Space For Rent
Saturday, June 4, 2016, Jaistha 21, 1423 BS, Shaban 27, 1437 Hijri

Crime: Physical domain to cyber space
Amdadul Haque
Published :Saturday, 4 June, 2016,  Time : 12:00 AM  View Count : 221
Cyber crime as a non-traditional security or human security threat is a great challenge in the 21st century which is termed as 'the Information Age.' In the recently concluded conference held in Bangladesh to create awareness about cyber security it is argued that almost 200 cyber attacks all over the world are launched every day in government and non-government institutions for stealing money as well as secret information and documents. Cyber attacks on social media and government and non-government financial and other sectors have become almost daily affair in Bangladesh over a few years. This version of crime has shaken and quaked the world concern to ensure peaceful uses of internet secure smooth functioning of business deals and transactions and avoid cyber warfare or conflict deliberating mass atrocities, destruction and aggression.
Cyber crimes are "offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet (chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)"(Halder, D. and Jaishankar, K. 2011). Cyber crimes are basically committed against three categories of entities. Firstly, individuals are targeted to hack and crack their social media passwords and IDs and bank accounts. Here both few selected men and women are mainly targeted to harass them and spread negative propaganda against them through different means of communication such as Skype, Facebook, mail, Viber, Whatsapp and others. Secondly, all sorts of properties like intellectual properties, credit card fund, financial transactions and others are monopolized through cyber crime. Thirdly, government and non-government institutions' important deals, databases, documents and secret information are hacked and splintered to bring large amount of destruction and atrocities in the daily performed functionaries. Recently, it is found through various newspapers that Bangladeshi people have received various messages and mails from different domestic and international websites in the name of scholarship, bonds and others. It is also found that a large amount of money has been sent to the hackers and crackers for DV lottery and other purposes within and abroad through mobile phone transactions.
Cyber crimes are basically committed by non-state actors such as organized national and transnational hacking and cracking networks and fundamentalist and extremist groups. It is found that technologically advanced nations (state actors) often participate in launching cyber attacks against their so called enemy states. Such as, the US and Israel carried out the Stuxnet (cyber) attacks reportedly against the Iranian nuclear infrastructures. However, the current piece of write up is an attempt to discuss how the notions of crimes, venue of crimes, actors of crimes and balancing mechanisms of security are shifting from physical domain to cyber space.
First shift is noticed in the nature of crime. Traditionally crimes take place in physical domain in the forms of robbery, theft, pick-pocketing, bribes and others hand to hand. But in cyber domain, crimes are related to cyber space where crimes are conducted through siphoning business or military information (i.e. cyber exploitation) or stunning rival military systems from functioning properly (i.e. cyber conflict), hacking and cracking cyber spheres like websites, passwords of the IDs of social media and tracking phone numbers. In this form of crime, a large number of individuals and institutions are targeted to earn money without accepted ways. Cyber crimes like blackmailing women, drug cartels, arms smuggling and killing people with contact are on the increase.
Second shift is termed as 'ratione loci' (territorial jurisdiction). In traditional form of criminal activities, offenses are occurred in a space which can be traced easily, criminals are identified through legal procedures and law and enforcement agencies could be reached easily to the crime zones/spots. But in cyber attacks and conflicts, it is not convenient to identify the attackers and criminals who commit a particular crime in cyber space due to the penetration of actors or criminals in national boundaries from within and far or near distance very easily. For example, the website of Bangladesh Computer Society was hacked by a Libyan hacker and hackers from three countries such as Sri Lanka, the Philippines and North Korea are deemed to be associated with the Bangladesh Bank heist. Sometimes it becomes impossible to identify from which part of the world the attacks have been launched.
Third shift is highly evident in the notion of security. Traditional notion of state security has been drastically changed. In the conventional state security, states could defend their national sovereignty through various offensive and defensive mechanisms. In the cyber warfare, states' traditional defensive and offensive techniques of security do not function properly as states do not know the time of attack and the location from which the attacks will be launched. In this redefined version of warfare, crackers and hackers very easily keep surveillance upon the means and ways of warfare of a particular state to destroy them tactically. Also, in the traditional security notion, the reverberation of an attack is predicted through various ways like secret agencies' reports, warnings and others. But in cyber space, the possibility and the time of attacks are not predicted.
Globally states are moving towards specialized laws from criminal laws to deal with the electronic crimes. Such as the US and India adopted Cybercrime Laws of the United States 2006 and Information Technology Act 2000 respectively. Bangladesh along with the experiences of other countries has adopted two important legal instruments (i.e. the Information and Communication Technology Act, 2006 and the Pornography Control Act, 2012) with defining offenses and punishment. Strong security of the national websites, using internet consciously and proper application of the existing legal instruments may play an effective role in curbing the amount of cyber crimes and ensuring security for both government and non-government institutions.
Amdadul Haque is a researcher who writes on contemporary issues. Email: [email protected]

Editor : Iqbal Sobhan Chowdhury
Published by the Editor on behalf of the Observer Ltd. from Globe Printers, 24/A, New Eskaton Road, Ramna, Dhaka. Editorial, News and Commercial Offices : Aziz Bhaban (2nd floor), 93, Motijheel C/A, Dhaka-1000. Phone :9586651-58. Fax: 9586659-60, Advertisemnet: 9513663, E-mail: [email protected], [email protected], [email protected].