CATEGORIES OF CYBERCRIMES, CYBERCRIMES LAWS IN PAKISTAN, TYPES OF CYBERCRIMINALS,PROCEDURE, PUNISHMENT, THE ROLE OF CYBERCRIME IAW

 


CYBERCRIME

INTRODUCTION:

Cybercrime is the offenses that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim directly or indirectly, using modern telecommunication networks such as the internet ( chat rooms, email, notice boards, and groups) and mobile phone (SMS/MMS)

Cybercriminals use computer technology to access personal information, business trade secrets or use the internet for exploitive or malicious purposes. They use computers for communication and document or data storage.

Causing monetary damage in billions of US dollars to the world economy, cybercrime is now one of the major global concerns.

with the rapidly increasing rate of internet penetration, the authorities have started to take necessary measures to keep people and their data safe in the online world. The more people rely on online services in the world, the more they become susceptible to internet crimes.

In this blog, we will learn about different categories of cybercriminal activities and cybercrime laws.

CATEGORIES OF CYBERCRIMES

I. Haking

It is a type of cybercrime in which unauthorized access is gained to data in a system or computer.

II. Identity theft

It is the deliberate use of someone else's identity. The term identity theft was first used in 1964.

III. Cyberbullying

It is also known as online bullying, cyberbullying, or is a form of harassment or bullying done using electronic means.

IV. Cyberstalking

It is the use of the internet to stalk or harass someone. It involves false accusations and defamation.

V.Spoofing

It is a trick in which hackers deceived computer systems to gain illegitimate advantages and steal data from personal networks or websites.

VI. Financial fraud

It is when someone steals money or deprives others of their assets through online means.

VII. Digital piracy

It is also known as online piracy, it involves the practice of illegally downloading and distributing digital copyrighted content

VIII. Computer viruses and worms

They are types of malware computer programs that replicate themselves to spread and infect computer systems.

XI. Malicious software

Software designed by cybercriminals to intentionally cause damage to the server, computer, client, or network.

X. Money laundering 

IT involves the use of the internet to launder money through different online payment systems.

XI. Denial of service attack( DOS attack)

Cyberattack to disrupt the targeted server and its traffic. It makes a network resource or machine unavailable to the intended users.

XII. Electronic terrorism

It is also known as cyberterrorism, electronic terrorism involves the use of the internet for violent acts. It involves potentially threatening someone or achieving ideological or political gains.

XIII. Vandalism

It is the action that involves the deliberate damage and destruction of your online material. It may also involve the modification of the online content on your website without your permission.


CYBERCRIMES LAWS IN PAKISTAN:

There are three cybercrimes laws in Pakistan, these laws deal with different categories of internet crimes in Pakistan, these are listed as under

i. Electronic Transaction Ordinance (ETO) 2002

ii. Electronic / Cyber Crime Bill 2007

iii. Prevention of Electronic Crimes Act (PECA) 2016

TYPES OF CYBERCRIMINALS:

There are seven major types of cybercriminals

1. Script Kiddies

2. Phishers 

3. Scammers 

4. Political/ religious/ commercial groups

5. Insiders

6. Hacker groups

7. Advanced Persistent Threat Agents

INQUIRY CONDUCTED BY FIA:

Federal Investigating agency has started inquiries for actions which by no stretch of the imagination can be termed as offenses under PECA

WHAT IS THE PROCEDURE OF CYBERCRIME?

First of all to file a written complaint with the cybercrime cell of any jurisdiction. The written complaint must be consist of name, contact details, and address for mailing. Complaint address to the Head of the cybercrime cell of the city where you are filing the cybercrime complaint.

PUNISHMENT FOR CYBERCRIMES:

The punishments under these provisions are different based upon the gravity of the committed cybercrime.

HOW CAN GET BAIL IN CYBERCRIME?

Anticipatory Bail in an IT Act 2000 (cyber law) case is bailable that is applied for prior to one's arrest or detention by authority, but in anticipation of section 438 of the criminal procedure, code prescribed that a person may apply to an appropriate High Court or court of Sessions.

THE ROLE OF CYBERCRIME IAW:

Cybercrime law identifies standers of acceptable behavior for data and communication technology (ICT) users; establishes socio-legal sanctions for cybercrime; protects ICT users, in general, and mitigates and/ or prevents damage to folks, data, systems, services, and infrastructure, in particular; protects human rights; allows the investigation and prosecution of crimes committed online; and facilitates cooperation between countries on criminal matters.

Cybercrime law provides rules of conduct and standers and connected digital technologies, and also the actions of behavior for the utilization of the web, computers, and connected digital technologies, and also the actions of the general public, government, and personal organizations; rules of proof and criminal procedure, and alternative criminal justice matters in cyberspace; and regulation to cut back risk and/or mitigate the damage done to people, organizations, and infrastructure ought to a crime occur. consequently, crime law includes substantive, procedural, and preventive law

SUBSTANTIV CYBERCRIME:

Substantive crime law includes laws that proscribe specific kinds of crime and penalize non-compliance with these laws.

Cybercrime includes ancient, real-world(offline) crimes e.g, Fraud, forgery, social group, concealing, and theft.

PROCEDURAL CRIMINAL LAW:

Procedural law demarcates the processes and procedures to be followed to use substantive law and rules to alter the social control of substantive law. An important part of procedural law may be a criminal procedure, which has comprehensive rules and pointers on the style within which suspected, accused, and processed by the criminal justice system and its agents. Procedural crime law includes provisions on jurisdiction and investigation powers, rules of proof, and criminal procedures that relate to information assortment, wiretapping, search and seizure, information preservation, and information retention. A governmental entity might need the revelation by a supplier of transmission sturdy in associate degree electronic communications system for 100 eighty days or less, solely consistent to a warrant issued mistreatment the procedures delineated within the Federal Rules of Criminal procedure by a court of competent jurisdiction.

PREVENTIVE CRIMINAL LAW:

Preventive law focuses on regulation and risk mitigation. within the context of crime, forestalling legislation seeks to either prevent crime or, at the terribly least, mitigate the harm ensuing from the commission of a crime. Other laws alter criminal justice agents to spot, investigate, and prosecute crime by making certain the required tools, measures, and processes are in situ to facilitate these actions e.g, telecommunications and transmission service provider's infrastructure is specified it allows wiretapping and information preservation.


law and learning by Nasra ikram

I am an attorney in Pakistan, Practicing law since 2009 and M.A Political Science. I’m a dedicated and experienced lawyer offering my services to assist clients with drafting contracts, agreements, Will, Deed, Cease and Desist letter and others with understanding of complexities of legal requirements, intellectual property, review documents and legal consultation on all types of litigations i.e. Family, Civil, Banking and others I'm also freelancer at Upwork and Fiverr My others skills are: I. Content Writing II. Website Development III. Graphic Designing IV. Virtual Assistance V. Ecommerce VI. WordPress VII. Video Editing VIII. Autocade I'm also tutor and teaches LLB all subjects.

Post a Comment

Previous Post Next Post