Documente Academic
Documente Profesional
Documente Cultură
Introduction:
Day by day the use of computer is increasingly & more users are connecting to the internet. So
the crimes are also increasing. But mostly peoples are unaware about cyber-crimes. Although the
term cybercrime is usually restricted to describing criminal activity in which the computer or
network is an essential part of the crime. Cyber Crimes are defined as: "Offences that are
committed against individuals or groups of individuals with a criminal motive to intentionally
harm the reputation of the victim or cause physical or mental harm to the victim directly or
indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails,)
and mobile phones (SMS/MMS)".Such new crimes devoted to the Internet are email
phishing, hijacking domain names, virus imitation, and cyber vandalism.
Classifications of cyber-crimes:
Cyber Crimes which are growing day by day, it is very difficult to find out what is
actually a cyber-crime and what is the conventional crime so to come out of this
confusion, cyber-crimes can be classified under different categories which are as follows:
i.
iii.
conventional warfare although this analogy is controversial for both its accuracy
and its political motivation.
Distribution of pirated software: It means distributing pirated software from one
computer to another intending to destroy the data and official records of the
government.
Possession of Unauthorized Information: It is very easy to access any
information by the terrorists with the aid of internet and to possess that
information for political, religious, social, ideological objectives.
iv.
Cyber-crimes against society: An unlawful act done with the intention of causing
harm to the cyberspace will affect large number of persons. These offences
includes:
Child Pornography: It involves the use of computer networks to create,
distribute, or access materials that sexually exploit underage children. It also
includes activities concerning indecent exposure and obscenity.
Cyber Trafficking: It may be trafficking in drugs, human beings, arms weapons
etc. which affects large number of persons. Trafficking in the cyberspace is also a
gravest crime.
Online Gambling: Online fraud and cheating is one of the most lucrative
businesses that are growing today in the cyber space. There are many cases that
have come to light are those pertaining to credit card crimes, contractual crimes,
offering jobs, etc.
Financial Crimes: This type of offence is common as there is rapid growth in the
users of networking sites and phone networking where culprit will try to attack by
sending bogus mails or messages through internet. Ex: Using credit cards by
obtaining password illegally.
Forgery: It means to deceive large number of persons by sending threatening
mails as online business transactions are becoming the habitual need of todays life
style.
of cyber terrorism and hackers. Mostly peoples dont know about cyber-crime/cyber
laws. So todays need to aware the society about cyber-crimes and cyber laws.
ICT-ACT of BANGLADESH:
ICT-Act of BANGLADESH is as follows:
Eliminates barriers to e-commerce,
Promotes legal and business infrastructures to secure e-transactions,
Facilitates electronic filing in government agencies and
Ensures efficient delivery of electronic records from government offices
Help maintain the latest technology by freeing it from nuisance as punitive provisions
Publishing obscene or defamatory information in electronic form
The law ensures five years imprisonment and a fine of up to Taka 5 core for offenders for
the first conviction and that could be extended to 10 years imprisonment and Taka 10
core as fine for each subsequent offence of the same nature.
Powers of Police Officers and Other Officers
Establishment of Cyber Appellate Tribunal
may pop-up frequently. Some of the major types of offences against which many countries across
the globe have enacted various Acts (mostly at preliminary levels) are as follows: 1. Unlawful access to data in computers,
2. Damaging data in computer etc.
3. Possession of device to obtain unauthorized telephone facilities,
4. Unauthorized access to computer and computer material
5. Committing mischief with data.
6. Data spying,
7. Computer fraud,
8. Forgery of prohibitive data,
9. Alteration of data,
10. Computer sabotage.
11. False entry in an authentic deed
12. False entry in permit license or passport
13. Electronic record made wrongfully
14. Electronic record made wrongfully by public servant
15. Interferences with business by destruction or damage of computer
16. Interferences with computer
17. Destruction of public document
18. Destruction of private document
19. Unauthorized access with intention to commit offences/ computer crimes
20. Unauthorized use and interception of computer services
21. Knowingly access of computer without authorization related to national defense or foreign
relation
22. Intentional access of computer without authorization to obtain financial information
23. Unauthorized access of computer of a Govt. Dept. Or agency
24. Knowingly causing transmission of data/program to damage a computer network, data or
program or withhold or deny use of computer, network etc.
25. Knowingly causing transmission of data/program with risk that transmission will damage a
computer network, data or program or withhold or deny use of computer, network etc., and an
unauthorized access of computer with intent to defraud.
the web to multifarious channels to any part of the world just with a click of the mouse. Cyber
culture has made our lives that easy. But with the growth of technology come its loopholes and
the loopholes lead way to various cyber-crimes. If we trace the nature and trend of cyber-crimes
in Asia, we see that year ago, cyber threats came from virus, malware and relatively
unsophisticated hacking. Over time, however, the techniques of hacking have become more
complex for instance, cyber terrorism, and identity theft, phishing, and e-commerce fraud.
Mobile devices and cloud computing present new data security exposures. News has it that In the
first eight months of 2013, more than 20,000 China-based websites were hacked, and more than
eight million servers hijacked by Zombie and Trojan programs controlled from overseas.
According to the Norton report, Indian citizens and corporations lost Rs 50,400 core to cyber
fraud in 2012. The report also said that 63% of smart phone users in the country have
experienced some form of mobile cybercrime in the 12 months preceding the reports release.
These are just a few instances. Covering up all instances would render the list endless.
With the growth of cyber-crimes all over Asia, the enforcement of comprehensive and state of
the art cyber data protection technologies has become the need of the hour. Cyber-crimes are
punishable in most countries worldwide. Chinese President Xi Jinping announced in February
2014 that he will spearhead the fight against cybercrime by putting himself in charge of a newly
formed body to coordinate cyber security. This new body will draft policy for boosting the
countrys defense against cybercrime
as well as expanding and improving Internet access. Meanwhile In 2013, the Indian government
went one step further by announcing a National Cyber Security Policy aimed at setting up an
agency to protect the public and private infrastructures from cyber-attacks and safeguarding the
personal information of web users, financial and banking information, and sovereign data. In
another instance the Japanese Government as of March 2014, the has been considering a new law
granting the National Information Security Centre (NISC) and the Government Security
Operation Coordination team (GSOC) with powers to cut through bureaucracy when dealing
with cyber threats. All that said the need for spreading the necessity of cyber protection on a
continental basis is extremely inevitable. The SAARC has realized the importance of spreading
cyber security awareness and the 18th SAARC Summit agreed to establish a cyber-crime
monitoring desk. However, hard and fast measures yet need to be implemented on an urgent
basis so as to combat cyber-crimes on a broader scale.
Conclusion:
The conclusion may, therefore, be drawn that computer-related crime is a real, (at least in respect
of certain offences) expanding phenomenon. Furthermore, a steady increase in number of such
crimes in this area is expected which demands for greater attention of lawmakers. Let's now once
again review the alternatives available for establishing a comprehensive legal framework. Can
we make only territorial laws applicable to online activities that have no relevant or perhaps even
determinable geographic location? It seems to be very difficult. We must also allow responsible
participants on the Internet to set their own rules and to help all concerned (online and offline).
The law of the Internet has already emerged, and we believe can continue to emerge with
individual users voting to join the particular systems they find most congenial.
However, this model also does not solve all problems, and various governance issues cannot be
resolved overnight. We will need to redefine Cyber Legal processes in this new dynamic context.
Finally, the Cyber Law defined as a thoughtful group conversation about core values and distinct
benefits to the Society will persist. But it will not, could not, and should not be the same law as
that applicable to physical, geographically defined territories.
Reference: