BDNOG17 Plenary Session, Security Concerns: A perspective in Smart Bangladesh
1. Security Concerns: A perspective in
Smart Bangladesh
Md. Najmul Islam BPM
Police Super
(Additional Deputy Police Commissioner)
Cyber Crime Investigation Division
Counter Terrorism and Transnational Crime Unit
Dhaka Metropolitan Police
2. 1st
and 2nd
IR in Europe and 3rd
is in USA and west.
Steam Engine in 1784, Electricity in 1870, Computer in 1943
and Internet in 1969, which were the factors of the past three
IR.
IR 4.0 leaded by ASIA, mentioned in WEF in Davos in 2012. BD
has a great potential in IR 4.0 based on Digital Technology.
Main Trait: IOT, Quantum Computing, Virtual reality, 3D
Printing, Artificial Intelligence (ML)
BD can be mid income country in 2024 and developed country
in 2041 by IR 4.0 and grab 200 billion dollars business on IT
and ITS.
Society 4.0(IR4.0)
3. 12 Dec, 2008 Digital Bangladesh phenomenon
was developed.
After almost a decade we are on board in achieving
a SMART BANGLADESH.
Key Pillars: Smart Citizen, Smart Government, Smart
Society, and Smart Economy.
IR4.0 has a close connection to SMART
BANGLADESH
SMART BANGLADESH a transition
4. Internet has offered us a much more convenient way to
share information across time and place.
Cyberspace also opened a new venue for criminal
activities.
Cyber attacks
Distribution of illegal materials in cyberspace
Computer-mediated illegal communications within big crime
groups or terrorists
Cyber threats has become one of the major security
issues for the law enforcement community.
Introduction
5. People are into virtual life
means criminals are in virtual life
In Bangladesh-
A new Facebook user is being added in every 10 seconds.
Nearly 70 millions people use Facebook.
This rate is higher than the current birth rate of the country.
We have been connected over fiber optic cables across the country.
We are now using 4G and going to be on 5G soon.
Data users : 120 millions and 160 Mllions Mobile Subscribers.
Facebook, Google/Youtube got their cache server in Bangladeh.
These are the parameters which indicates the development of ICT in Bangladesh and
development of criminal use of internet
6. Cybercrimes and Cyber Threats
Cybercrime Definition:
Illegal computer-mediated activities that can be
conducted through global electronic networks. [Thomas,
2000]
Cyber crime is an evil having its origin in the growing
dependence on computer in modern life.
A simple definition of cyber crime would be unlawful
acts wherein the computer is either a tool or a target or
both.
7. Cybercrime and Cyber Threats
What Is a Cyber Threat?
the possibility of a malicious attempt to damage or
disrupt a computer network or system which
eventually attempts to access files and infiltrate or
steal data.
A cyber threat is deemed any malicious act that
attempts to gain access to a computer network
without authorization or permission from the
owners.
Cyber Threat is itself a subset of cyber crime
8. Global Cyber Threats
Advanced Persistent Threats (stuxnet in Iran Nuclear Site)
Phishing Trojans (misguiding users and stealing credentials)
Botnets (Robotics used for repeated attacks or spreading malicious
things)
Ransomware (WannaCry, Petya)
Distributed Denial of Service (DDoS)
Intellectual Property Theft
Theft of Money (Online Bank forgery/ ATM forgery)
Data Manipulation (Integrity lose)
Data Destruction
Spyware/Malware (Used by LEA)
And importantly the dark web and blockchain
9. Sources of Cyber Threats
Nation states or national governments
Terrorists (ISIS/Al Quayeda)
Industrial spies
Organized crime groups
Hacktivists and hackers
Business competitors
15. DDoS Mitigation Strategies for ISPs
Deploy traffic scrubbing centers: Establish
dedicated facilities to analyze and filter
malicious traffic before it reaches the ISP's
infrastructure.
Ensure ample bandwidth: Over-provision
bandwidth capacity to absorb and mitigate
volumetric DDoS attacks without affecting
service quality.
Implement BGP route filtering: Use Border
Gateway Protocol (BGP) to filter out malicious
traffic and prevent it from propagating across
the ISP's network.
Invest in real-time traffic analysis: Utilize
advanced traffic analysis tools to quickly
identify and mitigate DDoS attacks as they
occur.
16. TLS (Transport Layer Security):
Introduction to TLS
Importance in Securing
Communication
21. IPv6 Security Benefits
IPv6 mandates the implementation of IPsec, providing a standardized
and integral approach to network layer security
IPv6 includes a feature called Neighbor Discovery Protocol (NDP) that
helps prevent common attacks like ARP (Address Resolution Protocol)
spoofing by introducing techniques such as Cryptographically
The vast address space of IPv6 makes it more challenging for attackers
to conduct successful network scans and reconnaissance, enhancing
network security
22. Comprehensive Network Security:
Integration of DNS Security, TLS, DDoS Mitigation, and IPv6
Strengthening Overall Network Defense
23. Incident Response Plan:
Developing and Implementing an Effective Plan
Importance of Timely Responses
25. Cryptography for ISPs
Secure Data Transmission: Implement SSL/TLS protocols for encrypting
data in transit. This ensures that sensitive information, such as login
credentials and customer data, is securely transmitted between users
and servers.
Virtual Private Network (VPN): Offer VPN services for both internal
communications and for customers. VPNs use encryption to create
secure communication channels, especially important for remote
workers or users accessing sensitive data.
DNS Security Extensions (DNSSEC): Implement DNSSEC to protect
against DNS spoofing and ensure the authenticity of domain name
information, preventing attacks like cache poisoning.
26. Incident Response Planning for ISPs
Formation of IRT: Establish a dedicated
incident response team with clearly defined
roles and responsibilities.
Monitoring Systems: Implement continuous
monitoring of network and system activities
to detect potential incidents in real-time.
Internal and External Communication: Define
communication channels for incident
reporting, both within the organization and
with external stakeholders. Like (LEA, E-Gov
CIRT, Overseas Organizations)
27. Common Cyber Threats in Bangladesh
amount to Cyber Crime
Facebook, email account hack and website hack by web phishing or by other
means (back door, penetration, sql injection etc)
Online Financial Frauds (Fake and false email -Nigerian Scam), E-business etc
Sharing false propaganda, information and obscene pictures or video by fake
accounts in social media and fake news portal
ATM, POS(Point of Sale) and others online banking frauds (Central Bank
Reserve Hack)
Mobile Banking frauds (BKASH, ROCKET, MCASH)
Pornography (to harass people or deliberate production for fame)
Crimes on chat engines like imo, viber, whatsapp
Online terrorism propaganda over social media and blogs
Online gambling, darkweb and Cryptocurrency (bitcoin)
29. What should be our role?
Dos
Develop cyber ethics
Use cyber space for knowledge and economic
development
Respect Pluralism on internet
Try to understand fake news and propaganda with hate
speech
Build strong connectivity amongst the alike people to
counter extremism over internet
Make counter narratives against rumor and hate speech
30. What should be our role?
Donts
Dont harass people specially women.
Avoid the page and groups of radicalism
Dont post over internet or social media
anything that supports extremism and violates
existing laws of the land like Pornography
control Act, Cyber Security Act and ATI ACT.
Dont spread obscene contents and false info
Dont forget to report to police
32. Challenges of Cyber Threat Investigation
Lake of proper awareness about Cyber Crime and
threats.
Complexities in Legal Framework
Non cooperation with the giant like Google, Facebook,
Twitter
Local internet infrastructure (Log Server/Nating/IP6.0)
Investigating officials, prosecutors and judges are not
well trained
Low numbers of expert people are working on it
33. Face the challenges
Establishing cyber police station and cyber tribunal in
each district.
Local Internet infrastructure like IIG, ISP, Mobile
operators should comply the call of LEAs.
Google, facebook, twitter should make direct
cooperation with LEA.
Strengthening the LEA with training and resources.
34. Move Forward.
Developing International Cooperation and collaboration
Exchange program like training and technology
Holding international symposium and seminars
Making common platform to fight cyber threats.
Working with the corporate giants like facebook, google, twitter
etc.
Reducing digital divide and transportation of technologies
35. Legislations
Cyber Security Act -2018
Pornography Control Act-2012
Telecommunication Control Act-2001
ICT Act-2006
Anti Terrorism Act-2009
Mutual Legal Assistance in Criminal Matters Act, 2012(section
28-30 digital evidence and 31-request by Central Authority)
Regular review of the laws to accommodate the changing
pattern of cyber crimes
36. Bangladesh Police in Cyber Arena
Police Headquarters
DMP-Cyber Crime Investigation Division
DMP- DB Cyber
CID-Cyber Police Bureau
PBI-Cyber Unit
RMP-Cyber Unit
CMP-Cyber
Two State of the art forensic labs
Two modern cyber training centers
37. Where to report instantly
Call Hotline 999/01320046494/01320046221-22
AC-CT Cyber: 01320046480/01320046479
AC-DB Cyber: 01320046236
CID-Cyber Police Bureau(Additional SP-CID Cyber)-01320010131
PHQ - Police Cyber Support for Women: 01320-000888
RMP- AC Cyber- 01320061983
Mail to :
cyberhelp@dmp.gov.bd
cyber.db@dmp.gov.bd
cyber@police.gov.bd
cybersupport.women@police.gov.bd
And I am available over : 01320046472 , cyberunit@dmp.gov.bd
38. Where to report through fb page
Be connected with these pages/ID.
facebook.com/cyberctdmp
facebook.com/cybercrimedb
facebook.com/ cpccidbdpolice
facebook.com/ PCSW.PHQ
facebook.com/najmulsumon (My Profile)