cybercrime The term “cybercrime” includes a wide variety of crime. Recognised crimes cover a broad range of offences, making it difficult to develop a typology or classification system for cybercrime. An interesting system can be found is found in the Council of Europe Convention on Cybercrime. The Convention on Cybercrime distinguishes between four different types of offences: • Offences against the confidentiality, integrity and availability of computer data and systems; • Computer-related offences; • Content-related offences and
• Copyright-related offences; Now this types of crimes are classified in different categories. This types of cybercrimes are happening all over the world. With the change of time new types of cybercrime are adding with this crime. The main crimes are now defined here. Offences Against the Confidentiality, Integrity and Availability of Computer Data and Systems: 3.2.1. Illegal Access (Hacking, Cracking): Since the development of computer networks, their ability to connect computers and offer users access to other computer systems, computers have been used by hackers for criminal purposes. Hackers need not be present at the crime scene; they just need to circumvent the protection securing the network. In many cases of illegal access, the security systems protecting the physical location of network hardware are more sophisticated than the security systems protecting sensitive information on networks, even in the same building. The illegal access to computer systems hinders computer operators from managing, operating and controlling their systems in an undisturbed and uninhibited manner. In most cases, illegal access (where law seeks to protect the integrity of the computer system itself) is not the endgoal, but rather a first step towards further crimes, such as modifying or obtaining stored data (where law seeks to protect the integrity and confidentiality of the data). 3.2.2 Data Espionage: Espionage or spying involves individual obtaining information that is considered secret or confidential without the permission of the holder of the information. Denial of Service attacks normally is an attack on a computer network using hundreds, even thousands of computers sending data to the network at the same time causing the network to crash. Hackers use special programs to hijack computers and coordinate such attacks. 3.2.3. Illegal Interception: The use of ICTs is accompanied by several risks related to the security of information transfer. Unlike classic mail order operations within a country, data transfer processes over the Internet involve numerous providers and different points where the data transfer process could be intercepted. The weakest point for intercept remains the user, especially users of private home computers, who are often inadequately protected against external attacks. 3.2.4. Data Interference: Attacks or obtaining of this information can result in financial losses. Besides deletion, the alteration of such information could also have major consequences. Previous legislation has in some not completely brought the protection of data in line with the protection of tangible objects. This enabled offenders to design scams that do not lead to criminal sanctions 3.2.5 Content related Offences: Many times content from any computer network and any system may be copied illegally by the cyber criminal. They use this data in their own name, this type of crime generally happen in our country, this is totally illegal in our country, but no one try to stop this crime. 3.2.6. Child Pornography: By the use of computer child pornography is very easily occurred. Child pornography is a form of child sexual exploitation. The Internet is becoming the main instrument for the trade and exchange of material containing child pornography. The major reasons for this
development are the speed and efficiency of the Internet for file transfers, its low production and distribution costs and perceived anonymity. Pictures placed on a webpage can be accessed and downloaded by millions of users worldwide. One of the most important reasons for the “success” of web pages offering pornography or even child pornography is the fact that Internet users are feeling less observed while sitting in their home and downloading material from the Internet. Unless the users made use of means of anonymous communication the impression of a missing traceability is wrong. Most Internet users are simply unaware of the electronic trail they leave while surfing. Data diddling : This kind of an attack involves altering raw data just before it is processed by a computer and then changing it back after the processing is completed. Racism, Hate Speech, Glorification of Violence Religious Offences Illegal Gambling and Online Games Libel and False Information Spam and Related Threats Other Forms of Illegal Content Copyright and Trademark related Offences Copyright‐related Offences Trademark‐related Offences Computer related m Offences Fraud and Computer‐related Fraud Computer‐related Forgery Identity Theft Misuse of Devices Combination Offences Cyberterrorism: Cyberterrorism is the act of Internet terrorism in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses. Cyberterrorism is a controversial term. Some authors choose a very narrow definition, relating to deployments, by known terrorist organizations, of disruption attacks against information systems for the primary purpose of creating alarm and panic. By this narrow definition, it is difficult to identify any instances of cyberterrorism. Cyberwarfare: Cyberwarfare is Internet-based conflict involving politically motivated attacks on information and information systems. Cyberwarfare attacks can disable official websites and networks, disrupt or disable essential services, steal or alter classified data, and criple financial systems among many other possibilities. Cyberlaundering: Cyber laundering is a new way to hide the proceeds of crime and the advance of technological solutions of electronic payments and online gambling has eliminated the need for time and space as compared to the traditional way of money laundering to achieve Cyberlaundering. Virus attack: A computer virus is a computer program that can infect other computer programs by modifying them in such a way as to include a (possibly evolved) copy of it. Viruses can be
file infecting or affecting boot sector of the computer. Worms, unlike viruses do not need the host to attach themselves to.
3.3 Mode and Manner of Committing Cybercrime: There are various modes or methods by which cybercrime can be committed. Generally illegally enter in another computer network and making anything wrong to their data that may be deleting or change or anything. Now some of the methods are described below. 1. Denial of Service attack: The computer of the victim is flooded with more requests than it can handle which cause it to crash. Distributed Denial of Service (DDoS) attack is also a type of denial of service attack, in which the offenders are wide in number and widespread. E.g. Amazon, Yahoo. 2. Data diddling: This kind of an attack involves altering raw data just before a computer processes it and then changing it back after the processing is completed. The electricity board faced similar problem of data diddling while the department was being computerised. 3. Unauthorized access to computer systems or Hacking: This kind of offence is normally referred as hacking in the generic sense. However the framers of the Information and Communication Technology Act, 2006 have nowhere used this term so to avoid any confusion we would not interchangeably use the word hacking for ‘unauthorized access’ as the latter has wide connotation. 4. Theft of information contained in electronic form: This includes information stored in computer hard disks, removable storage media etc. Theft may be either by appropriating the data physically or by tampering them through the virtual medium. 5. Virus / worm attacks: Viruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. They usually affect the data on a computer, either by altering or deleting it. Worms, unlike viruses do not need the host to attach themselves to. 6. Email bombing: This kind of activity refers to sending large numbers of mail to the victim, which may be an individual or a company or even mail servers there by ultimately resulting into crashing. 7. Trojan attacks: This term has its origin in the word ‘Trojan horse’. In software field this means an unauthorized programme, which passively gains control over another’s system by representing itself as an authorized programme. The most common form of installing a Trojan is through e-mail. E.g. a Trojan was installed in the computer of a lady film director in the U.S. while chatting. The cyber criminal through the web cam installed in the computer obtained her nude photographs. He further harassed this lady.
8. Internet time thefts: Normally in these kinds of thefts the Internet surfing hours of the victim are used up by another person. This is done by gaining access to the login ID and the password. E.g. Colonel Bajwa’s case- the Internet hours were used up by any other person. This was perhaps one of the first reported cases related to cybercrime in India. However this case made the police infamous as to their lack of understanding of the nature of cybercrime.
3.5 Future Cybercrime Chapter – Four Cybercrime in Bangladesh 4.1 Recently committed Cybercrimes in Bangladesh: In Bangaldesh Cybercrime has drawn public attention for the last couple of years. At present, the Skype conversation and blogging are burning issues of our country. Pornography video and picture upload happen in our country as a regular basis. We should act hand in hand to stop criminal activities. Bangladesh does not have enough natural resources and has been trying to achieve the economic development through the utilization of ICT industry. Over the last few years, many nations have taken advantage of the opportunities afforded by ICT within a policy framework, laid down guidelines and preceded with the formulation of a national ICT strategy as a part of the overall national development plan. Bangladesh intends to use ICT as the key-driving element for socio-economic development. The present government has also declared the vision-2021 i.e. within 2021 this country will become Digital Country and the per capita income will be equal to a middle income country. But the government as well as other concerns should consider crimes that may be committed in this world with the expansion of internet and other networks to convert this country into a digital country. The first recorded cyber crime took place in the year 1820. That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been in India, Japan and China around since 3500 B.C. The era of modern computers, however, began with the analytical engine of Charles Babbage. In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime in the world history. A recent survey showed that a new cyber crime is being registered every 10 seconds in Britain. The situation of other countries in the world is almost the same and in some cases it is more critical and miserable. On July 4, 2009 two dozens of websites of South Korea and United States of America’s were under cyber attack and the attack was remarkably successful in limiting public access to victim web sites such as government web sites, treasury department, federal trade commission and secret service. They were continuously reporting problems days after the attack started during the July 4 holiday. IT experts believe that about 90 percent of cyber crimes stay unreported. In case of Bangladesh, the situation is getting worsening day by day. The most common cyber attacks and crimes are listed below in Bangladesh:
1. Blackmailing girl by capturing their nude photographs and video on the sly and threatening to expose publicly. Such incidents are caused frequently by their boyfriends and others. 2. A number of community websites have been introduced, which the young girls and boys are using to exchange phone numbers for Posting hidden videos or even pictures with nudity etc. 3. Hacking in the website of Bangladesh Computer Society, which took place after a few days of a 3 day-long ‘Regional Seminar on Cyber Crime’ in Dhaka. 4. E-mail threatening the current Prime Minister Sheikh Hasina from a cyber cafe. 5. Hacking into the Internet account of Barisal DC office in 2003 AD, the incident was revealed after the DC office received a heavily bloated Internet bill and lodged a complaint with the Bangladesh Tar and Telephone Board (BTTB). 6. Hacking took place in the website of Bangladesh Rapid Action Battalion (RAB) in 2008, during the access to www.rab.gov.bd, the website read: "Hacked by Shahee_Mirza." 7. Hacking the mail of BRAC Bangladesh13 8. Stealing the transaction report of Dhaka Stock Exchange through hacking. 9. Inserting naked pictures to the website of Bangladesh National Parliament. 10. Inserting naked pictures to the website of Jamate Islami Bangladesh. 11. Inserting naked pictures to the website of The Daily Jugantor. 12. E-mail threatening to World Bank Dhaka Office.
4.2 Cyber security in Bangladesh 4.3 Effect of Cybercrime in Bangladesh 4.4 Lack of Mechanism Control Chapter 5: Cyber laws in Bangladesh 5.1 Enacted laws relating Cybercrime 5.2 Others laws preventing Cybercrime 5.3 Enforcements of Laws in Bangladesh 5.4 Implementation of Laws and Challenges 5.5 Other steps in preventing Cybercrime Chapter 6: 6.1 International laws on Cybercrime 6.2 Recommendations 6.3 Conclusion www.cybercrimejournal.co.nr