SlideShare a Scribd company logo
1 of 30
CYBER CRIME IN
BANGLADESH
PRESENTED BY:
JANNATUL NAYEM HIMEL ( ID – 163-15-8538)
MD. NAZMUL HOSSAIN MIR (ID: 163-15-8386)
SAJJAT CHOWDHURY TANVIR (ID: 162-15-7954)
MAKSUDUR RAHMAN NILOY (ID: 162-15-7955)
COURSE TEACHER:
TAJMARY MAHFUZ
ASSISTANT PROFESSOR
DEPARTMENT OF GED
DAFFODIL INTERNATIONAL UNIVERSITY
WHAT IS CYBER CRIME ?
Example :- Hacking of computer.
• Cybercrime is nothing but where a
device connected to the internet is
used as an object & subject of
crime.
HISTORY OF CYBER CRIME
The first occurance of cyber crime became evident
in the 1970s when some anti-government
teenagers used the telephone service to copy
one’s voice and made several dangerous threats
to general people.
DIFFERENCE BETWEEN CYBERCRIME AND TRADITIONAL
CRIME
Difference Between Cybercrime and
Traditional Crime is the time period
cybercrime refers to online or Web-based
unlawful acts. At this time, cybercrime is
considered one of the FBI’s prime three
priorities. Whereas there are identical
kinds of criminals in Traditional Crime
having identical causes, Traditional
Criminals have identical causes like Cyber
Criminals corresponding to boredom and
vandalism.
Vs.
PAST OF CYBER CRIME IN BANGLADESH
Bangladesh has not been a suitable
place of cyber crime in the past
because of less dependency on
technology.Since the arrival of
internet in the mid-90s,crime
through www started rising at a very
slow rate.Up until the first decade of
21st century,cyber crime was a very
little known topic.Several hacks on
governmental websites happened
during this time,but very few paid
attention to this.
TYPES OF CYBER CRIME IN BANGLADESH
Major types:
• Crime against a person
• Crime against an organization
• Crime against the society/country
Variations:
• Cyber Stalking
• Phishing/Spamming
• Piracy
• Identity Theft
• Blackmailing
• Malicious Software
• Cyber Bullying
• Raising chaos through fake news
PRESENT OF CYBER CRIME IN BANGLADESH
According to the police
headquarters(Dhaka), around
1,417 cases were filed under
the ICT act against 2,873
people in the last five years.
0
100
200
300
400
500
600
2012 2013 2014 2015 2016 2017
Cyber crime case filed
CASE INFO ON CYBER CRIME
RECENT INCIDENTS OF CYBER
CRIME
BANGLADESH BANK HEIST
• The Bangladesh Bank robbery, also known
colloquially as the Bangladesh Bank heist, took
place in February 2016, when instructions to
fraudulently withdraw US$ 1 billion from the
account of Bangladesh Bank, the central bank of
Bangladesh, at the Federal Reserve Bank of New
York were issued via the SWIFT network. Five
transactions issued by security hackers, worth
$101 million and withdrawn from a Bangladesh
Bank account at the Federal Reserve Bank of
New York, succeeded, with $20 million traced
to Sri Lanka (since recovered) and $81 million
to the Philippines (about $18 million
recovered).The Federal Reserve Bank of New
York blocked the remaining thirty transactions,
amounting to $850 million, at the request of
Bangladesh Bank.It was identified later that
Dridex malware was used for the attack.
SONALI BANK HEIST
In 2013,Hackers transferred
$250,000 from Sonali Bank to
recipients in Turkey.
German News Channel,Reuters
quoted a Sonali Bank official as
saying cybercriminals gained
passwords to other systems by
setting up key-logger software on
a computer and sending transfer
messages over SWIFT.
ATTACK ON MINORITIES
In the last 5-6 years,many tragedic
attacks happened on the minority
people of Bangladesh.Ramu attack
and Nasirnagar attack can be named
on top.These occurred through two
ways:
• Spreading fake news thorugh social
media
• Stealing a minority person’s identity
and threating government
employee/organization using it
So this is also a cyber crime.
MANY OTHER CYBER CRIMES
• On January 06, 2013, Islami
Bank Bangladesh site was
hacked by Human Mind Cracker.
• In February, 2016, skimming
attacks in six ATM booths of
three commercial banks.
• Several celebrities of Bangladesh
were harassed due to leaking of
sensitive information in the last
5 years.
CONSTITUTION OF BANGLADESH ON CYBER
CRIME
In order to facilitate e-commerce and
encourage the growth of information
technology, the Information and
Communication Technology (ICT) Act,
2006 was enacted making provisions
with a maximum punishment of 10
years imprisonment or fine up to taka
10 million or both.
However, recently the National
Parliament amended the ICT Act 2006,
raising penalties for cyber crimes
setting a minimum of 7 years
imprisonment and a maximum of 14
years or a fine of Tk. 1 crore or both.
CONSTITUTION OF BANGLADESH ON CYBER
CRIME
• The ICT Act, 2006 as amended in 2013 is obviously
a brilliant achievement of Bangladesh in the field of
cyber law. Critics point out that still there remain
certain specific limitations of the said Act as under:
(1) The Act remains silent about various intellectual
property rights like copy right, trade mark and
patent right of e-information and data.
(2) The enactment has a major effect on e-
commerce and m-commerce in Bangladesh. But it
keeps itself mum as to the electronic payment of
any transaction.
(3) The legislation was initially supposed to be
applied to crimes committed all over the world; but
nobody knows how this can be achieved in
practice.
Continued
CONSTITUTION OF BANGLADESH ON CYBER
CRIME
• (4) Spamming has become a peril in the West as
such they have made anti spamming provisions
in cyber law. However, there is no anti-
spamming provision in our Act.
(5) Domain name is the major issue which
relates to the internet world thoroughly. But the
ICT Act, 2006 does not define 'domain name'
and the rights and liabilities relating to this.
(6) The Act does not address any crime
committed through using mobile phones.
(7) This law made e-mails as evidence,
conflicting with the country's Evidence Act that
does not recognize e-mails as evidence.
•
IMPORTANCE OF CYBER SECURITY
Ask these questions to the people
surrounding you:
1.Has anyone ever blackmailed you by
stealing your photo and vandalizing it?
2.Has your social media account ever been
hacked?
3.Has your credit card ever been
scammed?
You will find out that the answer to these
WHO ARE THE BIGGEST VICTIMS OF CYBER
CRIME?
In mid-August 2017, Rapid Action Battalion (RAB) arrested two mobile
phone repairmen, Sabuj and Madhu. They were found guilty of using
their jobs to acquire personal information and content from various
women.
The two men would take these files from the mobile phones of women
who brought them in for repair. They also accessed their IMO
messenger apps and ran them in parallel on their own devices, reading
personal messages. The duo used all this information to blackmail a
number of women.
WHERE TO GET HELP?
Governmental Organization:
1.Dhaka Metropoliton Police(DMP) - https://dmp.gov.bd/contact-us/
2.Rapid Action battalion(RAB) - http://www.rab.gov.bd/english/report-crime-2/
3.National helpline centre for Violence against women and children - Helpline Number-
109
4.Cyber Crime Investigation Centre-CID(Bangladesh Police)
WHERE TO GET HELP?
Non-governmental non-profit organizations:
1.Crime Research and Analysis Foundation(CRAF) -
https://www.facebook.com/CrimeResearchandAnalysisFoundation
/
2.Insight Bangladesh Foundation -
http://insightbangladesh.org.bd/contact-us/
HOW TO IDENTIFY CYBER CRIME
1.Unusual activity in
accounts/apps
2.Fake app
3.Battery usage
4.Packet data transfer
monitoring
5.Unusual adverts
6.System software
malfunction
HOW TO IDENTIFY IF YOUR PC HAS
BEEN BREACHED ILLEGALLY
For Windows:
1.Suspicious outgoing traffic
2.Unusual ram usage
3.Unidentified disk usage
4.Antivirus getting disabled
For Linux:
1.Suspiciously/Unknown file names
2.Modification of login panel
3.Weird behavior of applications
HOW TO PREVENT
USE ANTIVIRUS
CLICK WITH CAUTION
USE STRONG PASSWORDS
SAFE ONLINE SHOPPING
LIVE DEMONSTRATION

More Related Content

What's hot (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber Crime
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital age
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security Awareness: In perspective of Bangladesh
Cyber security Awareness: In perspective of Bangladesh Cyber security Awareness: In perspective of Bangladesh
Cyber security Awareness: In perspective of Bangladesh
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cybercrime final-ppt
Cybercrime final-pptCybercrime final-ppt
Cybercrime final-ppt
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 

Similar to Cyber crime-in-bangladesh

CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDCYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDAnkush saini
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securityMehediHasan996
 
Cybercrime in Iraq
Cybercrime in IraqCybercrime in Iraq
Cybercrime in IraqAyub Nuri
 
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...Gamaliel Olayiwola Fasuyi
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Jayati Tiwari
 
Is Big Data A Risky Business in Isaca Journal
Is Big Data A Risky Business in Isaca JournalIs Big Data A Risky Business in Isaca Journal
Is Big Data A Risky Business in Isaca JournalTushar Kale
 
New microsoft office word document (3)
New microsoft office word document (3)New microsoft office word document (3)
New microsoft office word document (3)Priyatham Kanigarla
 
cybercrime-191029040729.pptx ciber crime
cybercrime-191029040729.pptx ciber crimecybercrime-191029040729.pptx ciber crime
cybercrime-191029040729.pptx ciber crimesujansujan1113
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime pptAsish Verma
 
cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000Yash Jain
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in Indiasaumi17
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in indiaArpan Shah
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problemijbuiiir1
 

Similar to Cyber crime-in-bangladesh (20)

CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDCYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime in Pakistan
Cyber crime in PakistanCyber crime in Pakistan
Cyber crime in Pakistan
 
Cybercrime ppt
Cybercrime pptCybercrime ppt
Cybercrime ppt
 
Cybercrime in Iraq
Cybercrime in IraqCybercrime in Iraq
Cybercrime in Iraq
 
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
 
Is Big Data A Risky Business in Isaca Journal
Is Big Data A Risky Business in Isaca JournalIs Big Data A Risky Business in Isaca Journal
Is Big Data A Risky Business in Isaca Journal
 
New microsoft office word document (3)
New microsoft office word document (3)New microsoft office word document (3)
New microsoft office word document (3)
 
cybercrime-191029040729.pptx ciber crime
cybercrime-191029040729.pptx ciber crimecybercrime-191029040729.pptx ciber crime
cybercrime-191029040729.pptx ciber crime
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
 

More from Md Nazmul Hossain Mir

More from Md Nazmul Hossain Mir (11)

Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
Bio medical image processing
Bio medical image processingBio medical image processing
Bio medical image processing
 
Challenges in-web-crawling
Challenges in-web-crawlingChallenges in-web-crawling
Challenges in-web-crawling
 
Cyclic redundancy check
Cyclic redundancy checkCyclic redundancy check
Cyclic redundancy check
 
Computer vision
Computer visionComputer vision
Computer vision
 
Artificial intelligence for diabetes case management the intersection of phys...
Artificial intelligence for diabetes case management the intersection of phys...Artificial intelligence for diabetes case management the intersection of phys...
Artificial intelligence for diabetes case management the intersection of phys...
 
Segmentation
SegmentationSegmentation
Segmentation
 
Error correction-and-type-of-error-in-c
Error correction-and-type-of-error-in-cError correction-and-type-of-error-in-c
Error correction-and-type-of-error-in-c
 
Datapath design
Datapath designDatapath design
Datapath design
 
Distributed systems
Distributed systemsDistributed systems
Distributed systems
 
Strongly connected components
Strongly connected componentsStrongly connected components
Strongly connected components
 

Recently uploaded

Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170Sonam Pathan
 
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jodhpur Park 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130 Available With Roomdivyansh0kumar0
 
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...makika9823
 
government_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfgovernment_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfshaunmashale756
 
Bladex 1Q24 Earning Results Presentation
Bladex 1Q24 Earning Results PresentationBladex 1Q24 Earning Results Presentation
Bladex 1Q24 Earning Results PresentationBladex
 
NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...
NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...
NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...Amil baba
 
How Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of ReportingHow Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of ReportingAggregage
 
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一S SDS
 
Vp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppVp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppmiss dipika
 
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...yordanosyohannes2
 
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...Henry Tapper
 
Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713Sonam Pathan
 
Chapter 2.ppt of macroeconomics by mankiw 9th edition
Chapter 2.ppt of macroeconomics by mankiw 9th editionChapter 2.ppt of macroeconomics by mankiw 9th edition
Chapter 2.ppt of macroeconomics by mankiw 9th editionMuhammadHusnain82237
 
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptx
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptxOAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptx
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptxhiddenlevers
 
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证rjrjkk
 
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办fqiuho152
 
Q3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast SlidesQ3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast SlidesMarketing847413
 
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...First NO1 World Amil baba in Faisalabad
 
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...Amil baba
 
chapter_2.ppt The labour market definitions and trends
chapter_2.ppt The labour market definitions and trendschapter_2.ppt The labour market definitions and trends
chapter_2.ppt The labour market definitions and trendslemlemtesfaye192
 

Recently uploaded (20)

Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
Call Girls Near Delhi Pride Hotel, New Delhi|9873777170
 
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jodhpur Park 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130 Available With Room
 
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
 
government_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfgovernment_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdf
 
Bladex 1Q24 Earning Results Presentation
Bladex 1Q24 Earning Results PresentationBladex 1Q24 Earning Results Presentation
Bladex 1Q24 Earning Results Presentation
 
NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...
NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...
NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...
 
How Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of ReportingHow Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of Reporting
 
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
(办理学位证)加拿大萨省大学毕业证成绩单原版一比一
 
Vp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppVp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsApp
 
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
 
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
 
Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713
 
Chapter 2.ppt of macroeconomics by mankiw 9th edition
Chapter 2.ppt of macroeconomics by mankiw 9th editionChapter 2.ppt of macroeconomics by mankiw 9th edition
Chapter 2.ppt of macroeconomics by mankiw 9th edition
 
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptx
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptxOAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptx
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptx
 
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
原版1:1复刻温哥华岛大学毕业证Vancouver毕业证留信学历认证
 
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
 
Q3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast SlidesQ3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast Slides
 
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
 
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...
NO1 WorldWide Genuine vashikaran specialist Vashikaran baba near Lahore Vashi...
 
chapter_2.ppt The labour market definitions and trends
chapter_2.ppt The labour market definitions and trendschapter_2.ppt The labour market definitions and trends
chapter_2.ppt The labour market definitions and trends
 

Cyber crime-in-bangladesh

  • 1. CYBER CRIME IN BANGLADESH PRESENTED BY: JANNATUL NAYEM HIMEL ( ID – 163-15-8538) MD. NAZMUL HOSSAIN MIR (ID: 163-15-8386) SAJJAT CHOWDHURY TANVIR (ID: 162-15-7954) MAKSUDUR RAHMAN NILOY (ID: 162-15-7955) COURSE TEACHER: TAJMARY MAHFUZ ASSISTANT PROFESSOR DEPARTMENT OF GED DAFFODIL INTERNATIONAL UNIVERSITY
  • 2. WHAT IS CYBER CRIME ? Example :- Hacking of computer. • Cybercrime is nothing but where a device connected to the internet is used as an object & subject of crime.
  • 3. HISTORY OF CYBER CRIME The first occurance of cyber crime became evident in the 1970s when some anti-government teenagers used the telephone service to copy one’s voice and made several dangerous threats to general people.
  • 4. DIFFERENCE BETWEEN CYBERCRIME AND TRADITIONAL CRIME Difference Between Cybercrime and Traditional Crime is the time period cybercrime refers to online or Web-based unlawful acts. At this time, cybercrime is considered one of the FBI’s prime three priorities. Whereas there are identical kinds of criminals in Traditional Crime having identical causes, Traditional Criminals have identical causes like Cyber Criminals corresponding to boredom and vandalism. Vs.
  • 5. PAST OF CYBER CRIME IN BANGLADESH Bangladesh has not been a suitable place of cyber crime in the past because of less dependency on technology.Since the arrival of internet in the mid-90s,crime through www started rising at a very slow rate.Up until the first decade of 21st century,cyber crime was a very little known topic.Several hacks on governmental websites happened during this time,but very few paid attention to this.
  • 6. TYPES OF CYBER CRIME IN BANGLADESH Major types: • Crime against a person • Crime against an organization • Crime against the society/country Variations: • Cyber Stalking • Phishing/Spamming • Piracy • Identity Theft • Blackmailing • Malicious Software • Cyber Bullying • Raising chaos through fake news
  • 7. PRESENT OF CYBER CRIME IN BANGLADESH According to the police headquarters(Dhaka), around 1,417 cases were filed under the ICT act against 2,873 people in the last five years. 0 100 200 300 400 500 600 2012 2013 2014 2015 2016 2017 Cyber crime case filed
  • 8. CASE INFO ON CYBER CRIME
  • 9. RECENT INCIDENTS OF CYBER CRIME
  • 10. BANGLADESH BANK HEIST • The Bangladesh Bank robbery, also known colloquially as the Bangladesh Bank heist, took place in February 2016, when instructions to fraudulently withdraw US$ 1 billion from the account of Bangladesh Bank, the central bank of Bangladesh, at the Federal Reserve Bank of New York were issued via the SWIFT network. Five transactions issued by security hackers, worth $101 million and withdrawn from a Bangladesh Bank account at the Federal Reserve Bank of New York, succeeded, with $20 million traced to Sri Lanka (since recovered) and $81 million to the Philippines (about $18 million recovered).The Federal Reserve Bank of New York blocked the remaining thirty transactions, amounting to $850 million, at the request of Bangladesh Bank.It was identified later that Dridex malware was used for the attack.
  • 11. SONALI BANK HEIST In 2013,Hackers transferred $250,000 from Sonali Bank to recipients in Turkey. German News Channel,Reuters quoted a Sonali Bank official as saying cybercriminals gained passwords to other systems by setting up key-logger software on a computer and sending transfer messages over SWIFT.
  • 12. ATTACK ON MINORITIES In the last 5-6 years,many tragedic attacks happened on the minority people of Bangladesh.Ramu attack and Nasirnagar attack can be named on top.These occurred through two ways: • Spreading fake news thorugh social media • Stealing a minority person’s identity and threating government employee/organization using it So this is also a cyber crime.
  • 13. MANY OTHER CYBER CRIMES • On January 06, 2013, Islami Bank Bangladesh site was hacked by Human Mind Cracker. • In February, 2016, skimming attacks in six ATM booths of three commercial banks. • Several celebrities of Bangladesh were harassed due to leaking of sensitive information in the last 5 years.
  • 14. CONSTITUTION OF BANGLADESH ON CYBER CRIME In order to facilitate e-commerce and encourage the growth of information technology, the Information and Communication Technology (ICT) Act, 2006 was enacted making provisions with a maximum punishment of 10 years imprisonment or fine up to taka 10 million or both. However, recently the National Parliament amended the ICT Act 2006, raising penalties for cyber crimes setting a minimum of 7 years imprisonment and a maximum of 14 years or a fine of Tk. 1 crore or both.
  • 15. CONSTITUTION OF BANGLADESH ON CYBER CRIME • The ICT Act, 2006 as amended in 2013 is obviously a brilliant achievement of Bangladesh in the field of cyber law. Critics point out that still there remain certain specific limitations of the said Act as under: (1) The Act remains silent about various intellectual property rights like copy right, trade mark and patent right of e-information and data. (2) The enactment has a major effect on e- commerce and m-commerce in Bangladesh. But it keeps itself mum as to the electronic payment of any transaction. (3) The legislation was initially supposed to be applied to crimes committed all over the world; but nobody knows how this can be achieved in practice. Continued
  • 16. CONSTITUTION OF BANGLADESH ON CYBER CRIME • (4) Spamming has become a peril in the West as such they have made anti spamming provisions in cyber law. However, there is no anti- spamming provision in our Act. (5) Domain name is the major issue which relates to the internet world thoroughly. But the ICT Act, 2006 does not define 'domain name' and the rights and liabilities relating to this. (6) The Act does not address any crime committed through using mobile phones. (7) This law made e-mails as evidence, conflicting with the country's Evidence Act that does not recognize e-mails as evidence. •
  • 17. IMPORTANCE OF CYBER SECURITY Ask these questions to the people surrounding you: 1.Has anyone ever blackmailed you by stealing your photo and vandalizing it? 2.Has your social media account ever been hacked? 3.Has your credit card ever been scammed? You will find out that the answer to these
  • 18. WHO ARE THE BIGGEST VICTIMS OF CYBER CRIME? In mid-August 2017, Rapid Action Battalion (RAB) arrested two mobile phone repairmen, Sabuj and Madhu. They were found guilty of using their jobs to acquire personal information and content from various women. The two men would take these files from the mobile phones of women who brought them in for repair. They also accessed their IMO messenger apps and ran them in parallel on their own devices, reading personal messages. The duo used all this information to blackmail a number of women.
  • 19. WHERE TO GET HELP? Governmental Organization: 1.Dhaka Metropoliton Police(DMP) - https://dmp.gov.bd/contact-us/ 2.Rapid Action battalion(RAB) - http://www.rab.gov.bd/english/report-crime-2/ 3.National helpline centre for Violence against women and children - Helpline Number- 109 4.Cyber Crime Investigation Centre-CID(Bangladesh Police)
  • 20. WHERE TO GET HELP? Non-governmental non-profit organizations: 1.Crime Research and Analysis Foundation(CRAF) - https://www.facebook.com/CrimeResearchandAnalysisFoundation / 2.Insight Bangladesh Foundation - http://insightbangladesh.org.bd/contact-us/
  • 21.
  • 22. HOW TO IDENTIFY CYBER CRIME 1.Unusual activity in accounts/apps 2.Fake app 3.Battery usage 4.Packet data transfer monitoring 5.Unusual adverts 6.System software malfunction
  • 23. HOW TO IDENTIFY IF YOUR PC HAS BEEN BREACHED ILLEGALLY
  • 24. For Windows: 1.Suspicious outgoing traffic 2.Unusual ram usage 3.Unidentified disk usage 4.Antivirus getting disabled For Linux: 1.Suspiciously/Unknown file names 2.Modification of login panel 3.Weird behavior of applications