Professional Documents
Culture Documents
Research Project On Cyber Crimes in Pakistan - 3
Research Project On Cyber Crimes in Pakistan - 3
Topic:
Supervisor
M. Muneeb Raza
Submitted by:
Session 2019-2024
Department of Law
1|P a ge
Acknowledgement
First of all, I am thankful to Allah Almighty, Most Beneficent and Merciful! Who blessed me
with courage and enlightened our heart with lightning of knowledge. All respect and regards to
the Holy Prophet (S.A.W) greatest teacher of the world. This study is dedicated to my respected
teachers. I am thankful to all my family members, friends, roommates and fellows whose
2|P a ge
Student Declaration
It is solemnly declared that this study is my original work that I have been done it with greater
efforts and struggle. None of its part is submitted to any easy, dissertation, research and thesis.
This is my pure academic work. Through information and knowledge I have been completed this
s of study. I know that the plagrisms is a crime. Therefore, this is my own handwritten work after
a long consideration and study. Sir, Mr. Muneeb Raza, helped me a lot to complete this research
study. Through his guidance I am able to complete this study. I am also thankful to the Mr.
Jibran Jamshad (H.O.D) of law department, who provide us this sort of opportunity.
3|P a ge
Supervisor declaration
It is hereby certified that work represented by Muhammad Sheraz Aslam in the research report
titled “The study of Cybercrimes threats in Pakistan, fueled by technological advancement”
Is based on the result of the study conducted by candidate under my supervision. He has fulfilled
all the requirements and is qualified to submit this research report in the subject matter of
Research Project.
M. Muneeb Raza
4|P a ge
APPROVAL CIRTIFICATE
It is certified that the department of law, Islamia University Bahawalpur has accepted the
research project submitted by Muhammad Sheraz Aslam in the current meeting for the
requirement of the LL.B.
Supervisor ______________________
M. Muneeb Raza
Date __________________________
5|P a ge
Abstract
Revolution and evolution is the reasons that world is going to be more advanced, significantly in
the field of computer. However this sort of advancement also brought some threats in our society
and in these threats one of the main is cybercrime. The growing revolution in the computer can
also brought the Cybercrimes threat is one of the major problems of the digital world in Pakistan,
and, at the moment, it negatively impacts the people, businesses, and government. This study
provides a legal analysis of the following major layers of the cyber threat in Pakistan: causes of
cybercrimes, and cyber security vulnerable, pertinent issues. The current laws with regard to
cybercrimes and handle the issues related to it but due to advancement in technology the
cybercrimes becomes more advanced and undetectable under the devices and abstruse for the
law and enforcing agencies to collect the evidence of that crime. This analysis determined the
weaknesses of the existing legislation towards efficient fight against cyber threat. The important
area of the research is to give a strong basis to foster and strengthening the exciting laws and
choosing these to the updated cyber security challenges, consumer cyber literacy and cyber
awareness, and international cooperation to grapple with the transnational cybercrime syndicates.
Taking harmonious measures within these spheres can bore fruit for Pakistanis cyber security
dealing capacity and ensure that the digital of the country is able to stand the phenomenal length
of cyber threats. Using modern devices to commit the cybercrime is another muddle in the head
of society. In order to halt these threatening crimes there has been dire and critical need to
improve the function of investigating agencies and public awareness.
Key words: cybercrime, Ethical hacker, cyber threats, online harassment, deep fake.
6|P a ge
Contents
1. Introduction ......................................................................................................................................... 9
1.1. Research objective ................................................................................................................... 9
1.2. Research Questions................................................................................................................ 10
1.3. Literature review.................................................................................................................... 10
1.4. Methodology ............................................................................................................................. 11
1.5. Case Study ................................................................................................................................. 11
1.6. Ethical consideration .................................................................................................................. 12
2. Cybercrime and challenges in legal framework .................................................................................. 12
2.1. Types of Cybercrimes with the advancement of technology ......................................................... 13
a) Fraud ..................................................................................................................................... 13
b) Hacking ..................................................................................................................................... 13
c). Online Harassment .................................................................................................................... 14
d). Deep fake and digital piracy...................................................................................................... 14
e).Phishing..................................................................................................................................... 15
f). Malware Software ..................................................................................................................... 15
g). Denial of Service (DoS) Attacks: .............................................................................................. 16
h) Insider Threats ........................................................................................................................... 16
i). Identity theft .............................................................................................................................. 16
Challenges in cybercrime and the exciting Legal Frame work in Pakistan............................................ 18
2.1. Telegraph Act, 1885.................................................................................................................... 18
2.2. The Pakistan Telecommunications (Re-organization) Act, 1996 .................................................. 18
2.3. National Information Technology Policy and Action Plan, 2000 .................................................. 19
2.4. Electronic Transactions Ordinance, 2002 .................................................................................... 19
2.5. The Electronic Crimes Act, 2004 ................................................................................................ 19
2.6. The Prevention of Electronic Crimes Act (PECA), 2016.............................................................. 20
3. Challenges and threats due to Technological Advancement ............................................................... 21
3.1. Jurisdictional Problem................................................................................................................. 21
a) Investment of time ................................................................................................................. 21
b) Less qualified expert .............................................................................................................. 22
c) Digital Forensic Equipment .................................................................................................... 22
d) Fear in Victim ........................................................................................................................ 22
7|P a ge
3.2. Evidence Collection and Tracing phenomena .............................................................................. 22
a) AI( Artificial Intelligence) and MI( Machine Learning) .......................................................... 23
b) Autonomous devices and system ............................................................................................ 23
c) Computing and data storage technology ................................................................................. 23
d) Internet of things .................................................................................................................... 23
3.4. Emerging cyber threats ............................................................................................................... 24
3.5. Cyber Espionage and State; Sponsored Attacks ........................................................................... 24
3.6. Online Extremism and Radicalization ......................................................................................... 24
3.7. Data Privacy Concerns................................................................................................................. 25
3.8. Fake Social Media Account ........................................................................................................ 25
3.9. Hacking ...................................................................................................................................... 25
3.10 Lack of Public Awareness .......................................................................................................... 26
3.11 Case Laws .............................................................................................................................. 26
I. Sheraz khan v. State and another ................................................................................................ 26
II. Meera Shafi v. State of Pakistan and others. ............................................................................... 27
III. Fakhar Zaman petitioner V State and other Respondent .......................................................... 27
4. Recommendations ............................................................................................................................. 28
4.1 Public Awareness......................................................................................................................... 28
4.2 Establishment of Special Courts ................................................................................................... 29
4.3 Establishment of Forensic laboratories regarding cybercrime. ...................................................... 29
4.4 Appointment of Ethical Hacker .................................................................................................... 29
4.5 Amendments in Legal Frame work in Pakistan ............................................................................. 29
4.6. Using updated devices or software ............................................................................................. 30
Conclusion ............................................................................................................................................ 30
References ............................................................................................................................................ 31
8|P a ge
The Study of Cybercrimes Threats In Pakistan, Fueled By
Technological Advancement.
1. Introduction
Everything in the universe are under the changing phenomena, the evolution lead to revolution,
the good things become bad and bad things become good with the passage of time. The myth is
too broken and a new thing is emerged as an understandable. In history, the stories of the myth
have been filled to pack. Likewise the story of internet and its evolution, initially, it was
considered as the huge sources of the information. Later, it is one of those sorts of technologies
that have advantages and disadvantages.
With the advent of computer, a new revolution has been started in the world, the traditional
phenomena has been shifted to modernized and evolved. With this advancement the traditional
crimes are shifted toward the digitalization. These are called cybercrimes. The cybercrimes have
been day to day increasing and the new enigmas have been erupting out from it under the roof
the advancement and boost occurred in technologies. The court’s role remains ordinary, however
the crime becoming advanced and next level. It is a scourge which affects the lives in glob as
well as in Pakistan.it has been accelerated on national and international standard. The legal
response is failing in Pakistan. The court is in muddle to deals the offences under the
cybercrimes. Firstly, the problem like to exercise the regular jurisdiction of the court, secondly,
the problem of collection, validity, tracing and correctness in the evidence process, thirdly, lack
of establishment of relevant special court to deal the cyber related offences, fourthly, the lack of
appointment of the ethical hacker or white hacker. Ergo, with the technological advancement the
surge in the cybercrime and perplexity of the courts has been raised.
1.1.Research objective
The research objective is to understand the phenomena of the cybercrimes and how it works
in Pakistan. The surges in the supply in technology also brought some malicious activities in
which one of them is cybercrime and the ethical concerns with regard to it. Firstly, the
research focus on how data is to be stolen by the hackers and what are the difficulties are
9|P a ge
faced by law and enforcing agencies and courts to trace out the criminals. Thirdly, this
research will provide the reader a comprehensive legislation history with regard to the
cybercrime legislation. Lastly, to recommend some of the cogent solutions for these
challenges related to the cybercrimes.
10 | P a g e
Cyber threats landscape and readiness challenges of Pakistan written by Muhammad
Riaz (2019). This study focused on the cyber threats a state or organization is depend upon
the vulnerability of ICT. In vulnerability, it includes the both aspect technical and social.
Cyber threats and incident response capability, a case study of Pakistan written by
Muhammad Tariq et al. (2013). Pakistan is moving toward the technological innovation,
especially toward ICT and e-government services. Simultaneously, the emerging threats are
also the problem for Pakistan. Prevalence of cyber bullying victimization among the
Pakistani youth Written by Sumera Saleem et al (2021), in this study, researcher focused on
the cyber bullying which has been surged due to the increased in the ICT, using the
communication devices the youth of Pakistan exhibiting the hostile behavior toward other
individual and group of individual.
Identity theft and social media written by shreen Irshad and Tariq Saleem (2020), the
min focused of the article is that how the identity of the person is to be theft in Pakistan the
used the statically data from 1800 years to 2020, and find out the reasons that how the
identity is being theft.
1.4.Methodology
For this sort of study I mostly reply on the method of qualitative research. For this study,
primary and secondary sort resources have been adopted. For primary source, this study rely
relevant statutes, articles and reports of the different organizations like UNO and UNESCO
etc. For this study, some secondary sources are also be used, like magazines, books, research
papers and internet archives book library.
1.5.Case Study
The phenomena of cybercrime, boosted with the coming of technology. Technology has
followed by the cyber-criminal and start threating the others. For example is that, an
organization is hacked, external parties penetrate their crucial data, and they not only gather the
11 | P a g e
private information about you and your clients but also illegally add a virus program to your
organization’s computers. Through the incorporation of a new detection security system, your
organization, IT experts find the cause of the criminal activity. However, when it comes to the
prosecution in court of law, your evidence is deem inadmissible or rejected by the opposition
saying that the detection system is doubtful and arguable and the information gathered is useless.
There have been many cases that are going too happened every day in which criminal uses every
sort means weather they are right or wrong but these malicious process has been carry out. Law
and enforcing agencies should follow the sagacious process to deals the cybercrime related to the
cybercrime.
1
Prashant Mali, A Text Book of Cybercrime and Penalties (Indiana: Repressed Publishing LLC, 2006)
12 | P a g e
Another comprehensive definition of the cybercrime is “The offences that are committed against
individual or group of individual with the criminal motive and intent to harm reputation of the
victim, or cause physical or mantle haram to the victim directly or indirectly by using the modern
devices and telecommunication devices and mobile phones 2. This definition has only defects that
it does not sight a glance that using computer or devices a big commercial loos or a financial loss
can be done.
In broader sense the reality of the cybercrime is that it deals all those sort of offence which are
committed with the assistance of the computer or where there is a common denominator is the
technology or under the umbrella of the technology. In simple sense cyber offence are those sort
of offence in which the genesis or any crime occurred by using any sort of technology.
a) Fraud
The nature of the fraud has been shifted toward the typical form to advanced form named
cybercrime or cyber-fraud. Today, the modern fraud has been done with the help of the
computer. With the help of some devices, enticement techniques and wrong guidance to the user
a cyber-criminal start the crime. For example, the cybercriminal used the different devices and
take access of the personal data and send some amount to his account, the bank give the opt
password to pass the money from one person to another, cybercriminal using the techniques of
enticement to send its password to his number. This is also known as transactional fraud. Several
complaints have been made with this regard.
b) Hacking
Hacking is common and lethal sort of cybercrime that take away all the access of the user data as
well as the company data. It means with the assistance of the computer the hacker got the access
of the others computer bypassing the security procedure. Unauthorized access of the computer of
an organization leads to the loss of the company or an organizational data. Pertinent to the cases
2
DH Jaishankar, “Cyber Crime and the Victimization of Women: Laws, Rights and Regulations” (2012) Hershey:
Information Science Reference.
13 | P a g e
of Pakistan, from hacking Facebook account of the bank fraud has been surged. However, the
perfect solution of that is appointment of the white hacker or the data analysis’s expert. Who
will make the strong wall of the system of security in order to halt the hacking attack? It is the
data expert, who done this.
Digital piracy is a different concept in which the malicious intended person copy the work of the
author and generate it in the name of the other. With the surge of the technologies like AI,
several ethical questions have been raised regarding the protection of copyrights law.
3
Allia Bukhari, 'Silent Battles: How Pakistani Women Counter Harassment in Cyberspace' The Diplomat (21
October 2020) accessed 17 March 2021.
4
https://cybernews.com/editorial/the-good-the-bad-and-the-ugly-of-deepfakes-explained/
14 | P a g e
e).Phishing
It is a form of scam in which any malicious person or the malicious organization enticed other
person by the to provide essential personal information and may open any account or involved in
any other activity. Phishing in Pakistan has been facing these phenomena with the peak. In
Pakistan, where the common people are unaware that how the other malicious person can be
used their information for any cybercrime or any other crime. It is my personal observation that
in Pakistan people often called any random person, in order to entice him to extract some crucial
information from him, especially on the Name Ehssas emergency cash, Benazir income support
program and welfare program. With the coming of technologies i.e upgrading in ICT leads the
phishing phenomena more easily. If we combined it with AI the more advanced technology, then
this crime is be too easier, as we know the AI being able to create the audio , video and any
textual content.
5
https://therecord.media/hackers-target-pakistani-government-with-malware
6
https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/
15 | P a g e
g). Denial of Service (DoS) Attacks:
Denial of services attack means that any malicious person make technology unavailable for its
legitimate user and to blackmailed the organization. This attack is further categorized into two
forms. The first is buffer overflow attack and second is flood attacks. The denial of services of
system occurs when the culprit dismantle the system’s services and the website and weaken the
security codes for the upcoming use7. Pakistan also faced many DDoS attack in his reagion,
especially the attacked, The Sindh high court attack, An ATM in Peshawar 8.
h) Insider Threats
it is also a cybercrime in which the enrolment of the employee, client, managers, supervisor,
consultant, company member, or board member may intentionally and unintentionally provide
the crucial data to the person whom have the malicious intention to harm the organization and
entity of the office9 and this thing ultimately leads to the corruption, degradation of resources,
sabotage and terrorism related activities. Typically it happened, when any insider person provide
the authorized access to the outsider. Insider threats are also happening in Pakistan and more
surprising is that the government does not have any strong hand to handle the problems that are
related to the insider threats. The most common example found in the K-Electric company when
someone who was the insider of the company gives hacker, the crucial access to it. The hacker
demands 7 million dollars of the data of its user, in data it include the crucial information i.e Id
cards, NTN, Bank credit and numbers and many more. 10 The government feels helpless and let it
away, so hackers put all the data on the dark web and it is about 8.5 GB, this how the insider
threat leads a long lasting trouble.
7
https://www.cloudflare.com/learning/ddos/glossary/denial-of-service/
8
https://propakistani.pk/2021/08/23/heres-a-recap-of-major-recent-cyber-attacks-in-pakistan/
9
https://www.fortinet.com/resources/cyberglossary/insider-threats
10
https://propakistani.pk/2021/08/23/heres-a-recap-of-major-recent-cyber-attacks-in-pakistan/
16 | P a g e
account or name of the common person i.e. illegal gambling. Due to identity theft a person may
face many consequences, i.e. new calls coming to you for the loan that you did not received from
the bank but on your name and identity by the hacker. Unfounded medical bills on your name
from the insurance company and you did not purchase any services. The phenomena in Pakistan
has been shifted a shocking path as 2.7 million personal data has been stolen from the NADRA
during the year 2019-202311. And more pathetic is that Government did nothing except making a
report or a JIT with that regarding.
11
https://www.thenews.com.pk/print/1172748-jit-report-confirms-theft-of-2-7m-pakistanis-info-from-nadra-
database
17 | P a g e
Challenges in cybercrime and the exciting Legal Frame work in Pakistan
Pakistan has the several laws with regard to the cybercrimes but not befitting in the nature to
handle the cybercrime with both hand and would not only narrow down to the mere use of
computer for unlawful purposes. As technology marches forward, the importance of having laws
and regulations for cyber activities grows. Cyber legislation is crucial for setting rules that
prevent cybercrimes and manage online activities done using computers. In Pakistan, the
Government has made strides to tackle these issues by passing important cyber laws, ensuring
the safety and security of its citizens as they navigate the online world. The brief descriptions are
as followings.
12
The Telegraph Act, 1885
13
the Pakistan Telecommunications (Re-organization) Act, 1996
18 | P a g e
2.3. National Information Technology Policy and Action Plan, 2000
In year 2000, Pakistani Government issues the policy with regard to the information technology
policy. The aim of this policy is to understand the cybercrimes and create the legislation with
regard to the cybercrimes and its advancement. Therefore the government starts its thinking that
to develop a modal of law as per the basis of UNICITRAL. Furthermore, policy makers should
look for the guidance from the international law and international policy forum. Therefore, in it a
comprehensive and analysis approach of the government development particular with the case of
the security, online transaction and data safety. The implementing of these policies and action
plans are crucial and beneficial that how the safeguard the individual and collective data and
boosting the e-commerce business14.
14
National Information Technology Policy and Action Plan, 2000
15
Electronic Transactions Ordinance, 2002
19 | P a g e
also hampered the progress of the person and community. The effectiveness of this act is vague
it means that it would define the definition into too broad scope or difficult to understand the true
sense without the presence of the technical expert. This act has been repealed in 2016 16.
For the matter of jurisdiction, PECA provide cybercrimes committed within the domain of
Pakistan regardless of the location of the criminal. The authorities have the full jurisdiction for
the prosecution and investigation18.
1. Child pornography
2. Cyber warfare
3. Cyber laundering
4. Unauthorized access
5. Phishing
6. Hate speech
16
The Electronic Crimes Act, 2004
17
What is: The Prevention of Electronic Crimes Act (PECA) (lawyersofpakistan.com).
18
ibid
20 | P a g e
7. Religious related ill speeches
8. Data espionage
9. Cyber terrorism
10. Illegal interception
11. Misuse of devices
12. Hacking
13. Pornographic material
14. Spam and related offence, etc.
a) Investment of time
While investigation there need a lot of time to cover the case properly. Even if the crime has
been done within Pakistan then court has to invest a lot of time to cover the offence. In
traditional crime, wrongdoer has been arrested by the investigating agency but in cybercrime
investigating agency required a lot of time to cover it and mostly the result has not been
positive19. Since most of the cybercrime has been done outside of the Pakistan therefore, the
19
The Challenges of Cybercrime Investigations and Prosecution – INSTITUTE OF ICT PROFESSIONALS GHANA
(iipgh.org)
21 | P a g e
phenomena of the tracing are to be difficult to arrest the criminal. However, it can be arrested
with the help of the Interpol, through a under branch of FIA, therefor, the whole procedure
required a lot of time to catch the cybercriminal.
d) Fear in Victim
Cybercrime victims are often under the threat that, the current cyber-attack has not been decoded
and traced by the law and enforcing agencies, another may be happened. Therefore, another may
be happened so they are under that sort of fear. The swift working of the law and enforcing
agencies if done then this thing would no longer. It is very often that criminal does not wanted to
put a complaint against the wrong doer because victim is already suffered if he did not fulfill the
requirement of the hacker the more he suffered.
20
Digital Forensics in Cyber Security—Recent Trends, Threats, and Opportunities | IntechOpen
22 | P a g e
a) AI( Artificial Intelligence) and MI( Machine Learning)
With the advent of the AI and MI, the speed, accuracy, frequency and exactness to the attack on
any system has been on the peak. Through this advancement a clear discrepancy has been
emerged. These systems utilized by the law and enforcing agencies and as well as attacker. The
law and enforcing agency to catch and arrest the cyber offender and the attacker used they won’t
catch by the agency at all21. Therefore, utilizing the advance system cybercriminal are not under
the domain of the law and enforcement agencies, the particular reason for the circumstances it
that they who not want any evidence against them.
d) Internet of things
Internet of things revolutionaries the way of living, the way we interact the technology on daily
basis, connecting everyday object to enhance the contribution of the conversation. The
proliferation of IoT also increased the risk of cyber security and the devices have been lacked of
the robust security protection. The phenomena of the IoT have been expanding in the nature. All
is needed that it would be mended by the strong security processes.
21
Technological developments and the future of cybercrime | RAND.
22
ibid
23
Ibid
23 | P a g e
All and all, the advancement in the technology made the huge set of problem and in which one of
them is the threat to the traditionally collection of the evidence procedure.
The internet and social media platforms are mostly used by extremist groups and radical
elements to advertise their ideologies, recruit followers, and incite violence. The way to deal
with the issue of online extremism is to use a multifaceted approach which includes the creation
of counter-narratives, content moderation, and the cooperation of government agencies, tech
companies and civil society organizations.
24 | P a g e
3.7. Data Privacy Concerns
The growth of the digital services and online transactions has led to data privacy and
protection issues in Pakistan. The lack of proper data protection laws and enforcement
mechanisms lead to the exposure of individuals to the threat of personal information misuse, data
breaches and privacy violations by both state and non-state actors.
The tackling of these cybercrime-related issues in Pakistan involves a joint effort from the
government agencies, law enforcement agencies, the private sector, the civil society
organizations, and the population in general24. The improvement of cyber security infrastructure,
the amendment of legal frameworks, the spread of cyber awareness, the increase of law
enforcement capacity, and the strengthening of international cooperation are the basic steps
towards constructing a safe and secure cyberspace in Pakistan.
3.9. Hacking
An unauthorized access of the data and with the intent to harm such data is known as hacking. In
Hacking a person using any computer or any address hacked the device or computer of the other
person. It is a huge problem for everyone whom has a digital account or site that contains most
important data. There has been three types of hackers namely, dark hacker, white hacker and
gray hackers,. The lethal hackers are the dark or black hacker these are the bad guys who is
responsible for the whole hacking. The white hacker is the anti of the dark hacker. They
deescalate the attack of the dark hacker. The gray hackers are the in between of white and dark
hat hacker, they generally hacked the system but they do not used the hacking material with
24
Ibid
25
12 social media threats to watch for in 2024 - Norton
25 | P a g e
intent to harm other. Hacking is not always a malicious act however, when hacker breached the
crucial information and used it for some gain and loss it would be included in the crime 26.
Complainant established a contact with Haya Misha Michele through the Facebook who
declared herself a manager of the USA bank and counted a false story of a person name Abbas
who had been deposited about 19,000,000$ in the bank and eventually dead without the hire,
therefore in order to seek this amount of money petionier should pay the custom and other
related chargers, Complainant paid it through the bank Ai-Islame round about 28 lacks and from
Meezan Bank he paid approximately 11 lack to the present petionier Ginika and peter. Then the
phone of the cyber offender has been switched off. The petionier were arrested by the FIA and
their mobile data has been checked by the officer and he was in the contact with the
cybercriminal.
Decision
Initially the above offence tried under PPC and PECA act jointly. later, court denounced it that
these would be run separately because off the section 26 of the general clauses act that if the
offence failing under the definition of two different laws then it should be tried separately. It was
the well settled plan for the complainant that he plunged into it and entangled in it like a bird in
26
https://www.fortinet.com/resources/cyberglossary/what-is-hacking
27
2022 P.Cr.LJ 203
26 | P a g e
the net. This is done quite handsomely that they do not give complainant a time to think about it.
So, court pronounced each offender a punishment of three years and a reasonable fine.
This case is in the form of write petition under article 199 the constitution. Petionier was a
female artist and her efforts are internationally recognized. Petionier alleged the respondent
Number 5 Mr.Ali Zafar a popular singer of Pakistan. She alleged him that on the certain
workplace respondent wanted her body access on the work place. She twitted this and be the part
of the campaign named #Meetoo movement. Later she filed a comlaint against the respondent
under the harassment of Women at work Place act 2010.
Decision
Court observed the maintainability of the petition in the court when this question resolved then
court determine that is it freedom of speech which is written in the constitution under article 19.
Court also observed there was a section i.e. 20 of PECA written in the petition. Court determine
the whole jurisdiction of the freedom of speech and reach the conclusion that the allegation
which she filed has been baseless and these are not covered under the article 19 of the
constitution but it is restriction. Freedom is necessary for the maintaining of the society but not
those who infringe the respect of the innocent and characterful person of the society. In this case
court observed that while using the online expression platform nobody should use or allegation
on the other member off the person. This case is important with regard to the online cyber
harassment and it’s provable.
In this case a women launched a complaint in the Cyber wing of the FIA branch Abbottabad,
against two person named Fakahr Zaman S/O Rukhan Zaman and Aziz-Ur- Rahamn. The first
28
PLD 2022 Lhr 773
29
2023 PCr.LJ 493
27 | P a g e
petionier filed a pre-arrest bail from the session court of Abbottabad and his application was
rejected under section 21, 22, 23 of the PECA 2016.
Decision
The court observed that the data recover from the mobile phone of the petitioner contains the
nude pictures and the nude video and more phatic is that the same had sent to the complainant’s
husband who is earning the money in abroad for his family. The complainant also said that she
was being blackmailed and entice for the sex. This is to grave for the court when the report of the
FIA cyber wing. Court order to quash all the material by a young Sub-inspector of FIA and
initiated the trial process to the petitioner and frame the charges against him.
All the above cases are the important because it insisted that the use of social media careful and
with diligent. All the decision of the different courts observed that there were certain cyber
harassment and, cyber harassment and cyber fraud.
4. Recommendations
The growing threats of cybercrime have enough capacity to damage any system of the
government. Here are the crucial recommendations to minimize the threats of cybercrime in
Pakistan.
28 | P a g e
4.2 Establishment of Special Courts
The cybercrimes are the modern crimes. The ordinary courts deals with the ordinary crimes. The
special courts are established, so that the procedure of the trial in the court smoothly done. In
Pakistan, there have been instances of the special courts, like, banking courts, consumer courts
and anti-terrorism courts. Therefore, establishing of special courts can be proved helpful
evidence relating loopholes that set by hackers or cyber criminals.
They are also being helpful to measure the security requirements of the organization and
individual, there has been 270 methods to handle the attack of the cybercriminal. Any ethical
hacker appointment proved beneficial that it does not allowed any internal and external security
breach occurs.
30
https://www.crime-research.org/interviews/Catching-Cyber-Criminals/
31
https://www.businesstechweekly.com/cybersecurity/network-security/ethical-hacking/
29 | P a g e
4.6. Using updated devices or software
Internet becomes a crucial part of our life. We used internet for different purposes and aims, one
of the main reason of the of being a victim of the cyber-attack utilizing the non-updated software
and devices, the issue is that these software are easily trace able. Therefore, in order to halt the
cyber-attack one must Using the updated software and updated devices can be helpful for
minimizing the threats of cyber-attack and any other problem that is related to the cybercrime 32.
Conclusion
Cybercrime and related offences are observed by Pakistan Now-a-days. The enigmas of the
cybercrime can be handled by the doing the different means and method of the solution. The
curse of the cybercrime can be handled with the right dealing of the criminal prosecution,
development of cyber units and appointment of white hat hacker. The exciting laws are the
wonderful solution of the crimes but somehow loopholes in they are also exciting there. As the
technological advancement began then there have been likely chances of threats of cyber-attack
on the sovereignty of Pakistan. By fostering the collaboration with the private, NGOs and
International bodies there has been likely chances to solve the problem of the cyber-attack in
Pakistan and they also helped Pakistan to remove the threats of these attack. In order to halt the
supply of the cybercrime there is a dire need to aware public, appointment of white hat hacker or
data analysis’s and maintaining the special courts to solved the cybercrime.
In addition, there is a critical need to curb the growing menace of the cybercrime in Pakistan.
Investing in cyber building awareness programs can be proved beneficial for solution of that
problem. The appointment of white hat hacker can also play a significant role to cope the
problem of the cybercrimes in Pakistan. Ergo, cybercrime is a bare threat to Pakistan, the dire
need to counter these threats with strong hands so that the
32
https://www.fortinet.com/resources/cyberglossary/what-is-hacking
30 | P a g e
Moreover, the phenomena of hacking is the live threats for the developing countries like
Pakistan, cause hacker used different sort of devices the enabled them to be more secured to
commit a crime in essay ways. There is dire need to regulate the technologies and boost the
development in it so that the vary and updating nature of the crime can be controlled. All in all
the problem of the crime regardless of its nature can destroy the fabric of the society.
In nut shell, cybercrimes in the developing countries like Pakistan creates unresting situation in
the people of it. With the advancement in the technologies the advancement of the cybercrime
occurs and it is also difficult to trace out the criminals because they have also more advanced
technology. Therefore, to develop a comprehensive and advancement must be adopted in the
legislation in Pakistan
References
1. Prashant Mali, A Text Book of Cybercrime and Penalties (Indiana: Repressed Publishing
LLC, 2006).
2. Digital Forensics in Cyber Security—Recent Trends, Threats, and Opportunities |
IntechOpen
3. Allia Bukhari, 'Silent Battles: How Pakistani Women Counter Harassment in
Cyberspace' The Diplomat (21 October 2020) accessed 17 March 2021.
4. Technological developments and the future of cybercrime | RAND.
5. Identity Theft and Social Media Shareen Irshad and Tariq Rahim Soomro.
31 | P a g e
7. https://www.ekransystem.com/en/blog/insider-data-theft-definition
8. PLD 2022 Lhr 773
9. 12 social media threats to watch for in 2024 - Norton
10. 2022 P.Cr.LJ 203
11. The Challenges of Cybercrime Investigations and Prosecution – INSTITUTE OF ICT
PROFESSIONALS GHANA (iipgh.org)
12. What is: The Prevention of Electronic Crimes Act (PECA) (lawyersofpakistan.com)?
13. The Pakistan Telecommunications (Re-organization) Act, 1996
14. The Electronic Crimes Act, 2004.
15. Electronic Transactions Ordinance, 2002.
16. National Information Technology Policy and Action Plan, 2000
17. Daanika Kamal, “Policing Cybercrime: A Comparative Analysis of the Prevention of
Electronic Crimes Bill,” Jinnah Institute, Policy Brief, January 18, 2017, 3-8.
18. Prevalence of cyber bullying victimization among Pakistani Youth Author links open
overlay panel Sumera Saleem et al.
19. https://cybernews.com/editorial/the-good-the-bad-and-the-ugly-of-deepfakes-explained/
20. https://www.crime-research.org/interviews/Catching-Cyber-Criminals/
21. Binder JF, Kenyon J. Terrorism and the internet: How dangerous is online
radicalization? Front Psychol. 2022 Oct 13; 13:997390. doi:
10.3389/fpsyg.2022.997390. PMID: 36312087; PMCID: PMC9606324.
22. https://www.ekransystem.com/en/blog/insider-data-theft-definition
23. https://consumer.ftc.gov/articles/what-know-about-identity-theft
24. https://www.exabeam.com/information-security/ethical-hacking/
25. https://www.cloudflare.com/learning/ddos/glossary/denial-of-service/
26. https://propakistani.pk/2021/08/23/heres-a-recap-of-major-recent-cyber-attacks-in-
pakistan/
27. https://www.fortinet.com/resources/cyberglossary/insider-threats
28. https://propakistani.pk/2021/08/23/heres-a-recap-of-major-recent-cyber-attacks-in-
pakistan/
29. https://www.thenews.com.pk/print/1172748-jit-report-confirms-theft-of-2-7m-
pakistanis-info-from-nadra-database
32 | P a g e
33 | P a g e