Professional Documents
Culture Documents
Most, but not all, cybercrime is committed by cybercriminals or hackers who want to
make money. Cybercrime is carried out by individuals or organizations.
Some cybercriminals are organized, use advanced techniques and are highly
technically skilled. Others are novice hackers.
Rarely, cybercrime aims to damage computers for reasons other than profit. These
could be political or personal.
cybercrime
Defining cybercrime
The U.S. Department of Justice (DOJ) divides cybercrime into three
categories:
Cybercriminals use various attack vectors to carry out their cyberattacks and
are constantly seeking new methods and techniques for achieving their goals,
while avoiding detection and arrest.
Cybercriminals often carry out their activities using malware and other types of
software, but social engineering is often an important component for executing
most types of cybercrime. Phishing emails are another important component
to many types of cybercrime but especially so for targeted attacks, like
business email compromise (BEC), in which the attacker attempts to
impersonate, via email, a business owner in order to convince employees to
pay out bogus invoices.
Common examples of
cybercrime
Malware
Computer viruses are the granddaddy of cybercrime; probably the first kind of
it you became aware of. Viruses infect computer systems, destroying files,
messing with the overall functionality, and self-replicating to jump to other
devices and systems. Viruses are actually a form of malware, which
encompasses all kinds of malicious software: any code or programs written
and distributed to do damage, steal data, make money for their owner, and
generally ruin your day. This includes ransomware, which can lock up your
files until you pay a ransom to decrypt them, and adware, which spams you
with ads.
Identity theft and other fraud
While identity theft is not exclusively a cybercrime, these days it’s much more
likely to happen through technology. In fact, identity fraud happens every two
seconds in America today. If a hacker wants to commit identity theft or credit
card fraud, they first need to access enough of their victim’s personal data to
fuel the crime. Here are several ways they can get that access:
Phishing: Cybercrooks use “bait” in the form of fraudulent messages to
lure victims to fake sites where they unwittingly enter personal
information like usernames, passwords, or bank details.
Pharming: Taking it one step deeper than phishing, pharming uses
malware to reroute unsuspecting internet surfers to fake versions of
websites, where they unknowingly enter their personal details.
Keylogging: This type of malware (or to be more specific, spyware)
secretly logs everything you type, capturing your account information and
other personal details.
Sniffing: If you’re connected to an unsecured, unencrypted public Wi-Fi
network, hackers can steal your data by “sniffing” your internet traffic with
special tools (unless you have a VPN, of course).
While hackers have many ways to steal personal data, there are also some
good ways you can prevent identity theft. Avoid accessing your personal
accounts (especially online banking) on public Wi-Fi, and consider setting up
a monitoring service to make sure your online accounts haven’t been
breached.
Cyberbullying
Cyberbullying refers to all kinds of online harassment, including stalking,
sexual harassment, doxxing (exposing someone’s personal information, like
their physical address, online without their consent), and fraping(breaking into
someone’s social media and making fake posts on their behalf).
Cryptojacking
Cryptojacking is when hackers break into your device and use it to mine
cryptocurrency without your knowledge or consent. Cryptominers do this by
using JavaScript to infect your device after you visit an infected website. This
can cause performance issues and high electric bills for you — and earn big
profits for the cryptojackers.
Cyberextortion
Cyberextortion is just what it sounds like — a digital version of the nightmare
that is extortion. One of the most common forms is ransomware, when
hackers infect your computer with malware that encrypts all your files until you
pay them a ransom to unlock them. Cyberextortion can also refer to
blackmailing victims using their personal info, photos, and video; or
threatening businesses using methods like botnet-driven DDoS attacks.
Cyberespionage
As mentioned, many cybercriminals these days are actually state-sponsored
groups. Whether it’s the North Koreans, the Iranians, or even the US’s own
NSA-affiliated Equation Group, world powers use hacker groups as one
weapon in the complicated matrix of global politics. Stealing classified
intelligence and using malware to attack nuclear plants are just two ways in
which state-sponsored groups can do some frightening things on the world
stage.
No matter the type of cybercrime, you can help protect yourself by installing a
strong antivirus program like Avast Free Antivirus. Avast will block malicious
links, suspicious websites, harmful downloads, and various other threats.
Cybercriminals don’t like to work too hard — if they can’t access your machine
or personal data, they’re likely to move on to the next (easier) victim. So give
yourself a strong layer of defense and fight back against cybercrooks.
Contact the companies and banks where you know fraud occurred.
Place fraud alerts and get your credit reports.
Report identity theft to the FTC.
With that in mind, here is our Top 10 list of steps you can take to avoid becoming a victim of cybercrime.
1) Education - Hackers aren’t the only ones who can gain power from information. By educating
yourself about the types of scams that exist on the Internet and how to avert them, you are putting
Since phishing is prevalent, read up on the latest phishing scams and learn how to recognize a
phishing attempt. Remember, phishing is when hackers attempt to lure you into revealing personal
information by pretending to be a legitimate organization or person. These scams often play off major
2) Use a firewall - Firewalls monitor traffic between your computer or network and the Internet and
serve as a great first line of defense when it comes to keeping intruders out. Make sure to use the
firewall that comes with your security software. And if you have a home wireless network, enable the
3) Click with caution - When you’re checking your email or chatting over instant messenger (IM), be
careful not to click on any links in messages from people you don’t know. The link could take you to a
fake website that asks for your private information, such as user names and passwords, or it could
download malware onto your computer. Even if the message is from someone you know, be cautious.
Some viruses replicate and spread through email, so look for information that indicates that the
message is legitimate.
4) Practice safe surfing - When navigating the web, you need to take precautions to avoid phony
websites that ask for your personal information and pages that contain malware. Use a search engine
to help you navigate to the correct web address since it will correct misspellings. That way, you won’t
wind up on a fake page at a commonly misspelled address. (Creating a phony site at an address
similar to the real site is called “typosquatting,” and it is a fairly common scam.)
SiteAdvisor®
SiteAdvisor software is a free browser tool that tells you if a site is safe or not right in your search
5) Practice safe shopping - In addition to practicing safe surfing, you also need to be careful where
you shop online. Be cautious when shopping at a site that you’ve never visited before and do a little
investigation before you enter your payment information. Look for a trustmark, such as McAfee
And when you’re on a payment page, look for the lock symbol in your browser, indicating that the site
uses encryption, or scrambling, to keep your information safe. Click on the icon to make sure that the
You also want to look at the address bar to see if the site starts with “https://” instead of “http://”
When it comes time to pay, use a credit card instead of a debit card. If the site turns out to be
fraudulent your credit card issuer may reimburse you for the charges, but with a debit card your
money is gone.
Finally, evaluate the site’s security and privacy policies in regards to your personal data.
6) Use comprehensive security software and keep your system updated - Because hackers have a
wide variety of ways to access your system and information, you need comprehensive security
software that can protect you from all angles. Software like McAfee® SecurityCenter, available
preloaded
on Dell™ PCs, can help protect you from malware, phishing, spyware, and other common and
emerging threats.
Just make sure that you keep your security software up to date by selecting the automatic update
function on your security control panel. And don’t forget to perform regular scans.
You also want to update your operating system (OS) and browser with the latest security patches. If
you are a Microsoft Windows user, you can enable automatic updates to keep your OS safe.
7) Secure your wireless network - Hackers can access data while it’s in transit on an unsecured
wireless network. You can keep the hackers out by enabling the firewall on your router and changing
the router’s administrator password. Cybercriminals often know the default passwords and they can
You may also want to set up your router so it only allows access to people with passwords that are
8) Use strong passwords - Although it may be easier for you to remember short passwords that
reference your birthday, middle name, or pet’s name, these kinds of passwords also make it easy for
hackers. Strong passwords can go a long way in helping secure your information, so choose a
password that is at least 10 characters long and consists of a combination of letters, numbers and
special characters. Also consider changing your password periodically to reduce the likelihood of it
being compromised.
9) Use common sense - Despite the warnings, cybercrime is increasing, fueled by common mistakes
people make such as responding to spam and downloading attachments from people they don’t
know. So, use common sense whenever you’re on the Internet. Never post personal information
online or share sensitive information such as your social security number and credit card number.
Exercise caution when clicking on any links or downloading any programs.
10) Be suspicious - Even if you consider yourself cyber savvy, you still need to keep your guard up for
any new tricks and be proactive about your safety. Backup your data regularly in case anything goes
wrong, and monitor your accounts and credit reports to make sure that a hacker has not stolen your
information or identity.
Introduction to money-laundering
Money is the prime reason for engaging in almost any type of criminal activity.
Money-laundering is the method by which criminals disguise the illegal origins of
their wealth and protect their asset bases, so as to avoid the suspicion of law
enforcement agencies and prevent leaving a trail of incriminating evidence.
Terrorists and terrorist organizations also rely on money to sustain themselves
and to carry out terrorist acts. Money for terrorists is derived from a wide variety
of sources. While terrorists are not greatly concerned with disguising the origin of
money, they are concerned with concealing its destination and the purpose for
which it has been collected. Terrorists and terrorist organizations therefore
employ techniques similar to those used by money launderers to hide their
money.
The ability to prevent and detect money-laundering is a highly effective means of
identifying criminals and terrorists and the underlying activity from which money
is derived. The application of intelligence and investigative techniques can be
one way of detecting and disrupting the activities of terrorists and terrorist
organizations.
Because they deal with other people's money, financial institutions rely on a
reputation for probity and integrity. A financial institution found to have assisted in
laundering money will be shunned by legitimate enterprises. An international
financial centre that is used for money-laundering can become an ideal financial
haven. Developing countries that attract "dirty money" as a short-term engine of
growth can find it difficult, as a consequence, to attract the kind of solid long-term
foreign direct investment that is based on stable conditions and good
governance, and that can help them sustain development and promote long-term
growth. Money-laundering can erode a nation's economy by changing the
demand for cash, making interest and exchange rates more volatile, and by
causing high inflation in countries where criminals are doing business.
Most disturbing of all, money-laundering fuels corruption and organized crime.
Corrupt public officials need to be able to launder bribes, kick-backs, public funds
and, on occasion, even development loans from international financial
institutions. Organized criminal groups need to be able to launder the proceeds
of drug trafficking and commodity smuggling. Terrorist groups use money-
laundering channels to get cash to buy arms. The social consequences of
allowing these groups to launder money can be disastrous. Taking the proceeds
of crimes from corrupt public officials, traffickers and organized crime groups is
one of the best ways to stop criminals in their tracks.
In recent years, the international community has become more aware of the
dangers that money-laundering poses in all these areas and many Governments
and jurisdictions have committed themselves to taking action. The United Nations
and other international organizations are committed to helping them in any way
they can.
Criminals are now taking advantage of the globalization of the world economy by
transferring funds quickly across international borders.
INTRODUCTION
Money laundering is a fast-growing crime in the modern world and also a mammoth threat
to the economics of the developing countries. In simple terms, money laundering can be defined
as such a method whereby illegal funds are transferred from one place to another, in order to
cover its tracks. The Financial Action Task Force (‘FATF’) identifies it as the processing of
criminal proceeds to disguise their illegal origin. Money laundering is stated to cause severe
harm to a country’s economy, along with impacting individuals from around the world. It is
further reported that the total amount of money being laundered in the entire world is between
US$500 billion and US$1 trillion. There are three steps involved in this illegal process –
placement, layering, and integration. Firstly, the illegitimate funds are secretly introduced into
the legitimate financial system. Then, the money is moved around to create confusion,
sometimes by wiring or transferring through numerous fake accounts. Finally, it is integrated
into the financial system through additional transactions, until the laundered money appears
clean.
Globally, the drive against money laundering started in the 1970s, when the Bank Secrecy
Act 1970 was passed in the United States. In the case of Pakistan, the situation is different and
the anti-money laundering measures were introduced in the 2000s. Several steps have been made
in an attempt to control money laundering. Nevertheless, money laundering is rampant in the
country and this can be attributed to the weak enforcement of laws and loopholes in the current
regime.
In June 2018, Pakistan was included in the ‘grey list’ issued by the FATF, which can have a
detrimental impact on the Pakistani market. Currency dealers are of the opinion that banks would
be the first to suffer by this. Although, there are no penalties that are included by being in the
‘grey list’, it is stated that as a result of this, financial institutions would be reluctant to conduct
business with the Pakistani institutions. This, in turn, would impact trade and further increase
Pakistan’s current account deficit. Businesses are also severely affected by money laundering as
it deters investors. Furthermore, it is also stated that international banks can pull their business
out of Pakistan as a result of the inclusion in the ‘grey list’.
Money laundering is the process of illegal movement of money to hide its original
source. Black money gained through illicit activities (drug selling, human trafficking,
terrorism, etc.) is transferred in a certain pattern to manipulate the authorities and to
hide the money trail. Money laundering is also called a whitecollar crime as often
high-rank officials and PEPs (Politically Exposed People) are involved in it. The
Motive of money laundering is to wash black money in a seamless manner gradually
mixing it with white money.
The Anti-Terrorism Act of 2002, which defines the crimes of terrorist finance and
money laundering and establishes jurisdictions and punishments (amended in
October 2004 to increase maximum punishments).
The National Accountability Ordinance of 1999, which requires financial
institutions to report suspicious transactions to the NAB and establishes
accountability courts.
The Control of Narcotic Substances Act of 1997, which also requires the
reporting of suspicious transactions to the ANF, contains provisions for the freezing
and seizing of assets associated with narcotics trafficking, and establishes special
courts for offenses (including financing) involving illegal narcotics.
All these laws include provisions to allow investigators to access financial records and
conduct financial investigations.
In 2007, Pakistan enacted the AML Ordinance, establishing regulations for AML and
combating the financing of terrorism and criminalizing money laundering. Under the
Ordinance, the Financial Monitoring Unit (FMU) is created. The FMU serves as Pakistan's
FIU and is in charge of handling Suspicious Transaction Reports (STRs). In 2010, the
SBP passed the Anti-Money Laundering Act, replacing the 2007 AML Ordinance.
The FMU works with several Pakistani law enforcement agencies that are responsible for
enforcing financial crime laws, including the National Accountability Bureau (NAB), the
Anti-Narcotics Force (ANF), the Directorate of Customs Intelligence and Investigations
(CII), and the Federal Investigative Agency (FIA).
The FIA deals with crimes relating to money laundering, terrorism, human smuggling
and trafficking, and cybercrime, among others.
The State Bank of Pakistan (SBP) and the Securities and Exchange Commission of
Pakistan (SECP) are the primary financial regulators. Notwithstanding the absence of
standalone AML legislation, the SBP and SECP have independently established AML
units to enhance their oversight of the financial sector. The SBP has introduced
regulations intended to be consistent with the Financial Action Task Force’s (FATF)
recommendations in the areas of a Know Your Customer (KYC) policy, record retention,
due diligence of correspondent banks, and the reporting of suspicious transactions.
stages of Money Laundering: Money laundering can easily be understand through its three main stages
i.e. placement, layering and integration, description of which are here as under.
1. Placement: in this stage the illegitimate money generated from some illegal source i.e. drug
trafficking, illegal activities, human trafficking etc, the money launderer then break this illegal funds into
small cash and then enter into the financial intermediaries, trade economy or Physical smuggling by
means of depositing money in the bank through opening fake accounts, investment in term certificates,
money order, checks or other monetary instruments. The main purpose is to conceal the original
identity of the money from where it is being generated.
2. Layering: The 2nd stage comes after the placement stage; when money launderer succeeded in
placing the illegitimate money into the financial sector then money launderer create the layer after layer
over these funds by means of moving this money from one channel to another through transferring
from one account to another or one financial intermediary to another. The subject funds are also
channelized to purchase and sale of government securities or for the payments of goods and services.
3. Integrating: The third stage after successfully completion of the 2nd stage, money launderer used
these funds to re-enter into the economy in any legitimate source either to invest in public development
projects, luxury assets, or any business ventures. It may also involve in the following activities. Lend
the proceeds back to the launderer as a loan Repay the proceeds back to the launderer as payments
for goods supplied or services rendered. Place funds as collection with bankers in different countries
and then obtaining loans. Over / under invoices foreign trade transactions
RECOMMENDATIONS On the basis of our previous discussion relating to the Pakistani banking and
financial sector including the non bank financial sector and development financial institutes, few of
recommendations are here as under relating to the anti money laundering and terrorist financing. Also
some recommendations for the government to made his effort to remove the name of Pakistan from
the black listed countries which is being included by world governing body FATF (Financial action task
force) in the month of February 2010 due to non compliance. Monitoring of Free Trade Zones
Developing one account opening form for customer to stock broker Centralized reporting system from
all Banks One regulatory authority for all Banks, Non Banks & DFI’s Monitoring of auditors, lawyers &
legal advisors Mandatory anti money laundering training for banks employees including international
training and seminars. Decision making should be decentralized instead of one man show in financial
institutions. Employees and officers of the financial institution should be legally protected.
Currently in Pakistan four free trade zones are in operations (i.e. Karachi, Risalpur, Sialkot and Saindak),
the main purpose of these free trade zones is to promote more exports with tax benefits and less
stringent policies of the government over these export zones. All the bank’s branches are working in
these zones and they allowed huge amount of financing to the customers operating and also accepting
the deposits but the SBP prudential regulations in these free trade zones are still not implemented and
no proper guidelines being provided to the banking channels who are working in these trade zones,
banks are showing their assets or liabilities from these zones in offshore banking. Money launderer used
these sorts of places for the purpose of whitening their money previously generated from the
illegitimate sources due to weak policies and no special transaction monitoring from the state bank of
Pakistan and banks itself. Banks and especially state bank should regulate the free trade zones to
strengthen the policies and strict monitoring and implementations of the policies against money
laundering and terrorist financing, these sorts of early measures will help the government and
regulatory authorities to remove the name of Pakistan from the black listed countries list or to take
precautionary measures for the banking sector from any future losses.
Developing one account opening form: Currently the brokerage houses and stock exchanges all
over the country were monitored by the SECP (security and exchange commission of Pakistan)
and the two local governing bodies i.e. (SECP and SBP) are in touch and they keep exchanging
their views and regulations pertaining to the money laundering and terrorist financing.
A comprehensive one account opening from is required for all brokers of stock exchanges,
modarba companies, exchange companies, customer’s who opened an account for deposit
purpose at any bank and all other non bank financial corporations.
The main idea behind the one comprehensive account form is to better focused on the KYC
“Know Your Customer” and also better monitoring from the side of the two regulatory
authorities, because it is easy to understand the one format with comprehensive details which
save the time and also its easy to gather the information in one format for all. If the same
customer is open the account at any bank for the purpose of depositing the money and the same
is pursuing for opening the account at CDC (Central depository company) the two organization
is being monitored by the two different regulatory authorities it is easier or better for the both to
verify the credential of the same customer at both end due to the same unique account opening
form, which will help to minimize the chances of money laundering and properly reported to the
Centralized reporting system from all Financial Institutions: Currently all banks are liable to
report their exposures both funded and non funded as well as the reporting to those customers
they defaulted in payment of any facility amount granted to them by the banks, it will help the
other institutions to asses the financial history of the company before granting them further.
The main theme for this recommendation is to gather all the information from all the financial
institutions including (Modarba Companies, Insurance companies, NBFI’s, banks, DFI’s) at one
place to monitor the each and every activity of the person or any company for better monitoring
If the transactions or all the financial activities being monitored at one place it is difficult to the
person or the company to get involved in any money laundering activity or any terrorist
financing activity, it will also help the regulatory authority to closed monitor the suspicious
One regulatory authority for all Banks, Non Banks & DFI’s: Currently State Bank of
Pakistan is monitoring the banks and DFI’s and SECP monitors the non banking financial sectors
including the stock exchanges. The regulations in both the areas were different from each other
All the financial institution or the non bank financial sector should be regulated under one
umbrella so the one regulation is applied to the all and effective monitoring for all the sectors, it
is also helpful for the regulators to gather the information pertaining to the money laundering and
to regulate the lawyers, consultants & accountants (individual / firm) who can impose penalties
as well as ban of services, it is in general practice that lawyers suggest different ways of money
laundering to their clients like fake property documents, fake property dealings, tax evasion etc.
On the other hand accountants also take part to strengthen the money laundering by means of
making the fake financials (balance sheets. Profit loss account, cash flow accounts & change of
equity) for the purpose of using the same to avail the credit facilities from the different financial
intermediaries to convert their black money generated through illegitimate sources into the white
money. If these services is monitored it will help to reduce the chances of money laundering /
Mandatory anti money laundering training from banks: Training is a tool which enhanced
the capabilities of the individual to monitor & highlight the main stream issues like money
laundering & terrorist financing. State Bank of Pakistan and SECP should regulate and penalize
the financial institutions as well as Non Bank Financial institutions incase of non compliance, in
addition to this SBP & SECP should also take initiatives to arrange the international trainings
and seminars for the designated compliance head / officers for better understanding of the rules
Decision making should be decentralized instead of one man show in financial institutions.
In Pakistan another problem faced by financial institutions is some of the banks are not completely
decentralized in decision making. Powers given to different committees for decision making is like a
window dressing and committees are not functioning as per requirement and influence by the owner of
the bank. On the other hand departments like compliance, audit and internal control are functional just
for fulfilling the requirement of SBP and fully dominant by centralized decision making. Such committees
and departments are not working in true letter and spirit. The aim of such institutions is just is to earn
profits by either way. Regulatory authorities should focus on this issue and should take necessary steps
in order to avoid such practices and encourage the completely management based institution with the
power to take decisions and should follow the policies and regulation instead of one man show
institution.
White-Collar Crime
What Is White-Collar Crime?
White-collar crime is a nonviolent crime committed for financial gain. According to
the FBI, a key agency that investigates these offenses, "these crimes are
characterized by deceit, concealment, or violation of trust." The motivation for
these crimes is to obtain or avoid losing money, property, or services, or to
secure a personal or business advantage.
“Reportedly coined in 1939, the term white-collar crime is now synonymous with
the full range of frauds committed by business and government professionals.
These crimes are characterized by deceit, concealment, or violation of trust and
are not dependent on the application or threat of physical force or violence. The
motivation behind these crimes is financial—to obtain or avoid losing money,
property, or services or to secure a personal or business advantage.”
In criminology, white collar offenses differ from blue collar crimes in that blue-collar crime is
any crime committed by an individual from a lower social class. White-collar crime, on the
other hand, is associated with crime committed by someone of a higher-level social class.
Blue collar crimes are often considered more obvious and easily detected by law
enforcement.
It is important to understand that not every false statement of fact can be considered a fraudulent
act. The statement must be considered a material fact, or a statement that is of such significance
that the fact or facts alone were used by the victim to make an important decision.
Fraud
Fraud is one of the most common types of white collar crimes. Fraud cases often involve
the perpetrator imitating someone else in order to take funds out of the real owner’s bank
account. Fraud may help a perpetrator commit identity theft.
Bribery
Another common form of a white collar crime is bribery. In bribery cases, the perpetrator
pays someone in a power position in order to make arrangements that financially benefit the
perpetrator or others. For example, a perpetrator may pay a government official. It is often
hard for federal regulators to prove and prosecute.
Insider Trading
Another common white collar crime is that of insider trading. Insider trading involves people
using connections that they have on the inside to buy or sell stock before the relevant
information is made public. For example, someone who knows that a company may be
facing a lawsuit or a layoff may decide to sell stock before the information is released in
order to sell at a higher rate. Conversely, a person may wait to buy until the bad news hits in
order to purchase at a lower price. In contrast to some other white collar crimes, regulators
have become increasingly savvy ate detecting certain trades that seemed to be based on
tipped off information. It may be difficult for a person to hold onto stock knowing that this
may ultimately mean losing money when they have confidential information.
Cyber Crime
Due to the internet, an increasing cause of white collar crimes is due to cyber crime. This
type of crime involves collecting credit card numbers and personal identifying information
through the use of computers. Some nations even use sophisticated attacks in order to
discover classified information that other countries are attempting to hide. Some individuals
or nations may make viruses that infect vulnerable computers and send spam or perform
other tasks that may help generate funds.
Embezzlement
Embezzlement is the misappropriation of the property of another by a person
who has lawful possession of the property. One of the most common forms of
embezzlement is employee theft. To establish a case for embezzlement, the
prosecution must typically show that there was a fiduciary relationship
between the defendant and the party who lost the property; the property came
into the defendant’s possession through that fiduciary relationship; the
defendant fraudulently assumed ownership of the property; and the defendant
intentionally misappropriated the property. The penalty for embezzlement is
generally determined by the value of the property that is misappropriated.
Tax evasion
Tax evasion (26 U.S.C. § 7201. Attempt to evade or defeat tax) is one of the
more common types of tax crimes. Essentially, tax evasion is the intentional
and illegal avoidance of paying mandatory taxes to the government.
There are several different types of tax evasion. First, individuals can evade
income taxes by failing to file a tax return or making false statements, such as
fake deductions or not reporting income on a return or writing off personal
expenses as business expenses so that they do not have to pay taxes on
them. Another form of tax evasion is an abusive trust scheme, which is a
scheme in which one purports to transfer money into another’s possession,
but actually does not do so. The “transfer” cancels the taxes on the
individual’s income. A third type of tax evasion is when businesses misstate
income or expenses. This can be done in several ways. First, with respect to
payroll, employers may keep tax withholdings for themselves and pay
employees in cash or file false payroll tax returns. Next, it is possible for retail
stores to find ways to avoid sales tax, such as failing to report sales tax
reimbursement collected from customers.
Money laundering
MINIMIZING RADICALIZATION
There is a need to respond to the imminent threat that violent extremism poses and to reassure fearful
populations. The heightened terrorist alerts many countries currently operate under are a reaction to
these security challenges. It is likely that the future in many societies will be one of more robust security
systems to prevent possible terrorist attacks. But the manner in which security institutions respond to
potential threats could lead to the stigmatization of certain groups and could thus become a driver in
the radicalization process. UNDP’s global initiative will therefore include as one of its pillars for
preventing violent extremism, measures to increase the capacity of the justice and security sectors, not
only to detect and prevent violent activities, but also to ensure that the proper judicial process and the
legal and human rights of those being prosecuted are followed and respected. This also includes
ensuring well-capacitated staff to run prison facilities and to offer rehabilitation and re-integration
support for inmates in general, and in particular the ones convicted of violent extremism. These
initiatives will ensure that prisons become centers for deradicalization rather than a source of
recruitment for violent extremists. This also means working with national human rights institutions to
ensure that the delivery of justice, security and surveillance is done with respect for human rights and
the rule of law.
An increased focus on fighting corruption helps to enhance the legitimacy of state institutions and
directly contributes to reducing perceptions of injustice and inequality. Countries or local communities
that make a solid effort to reduce the petty and grand corruption that fuel people’s perceptions of
injustice provide a visible sign that the causes of inequality and unequal opportunities are being
addressed. UNDP has long experience in building capacities of anti-corruption institutions, fostering
capacities of civil society to monitor transparency and accountability in government and in assessing
corruption risks in specific sectors and at the local community level.
UNDP’s initiative will focus on improving the livelihoods of groups at risk (youth in particular), meaning
improving their skills and education levels and ensuring better access to jobs and upward mobility. The
combination of these is important as supply-side vocational training projects that are not linked to
meaningful employment in the marketplace risk raising expectations that cannot be satisfied, hence
possibly aggravating perceptions of unfairness and discrimination. Special attention will need to be paid
to adolescent girls to reduce their vulnerability to trafficking and gender-based violence.
Economic empowerment through the creation of jobs and livelihoods is not sufficient. It is equally
important to ensure that disenfranchised men and women - young people in particular - are provided
with the space and platforms for civic engagement and participation in decision-making. UNDP’s
integrated approach to support inclusive political processes works with women and men of all ages to
strengthen civil society capacities and expand and protect spaces for citizen participation in public life,
with a special focus on groups experiencing discrimination and marginalization. Regular engagement
with political leaders and decisionmakers in particular at the local level can yield important peace- and
social-cohesion dividends. Creating opportunities for men and women to organize, culturally, politically,
or for sports, also helps in managing frustrations. Genuine participation in, or access to, decision-making
generates a strong sense of inclusion and tolerance, and hence decreases alienation. Legislatures can
support the adoption of laws that protect fundamental freedoms, and that entrench and strengthen
human-rights protections, minority-rights guarantees and gender equality. They can exercise caution in
the passage of anti-terrorism legislation that could violate human rights and freedoms. Both legislation
and budget allocations can help to address the problem of exclusion. Legislators can also champion
national consensus-building around common values. Parliamentary oversight of the executive’s use of
power can enhance public confidence in the integrity of the executive’s activities and make the public
more willing to accept the legitimacy of decisions taken to address violent extremism. UNDP’s global
initiative will therefore include measures to increase the capacity of legislatures and political actors to
prevent violent activities.
Limited state capacity particularly manifests itself at the subnational level where people have the most
direct contact with state institutions, and where the lack of services and security becomes most
apparent. Improving the quality of services and of engagement between authorities and people
enhances public trust and state legitimacy that are at the root of just and peaceful societies. UNDP
support focuses on strengthening the capacities of local institutions, local economic actors, and
communities to develop and pursue the realization of local development outcomes that are relevant to
local needs and aspirations. By grounding development choices in the needs of the people – particularly
the poor, marginalized and traditionally excluded groups - and fostering transparency, accountability,
participation and ownership, local governments become forefront players in combating exclusion and
reverse long-held perceptions of economic and social injustice.
The more a society provides opportunities for dialogue, and for different groups to develop mutual
understanding with one another, the greater the chance that trust, tolerance and respect for diversity
will flourish. But many authorities today, in particular in urban communities, claim they no longer feel
the pulse of their communities and lack the capacity for outreach and communication with those
inclined to join the ranks of violent extremists. Conversely, many disaffected and alienated persons
complain that they are no longer understood, respected, or accepted by their families, community, or
state authority structures. This is partly due to the profound gaps in intergenerational communication
generated by modern technology and culture. Approaches centered on an active listening of their
concerns, on inclusive dialogue, and on fostering active and open participation in public processes, can
have a transformative impact. But critical changes in political and social attitudes and behaviors cannot
be manipulated from the outside. They have to emerge from the organic conditions of a society. This
requires trusted and credible “insider mediators” able to engage relevant political, social, and civic
leaderships, build dialogue across lines of tension, and convene and facilitate critical conversations.
These mediators – traditional or religious leaders (women or men), civic activists, artists, teachers,
media anchors etc. with legitimacy to mediate – can play an important early warning role, identifying
potential signs of radicalization or recruitment by extremists. The spread of ideologies that preach
intolerance for divergent opinions or lifestyles as well as increased gender-based violence are key
precursors of extremism spreading into the mainstream. Building on a recently released Guidance Note
on support for “insider mediation,” prepared jointly with the European Union, UNDP will work with
partners to develop in-depth guidance on identifying and working with credible intermediaries in
situations characterized by the risk of violent extremism.
The systematic discrimination and abuse of women is a strategic and deliberate tactic of a number of
violent extremist groups. As the Special Representative of the UN Secretary-General on Sexual Violence
in Conflict has written, “extremist groups like ISIL and Boko Haram view female bodies as vessels for
producing a new generation that can be raised in their own image, according to their radical
ideology.”42 Even before violent extremism has taken root, key indicators of the spread of extremist
ideologies include increased discrimination against women and girls. That is why advocating for and
reinforcing the equal rights of women and girls and ensuring that gender equality laws and policies are
put in place and enforced, are important building blocks of an action plan to prevent violent extremism.
In many parts of sub-Saharan Africa, South East Asia and the Middle East, women have been at the
forefront of efforts to counter the political, social and cultural factors that enable violent extremism.
Women are among the most powerful voices of prevention – in their homes, schools and communities -
and women’s organizations and movements have played a significant role in advocating for inclusion
and tolerance. Women’s organizations also provide alternative social, educational and economic
activities for at-risk young women and men. Hence they can uniquely help build the social cohesion
needed to resist the appeal of a violent extremist group. Most of the current counter-violent extremist
programs however focus only on men. Women are also absent from the decision-making processes on
how to address violent extremism.43 A closer understanding of the roles women play in relation to
violence and conflict is critical to the development of tailored strategies to strengthen resilience against
violent extremism and to support victims and survivors. This not only requires reaching out to natural
allies such as human-rights organizations, educational institutions and policy-makers already engaged in
preventing violent extremism, but also calls for engaging with religious leaders, the media, community
leaders, women’s organizations, security forces and the private sector to promote values in compliance
with international human rights standards and norms. Investing in women’s economic autonomy is also
critical in preventing violent extremism as women’s economic status builds their own resilience, as well
as that of their families, against joining extremist groups.
To counter the narrative of radical groups to convince people to join their ranks, a communications
strategy needs to be proactive, not only reactive to the seductive language used by extremists.47 UNDP
will work with select partners to develop an online interactive platform for those advocating creative
approaches to enhance inclusion, promotion of human rights, social cohesion and tolerance, gender
equality and women’s empowerment; and to reach out to and engage in dialogue with disaffected
groups and individuals. The voices of women, youth, and religious leaders as well as victims, survivors
and returnees are important in this approach. A communications tool-kit, including a guide for the use
of social media, will be developed for use by development partners, governments, media and civic
organizations in reaching out to and engaging with those susceptible to violent extremism. UNDP will
partner with global and regional media to create messages of tolerance and respect for diversity and
gender equality that can be launched on national and local TV, in schools, universities, sports clubs, and
religious and community centers to discourage people from joining radical groups or to encourage them
to disengage from these groups. The usefulness of “social marketing” approaches and “strategic
communications” will also be examined to see how peaceful activism and mobilization might be
promoted as a viable alternative leading to individual and collective empowerment.
On May 8, a suicide bomber killed at least 10 (including police officers and security guards)
and wounded at least 24 others in an attack at Lahore’s Data Darbar Sufi shrine. Hizbul Ahrar, a
faction of TTP, claimed responsibility for the attack, specifying that the target was law enforcement
officers and not civilians.
On May 11, three militants killed five (including a Pakistani Navy officer) and injured six in
an attack on the Pearl Continental Hotel in Gwadar. The Balochistan Liberation Army claimed
responsibility for the attack, stating the targets were Chinese and other foreign investors.
CONTROLLING TERRORISM
Pakistan collects biometric information at land crossings through its International Border
Management Security System. Authorities had limited ability to detect smuggling by air
travel. The Customs Service attempted to enforce anti-money laundering laws and foreign
exchange regulations at all major airports, in coordination with other agencies. Customs
managed the entry of dual-use chemicals for legitimate purposes through end-use
verification, while also attempting to prevent their diversion for use in IEDs. Consistent with
UNSCR 2178, returning FTFs may be prosecuted under Pakistani law. NACTA is
responsible for compiling and verifying data on these individuals.
Some madrassas reportedly continued to teach “extremist” doctrine. The National Action
Plan directs increased government supervision of madrassas, and there was evidence of
continued government efforts to increase regulation. Security analysts and madrassa
reform proponents observed, however, that many madrassas failed to register with the
government or provide documentation of their sources of funding or to limit their
acceptance of foreign students to those with valid visas, a background check, and the
consent of their governments, as required by law.
The Pakistani cities of Nowshera, Peshawar, and Quetta are members of the SCN.
Intelligence Collection
Despite the increased demand for police services, station house reporting procedures— which are
largely done by hand in large, leather-bound ledgers—have remained unchanged for decades.
Computerized record-keeping and Internet communication between stations and headquarters remain
limited to a handful of model stations in urban centers. Although peace committees that involve
community members in resolving local disputes can be a mechanism for reporting suspicious activity to
the police, only limited efforts have been made to sensitize police at the station house level to look for
indications that terrorist groups might be present and preparing for local operations. There is also no
effective means for higher police authorities to routinely provide terrorist-related information to police
stations in a timely manner, let alone as actionable intelligence for the conduct of counterterrorist
operations. Police stations need a new system for information collection and analysis and new personnel
trained to perform these functions. Historically, police stations had a dedicated cell that conducted
liaison with the village headman and watchman to collect information on local conditions, personalities,
and activities that might pose a security threat. As Pakistan has become more urbanized, these roles
have disappeared. The Police Rules of 1934 created a system of police station record-keeping with
inspections by senior officers that continued until the 1970s. Given the proliferation of demands on the
police and the frequent transfer of key personnel, this system fell into disuse. The 1997 National
Counterterrorism Act provided procedures and authorities for police surveillance of suspected
terrorists.20 The Fair Trial Act of February 2013 broadened those authorities to include wire taps and
other types of electronic eavesdropping.21 These procedures generally are not followed and the
authorities not used, however.22 Police at the station house level are often unaware of the details of
the law, and countering terrorism has not yet been specifically prescribed as part of their duties.
SNAPSHOT
The National Accountability Bureau (NAB) was established on November 16, 1999 by the National
Accountability Ordinance. The NAB is a federal executive agency of the Government of Pakistan,
with the mandate to deal with corruption prevention, raise public awareness, and enforce of anti-
corruption measures. The NAB has its headquarters in the federal capital and has five regional
offices in four provinces. The headquarters office exclusively performs policy and monitoring
functions, while the hardcore work of investigation is carried out in the regional offices. The NAB's
main tasks have been organized along functional lines and are undertaken by four main divisions:
Operations, Prosecution, Awareness and Prevention, and Human Resource and Finance Divisions.
Importance of NAB
NAB is a key national institution if this nation seeks to eliminate corruption in the
gigantic public sector as well as the joint public-private sector-based projects either in
the conception stage or in-process. It is imperative that all other key institutions such
as the State Bank, the FBR, FIA, commercial banks & DFIs, NHA, FWO, and all
others should heed the national interest and co-operate with NAB in identifying and
bringing to justice all emerging and actual sources of corrupt practices and acts of
omission and commission. If citizens wish to be whistle-blowers (regarding corrupt
practices), their testimonies should be entertained.
Organization[edit]
The bureau has two principal officers: the Chairman; and the Prosecutor General of Accountability in
Pakistan. The Chairman is the head of investigation, and serves a four-year term. Lt-Gen Syed
Mohammad Amjad was the first chairman of the bureau. Justice (R) Javed Iqbal is the present
chairman of NAB. The Prosecutor General is the head of prosecution, and serves a three-year term.
A retired justice Asghar haider is current Prosecutor General of National Accountability Bureau
(Nab).
Infrastructure[edit]
In 2013, NAB inducted a large number of officers and conducted their Investigation Training at
COMSATS University in Islamabad. The officers, after successful completion of the Seven Months
off-job and 2 Months on-job training, were posted to different bureaus within the country. There are
various challenges currently faced by NAB, including a slow judicial process, difficulty in collecting
prosecutable evidence since the majority of country's public record is not electronically archived or
integrated into a central database.
NAB employees are consistently kept up to date with new training programs in financial crimes.
Criticism[edit]
The National Accountability Bureau has been criticized by the Supreme Court for mismanagement.
Justice Jawad S. Khawaja of the Supreme Court criticized the institution for its practice of 'plea
bargain' and described it as 'institutionalized corruption.' Under the said practice the Bureau arrests
suspects and negotiates for an out-of-court settlement under which the suspect is made to sign a
confession and deposit funds of an amount determined by NAB. Justice Khawaja stated during court
proceedings that he believed some NAB officials warn influential suspects before arrest to allow
them sufficient time to escape.[7][8]