CYBERCRIME IN BANGLADESH: IMPLICATIONS AND RESPONSE STRATEGY
Keywords:
CYBERCRIME, BANGLADESHAbstract
Cybercrime is becoming a serious concern of the modern world. With the
spiralling technological advancements, more number of functions and services
are increasing their reliance on ICT-based networks. Such reliance in the
foreseeable future is likely to involve most of the socio-politico-economic, as well
as military affairs around the globe. Alarmingly, cyber criminals are creeping at
the heels of these technological advents and terrorising individuals, communities,
societies, organisations and states by hi-tech theft, forgery, defamation, sabotage,
propaganda and other malicious activities. The convenience of committing the
crime without being easily detected makes cyber criminals nearly invincible. While
the detrimental effect of cybercrime is more pronounced in developed countries,
the crime is still less evident in Bangladesh. There are, however, symptoms
popping up sporadically which allude to a potential threat that is likely to grow
along with the ‘Digital Bangladesh’. The awareness and preparedness of the
country in this regard is apparently dubious. This paper attempts to evaluate the
vulnerability and awareness of Bangladesh concerning cybercrime, and suggest
an outline strategy to deal with it. A conceptual overview, skimmed chiefly out
of published materials, is presented at the beginning. The vulnerabilities and
preparedness is then evaluated before recommending a response strategy to
fight cybercrime. The analysis is primarily based on personal experience and
interactions with the concerned elite.
The degree of awareness in this regard, and hence the preparedness, is minimal.
The country needs to immediately start building up and enhancing its capability
to deal with cybercrimes. Such efforts should include legislative, judicial and
executive aspects, and development of a holistic approach involving all technocrats,
administrators, users and beneficiaries of cyber facilities. Promulgation of relevant
laws and their effective enforcement; building awareness; acquiring technical
knowledge and capabilities, etc are also vital in this regard.
Downloads
References
Books
Dudeja VD, Cyber Crime and Law Enforcement, Commonwealth Publishers,
Jody R. Westby, International Guide to Combating Cybercrime, American
Bar Association, 2003.
Victoria Roddle, The Ultimate Guide to Internet Safety, Lulu Press, 2008.
Journal/Report/Article/Paper
Cyber Terrorism Concept, Strategy and Counter Measures.
Dhaga S. Lt Col, Head Department of Telematics, MCTE, Study Papers on
Cyber Conflict.
Presentation by M Abdus Sobhan, Executive Director, Bangladesh Computer
Council.
Osiur Rahman, Mahabubur Rahman & Nour Mohammad, Cyber Law &
Territory, Claiming New Dynamism in Jurisprudence.
Mohammad Mahabubur Rahman, Cyber Space: Claiming Conceptual and
Institutional Innovations.
Report, International Telecommunication Union, ICT Application and Cyber
Security Division, April 2009.
Post Note, Computer Crime, October 2006.
Georgia Tech Information Security Center (GTISC), Emerging Cyber Threats
Report for 2009.
A Discussion Paper Outlining Key Policy Issues, Cyber Security, A New
Model for Protecting the Network, 2005.
Cybercrime Intelligence Report 2009, Finjan Malicious Code Research
Center.
Shakila Yeasmin Suchana, Cyber crime in ‘Digital Bangladesh’ published in
Daily Star on.
V. Shina Kumar, Asst.Director, A.P.Police Academy (India) ‘Cyber Crime
– Prevention & Detection’
Stein Schjolberg and Solange Ghernaouti-Hélie, A Global Protocol on
Cybersecurity and Cybercrime, Cybercrimedata, 2009.
Sam Lumpkin, Senior Security Architect, 2AB, Inc, ‘Internet Security and
Cyber Crime’.
The Penal Code, 1860 (Act No. XLV of 1860).
The Information and Communication Technology Act, 2006.
A.R.M. Borhanuddin (Raihan), Department of Law, Dhaka University,
‘Cyber Crime and Bangladesh Perspective’.
Shuaib Zahda, Cyber-Terrorism: Hype or Hazard, January 2010.
Ronald Deibert, China’s Cyberspace Control Strategy : An Overview and
Consideration of Issues for Canadian Policy, February 2010.
Sean Gallagher, Defense Department’s diversity hobbles race to improve to
information assurance, 22 January, 2010.
US Department of Homeland Security Report, Computer Network Security
& Privacy Protection, 19 February 2010.
James A. Lewis, Director and Senior Fellow, Technology And Public
Policy Program, Center for Strategic and International Studies (CSIS)
‘Cybersecurity: Next Steps to Protect Critical Infrastructure’, 23 February,
United Nations Manual on the Prevention and Control of Computer Related
Crime, 1995.
Sharier Khan, The Daily Star, 11 December 2009.
Cybercrime Investigation and Forensics.
Presentation: Emerging Threats in Cyber Space – Cyber Terrorism, MMS
and Data Theft.
Script – Cyber Security Vis of Military Delegation
Mary Hvistendahl, China’s Hacker Army, 3 March 2010.
Presentation Paper: Cyber Terrorism.
Jimmy Sproles and Will Byars : Statistics on Cyber Terrorism, Information
from the Research Paper.
David Cater and Andra Katz, ‘Computer Crime: An Emerging Challenge for
Law Enforcement’, Law Enforcement Bulletin, December 1996.
Vinayak Godse, DSCI, Cyber Security, 5 March 2009.
Samuel Walker and Charles M Katz, The Police in America.
The Daily Star, 05 November 2007.
The Daily Star, 10 November 2007.
New Age, 14 Mar 2008.
The Daily Star, 6 September, 2008.
Dainik Jai Jai Din, 28 March 2009.
New Age, 21 April 2009.
The Daily Star, 28 September 2009.
Jugantor, 9 January 2010.
The Daily Star: 11 May 2010.
New Age, 31 May 2010.
Internet Websites
http://itu.int/ITU-D/cyb/cybersecurity/legislation
http:/securityfocus.com
http://cs.etsu-tn.edu/gotterbarn/stdntppr/stats.htm
http://trusecure.com/html/tspub/whitepapers/crime.pdf
http://securityfocus.com/vulns/stats.shtml
http://attrition.org/errata/stats.html
http://cfr.org/publication/15577/evolution_of_cyber_warfare.html
http://en.wikipedia.org/wiki/ILOVEYOU
http://intelfusion.net/wordpress/?page_id=595
http://theatlantic.com/magazine/archive/2010/02/cyber-warriors/7917/
http:/en.wikipedia.org/wiki/cyberwarfare#cite_note-41
http://en.kioskea.net/news/15123-bangladesh-police-arrest-facebook-sharetipster
http://mcafee.com/us/about/press/corporate/2009/20090129_063500_
j.html.
Interview
H. M. Faruque Ahammad, General Manager & CTO, Information Services
Network Limited, on 19 April 2010 at 3 pm.
Sumon Ahmed Sabir, Managing Director, BDCOM Online Limited and
Chairman BDCERT, on 19 April 2010 at 5 pm.
Mohd. Zulfiquar Hafiz (Jewel), Associate Professor, Institute of Information
Technology (IIT), Dhaka University, on 22 April 2010 at 11 am.
Barrister K. M. Tanjib-ul Alam, Tanjib-ul Alam and Associates, on 22 April
at 5 pm.
Md Nazmul Haque, PPM, Deputy Inspector General, Criminal Investigation
Department (CID), Bangladesh Police, on 26 April 2010 at 4 pm.
Major General Zia Ahmed, psc (Retd), Chairman, Bangladesh
Telecommunication Regulatory Commission, on 29 June 2010 at 3 pm.
Major Md Rakibul Hassan, Deputy Director, System & Services, Bangladesh
Telecommunication Regulatory Commission, on 29 June 2010 at 4 pm.
Taifur Rahman Chowdhury, Head of ICT, BRAC, on 12 July 2010 at 10
am.
Naimuzzaman Mukta, People’s Perspective Specialist, Access to Information
Programme, Prime Minister’s Office, on 13 July 2010 at 2 pm.
Brigadier General Kazi Fakhruddin Ahmed, psc, Director of Forces Signal
Intelligence Bureau, Directorate General of Forces Intelligence (DGFI), on
July 2010 at 10 am.
Lieutenant Colonel Ziaul Ahsan, Director Intelligence, Rapid Action
Battalion (RAB), on 15 July at 2 pm.
Major Abu Sayed Raihan, Deputy Director Technical, National Security
Intelligence (NSI), on 17 July 2010 at 2 pm.
Professor Jamilur Reza Chowdhury, Former Vice Chancellor, BRAC
University and Former Professor of BUET, on 21 July 2010 at 11 am.