What cyber-victims need to do? – newagebd.net

THE crime pattern in the digital world is almost the same. In court, it is often observed that the perpetrators are more or less cyber experts while the victims are relatively cyber incompetent or unaware. About 30 per cent of cases pending in tribunals are romance scandals, where a womans private moments are captured with or without her consent. The criminal later publishes those obscene pictures or videos on social media to take revenge, defame the woman, or blackmail her for money. Cases of false information, threats, and denigrations account for close to 35 per cent, and the remaining 65 per cent of cases are filed against cheating, fraud, hacking, incitement, and attacks on religion. According to the CCAF research report, among the victims, 57 per cent are women, and 43 per cent are men. Women are more victims compared to men, mainly for two reasons: a lack of cyber security awareness among them and victim blaming. However, the lack of cyber awareness increases the possibility of becoming a victim of cybercrime for both men and women, while criminals take advantage of the latter, particularly blaming women.

Compared to other crimes, the magnitude and impact of cybercrime are dire. One of the reasons is that the incidents of cybercrime spread across the globe in an instant. People can see it before it is verified as true or false; the victims fame and purity will be at stake, and it will not be easy to recover. Secondly, identifying a cyber-criminal is not painless. Cyber criminals are usually cyber-savvy and may be able to remain anonymous. Thirdly, the perpetrator does not need to be present at the crime scene to commit a cybercrime. A criminal can hack anyones Facebook account while sitting abroad. That is why cybercrime is a transnational crime that has no borders. Fourthly, the evidence used in cybercrime is difficult to collect, and presenting it in court with an opinion after an expert examination is even more difficult. Fifthly, the Digital Security Act, 2018 is a special act, and the terms used in the act are highly technical and not easy to understand for ordinary people.

Currently, about four thousand cyber cases are pending in different tribunals nationwide. The actual number of cybercrimes is higher than the number of cases reported. Due to public shame of victims, fear, and the complexity of the prosecution process, fewer cases come to the tribunal for trial than the actual number of crimes.

According to the Bangladesh Telecommunication Regulatory Commission, there are about 12.5 crore internet users in Bangladesh. There is no debate that Facebook is the most popular social media site in the country. According to Napoleon Cut data, 5.90 crore people now use Facebook, with women accounting for 32 per cent and men accounting for 68 per cent. The number of conscious internet users is insignificant among this enormous number. There are set principles and norms for using social media. Some love to ignore those, and some are not well acquainted with them. Some are unknowingly committing cybercrimes and violating laws and rules. A common perception is that the victims cannot seek justice if obscene pictures or videos are captured with their consent. This is wrong. As per law, whoever publishes such photographs or videos with ill motives or intentions whether the person is a man or a woman commits a cybercrime. However, none should be allowed to take and share personal photos or videos. Sharing a secret password with anyone to show loyalty and prove trust is entirely unwise. Besides, the culprits are misusing the technology by editing normal pictures into naked ones and even making pornographic videos.

Prevention is better than cure and should be the policy to tackle cybercrime. The loss already incurred cannot be compensated for once the offence is committed. The following precautions are vital to prevent crime: (a) strong passwords. Simple passwords such as birthdays, cell phone numbers, and names are not suitable; (b) two-way authentication, one gets an alert notification if unauthorised access is noticed; (c) no sharing of passwords with anyone, not even close family members, because the relationship could end at any time, (d) no sharing of private photos or videos with anyone being emotional, as the emotion of a weak moment may bring extreme suffering in life. Photos or videos captured are stored in the cloud where a wrongdoer may get access and blackmail if the mobile is stolen, hacked, damaged, or needs repairing; (e) it is not wise to open unsolicited messages, emails, or online links, as these might be trapping; (f) updated internet security on the laptop, computer, or mobile for better protection; (g) it is essential to check and monitor the friends list on social media, choose friends carefully, and be vigilant to protect and respect ones privacy.

However, once the crime is committed, the first task is to collect and preserve screenshots, links, and pictures of the crime as evidence; and report the criminal incident to the cyber unit of the police department. The Helpline service is also very active. One can file a general diary or first information report at the police station if necessary. Another door that is open for litigation is the cyber tribunal. The required forensic evidence may not be found when the criminal deletes, edits, or makes only-me his post. Facebook and Google respect users privacy and do not give complete information to the police. It is crucial to recover and seize the device used in the crime to prove the case. The faster the perpetrator is identified and apprehended, the greater the chances of getting proper justice.

Along with technological development, cybercrime will also continue to grow. So let us be aware and vigilant and prevent cybercrime.

Md Ziaur Rahman studies at Queensland University of Technology, Australia.

Go here to read the rest:
What cyber-victims need to do? - newagebd.net

Related Posts

Comments are closed.