Documente Academic
Documente Profesional
Documente Cultură
Crimes
Syed Shahid Hassan
Deputy Director
Cyber Crimes Circle
FIA Punjab Lahore
Sequence
Introduction
About National Response Centre for
Cyber Crimes (NR3C), FIA
Cyber Crime Laws in Pakistan
Categories of Cyber Crimes
Explanation of each category using
definition of Crime with Examples.
How Law Enforcement Agencies track
Cyber Criminals
2
About NR3C
National Response Centre for Cyber Crimes
(NR3C) is a Public Sector Development Project
(PSDP).
National Response Centre for Cyber Crimes
(NR3C) was established in Year-2007 (August
2007).
Responsible for enforcement of Electronic/Cyber
Crime laws in Pakistan.
Currently there are five notified cyber crime
police stations located
at Lahore, Karachi,
Peshawar, Quetta and Rawalpindi/Islamabad.
Notified Digital Forensic Laboratories.
Notified Special Public Prosecutors.
Cyber Pakistan
Laws
The
in Pakistan
Telecommunication
of
Electronic
Crimes
Ordinance
Current Status
of
Cyber Crime Legislation in
Pakistan
Prevention of Electronic Crimes Ordinance (PECO) is ineffective
since 7th Nov, 2009.
Cyber Stalking
Cyber Stalking
General Definition:
Cyberstalkingis the use of theInternetor other
electronic means tostalkor harass an
individual, a group of individuals, or an
organization. It may include false accusations,
monitoring, making threats, identity theft,
impersonation, damage to data or equipment,
indecent proposal, or gathering information in
order to harass.
Social Networks
10
11
15
16
Lottery Scams
The people who receive the scam emails and fall
for them are asked to make advance payments in
the following heads one after another.
18
Phishing
Con artists might send millions of fraudulent email messages that appear to come from Web
sites you trust, like your bank or credit card
company, and request that you provide personal
information.
20
21
22
23
24
Hacking
25
Hacking
Generic Definition:
Illegal access into another party's
computer or Internet site carried out
for malevolent or fraudulent
purposes or to make unauthorised
amendments or just for fun
(Computers);
26
Hacking
Legal Definition:
Section 36 & 37 of ETO 2002 Covers
Hacking.
(The punishment for Hacking is
imprisonment up to 7 Years or Fine
not exceeding 1 Million rupees or
both).
27
Hacking
Section 36 of ETO 2002 defines Hacking under head
Violation of Privacy of information:
Any person who gains or attempts to gain access to any
information system with or without intent to acquire the
information contained therein or to gain knowledge of such
information, whether or not he is aware of the nature or
contents of such information, when he is not authorised to
gain access, as aforesaid, shall be guilty of an offence
under this Ordinance punishable with either description of a
term not exceeding seven years, or fine which may extend
to one million rupees, or with both.
28
Examples of Hacking
Breaking in to Universitys information
system to steal or alter information.
Hacking Email Accounts
Website Defacement
Stealing or altering any information from
any information system by any means.
Stealing information from information
system also includes looking over the
shoulder when you are not authorised.
Breaking in to Banks information system
to add/change the amount in your Bank
account.
29
System Damage
30
ATM
Skimmer
Device
32
Magnetic
Stripe Read &
Writer (MSRW)
Device
34
Keyloggers
A keylogger can be either specialized
hardware fitted to a keyboard or
keyboard cable or a software
program. Keyloggers are used to
record and log each and every
keystroke on a personal computer.
35
Types of Keyloggers
Generally, there are two types of
Keyloggers:
1. Software Based Keyloggers
2. Hardware Based Keyloggers
36
Hardware Based
Keylogger
37
Hardware Based
Keyloggers
38
Hardware Based
Keyloggers
USB Based
Keyloggers
National Response Centre for
Cyber Crimes, FIA
39
Hardware Based
Keylogger
Before
National Response Centre for
Cyber Crimes, FIA
After
40
Hardware Based
Keylogger
41
Software Based
Keylogger
Typical Features:
Keystroke recording
Screen Shots (e.g. on every mouse
click, after every 5 mins)
Username & Password Monitoring
Chat monitoring (MSN, Yahoo, ICQ,
AOL, etc)
Sending monitored data to remote
FTP server or email address.
National Response Centre for
Cyber Crimes, FIA
42
Other Categories
Obscene calls
Obscene SMS
Threatening calls
Threatening SMS
Malicious code (Computer virus,
Worm, Trojan Horse, Root Kit, Botnet,
Sypware, Malware)
46
Malicious code
How do
52