2. Cyber Crime
Activity in which computers or networks are a
tool, a target, or a place of criminal activity.
Committing fraud
Stealing identities
Violating privacy
3. Cyber Crime
It is also include traditional crimes in which
computers or networks are used to enable
the illicit activity.
Most common hacking:
Social media
4. Rafay Baloch
Pakistani researcher
Rafay Baloch is a Pakistani ethical hacker
and security researcher known for his
discovery of vulnerabilities on the Android
operating system. He has been featured and
known by both national and international
media and publications like Forbes, BBC,
5. FIA director : abdul rauf
http://www.fia.gov.pk/en/NR3C.php
6.
7. Cyber Crime
Examples:
E-mail account of a Federal Minister is hacked.
Credit cards frauds reach to an alarming level.
Visiting CEOs of Multinational Companies gets
threatening E-mails.
Financial institutions are the favorite targets of
Cyber criminals --- worst effecting the
technological
progress in the area of e –Commerce.
8. Cyber Laws
The legal issues related to use of communications
technology, particularly "cyberspace", i.e. the
Internet.
It is an intersection of many legal fields, like:
Intellectual property,
Privacy
Cyber laws is an attempt to apply laws designed for
the physical world to human activity on the Internet
9. Cyber Laws in the World
Electronic Commerce Act (Ireland)
Electronic Transactions Act (UK, USA,
Australia, New Zealand, Singapore)
Electronic Transactions Ordinance (Hong
Kong)
Information Technology Act (India)
Information Communication Technology Act
Draft (Bangladesh)
10. Cyber Laws in Pakistan
There are different laws, promulgated in Pakistan.
These laws not only deal with crime of Internet
These deal with all dimensions related to computer
& networks.
Two of them are most known.
They are:
Electronic Transaction Ordinance 2002
Electronic / Cyber Crime Bill 2007
11. Punishment
Spreading false information about an
individual: up to 3 years in prison or up to
PKR 1 million in fine, or both – if someone
intentionally and publicly displays any
information through any information system,
which he or she knows to be false and by
which he or she intimidates or harms the
reputation or privacy of a natural person
12. Punisment
Making videos/taking photographs and
distributing them without consent: up to 3
years in prison or up to PKR 1 million in fine,
or both – if someone takes a photograph or
makes a video of any person and displays or
distributes it without his or her consent and in
a manner that harms that person.
13. Electronic Transaction Ordinance 2002
Overview
The Electronic Transactions Ordinance (ETO), 2002, was
the first IT-relevant legislation created by national
lawmakers.
A first step and a solid foundation for legal sanctity and
protection for Pakistani e-Commerce locally and globally.
Laid the foundation for comprehensive Legal Infrastructure.
It is heavily taken from foreign law related to cyber crime.
14. Pre-ETO 2002
No recognition of electronic documentation
No recognition of electronic records
No recognition of evidential basis of
documents/records
Failure to authenticate or identify digital or electronic
signatures or forms of authentication
No online transaction could be legally binding
Electronic Data & Forensic Evidence not covered.
No Rules
15. ETO 2002
Sections
There are 43 sections in this ordinance
It deals with following 8 main areas relating to e-
Commerce.
Recognition of Electronic Documents
Electronic Communications
Digital Signature regime and its evidential consequences
Web Site & Digital Signatures Certification Providers
Stamp Duty
Attestation, notarization, certified copies
Jurisdiction
Offences
16. ETO 2002
Important Sections are:
36. Violation of privacy information
gains or attempts to gain access
to any information system with or without internt
to acquire the information
Gain Knowledge
Imprisonment 7 years (custody)
Fine Rs. 1 million
17. ETO 2002
37. Damage to information system, etc.
alter, modify, delete, remove, generate, transmit or store
information
to impair the operation of,
or prevent or hinder access to, information
knowingly not authorized
Imprisonment 7 years
Fine Rs. 1 million
18. ETO 2002
38. Offences to be non-bailable, compoundable
and cognizable
All offences under this Ordinance shall be non-bailable,
compoundable and cognizable.
19. Post ETO 2002
Electronic Documentation & Records
recognized
Electronic & Digital forms of authentication &
identification given legal sanctity
Messages through email, fax, mobile phones,
Plastic Cards, Online recognized.
21. Overview
“Prevention of Electronic Crimes Ordinance, 2007″
is in force now
It was promulgated by the President of Pakistan on
the 31st December 2007
The bill deals with the electronic crimes included:
Cyber terrorism
Data damage
Electronic fraud
Electronic forgery
Unauthorized access to code
Cyber stalking
Cyber Spamming/spoofing
22. Electronic/Cyber Crime Bill 2007
It offers penalties ranging from six months
imprisonment to capital punishment for 17
types of cyber crimes
It will apply to every person who commits an
offence, irrespective of his nationality or
citizenship.
It gives exclusive powers to the Federal
Investigation Agency (FIA) to investigate and
charge cases against such crimes.
23. Punishments
Under this law there are defined punishment
for the offence.
Every respective offence under this law has
its distinctive punishment which can be
imprisonment or fine.
24. Offence Imprisonment (years) Fine
Criminal Access 3 3 Lac
Criminal Data Access 3 3 Lac
Data Damage 3 3 Lac
System Damage 3 3 Lac
Electronic Fraud 7 7 Lac
Electronic Forgery 7 7 Lac
Misuse of Device 3 3 Lac
Unauthorized access to code 3 3 Lac
Malicious code 5 5 Lac
Defamation 5 5 Lac
Cyber stalking 3 3 Lac
Cyber Spamming 6 months 50,000
Spoofing 3 3 Lac
Pornography 10 -----
Cyber terrorism Life 10 Million
25. Sections
Data Damage:
Whoever with intent to illegal gain or cause harm
to the public or any person, damages any data,
shall come under this section.
Punishment:
3 years
3 Lac
26. Electronic/Cyber Crime Bill 2007
Electronic fraud:
People for illegal gain get in the way or use any
data, electronic system or device or with intent to
deceive any person, which act or omissions is
likely to cause damage or harm.
Punishment:
7 years
7 Lac
27. Electronic/Cyber Crime Bill 2007
Electronic Forgery:
Digital forgery is falsely altering digital contents
such as pictures, images, documents, and music
perhaps. for economic gain. It may
involve electronic forgery and identity theft.
The majority of digital forgery occurs. because
digitally altered pictures often appeal to the
viewers' eyes
Punishment:
7years
7 Lac
28. For example, identity theft, where a person
forges the signature of another, is a felony
and is punishable by a fine and some years
of imprisonment. Digital forgery involves
changing elements of a document or image
and representing the changes as true copies
of the original.
29. Electronic/Cyber Crime Bill 2007
Malicious code:
Whoever willfully writes, offers, makes available,
distributes or transmits malicious code through an
electronic system or device, with intent to cause
harm to any electronic system or resulting in the
theft or loss of data commits the offence of
malicious code.
Punishment:
5 years
5 Lac
30. Electronic/Cyber Crime Bill 2007
Cyber stalking:
Whoever with intent to harass any person uses computer,
computer network, internet, or any other similar means of
communication to communicate obscene, vulgar, profane,
lewd.
Make any suggestion or proposal of an obscene nature
Threaten any illegal or immoral act
Take or distribute pictures or photographs of any person
without his consent or knowledge
Commits the offence of cyber stalking.
3 Years
3 Lac
31. Electronic/Cyber Crime Bill 2007
Spamming:
Whoever transmits harmful, fraudulent, misleading,
illegal or unsolicited electronic messages in bulk to any
person
without the express permission of the recipient,
involves in falsified online user account registration or
falsified domain name registration for commercial purpose
commits the offence of spamming.
Punishment:
6 month
50,000
32. Electronic/Cyber Crime Bill 2007
Spoofing:
Whoever establishes a website, or sends an
electronic message with a counterfeit source
intended to be believed by the recipient or visitor
or its electronic system to be an authentic source
with intent to gain unauthorized access or obtain
valuable information
Later, Information can be used for any lawful
purposes commits the offence of spoofing.
3 Years
3 Lac
33. Electronic/Cyber Crime Bill 2007
Cyber terrorism:
Any person, group or organization who, with terroristic
intent utilizes,
accesses or causes to be accessed a computer or
computer network or electronic system or device or by any
available means,
knowingly engages in or attempts to engage in a terroristic
act commits the offence of cyber terrorism.
Punishment
Whoever commits the offence of cyber terrorism and
causes death of any person shall be punished with death
Or imprisonment for life, and with fine
Otherwise he shall be punishable with imprisonment of ten
years or with fine ten million rupees
34. Crimes Reported in Pakistan
A total of 57 cases have been registered under
the ETO 2002 in the years 2005 & 2006.
Offences 2006 2005 Total
IPR Crimes 14 20 34
Spurious Drugs 37 30 67
Cyber Crimes 33 24 57
Counterfeit Currencies 7 2 9
Others 105 148 253
Total: 196 224 420
Editor's Notes
characteristic of the culture of computers, information technology, and virtual reality.
"the cyber age"
We are living in cyber age.
ناجائز:Illicit
Rafay friend story……American lawyer…..
Promulgated : Naqiz
Ordinance : Urgent need ….President right ..but for 90 days
Pre-ETO : Electronic Transactions Ordinance, 2002
قابل دست اندازی cognizable : without warrant arrest the accused
Compoundable offences are those offences where, the complainant (one who has filed the case, i.e. the victim), enter into a compromise, and agrees to have the charges dropped against the accused.
Forgery : illegally manipulate things
Digital forgery is falsely altering digital contents such as pictures, images, documents, and music perhaps. for economic gain. It may involve electronic forgery and identity theft. The majority of digital forgery occurs. because digitally altered pictures often appeal to the viewers' eyes
Fai-lony (felony سنگین جرم - sangeen-juram
Malicious code is the term used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.:::Malware
گستاخ profane
Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails, phone calls, and websites, or can be more technical, such as a computer spoofing an IP address, Address Resolution Protocol (ARP), or Domain Name System (DNS) server.