Anti-Cyber Crime Law Seeks Legislation in Pakistan

Computer crime, cyber crime, e-crime or electronic crime generally refers to criminal activity where a computer or network is the source, tool, target, or place of a crime. These categories are not exclusive and many activities can be characterized as falling in one or more. Additionally, although the terms computer crime and cyber crime are more properly restricted to describing criminal activity in which the computer or network is a necessary part of the crime, these terms are also sometimes used to include traditional crimes, such as fraud, theft, blackmail, forgery, and embezzlement, in which computers or networks are used. As the use of computers has grown, computer crime has become more important. Computer crime can broadly be defined as criminal activity involving an information technology infrastructure, including illegal access (unauthorized access), illegal interception (by technical means of non-public transmissions of computer data to, from or within a computer system), data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data), systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data), misuse of devices, forgery (ID theft), and electronic fraud. A common example is when a person starts to steal information from sites, or cause damage to, a computer or computer network. This can be entirely virtual in that the information only exists in digital form, and the damage, while real, has no physical consequence other than the machine ceases to function. In some legal systems, intangible property cannot be stolen and the damage must be visible, e.g. as resulting from a blow from a hammer. Where human-centric terminology is used for crimes relying on natural language skills and innate gullibility, definitions have to be modified to ensure that fraudulent behavior remains criminal no matter how it is committed There are different categories of cyber-crime which are as under; Financial - crimes which disrupt businesses' ability to conduct 'e-commerce' (or electronic commerce).

Piracy - the act of copying copyrighted material. The personal computer and the Internet both offer new mediums for committing an 'old' crime. Online theft is defined as any type of 'piracy' that involves the use of the Internet to market or distribute creative works protected by copyright. Hacking - the act of gaining unauthorized access to a computer system or network and in some cases making unauthorized use of this access. Hacking is also the act by which other forms of cyber-crime (e.g., fraud, terrorism, etc.) are committed. Cyber-terrorism - the effect of acts of hacking designed to cause terror. Like conventional terrorism, `e-terrorism' is classified as such if the result of hacking is to cause violence against persons or property, or at least cause enough harm to generate fear. Online Pornography - There are laws against possessing or distributing child pornography. Distributing pornography of any form to a minor is illegal. The Internet is merely a new medium for this `old' crime, but how best to regulate this global medium of communication across international boundaries and age groups has sparked a great deal of controversy and debate. On January 18, 2007 Pakistan Minister for IT (Information Technology), Awais Ahmad Khan Leghari visualizes cyber crime bill's adoption as a significant step in enforcing a secure ambiance for business and encouraging e-commerce. This bill on Prevention of Cyber Crimes outlined the knowledge about electronic crimes and illegal online intrusion to spread it among general public. The bill would help improve e-readiness in Pakistan that would rank the country among indices drawn by various international business journals and agencies. The federal cabinet will soon table the e-crime bill in the parliament. This law will mandate ISPs to maintain records of e-mails and data for specific periods of time. Under this law proposition namely Prevention of Electronics Crime Bill 2006 imposes penalties varying between 6 months in jail to 17 types of execution for committing cyber crimes, hacking, cyber terrorism, and unauthorized access of protected data.

The law is designed to help the government in extraditing foreign nationals engaged in any kind of criminal activity through the Internet. I personally believe this is the very reason that the IT community was up in arms in 2007 when the initial Cyber Crime Bill was drafted, it contained abundant loop holes which gave sweeping powers to the Cyber Crime Tribunal and the FIA to arrest and detain the offender without even presenting a proper evidence and proof. Now we must be watchful of the statements issued by Rehman Malik it does seem that all Anti-Govt emailers, SMS’ers and website are doomed. They choose to silence the offending voice rather then changing their own corrupt ways which are leading our country down towards doom and destruction – maybe now we could start labeling them as a democratically elected dictatorship. Profile of National Response Centre for Cyber Crimes Introduction to National Response Centre for Cyber Crimes:Information technology is making profound inroads into the very fabric of our society and our economy as a nation in the global community. In a very real sense, the "Information Superhighway" has become the economic lifeblood of our nation. We are depending on information technology, computers and the global network that connect them together. This dependency has become a clear and compelling threat to our economic well-being, our public safety, and our national security. The world's networks, referred to by many as "cyberspace", know no physical boundaries. Our increasing connectivity to and through cyberspace increases our exposure to traditional adversaries and a growing body of new ones. Terrorists, radical groups, narcotics traffickers, and organized crime will join adversarial nation-states in making use of a burgeoning array of sophisticated information attack tools. Information attacks can supplement or replace traditional military attacks, greatly complicating and expanding the vulnerabilities we must anticipate and counter. The resources at risk include not only information stored on or traversing cyberspace, but all of the components of our national infrastructure that depend upon information technology and the timely availability of accurate data. These include the

telecommunications infrastructure itself, our banking and financial systems, our transportation networks, emergency services, such as police, fire, and rescue; and government operations at all levels. All are necessary for economic success and national security. Keeping this in view National Response Centre for cyber crimes was formed.      Enhance the capability of Government of Pakistan and Federal Investigation Agency to effectively prevent growing cyber crimes. Reporting & Investigation Centre for all types of Cyber Crimes in the country Liaison with all relevant national and international organizations to handle cases against the Cyber Criminals Provide necessary technical support to all sensitive government organizations to make their critical information resources secure. Carry out regular R & D activities to make the Response Centre as a centre of technical excellence.

Provide timely information to critical infrastructure owners and  government departments about threats, actual attacks and recovery techniques. A role of Computer Emergency Response Team (CERT).  To provide on demand state-of-the-art electronic forensic services and cyber investigative to support local police

 Build local capability in incident handling and security intelligence  Monitor global security issues and gather IT security intelligence.  Capacity building to investigate and handle cyber crime cases.   Investigation and prosecution of cyber criminals and cope with high-tech crimes. To enforce existing laws to combat computer crime and to protect consumers and Internet users.

Achievements Made Up till Now:  Organized Over Forty (40) Seminars/Workshops in different cities of Pakistan, in which thousands of relevant persons participated

 Approximately Sixty Eight (68) complaints have been received by NR3C

and being processed by Zonal Cyber Crimes Units. NR3C has provided training to over 100 officers of National  Accountability Bureau with basic cyber investigations techniques and methods.      Timely inform all Government organizations and financial institutions etc about the DOS attacks NR3C is providing training on “Collection of Digital Evidence from Scene of Crimes “ for the Police Officers of all provinces in Pakistan. Availability of Internet users log has been increased from (45) days to (90) days after lot of efforts by NR3C. First Responder course is being approved from National Police Training Management Board. During last two years NR3C played a vital role regarding timely reporting of defacement of websites in Pakistan.

Past performance of National Response Centre for Cyber Crimes is as under. 1.AWARENESS PROGRAM NR3C is providing single point of contact for all local and foreign organizations for all matters related to cyber crimes It is imparting training and related security education to persons of government/semi-government and private sector organization. It has also conducted a number of seminars in different cities of the country to educate the senior management of sensitive government organizations regarding cyber attacks on their information resources: information breach and to make their systems secure against all such threats. The details of seminars are as under: Date Topics Participation from

Public/Private sector Cyber Security Challenges and 16th Oct, 02 Solutions (Middle Level Management) 25th Feb, 03 2nd Jun, 03 Cyber Security Challenges and Solutions (For Senior Level Management) 80


Orientation on Cyber Crimes (For 85 Junior Level Management)

Coordination Efforts to Combat Banking related Cyber Crimes and 18th Jun, 03 40 Money Laundering (For Senior Executives of Banking Sector) 10th July, 03 12th July, 03 29th Aug, 03 4th Oct, 03 9th Feb, 04 30 March, 04 24th May, 04 27 Nov, 2004 27 Nov, 2004 Cyber Security challenges and Solutions (at Karachi) Cyber Security challenges and Solutions (at Lahore) Processing of first Cyber Crime case by NR3C Coordination Efforts to Combat ISP’s related Cyber Crimes Cyber Crimes For SIG,at FIA Academy Cyber Security challenges and Solution at Islamabad Information Security and Cyber Crimes at Islamabad Information Security and Cyber Crimes at Islamabad Conference on Cyber Security at Karachi 200 200 20 30 20 200 200 250 200

Sep-Dec-04 Training of Police Agency officers 300 in the area of Digital Evidence

Islamabad, Peshawar, Lahore, Karachi, Quetta and Muzafrabad 3rd Dec,07 17th Dec,07 18th Dec,07 28th Jan,08 Lecture on Cyber Security to trainee NAB Officers One day Seminar on Cyber Security Lecture on Information Security in NAB Lecture on Information Security in NAB 52 60 Trainee Judges from Punjab 35 55

Four Days Training Workshop for 28th Jan to under training ASPs at National 37 30th Jan,08 Police Academy 4th March,08 12th Apr,08 One day workshop on Cyber Security Challenges & Solutions 60

Lecture on Introduction to Cyber 50 Crimes 45 65 50

One day Seminar on Cyber 14th Apr, 08 Terrorism: A threat to Critical Information Infrastructure 26th Apr,08 Lecture on Cyber Security 28th Apr,08 8th May,08 Lecture on Eminent Threat of Cyber Crimes & Cyber Terrorism

One day Seminar on Awareness of 150 Cyber Crimes/Electronic Crimes

2.FIA TEAM SKILL IMPROVE TO HELP ORGANIZATIONS: NR3C is helping to improve the skill level of FIA officer and official to interrogate such kind of hi-tech and sophisticated crimes, through training, seminars and workshops. 3.HANDLING OF CYBER CRIMES IN PAKISTAN

The major category of cases which is handled is as under:  Financial Crimes  Email Treating  Denial of Service attack and DDOS attack.  Virus / Worm attacks.  Internet time thefts.  Unauthorized to access the system  Credit Cards Frauds  Anti Pakistan/Islam material on websites  ATM Frauds  Mobile communication  Theft of Systems  Web SMS  Pornography  Interpol Cases

4.ASSISTANCE PROVIDE TO OTHER ORGANIZATION:     Provided real time help and assistance to number of financial institutions in their efforts regarding information security. Facilitates police departments in tracing a large number of cases involving electronic evidence like e-mail and telephone messages etc. Provided assistance to finalize cyber laws. Provided training to lawyers and judges through Islamic University & Judicial Academy.

Nature of the cases reported to NR3C/FIA

Sign up to vote on this title
UsefulNot useful