CYBERCRIME IN BANGLADESH: IMPLICATIONS AND RESPONSE STRATEGY

Authors

  • Brigadier General Md. Khurshid Alam, ndc, psc NDC

Keywords:

CYBERCRIME, BANGLADESH

Abstract

Cybercrime is becoming a serious concern of the modern world. With the
spiralling technological advancements, more number of functions and services
are increasing their reliance on ICT-based networks. Such reliance in the
foreseeable future is likely to involve most of the socio-politico-economic, as well
as military affairs around the globe. Alarmingly, cyber criminals are creeping at
the heels of these technological advents and terrorising individuals, communities,
societies, organisations and states by hi-tech theft, forgery, defamation, sabotage,
propaganda and other malicious activities. The convenience of committing the
crime without being easily detected makes cyber criminals nearly invincible. While
the detrimental effect of cybercrime is more pronounced in developed countries,
the crime is still less evident in Bangladesh. There are, however, symptoms
popping up sporadically which allude to a potential threat that is likely to grow
along with the ‘Digital Bangladesh’. The awareness and preparedness of the
country in this regard is apparently dubious. This paper attempts to evaluate the
vulnerability and awareness of Bangladesh concerning cybercrime, and suggest
an outline strategy to deal with it. A conceptual overview, skimmed chiefly out
of published materials, is presented at the beginning. The vulnerabilities and
preparedness is then evaluated before recommending a response strategy to
fight cybercrime. The analysis is primarily based on personal experience and
interactions with the concerned elite.
The degree of awareness in this regard, and hence the preparedness, is minimal.
The country needs to immediately start building up and enhancing its capability
to deal with cybercrimes. Such efforts should include legislative, judicial and
executive aspects, and development of a holistic approach involving all technocrats,
administrators, users and beneficiaries of cyber facilities. Promulgation of relevant
laws and their effective enforcement; building awareness; acquiring technical
knowledge and capabilities, etc are also vital in this regard.

Downloads

Download data is not yet available.

References

Books

Dudeja VD, Cyber Crime and Law Enforcement, Commonwealth Publishers,

Jody R. Westby, International Guide to Combating Cybercrime, American

Bar Association, 2003.

Victoria Roddle, The Ultimate Guide to Internet Safety, Lulu Press, 2008.

Journal/Report/Article/Paper

Cyber Terrorism Concept, Strategy and Counter Measures.

Dhaga S. Lt Col, Head Department of Telematics, MCTE, Study Papers on

Cyber Conflict.

Presentation by M Abdus Sobhan, Executive Director, Bangladesh Computer

Council.

Osiur Rahman, Mahabubur Rahman & Nour Mohammad, Cyber Law &

Territory, Claiming New Dynamism in Jurisprudence.

Mohammad Mahabubur Rahman, Cyber Space: Claiming Conceptual and

Institutional Innovations.

Report, International Telecommunication Union, ICT Application and Cyber

Security Division, April 2009.

Post Note, Computer Crime, October 2006.

Georgia Tech Information Security Center (GTISC), Emerging Cyber Threats

Report for 2009.

A Discussion Paper Outlining Key Policy Issues, Cyber Security, A New

Model for Protecting the Network, 2005.

Cybercrime Intelligence Report 2009, Finjan Malicious Code Research

Center.

Shakila Yeasmin Suchana, Cyber crime in ‘Digital Bangladesh’ published in

Daily Star on.

V. Shina Kumar, Asst.Director, A.P.Police Academy (India) ‘Cyber Crime

– Prevention & Detection’

Stein Schjolberg and Solange Ghernaouti-Hélie, A Global Protocol on

Cybersecurity and Cybercrime, Cybercrimedata, 2009.

Sam Lumpkin, Senior Security Architect, 2AB, Inc, ‘Internet Security and

Cyber Crime’.

The Penal Code, 1860 (Act No. XLV of 1860).

The Information and Communication Technology Act, 2006.

A.R.M. Borhanuddin (Raihan), Department of Law, Dhaka University,

‘Cyber Crime and Bangladesh Perspective’.

Shuaib Zahda, Cyber-Terrorism: Hype or Hazard, January 2010.

Ronald Deibert, China’s Cyberspace Control Strategy : An Overview and

Consideration of Issues for Canadian Policy, February 2010.

Sean Gallagher, Defense Department’s diversity hobbles race to improve to

information assurance, 22 January, 2010.

US Department of Homeland Security Report, Computer Network Security

& Privacy Protection, 19 February 2010.

James A. Lewis, Director and Senior Fellow, Technology And Public

Policy Program, Center for Strategic and International Studies (CSIS)

‘Cybersecurity: Next Steps to Protect Critical Infrastructure’, 23 February,

United Nations Manual on the Prevention and Control of Computer Related

Crime, 1995.

Sharier Khan, The Daily Star, 11 December 2009.

Cybercrime Investigation and Forensics.

Presentation: Emerging Threats in Cyber Space – Cyber Terrorism, MMS

and Data Theft.

Script – Cyber Security Vis of Military Delegation

Mary Hvistendahl, China’s Hacker Army, 3 March 2010.

Presentation Paper: Cyber Terrorism.

Jimmy Sproles and Will Byars : Statistics on Cyber Terrorism, Information

from the Research Paper.

David Cater and Andra Katz, ‘Computer Crime: An Emerging Challenge for

Law Enforcement’, Law Enforcement Bulletin, December 1996.

Vinayak Godse, DSCI, Cyber Security, 5 March 2009.

Samuel Walker and Charles M Katz, The Police in America.

The Daily Star, 05 November 2007.

The Daily Star, 10 November 2007.

New Age, 14 Mar 2008.

The Daily Star, 6 September, 2008.

Dainik Jai Jai Din, 28 March 2009.

New Age, 21 April 2009.

The Daily Star, 28 September 2009.

Jugantor, 9 January 2010.

The Daily Star: 11 May 2010.

New Age, 31 May 2010.

Internet Websites

http://itu.int/ITU-D/cyb/cybersecurity/legislation

http://bdcert.org

http:/securityfocus.com

http://cs.etsu-tn.edu/gotterbarn/stdntppr/stats.htm

http://trusecure.com/html/tspub/whitepapers/crime.pdf

http://securityfocus.com/vulns/stats.shtml

http://attrition.org/errata/stats.html

http://cfr.org/publication/15577/evolution_of_cyber_warfare.html

http://en.wikipedia.org/wiki/ILOVEYOU

http://intelfusion.net/wordpress/?page_id=595

http://theatlantic.com/magazine/archive/2010/02/cyber-warriors/7917/

http:/en.wikipedia.org/wiki/cyberwarfare#cite_note-41

http://en.kioskea.net/news/15123-bangladesh-police-arrest-facebook-sharetipster

http://mcafee.com/us/about/press/corporate/2009/20090129_063500_

j.html.

Interview

H. M. Faruque Ahammad, General Manager & CTO, Information Services

Network Limited, on 19 April 2010 at 3 pm.

Sumon Ahmed Sabir, Managing Director, BDCOM Online Limited and

Chairman BDCERT, on 19 April 2010 at 5 pm.

Mohd. Zulfiquar Hafiz (Jewel), Associate Professor, Institute of Information

Technology (IIT), Dhaka University, on 22 April 2010 at 11 am.

Barrister K. M. Tanjib-ul Alam, Tanjib-ul Alam and Associates, on 22 April

at 5 pm.

Md Nazmul Haque, PPM, Deputy Inspector General, Criminal Investigation

Department (CID), Bangladesh Police, on 26 April 2010 at 4 pm.

Major General Zia Ahmed, psc (Retd), Chairman, Bangladesh

Telecommunication Regulatory Commission, on 29 June 2010 at 3 pm.

Major Md Rakibul Hassan, Deputy Director, System & Services, Bangladesh

Telecommunication Regulatory Commission, on 29 June 2010 at 4 pm.

Taifur Rahman Chowdhury, Head of ICT, BRAC, on 12 July 2010 at 10

am.

Naimuzzaman Mukta, People’s Perspective Specialist, Access to Information

Programme, Prime Minister’s Office, on 13 July 2010 at 2 pm.

Brigadier General Kazi Fakhruddin Ahmed, psc, Director of Forces Signal

Intelligence Bureau, Directorate General of Forces Intelligence (DGFI), on

July 2010 at 10 am.

Lieutenant Colonel Ziaul Ahsan, Director Intelligence, Rapid Action

Battalion (RAB), on 15 July at 2 pm.

Major Abu Sayed Raihan, Deputy Director Technical, National Security

Intelligence (NSI), on 17 July 2010 at 2 pm.

Professor Jamilur Reza Chowdhury, Former Vice Chancellor, BRAC

University and Former Professor of BUET, on 21 July 2010 at 11 am.

Published

2011-12-30

How to Cite

Brigadier General Md. Khurshid Alam, ndc, psc. (2011). CYBERCRIME IN BANGLADESH: IMPLICATIONS AND RESPONSE STRATEGY. NDC E-JOURNAL, 10(2), 20-35. Retrieved from https://ndcjournal.ndc.gov.bd/ndcj/index.php/ndcj/article/view/82

Similar Articles

You may also start an advanced similarity search for this article.

Most read articles by the same author(s)