Quaid-e-Azam Law College Lahore
LLB-I
Cyber Space Laws
Mr. Salman Ahmed
LLM UK
INTRODUCTION TO CYBER LAW:
Definitions:
Cyber law: it is a term to describe a law that deals with issues related to internet, technological and
electronic elements, communication technology, including computers, software, hardware, and
information systems.
Cybercrime: It is a generic term which refers to all criminal activities one using the medium of
communication technology components, the internet, cyber space, and the world wide web.
Cyber: virtual reality Cybercrime: technology based crime
Categories of cyber law:
1. Using a computer to target other e.g., hacking, virus attacking etc.
2. Using computer to commit crime e.g., online fraud, cyber terrorism etc.
Importance of cyber law:
Cyber law is concerned with every individual these days. This is primarily because we all use
internet in some or other form daily. Internet is used when we create an account online,
while performing e-commerce transactions, net banking, for email etc.
Cyber law is important because it touches almost all aspects of transaction and activities on
and concerning with the internet, the world wide web and cyber space.
Cyber law protects every individual from getting trapped in any cyber violations.
Scope of cyber law in Pakistan:
There is tremendous scope of cyber law in Pakistan as the number of activities through
internet is no increase with the changing time, the requirements for cyber laws and their
applications is gathering momentum.
What is technology? (a Greek word/combination of two words)
Techne + Logos
Art, craft, or skill To speak off
Technology means tools, techniques, and sources of power to make life easier or more
pleasant and work more productively.
Cyber Jurisprudence:
It is the study of law which are directly related to cybercrimes. Cyber jurisprudence also describes
the principles of legal issues which exclusively the cyber space and internet.
Cyber: virtual reality Jurisprudence: Derived from the Latin word Juris + Prudentia
Cyber space: Virtual computer world, electronic medium that is used to facilitate online
communication, allows us to share information, interact, play games etc.
Communication technology: Also known as IT, refers to all the equipment and programs that are
used to process, secure, and communicate information such as email, fax, telegraph, messages etc.
Technology based crimes: Also called the cyber-crimes, includes fraud, trafficking, child
pornography, intellectual property violations, privacy violations. Crimes committed with the use of
computers, electronic devices, or the information technology devices.
Types of Cyber Crimes:
1. Hate speech: Whoever prepares or disseminates information, through any information
system or device, that advances or is likely to advance interfaith, sectarian, or racial hatred.
2. Advance Fee Fraud: It is the kind of Cyber-crime where advance fee deducted fraudulently
from customer in other words advance fee is actually a kind of lottery scam which begins
with an unexpected email notification.
3. Bank Fraud: A kind of cyber-crime where an employee of bank send emails to their clients
for sharing of their personal information such as Credit Cards and Debit Cards information,
which he uses for his personal benefit including unauthorized purchases and cause loss to
the client for his trust upon the bank employee.
4. Cyber Defamation: A kind of cyber-crime where someone use the electronic media to
defame the reputation of a person.
5. Cyber Pornography: A kind of Cyber-crime where by using to cyber space to expose,
circulate, initiate assign, introduce or advertise pornography or indecent items. In simple
words cyber pornography means the publishing, distributing, or designing pornography by
using cyber space.
6. Cyber stalking: A kind of cyber-crime where a person harass or involve the person in false
accusation, and defame the person using of the Internet, e-mail, or other electronic
communications devices to stalk another person.
7. Cyber terrorism: A kind of cyber-crime where some wrong doer using electronic system
perform illegal act, violent act, threatening to someone or some class of persons for the
purpose to achieving different political or anti-social gains.
8. Data Diddling: A cybercrime where a person intentionally enters wrong information
into a computer, system, or document/e-documents. It is often used when
businesses and individuals want to hide part of their profits for tax evasion purposes.
It could also be used to fabricate the average order value or the number of sales. Data
diddling refers to compromising raw data at the entry point.
9. Denial of Service Attack: A kind of cyber-attack which prevents a computer user or owners
access to services available on his system.
10. Digital Piracy: It is a kind of cyber-crime where someone does online piracy it consist of
illegal downloading and distributing digital copy right content of registered material etc.
11. Email Bombing: it is a kind of cyber-crime which means sending a large number of emails to
the victim resulting in victim’s email account or mail servers crashing.
In simple words, email bombing is flooding an inbox and mail server with messages.
12. Web Spoofing: It is a scam where cyber criminals create a website that closely resembles a
trusted brand as well as a domain that is virtually identical to a brand's web domain. The
goal of website spoofing is to lure a brand's customers, suppliers, partners, and employees
to a fraudulent website and convince them to share sensitive information like login
credentials, Social Security numbers, credit card information or bank account numbers.
13. Fake Social Media Accounts: These accounts are those which are created by original persons
but used by unauthorized person for the purpose to getting fame and cheating public at
large or accounts created by imposters to defame a person.
14. Fake Websites: Fake websites are those which are identical to original ones, but it involves
manipulating the domain name system to take unsuspecting victims to fake websites. The
browser reaches some fake website, rather than original website.
15. Financial Crimes: A cyber-crime which may also include hacking into bank server, cyber
cheating, money laundering, debit and credit card frauds and accounting scams etc.
16. Forgery: It is a kind of cyber-crime where the criminals use the computer and IT devices to
forge documents, currency notes, academic certificates, medical certificate, electronic
records, bank records, financial institution records, company records, institution records,
postage and revenue stamps and other government and private records by using computer,
scanners, and printers.
17. Identity Theft: It is a kind of cyber-crime where unauthorized person deliberately use
someone else’s identity for the purpose of defaming someone or cheating public at large.
Identity theft occurs when somebody uses another person’s identifying information, like
name, social security number, or credit card number without permission and commits fraud
or other crimes. It deprives the real owner from his valuable interests.
18. Online Gambling: There are many websites which offer online based gambling. In some
countries it is permissible while in other countries it is prohibited. The issues arises when a
person residing in a country where gambling is illegal and gambles on such website.
19. Salami Attacks: Salami is “In banking, a fraud that involves taking all of the round-down
fractional cents from periodic interest payments and crediting them to a single account”.
20. Sale of illegal articles: Through the internet it is common to find illegal articles on just a click,
i.e., narcotics drugs, weapons and other article’s information is posted on websites, from
where people get information and buy illegal products.
21. Trojans and key-loggers: In simple words a Trojan is “an unauthorized program which
functions from inside what seems to be an authorized program, thereby concealing what it is
actually doing”. Common types of Trojans are Remote Administration Trojans (RATs),
Password Trojans.
22. Virus Attacks: Small software programs that are designed to spread from one computer to
another and to interfere with computer operations. These are mostly spread by attachments
in e-mail messages, instant messaging messages, attachments of funny images, greeting
cards, and audio and video files. These can also spread through downloads on the Internet,
where they are hidden in illicit software or other files or programs.
23. Web Defacement: Substitution of the original home page of a website with another page
(usually pornographic or defamatory in nature) by a hacker. Governments and religious sites
are mostly targeted by the hackers to display their political and religious beliefs respectively,
in addition to disturbing images and offensive phrases. Moreover, the financial websites are
also hacked to gain financial benefits and to hack the personal data of clients/consumers.
Sometimes the hacker hacks websites just for fun.
24. Web Jacking: It is when attackers illegally gain control of an organization’s or individual’s
website. The hackers implant a fake website, which, when you open it, takes you to another
fraudulent website, where the attackers try to extract sensitive information.
25. Hacking: A kind of cyber-crime where unauthorized person get access in a data system or
any electronic system for his illegal benefit.
26. Cyber Bullying: It is bullying that takes place over digital devices like cell phones, computers,
and tablets. Cyberbullying can occur through SMS, Text, and apps, or online in social media,
forums, or gaming where people can view, participate in, or share content. Cyberbullying
includes sending, posting, or sharing negative, harmful, false, or mean content about
someone else. It can include sharing personal or private information about someone else
causing embarrassment or humiliation. Some cyberbullying crosses the line into unlawful or
criminal behavior.
27. Malware: It is a kind of cyber-crime where person designs a software to intentionally
damage any electronic system.
28. Money Laundering: It is a kind of cyber-crime where criminal use electronic devices for the
purpose of money laundering through different online payment system.
Procedure of F.I.A in cyber-crimes:
The Government of Pakistan has established a department “National Response Center for Cyber
Crime” under the control of Federal Investigation Agency (FIA), which is responsible for all matters
concerning cyber-crimes, to investigate, trace the criminals and stop misuse of the internet.
Section 25 of PECO 2007: Establishment of investigation agencies and prosecution.- The Federal
Government shall establish a specialized investigation and prosecution cell within Federal
Investigation Agency to investigate and prosecute the offences under this Ordinance
NR3Cs primary function is to deal with technology based crimes in Pakistan. This is the only unit
which directly receives complaints and assist other law enforcement agencies in cyber-crimes.
Complaint Mechanism:
Online:
Follow the below detailed procedure for reporting an offence to FIA Cyber Crime Wing in Pakistan, if
you are a victim of any one or more offences mentioned above:
Register a complaint online by accessing the link: (http://www.nr3c.gov.pk/creport.php)
You can also register a complaint via email at (
[email protected]).
Complaint must state you name, address, CNIC No. with all possible details of the act that
you want to report and name of the person or URL/link of profile through which cybercrime
offence is being committed in Pakistan.
You can also Register Complaint in person against Cyber Crimes by making hard-copy applic-
ation to nearest FIA Cyber Crime Station or by mailing it to Director NR3C-FIA.
Written:
It is important that you write your complaint with full details of the cybercrime offence in Pakistan.
Complaint can be made both in English and Urdu, but it must be accompanied with all the evidence.
Section 3 of Federal Investigation Agency Act 1974 and the schedule Item No. 27, Offences
punishable under the Prevention of Electronic Crimes Ordinance 2007.