Professional Documents
Culture Documents
• Introduction
• About National Response Centre for Cyber
Crimes (NR3C), FIA
• Cyber Crime Laws in Pakistan
• Categories of Cyber Crimes
• Explanation of each category using definition
of Crime with Examples.
• How Law Enforcement Agencies track Cyber
Criminals 2
About NR3C
National Response Centre for Cyber Crimes (NR3C) is a Public
Sector Development Project (PSDP).
National Response Centre for Cyber Crimes (NR3C) was
established in Year-2007 (August 2007).
Responsible for enforcement of Electronic/Cyber Crime laws
in Pakistan.
Currently there are five notified cyber crime police stations
located at Lahore, Karachi, Peshawar, Quetta and
Rawalpindi/Islamabad.
Notified Digital Forensic Laboratories.
Notified Special Public Prosecutors.
3
Cyber Laws in Pakistan
4
Current Status
of
Cyber Crime Legislation in Pakistan
5
Categories of Cyber Crimes
7
Cyber Stalking
General Definition:
8
Real Life Examples of Cyber Stalking
9
Social Networks
10
Electronic /Online Fraud
11
Electronic / Online Fraud
12
Electronic /Online Frauds
Electronic / Online Frauds can further be divided into
following sub-categories.
• Email / SMS Lottery Scams
• Employment Scams
• Phishing
• Goods never delivered Fraud
• Cultus Fraud (through Mobile Phone Calls)
• Prize Winner Scam (through Mobile Phone Calls)
• Fraudulent Balance Transfer (Mobile Phone)
13
Email / SMS / BISP Lottery Scams
14
Examples of Lottery Scam
15
Example of Lottery Scams
16
Lottery Scams
The people who receive the scam emails and fall for them are
asked to make advance payments in the following heads one
after another.
• Legal Fees (for a Lawyer: as some kind of lawyer is always involved)
• Insurance Fee (Before transferring the actual amount to victim’s account)
• Shipping Charges (As they inform that the money will be sent through
parcel!!!)
• Wire Transfer Charges
• Drug Free Certificate Charges
• Anti-Money Laundering Certificate Charges
• Terrorist Free Certificate Charges
• Non-Inspection Fee at Airport
• Bribes
• Etc 17
Employment / Job Scams
Employment scams, also known
as job scams, are a form
of advance fee fraud scamming
where certain unscrupulous
persons posing as
recruiters or employers offer
attractive employment opportuniti
es which require the job seeker to
pay them money in advance,
usually under the guise of work
visas, travel expenses, and out-of-
pocket expenses.
18
Employment / Job Scams
• People usually look and apply for job overseas but they don’t
remember where they applied.
• Job Scammers search for there email addresses on such
websites and respond them by asking more information about
the victim and finally offering job of handsome amount.
• Job Scammers make use of fake websites and real looking
email addresses to put reality in their scams stories.
• Then they tell you to pay 50 $ as an application processing
fee. If the victim pays money, they ask for 120 $ more for visa
processing fee. If paid, they ask for more money on and on
under different heads.
• Their objective is squeeze the victims as much as they can.
19
Phishing
20
Real Life Example of Phishing
21
Real Life Example of Phishing
22
Real Life Example of Phishing
This one is
Easy!
This is not
eBay site
but a fake
One.
23
Electronic /Computer Forgery
Examples:
• Creating forged Documents using computer
and other electronic equipment.
• Creating forged Credit Cards/Debit Cards
24
Hacking
25
Hacking
Generic Definition:
26
Hacking
Legal Definition:
• Section 36 & 37 of ETO 2002 Covers Hacking.
(The punishment for Hacking is imprisonment
up to 7 Years or Fine not exceeding 1 Million
rupees or both).
27
Hacking
Section 36 of ETO 2002 defines Hacking under head
“Violation of Privacy of information:
28
Examples of Hacking
• Breaking in to University’s information system to
steal or alter information.
• Hacking Email Accounts
• Website Defacement
• Stealing or altering any information from any
information system by any means.
• Stealing information from information system also
includes looking over the shoulder when you are not
authorised.
• Breaking in to Bank’s information system to
add/change the amount in your Bank account.
29
System Damage
30
Examples of System Damage
31
Examples of Misuse of Electronic System
• ATM Skimmer
Device
32
Another Picture of Skimmer Device
33
Examples of Misuse of Electronic System
• Magnetic Stripe
Read & Writer
(MSRW) Device
34
Keyloggers
A keylogger can be either specialized
hardware fitted to a keyboard or keyboard
cable or a software program. Keyloggers are
used to record and log each and every
keystroke on a personal computer.
35
Types of Keyloggers
USB Based
Keyloggers
Before After
46
Malicious code
• Computer virus: program which can copy itself and surreptitiously infect
another computer, often via shared media such as a floppy disk, CD,
thumb drive, shared directory, etc. Viruses are always embedded within
another file or program.
• Worm: self-reproducing program which propagates via the network.
• Trojan horse: program which purports to do one thing, but secretly does
something else; example: free screen saver which installs a backdoor
• Root kit: set of programs designed to allow an adversary to surreptitiously
gain full control of a targeted system while avoiding detection and
resisting removal, with the emphasis being on evading detection and
removal
• Botnet: set of compromised computers ("bots" or "zombies") under the
unified command and control of a "botmaster;" commands are sent to
bots via a command and control channel (bot commands are often
transmitted via IRC, Internet Relay Chat).
• Spyware: assorted privacy-invading/browser-perverting programs
• Malware: an inclusive term for all of the above -- "malicious software"
47
How do LEAs Track Cyber Criminals?
• Have you ever noticed, when you visit some
websites, you get advertisements from
Pakistani Company’s!!!!!
51
Question & Answers
52