Functions of Anti Corruption Wing

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 40

Section4

Anti Corruption Wing


The Anti-Corruption and Economic Crime Wing of FIA transferred to National Accountability Bureau
(NAB) on 16.08.2004 have been restored vide notification dated 24.10.2008.

The Anti Corruption Wing is an important part of FIA, which deals with organized crimes other than
terrorism and human trafficking. This wing is headed by a senior police officer as Additional Director
General at the HQ who is responsible for assisting the Director General and coordinating operations
of the zonal directors.

Functions of Anti Corruption Wing

 Anti-Corruption
 Spurious Drugs
 Counterfeit Currencies
 PPC and other Special Laws
 Important Cases of ACW

Spurious Drugs
The illicit trade of production/ supply, distribution, and sale of drugs are posing a serious threat to the
lives of the innocent citizens and has serious ramifications such as:

 Loss of Government revenue/ tax evasion


 Undermines Government health agendas and regulatory regimes
 Undermines legitimate trade and commerce
 Defrauds the consumers and health industry
 Erodes corporate investment and productivity
 Encourages organized crime

FIA’s crime wing has taken up the challenge to eradicate the illicit trade in drugs and has recovered
spurious drugs valuing over Rs.416 million and seized eight illegal manufacturing units. Special drug
units have been established in the provincial headquarters. The FIA has registered 67 cases in the
years 2005 & 2006.

Counterfeit Currencies
The increasing instances of counterfeiting of currency in various parts of the country hold serious
repercussions for the national economy. FIA crime wing is responsible to deal with the currency
counterfeiting. A task force is working led by the Governor, State Bank of Pakistan and the FIA is a
member thereof. The FIA is maintaining a database of all the culprits of counterfeit currency cases
across the country. The FIA coordinates with the provincial/ local law enforcement agencies in cases
registered in their jurisdictions.

Important Cases of ACW


OPERATION FURNACE – Electricity Theft

 On receipt of source information regarding electricity theft by Maqsood Ahmed owner M/s
Aziz Steel Re-Rolling Mills, M.S. Road, Momin Pura, Daroghawal Lahore in connivance with
the employees of LESCO Shalimar Division Lahore, a team of FIA officials along with
technical expert Mr. Adnan Riaz Mir Manager Testing & Inspection LESCO Lahore raided
the above mentioned factory and on checking the meters installed were found dead stop
against a running load of 600 amperes. The owner was using the supply through direct
hooking methods by making hole in the supply lines and fixing the lines with the floor with
wooden clamps. Two air circuit breakers were installed to switch over the load to meter or
direct hooking
 The FIA Crime Circle Lahore registered a case and arrested the accused Maqsood Ahmed
on 12.06.2009. Crime Circle also recovered switching equipment used for theft of electricity
and amount of Rs. 3, 20, 000/- from accused Maqsood Ahmed during remand.
 Investigation is at final stage and shall be concluded within a fortnight

OPERATION DYPERON - Spurious Drugs

 An information was received on 12-06-09 at FIA Crime Circle Lahore that some persons are
involved in manufacturing, preparing, filling, selling and the distribution of Spurious Drugs. A
raid was conducted by the officials of FIA Crime Circle Lahore and as a result of raid
approximately 65000 empty ampoules labeled with “Dyperon “, three blocks of printing
screens and two Italian made ampoule manufacturing machines etc were recovered.
Shahzad Anjum owner and Hamid Ali Manager of Factory residents of Lahore were present
at the premises and did not have any plausible reply against the allegations of printing forged
labels / marks of drugs for using them as genuine. Hence both of them were arrested and
case was registered on 4/7/2009 u/s 420, 468, 471, 109 PPC in FIA Crime Circle,
Lahore.During investigation the accused Munir Ahmed recorded his confessional statement
U/S 164 CrPC.
 On receipt of Istighasa from Drug Inspector on 18.07.2009, relevant sections of Drug Act,
1976 have been added. Interim Challan was submitted in the Drug Court on 20.07.2009. the
accused are in judicial lock up. Post arrest bail has been adjourned for 22.07.2009 on
20.07.2009.
 Investigation is under progress to detect where the injections were being supplied.

Embezzlement of Rs. 60 Million from Edwards College Peshawar

 A case was registered on the complaint of Principal Edwards College Peshawar in PS East
Peshawar Cantt for the embezzlement of Rs. 60 Million in the accounts of the college against
Haroon Shahid, Asstt. Accountant Edwards College Peshawar Nimatullah and Ijaz.. Being
Federal employees the case was transferred to FIA Peshawar for investigation.
 FIA Crime Circle Peshawar registered the subject case and arrested the accused. All the
accused were tactfully interrogated by the FIA officials due to which accused Haroon Shahid
confessed his guilt before the court and the judicial magistrate recorded his statement U/S
164/364 CrPC. FIA Crime Circle also recovered the amount of Rs. 304,000/- and two
vehicles
 Further investigation is in progress.

Operation Sukuk
 This case was registered in FIA Crime Circle Lahore after enquiry against employees of
WAPDA officers/officials and others on the charges of misappropriation, forgery and
impersonation etc. The accused were found involved in the illegal transfer and sale of
WAPDA SUKUK BONDS valuing more than Rs. 190 Million. These bonds were originally
purchased by M/s National Fertilizer Corporation. The accused in connivance with one
another transferred the same to Swift Engineering Solutions, Lahore and later to Al-Meezan
Investment Management Ltd Karachi. The crime proceeds were withdrawn from branches of
MCB and HBL Main Market Gulberg Lahore.
 FIA Crime Circle Lahore arrested 8 accused persons out of 15 and recovered cash & prize
bonds of amounting to Rs. 2.525 Million during the house search of 2 accused persons
Muhammad Naqi Riaz (Mastermind) and Syed Riaz Hussain Shah . Total cash recoveries
amount to Rs. 9.8 Million. Properties purchased form crime proceeds valuing Rs. 17.5 Million
approximately have been recovered. Accused have been placed on Watch List. Help from
SOCA is being sought to apprehend accused Muhammad Naqi Riaz.
 Further investigation is in progress.

Raid Report

 Upon receipt of a complaint from Shakeel Ahmad s/o Lal Muhammad r/o Jalalpur Peer Wala
Distt. Multan that Muhammad Arif SDO MEPCO sub-Division Jalapur Peer Wala is
demanding Rs. 5000/- as illegal gratification to revise the detection bill of Rs. 23,600/- for
May 2009 of his tube-well connection, a raiding party of FIA under the supervision of a
Magistrate was constitute.
 FIA Crime Circle Multan conducted a raid and caught red-handed Muhammad Arif SDO
MEPCO (BPS-17) while receiving illegal gratification of Rs. 5000/- from complaint Shakeel
Ahmad. Case FIR No. 34/09 dated 19-06-2009 U/S 161 PPC R/W 5(2)47 PCA has been
registered in FIA Crime Circle Multan against Muhammad Arif SDO who has been arrested
in this case.
 Investigation is in progress.

Corruption in Utility Store

 It is to inform that an exemplary conviction has been awarded to accused waris s/o Ghulam
Hussain Incharge Utility Stores Corporation Johi, District Dadu, Sindh in case FIR No. 02/97
dated 23/02/1997, registered u/s 409 PPC 5(2) Act 1947 of FIA Sindh against him. He was
involved in misappropriation of stocks worth Rs. 2, 12,519/-. On 29/08/2009 the accused was
convicted and sentenced by the Honourable Court of Special Judge (Central) Hyderabad to
suffer R.I for 10 years and also to pay a fine of Rs. 3,00,000/-, in default of payment of fine
further S.I for 06 months.
 This is an exemplary conviction ever awarded to any accused in such cases

Anti HumanTrafficking Unit


Human Trafficking in person
Trafficking in persons is the acquisition of people by improper means such as force, fraud or
deception, with the aim of exploiting them. According to Trafficking in person Act,2018 Human
Trafficking in Persons is defined as, "Any person who recruits, harbors, transports, provide or obtain
another person, or attempts to do so, for compelled labor or commercial sex acts through the use of
force, fraud or coercion, commits an offence of trafficking in person ." Human trafficking provides
high monetary gains.It is the third largest source of organized crime revenue

Smuggling of migrants:
Smuggling of migrants involves the procurement for financial or other material benefit of illegal entry
of a person into a State of which that person is not a national or resident.According to the prevention
of smuggling of migrant Act,2018,Smuggling of migrant Act is defined as,"the facilitation, for
benefits,of illegal entry of another person who is a foreigner,into Pakistan or from Pakistan into a
country of which the person is not a national or a permanent resident,or is a citizen of Pakistan into
another country of which the person is not a national or a permanent resident."

Anti Human Smuggling (AHS) Directorate


Virtually every country in the world is affected by these crimes. The challenge for all countries, rich
and poor, is to target the criminals who exploit desperate people and to protect and assist victims of
trafficking and smuggled migrants, many of whom endure unimaginable hardships in their bid for a
better life.Being Human trafficking and Human smuggling is fastest growing international crime, so
there was a dire need of an Establishment/ Directorate in FIA which acts as liaison office between
the field offices of FIA in Pakistan and foreign link offices working on Human trafficking/Smuggling
and the FIA HQs Islamabad and MOI. Furthermore, this Directorate also interacts with national and
international organizations directly or through MOI and MOFA.For the said purpose,a separate Anti
Human Smuggling Directorate had been established inSeptember 2007, headed by Director BPS-
20.Anti-HumanSmuggling (AHS)is a directorate working under the Addl. D.G Immigration. The AHS
Wing, in coordination with all the Zones of FIA monitors the activities of Human Smugglers/ Agents
throughout Pakistan. Therefore, specialized teams have been formed in order to arrest the
absconders of human smugglers / traffickers in their concerned Zones / Anti Human Trafficking
Cells(AHTCs). The field units submit regular monthly and daily reports of the human smugglers to
AHS Directorate based on which an annual booklet of Most Wanted Human Traffickers/ smugglers is
compiled and the names of the smugglers are placed on Black List so that they are apprehended at
immigration entry and exit Points

Functions of AHS

 To curb the menace of Human Traffickers/Human Smuggling, by following the strategy i.e
Protection, prosecution, punishment, prevention and promotion.
 To Provide policies / guidelines to the field offices and circles to combat human trafficking
make sure its implementation through its field offices.
 Arrangement of special seminars and training programs for the capacity building of its field
staff.
 To monitor the performance of operational circles.
 To maintain a data base of Human Trafficking / Smuggling crime.
 To make analysis and research of the crime data in order to formulate policies accordingly.
 To share information related to Human Trafficking and Migrant Smuggling with the ministry of
interior, Senate, National Assembly, FIA Link offices and international organizations as an
active partner of world community against Human Trafficking.
 To maintain the record of most wanted Smugglers / Traffickers and Publication of Most
wanted Human Trafficker / Smugglers yearly Redbook. To maintain the record of most
wanted Smugglers / Traffickers and Publication of Most wanted Human Trafficker /
Smugglers yearly Redbook
 To monitor counter measures against Human Traffickers / Smugglers with the coordination
of other law enforcement Agencies.
 To process the complaints received to this directorate, through its operational circles and get
its feedback.
 To prevent and protect victims of Human Trafficking / Smuggling through apprehension of
Human trafficker/smugglers.
 Verification of Visas / Passports from concerned Embassies in order to stop travelling
through forged documents.

Measures to combat Human Trafficking/Smuggling


To control Human Trafficking the following measures have been taken by Government of Pakistan:-

 Establishment of Integrated Border Management System (IBMS) at all FIA Immigration


Check posts (Entry/ Exit points).IBMS is a national level system of critical nature and being
vital component to support FIA immigration to keep an eye on all incoming and outgoing
international travelers on the basis of FIA Act, 1974 and Foreigners Registration Act 1964.
Also part of National Action Plan to support Law Enforcement Agencies (LEAs) & Intelligence
Agencies (IAs) in fight against terrorism, illegal trafficking and over stay of foreign nationals
in Pakistan.
 Issuance of Computerized National Identity Card/National Identity Card for Overseas
Pakistanis / Pakistan origin card/ Family registration certificate by NADRA.
 Issuance of Machine Readable Passports (MRPs)
 Capacity Building of Immigration Staff
 Publication of Red Book of Most Wanted Human Traffickers/Smugglers (MWS/Ts) by FIA
every year for their apprehension.
 Case Management System (CMS) has been established for the computerization of crime
data and easy access to the desired information.
 Interception of Fake/ Forged/ Tempered travel document holders at Immigration check-posts
 Exit Control List (ECL) in order to stop the exit of Human traffickers/smugglers from Pakistan
 Passport Control/ Black-listing of lost or stolen passports.
 FIA prepares and plead the cases to INTERPOL to get the Red Warrants issued to
apprehend Human traffickers/Smugglers and extradite and deport them to the concerned
country.
 Forgery Detection Machines at International Airports
 Human intelligence.
 Offloading based on screening and information
 24/7 FIA Helpline for complaints and support
 Establishment of FIA link/ Liaison office in Sultanate of Oman, Spain, UK, Turkey, Malaysia
and Iran.
 Inter- Agency Task Force (IATF) has been established for the collection of intelligence and
sharing of information,to control Human Trafficking/ Smuggling. The task force comprises of
personnel from the FIA alongwith the Frontier Constabulary, Coast Guard, Balochistan
Police, Levies, Maritime security agency and ISI etc.

APPLICABLE LAWS
 Prevention of Trafficking in Persons Act 2018.
In order to combat the menace of human trafficking especially in respect of women and
children (victim), the law "Prevention of Trafficking in Person Act 2018" has been enacted
which says “Anyone who commits the offence of trafficking in person is liable to be punished
with imprisonment upto seven years or fine upto one million or with both. But if this offence is
committed in respect of women and children the punishment has been extended upto ten
years.”

 Prevention of Smuggling of Migrants, Act 2018.


“Whoever intentionally engages in or attempts to engage in the smuggling of migrants shall
be punished with imprisonment which may extend to five years but which shall not be less
than three years and with fine upto one million rupees”.

 Emigration Ordinance, 1979


 Federal Investigation Agency Act, 1974
 Passport Act 1974
 Foreigners Act, 1946

Transnational Crime Web


Human Trafficking/Migrant smuggling is an international crime which is multi-dimensional in nature.
In order to eliminate or curb this international crime web, a consolidated and well-coordinated effort
is required. This perpetual crime web needs to be monitored and unearth through joint efforts
starting from the origin of the victim through its transit route to the end of his final journey. So, it will
be fruitless and a futile attempt if a coordination gap exists between the departments within a country
or internationally agencies. Therefore, following departments play their respective roles with well-
developed coordination and cooperation

Cyber Crime Cell


In Human Trafficking / Smuggling, Internet is used as mode of communication so Cyber Crime Cell
intercepts the communication of Human Traffickers / Smugglers and takes action against them.

Anti-Money Laundering Cell


In Human Trafficking payments are mostly made through illegal channels i.e. Hundi/Hawala . So,this
Circle monitors illegal money transfers and suspected accounts.

Forged Documentation
The Human traffickers / smugglers mostly use forged documents to travel abroad.So, concerned
departments are being involved and taken into loop to adopt measures to avoid forgery of
documents and solid evidence collection

Anti-Human Smugglers / Trafficking Circle (AHTC).


AHTCs offices are equipped with the sole responsibility to curb the menace of Human smuggling
and Human trafficking. AHTCs have been established being an operational unit on ground. They
collect intelligence, conduct raids, investigate the cases and get them prosecuted in their respective
courts. Each AHTC is headed by an officer of Deputy Director (BS-18).

Interpol
Interpol issues Red notices against proclaimed offenders of human trafficking and Smuggling.These
offices in coordination with other NCBs extradite and deport the accused wanted in human
Trafficking and Smuggling cases in Pakistan

COUNTER TERRORISM WING (CTW)


Mandate  
In 2003
Federal
Governmen
t assigned
Counter
Terrorism
role to FIA.
Hence
CTW
formerly
SIG was
formally
established
in May
2003. CTW
Officers
were
provided
extensive
training and
some
equipment
by US
government
, Anti
Terrorism
Assistance
Program, in
the area of
crime
scene
analysis,
computer
forensic
analysis,
cyber
terrorism,
terrorist
financing
investigatio
ns and post
blast
explosives
analysis etc

CTW Vision
To identify, arrest and prosecute Most Wanted Terrorists and to become a centre of excellence for
specialized counter terrorist investigations.

Counter Terrorism Functions of CTW

 Identify and arrest most wanted terrorist.


 Detect & investigate terrorist financing/money laundering cases.
 Crime Scene & Explosive analysis of major terrorist incidents. ›Detect, seize and prosecute
hate material.
 Computer / Cell Phones forensic analysis and Cyber Terrorism Investigations.
 Prepare Terrorist Incident Analysis and Threat Assessment Reports for Federal Govt.
 Build a National Database of terrorist entities.
 Training courses for Police Departmentsnts.
 Crime Scene & Explosive analysis of major terrorist incidents.

Cyber Investigation Unit (CIU) and Computer Forensic Lab.


CIU consist of 05 IT Experts which are highly trained to investigate Cyber Terrorism enquiries/cases
and conduct Computer/Cell phone Forensics. Govt. of Pakistan has notified SIG computer forensic
lab as first notified lab for thepurpose of electronic forensic and the SIG IT experts appear as
Forensic Experts in courts. So far SIG forensic experts have conducted over 100 forensic analysis
for different police departments. CIU has also developed the following softwares

 Terrorists Information System (TIS)


 Terrorist Incident Analysis (TIA)
 Case Monitoring System (CMS)
 Personnel Record Database (PERREC)
 Humman Trafficker Information System
Terrorist  
Financing
Investigati
on Unit
(TFIU)
A TFIU has so
far
successfully
conducted 61
enquries on
request of
Interpol, FMU
and
International
partners.
Facilitates
Investigation
and
Procecution of
cases in courts
of law.
Provides
training to
Financial
Investigators
and has
developed
SOPs for TF
Investigations.
FIE liaisons
with Financial
Monitoring
Unit
(FMU/FIU),
State Bank of
Pakistan,
Commercial
Banks,
Financial
Institutions.
Analysis and
monitoring of
implementatio
n of rules and
regulations
pertaining to
terrorist
financing.
Represents
SIG / FIA on
various
national and
international
forums for
supporting
efforts to
combat money
laundering &
terrorist
financing.
Important  
Terrorism
Cases
Investigated
by CTW

 Case FIR
No. 291
dated
06.06.08
Rawalpin
di
(attempte
d suicide
attacks
on
President
Camp
Office
RWP).
 Case FIR
No. 09/08
dated
19.06.08
Explosive
Act FIA
Crime
Circle
Lahore.
 Case FIR
No. 10/08
FIA
Crime
Circle
Rawalpin
di.
 SIG is
part of
JIT
investigat
ing
Marriott
Bomb
Blast
(Case
FIR No.
127/08
dated
20.09.08
Police
Station:
Secretari
at
Islamaba
d).
 Case FIR
No. 01/09
SIU FIA
Terrorist
attacks
on
Mumbai.
Final
Report
submitted
to ATC
Rawalpin
di.
 Director
SIG is
heading
JIT
constitute
d by the
Federal
Governm
ent to
investigat
e
Mohtara
ma
Benazir
Bhutto
Assassin
ation
case
Rawalpin
di.

Books Published
 Hand book on Cyber Terrorism.
 Hand book on Explosives, Bombs & IEDs.
 Hand book on Terrorist Finance Investigations.

Specialized Information Stored with CTW


CTW database has been established with links/references to all the official documents of SIG and
applications/databases noted above. All SIG offices are connected through Wide Area Network
(WAN). Data of Terrorists, Suspects, Terrorist Orgonizations,Terrorist Incidents Analysis and Threat
Assessment Reports etc are stored on Terrorist Information System (TIS).

INTERPOL
NATION  
AL
CENTRA
L
BUREAU
PAKISTA
N OF
INTERPO
L
The
International
Criminal
Police
Organization
- ICPO,
INTERPOL
was founded
in 1914 with
the founding
principle to
coordinate
efforts
relating to
international
police
cooperation.
The
membership
of
INTERPOL
today
consists of
187
countries,
with its
General
Secretariat
in Lyon,
France.
Each
member
country
establishes
a National
Central
Bureau NCB
to serve as
the focal
point for that
nation's
involvement
in the
collection of
evidence,
the pursuit
of fugitives,
locating
missing
persons
including
missing
children, the
identification
of
unidentified
bodies, and
the
exchange of
or request
for
information
related to
law
enforcement
investigation
s across
international
borders.

Pakistan became member of ICPC (International Criminal Police Commission) in 1952. The National
Central Bureau (NCB) of Pakistan was created under the new constitution of ICPO in 1957. It is
attached with Federal Investigation Agency since its inception. The Director General FIA is an ex-
officio, the Head of NCB-Pakistan. In 1990 the Secretariat General (SG) of ICPO Interpol Lyon
introduced new Communication System namely X-400 to exchange mails electronically amongst all
Interpol member states. NCB Pakistan was connected with X-400 system in 1999. Interpol SG Lyon
replaced X-400 System in 2002 with new Web based Communication System namely I/24-7. In May
2004, Interpol SG Lyon provided the equipments for the system free of cost. During 2005, Interpol
SG Lyon has also provided equipments for the extension of I-24/7 Communication System beyond
NCB-Pakistan Islamabad.

Conferences and Meetings Unit


During the period under report, 26 cases of Interpol meetings, training and conferences were
received from IPSG Lyon, France intimating to nominate suitable police officers for the said purpose.
The papers of these cases were circulated to all concerned and Provincial Police Chiefs for further
necessary action. The following meetings, conferences and training were attended by FIA Officers.
The most of the meetings are/were fully funded by the organizers of the conferences and meetings.

National Response Centre for Cyber Crimes


INTRODUCTION
National  
Response
Centre for
Cyber Crime
(NR3C) - FIA is
a law
enforcement
agency
dedicated to
fight cyber
crime.
Inception of this
Hi-Tech crime
fighting unit
transpired in
2007 to identify
and curb the
phenomenon of
technological
abuse in
society

National
Reponse
Centre for
Cyber Crime
(NR3C), is the
latest
introduction to
mandate of the
FIA, primarily to
deal with
technology
based crimes in
Pakistan. It is
the only unit of
its kind in the
country and in
addition to the
directly
received
complaints also
assists other
law
enforcement
agencies in
their own
cases.

NR3C has
expertise in
Digital
Forensics,
Technical
Investigation,
Information
System
Security Audits,
Penetration
Testing and
Trainings. The
unit since its
inception has
been involved
in capacity
building of the
officers of
Police,
Intelligence,
Judiciary,
Prosecutors
and other Govt.
organizations.
NR3C has also
conducted a
large number of
seminars,
workshops and
training/awaren
ess programs
for the
academia,
print/electronic
media and
lawyers. Cyber
Scouts is the
latest initiative
of NR3C, in
which, selected
students of
different
private/public
schools are
trained to deal
with computer
emergencies
and spreading
awareness
amongst their
fellow students,
teachers and
parents.
VISION
A law enforcement agency that combats Cyber Crime, provides state of the art digital forensic
services, enjoys the respect in the society for its integrity, professional competence, impartial attitude
and serves as a role model for provincial police forces.

MISSION
To achieve excellence by promoting culture of merit, enforcing technology based law, extending
continuous professional training, ensuring effective internal accountability, encouraging use of
technology and possessing an efficient feedback mechanism.

SERVICES
COMPUTER FORENSICS
In today’s ever changing criminal world the use of computers for fraud and the pursuit of other
crimes has increased to dramatic proportions. NR3C-FIA is a specialized department to deal with the
computer crime. Computer crime is not only about fraud – online or otherwise – it also encompasses
areas such as pornography, child sex abuse and the sale of black market goods online. The wide
range of data content present in hard drives is potential evidence if seized from a crime scene. The
process of forensic acquisition, analysis and reporting of computer storage devices is Computer
Forensic. NR3C has state of the art computer forensic facility, and posses leading forensic experts
to deal with all computer related crimes.

MOBILE FORENSICS
The increased utility of mobile devices such as smart phones has leveraged the criminals to
communicate and use digital application, resultantly storing tremendous amount of data on the
device. Criminals use smart phones for a number of activities such as committing fraud over e-mail,
harassment through text messages, trafficking of child pornography, communications related to
narcotics, etc. The data stored on smart phones is extremely useful to forensic analysts through the
course of an investigation. The forensic acquisition, analysis and presentation of data content stored
on mobile devices is known as Mobile Forensics. NR3C since inception has dealt with numerous
mobile forensic cases, and also facilitates other government installations on such technical
assistance.

VIDEO FORENSICS
Video recordings can provide a real time, eyewitness account of a crime so investigators can watch
or hear what transpired. For instance, a surveillance video captures a bank robbery in progress, or a
hidden camera records. For most crimes, however, high quality video recordings are often not
available. This is where forensic video expertise can help. Forensic experts have many techniques
to enhance recordings that can bring out details and provide a clearer picture of what occurred.
NR3C experts have engaged in numerous video forensic investigations and have successfully
identified criminals and terrorist through this forensic method.

NETWORK FORENSICS
Network forensics is the capture, storage, and analysis of network events. Regardless of the name,
the idea is the same: record every packet of network traffic (all emails, all database queries, all Web
browsing–absolutely all traffic of all kinds traversing an organization’s network) to a single
searchable repository so the traffic can be examined in detail. It also includes the forensic
examination of network devices such as router, VOIP gateways, IDS/IDP etc. The network device
configuration and related data present in these devices is important in cyber crime cases. NR3C has
a specialized team to investigate and process network forensic cases. They have successfully
analyzed numerous network forensic investigations in past.

TECHNICAL TRAINING
Development of human resource leverages the organizations to perform efficiently. Trainings,
seminars and workshops are instant source of information that gives an edge to professionals to
understand and excel in their respective fields. NR3C over years has trained around thousands of
individuals of academia, law enforcement agencies, judiciary, police academy, intelligence agencies
etc. Trainings disseminated in relation to digital forensic comprehension of interpreting forensic
reports, evidence extraction methods, laws application to judicial community. 12, 458 individuals
from all walks of life ranging from a 6 grade kid to a decorated officers have been trained by NR3C
to serve the purpose cyber crime mitigation

CYBER CRIME
Any activity commissioned via computer, digital devices and networks used in the cyber realm, and
is facilitated through the internet medium. It can include the distant theft of information belonging to
an individual, government or corporate sector through criminal tress-passing into unauthorized
remote systems around the world. It includes from stealing millions of rupees from online bank to
harassing and stalking cyber users.

Cyber Crime also includes sending viruses on different systems, or posting defamation messages.
Commission of cyber crime can be:

 Cyber crime has now surpassed illegal drug trafficking as a criminal moneymaker
 Somebody’s identity is stolen every 3 seconds as a result of cyber crime
 Without a sophisticated security package, your unprotected PC can become infected within
four minutes of connecting to the Internet.

MAJOR ONLINE ACTIVITIES


In Pakistan, internet users range from 10% to 16% of the overall population

 Social networking
 Online banking
 Internet surfing
 Audio & video communication
 Entertainment
 Online shopping
 Map directions / GPS
 Online auction
 Information sharing
 Medical assistance
 Online games

CYBER CRIME CATEGORIE

 Hacking  Computer viruses and worms


 Identity theft  Malicious Software
 Cyber Bullying  Intellectual property rights
 Cyber Stalking  Money Laundering
 Financial fraud  Denial of Service attack
 Digital Piracy  Electronic Terrorism, Vandalism and Extortion

CYBER CRIME CATEGORIES


HACKING
Trying to get into computer systems in order to steal, corrupt, or illegitimately view data. Hacking
comes from the term “hacker”, who is an expert in computer programming languages and systems.
Hacking, in this sense, means using unusually complex and clever methods to make computers do
things. For some time, however, the popular press has used the word “hacker” and “hacking” in a
negative way to refer to individuals who try to get into computer systems in order to steal, corrupt, or
illegitimately view data. Hackers themselves maintain that the proper term for such individuals is
“cracker”, and that their activities should be called cracking. However, in order to be consistent with
the most common usage of the word, we use “hacking” here to refer to unauthorized access

WEBSITE DEFACEMENT
Website defacement is an attack on a website that changes the visual appearance of the site or a
webpage. This is typically the work of system crackers, who break into a web server and replace the
hosted website with one of its own. The most common method of defacement is using SQL
Injections to log on to administrator accounts. Defacements usually consist of an entire page. This
page usually includes the defacer’s pseudonym or “Hacking Codename.” Sometimes, the Website
Defacer makes fun of the system administrator for failing to maintain server security. Most times, the
defacement is harmless, however, sometimes it can be used as a distraction to cover up more
sinister actions such as uploading malware or deleting essential files from the server. NR3C has
successfully investigated cases relating to website defacement.

CYBER BULLYING
Cyber stalking (also called cyber harassment) is when someone uses the Internet to threaten or
make unwanted advances towards someone else. This sort of harassment can cause physical,
emotional, and psychological damage to the victim. Children are particularly vulnerable because of
their trusting nature and give away their personal information. This information later is used against
them for stalking purpose, therefore the NR3C officials advice that until the person is not a trusted
individual, no information should shared over the internet.

CYBER STALKING
Using the Internet to threaten or make unwanted advances towards someone else Cyber stalking
(also called cyber harassment) is when someone uses the Internet to threaten or make unwanted
advances towards someone else. This sort of harassment can cause physical, emotional, and
psychological damage to the victim. Children are particularly vulnerable because of their trusting
nature

CHILD PORNOGRAPHY
The internet evolution has made children a viable victim to the cyber crime. As more homes have
access to internet, children use the internet and chances have increased where they can fall victim
to the aggression of pedophiles. The easy access to pornographic contents available over the
internet lowers the inhibition of the children. Pedophiles lure the children by distributing pornographic
material, and try to meet them for sexual activities which also include collection of their explicit
photographs and videos. Mostly pedophiles try to contact children in chat rooms posing as
teenagers, and start to befriend them to win their confidence.

Each year, countless children around the world fall prey to sexual predators. These young victims
are left with permanent psychological, physical, and emotional scars. When a recording of that
sexual abuse is made or released onto the Internet, it lives on forever. It haunts the children depicted
in it, who live daily with the knowledge that countless strangers use an image of their worst
experiences for their own gratification. NR3C, cyber crime unit has zero tolerance for pedophiles,
and is driven to make cyber space a safe place for our children.

SOCIAL ENGINEERING
Social engineering is a technique used by cyber criminals to get access to confidential information.
With social engineering, attackers use manipulation and deceit to trick victims into giving out
confidential information. Some of the social engineering methods used by attackers:

 Sending messages that contain dangerous attachments (e.g. malware) with text that
encourage people to open the attachments.
 Pretending to be the main administrator of a local network and asking for the victim’s
password in order to perform a maintenance check.
 Telling a victim over the phone that he/she has won a prize, in return they ask for a credit
card number to deliver it.
 Asking for a user’s password for a certain Internet service, such as a blog, and later use the
same password to access user’s computer. This technique works because users often use
the same passwords for many different portals.

DATA THEFT
Data theft is the act of stealing computer-based information from an unknowing victim with the intent
of compromising privacy or obtaining confidential information. Data theft is increasingly a problem for
individual computer users, as well as big corporate firms. The following categories are most common
in data theft cases.

 E-commerce: You should make sure that your data is safe from prying eyes when you sell or
buy things on the Web. Carelessness can lead to leaking your private account information.
 Password cracking: Intruders can access your machine and get valuable data if it is not
password-protected or its password can be easily decoded (weak password).
 Eavesdropping: Data sent on insecure lines can be wiretapped and recorded. If no
encryption mechanism is used, there is a good chance of losing your password and other
private information to the eavesdropper.
 Laptop theft: Increasingly incidents of laptop theft from corporate firms occur with the
valuable information stored in the laptop being sold to competitors. Carelessness and lack of
laptop data encryption can lead to major losses for the firm.

IDENTITY THEFT
Identity theft refers to a crime where an individual maliciously obtains and uses another individual’s
personal/sensitive information to commit frauds/scams by using the stolen identity. Mostly this crime
is committed for economic gain. The cyber criminal gains access to an individual’s information by
stealing e-mail details, stored information on computer databases, they eavesdrop over the networks
to get hold of transactions. Identity thefts include but not limited to shoulder surfing, dumpster diving,
spamming, spoofing, phishing, and skimming. NR3C has successfully investigated numerous cases
of identity theft.

FINANCIAL FRAUD
Financial fraud is a criminal behavior in which a person uses wrong methods to trick a victim out of
his money. The Internet fraud scheme is a common example of financial fraud, which includes
emulated online sales, retail schemes, business opportunity schemes, identity theft, market
manipulation schemes, and credit card schemes.

COMPUTER VIRUSES AND WORMS


A virus is a malicious program that passes from one computer to another in the same way as a
biological virus passes from one person to another. Most viruses are written with a malicious intent,
so that they may cause damage to programs and data in addition to spreading themselves. Viruses
infect existing programs to alter the behavior of programs, actively destroy data, and perform actions
to storage devices that render their stored data inaccessible.

A worm is a software program that uses computer networks and security holes to replicate itself from
one computer to another. It usually performs malicious actions, such as using the resources of
computers as well as shutting down the computers

INTELLECTUAL PROPERTY RIGHTS


Intellectual property rights is concerned with any act that allows access to patent, trade secrets,
customer data, sales trends, and any confidential information.

DENIAL OF SERVICE ATTACK


A Denial-of-Service (DoS) attack is mounted with the objective of causing a negative impact on the
performance of a computer or network. It is also known as a network saturation attack or bandwidth
consumption attack. Attackers perform DoS attacks by sending a large number of protocol packets
to the network
ECONOMIC CRIME WING (ECW)
The Anti-Corruption and Economic Crime Wing of FIA transferred to National Accountability Bureau
(NAB) on 16.08.2004 have been restored vide notification dated 24.10.2008.

The Anti-Corruption and Economic Crime Wing of FIA transferred to National Accountability Bureau
(NAB) on 16.08.2004 have been restored vide notification dated 24.10.2008.

Intellectual Property Rights Enforcement


1. The Federal Investigation Agency has constituted an Advisory Committee on IPR
Enforcement comprising of Ms. Ameena Saiyid, Managing Director, Oxford University Press,
Mr. Kamal Ahmed, Country Manager, Microsoft Corporation Pakistan, Mr. Hasan Irfan Khan,
Advocate, M/s Irfan & Irfan, Mr. Q. M. Shahed of Pakistan Tobacco Company, Mr. Ikram ul
Majeed Sehgal, Security & Management Services, Mr. Muhammad Siddique, Collector
Customs (Legal), as honorary members.
2. On the invitation of Director General FIA, an inaugural meeting of the Advisory Committee
was held on 2nd July 2009. It was Chaired by Mr. Irfan Nadeem, Addtional Director General
FIA / Economic Crime Branch, at FIA HQ, Islamabad. Besides, the above members and FIA
officers, Syed Khalid Mehmood Bokhari, Director General IPO-Pakistan, also attended the
meeting.
3. At the outset, the Addl. Director General ECW warmly welcomed all the participants, followed
by presentation by Mr. Shahid Nadeem Baloch, Director IPR on the performance of FIA and
its future plans, which was highly appreciated. The participants discussed current issues
relating to the IPR Laws, Enforcement Actions, Challenges being confronted with and the
mechanism to be adopted for effective enforcement of IPR Laws in Pakistan. The
participants agreed on sharing of database, capacity building of Investigators, Prosecutors,
initiating a proposal for establishing Special Tribunals for speedy trial of IPR cases and
mutual cooperation in crime fighting, in coordination with IPO-Pakistan. While FIA’s initiative
of organizing a high level forum of IPR was appreciated, it was also decided to continue such
meetings followed by Seminars/Conferences as a part of awareness campaign.
4. Four working groups for the Policy Formulation, Awareness Campaign, Sharing of Database
and identifying “Big Fish” involved in large scale IPR violations have been formed for
submitting their reports in the next meeting.

Minutes of inaugural meeting of FIA’s advisory committee on IPR


enforcement, held on 2nd July 2009 at FIA HQ, Islamabad
The inaugural session of FIA’s Advisory Committee on IPR Enforcement was held on 2nd July 2009
at 11 a.m. at FIA HQ, Islamabad. It was Chaired by Mr. Irfan Nadeem, Addl. Director General FIA /
Economic Crime Branch, FIA HQ Islamabad. List of the participants and Agenda of meeting are
annexed.

At the outset the Addl. Director General FIA conveyed a message of welcome of Director General
FIA Mr. Tariq Khosa, who could not make it to the meeting due to another official commitment. He
then warmly welcomed all the participants, especially the honorary members of Advisory Committee
and apprised them about the global importance of Intellectual Property Right in general and the
challenges on the subject being confronted with, in Pakistan, in particular. Federal Investigation
Agency genuinely needs the valuable guidance / assistance of the Advisory committee in our
commitments to combat the menace of IPR violations, keeping in view the basic core values, he
added.

COUNTER TERRORISM WING (CTW)


Mandate
In 2003
Federal
Governmen
t assigned
Counter
Terrorism
role to FIA.
Hence
CTW
formerly
SIG was
formally
established
in May
2003. CTW
Officers
were
provided
extensive
training and
some  
equipment
by US
government
, Anti
Terrorism
Assistance
Program, in
the area of
crime
scene
analysis,
computer
forensic
analysis,
cyber
terrorism,
terrorist
financing
investigatio
ns and post
blast
explosives
analysis etc
CTW Vision
To identify, arrest and prosecute Most Wanted Terrorists and to become a centre of excellence for
specialized counter terrorist investigations.

Counter Terrorism Functions of CTW

 Identify and arrest most wanted terrorist.


 Detect & investigate terrorist financing/money laundering cases.
 Crime Scene & Explosive analysis of major terrorist incidents. ›Detect, seize and prosecute
hate material.
 Computer / Cell Phones forensic analysis and Cyber Terrorism Investigations.
 Prepare Terrorist Incident Analysis and Threat Assessment Reports for Federal Govt.
 Build a National Database of terrorist entities.
 Training courses for Police Departmentsnts.
 Crime Scene & Explosive analysis of major terrorist incidents.

Cyber Investigation Unit (CIU) and Computer Forensic Lab.


CIU consist of 05 IT Experts which are highly trained to investigate Cyber Terrorism enquiries/cases
and conduct Computer/Cell phone Forensics. Govt. of Pakistan has notified SIG computer forensic
lab as first notified lab for thepurpose of electronic forensic and the SIG IT experts appear as
Forensic Experts in courts. So far SIG forensic experts have conducted over 100 forensic analysis
for different police departments. CIU has also developed the following softwares

 Terrorists Information System (TIS)


 Terrorist Incident Analysis (TIA)
 Case Monitoring System (CMS)
 Personnel Record Database (PERREC)
 Humman Trafficker Information System
Terrorist  
Financing
Investigati
on Unit
(TFIU)
A TFIU has so
far
successfully
conducted 61
enquries on
request of
Interpol, FMU
and
International
partners.
Facilitates
Investigation
and
Procecution of
cases in courts
of law.
Provides
training to
Financial
Investigators
and has
developed
SOPs for TF
Investigations.
FIE liaisons
with Financial
Monitoring
Unit
(FMU/FIU),
State Bank of
Pakistan,
Commercial
Banks,
Financial
Institutions.
Analysis and
monitoring of
implementatio
n of rules and
regulations
pertaining to
terrorist
financing.
Represents
SIG / FIA on
various
national and
international
forums for
supporting
efforts to
combat money
laundering &
terrorist
financing.
Important  
Terrorism
Cases
Investigated
by CTW

 Case FIR
No. 291
dated
06.06.08
Rawalpin
di
(attempte
d suicide
attacks
on
President
Camp
Office
RWP).
 Case FIR
No. 09/08
dated
19.06.08
Explosive
Act FIA
Crime
Circle
Lahore.
 Case FIR
No. 10/08
FIA
Crime
Circle
Rawalpin
di.
 SIG is
part of
JIT
investigat
ing
Marriott
Bomb
Blast
(Case
FIR No.
127/08
dated
20.09.08
Police
Station:
Secretari
at
Islamaba
d).
 Case FIR
No. 01/09
SIU FIA
Terrorist
attacks
on
Mumbai.
Final
Report
submitted
to ATC
Rawalpin
di.
 Director
SIG is
heading
JIT
constitute
d by the
Federal
Governm
ent to
investigat
e
Mohtara
ma
Benazir
Bhutto
Assassin
ation
case
Rawalpin
di.

Books Published
 Hand book on Cyber Terrorism.
 Hand book on Explosives, Bombs & IEDs.
 Hand book on Terrorist Finance Investigations.

Specialized Information Stored with CTW


CTW database has been established with links/references to all the official documents of SIG and
applications/databases noted above. All SIG offices are connected through Wide Area Network
(WAN). Data of Terrorists, Suspects, Terrorist Orgonizations,Terrorist Incidents Analysis and Threat
Assessment Reports etc are stored on Terrorist Information System (TIS).

FEDERAL INVESTIGATION AGENCY


ACT, 1974 (VIII OF 1975)
An Act to provide for the constitution of a
FEDERAL INVESTIGATION AGENCY
(Gazette of Pakistan, Extra-ordinary, Part-I, 17th January, 1975)
Whereas it is expedient to provide for the constitution of a Federal Investigation Agency for the
investigation of certain offences committed in connection with matters concerning the Federal
Government, and for matters connected therewith;
It is hereby enacted as follows: -

1. Short title, extent and commencement:


1. This Act may be called the Federal Investigation Agency Act, 1974.
2. It extents to the whole of Pakistan and also applied to all citizens of Pakistan and
Public Servants, wherever they may be.
3. It shall come to force at once.
2. Definitions: In this Act, unless there is anything repugnant in the subject or contest: -

1. “AGENCY” means the Federal Investigation Agency constituted under section 3;


2. “CODE” means the Code of Criminal Procedure, 1898 (Act V of 1898);
3. “DIRECTOR GENERAL” means the Director General of Agency;
4. “PROVINCIAL POLICE” means the Police constituted by Provincial Government
under the Police Act, 1861 (V of 1861);
5. “PUBLIC SERVANT” means a public servant as defined in Section 21 of the
Pakistan Penal Code (Act XL V of 1860), and includes an employee of any
corporation or other body or organization set up controlled or administered by or
under the authority of the Federal Government;
6. “SPECIAL POLICE” means the Pakistan Special Police Establishment constitution
under the Pakistan Special Police Establishment Ordinance 1948, (VII of 1948);
7. “SPECIFIED PERSONS” mean the persons who were appointed to posts in or
under a Provincial Police in pursuance of Article 3 of the Special Police and
Provincial Police (Amalgamation) Order, 1962 (P.O. No. 1 of 1962); and
8. “RULES” means rules made under this Act.
o Constitution of the Agency:

1. Notwithstanding any thing contained in any other law of the time being in force, the
Federal Government may constitute an Agency to be called the Federal Investigation
Agency for inquiry into, and investigation of the offences specified in the Schedule,
including an attempt or conspiracy to commit, and abetment of, any such offence.
2. The Agency shall consist of a Director General to be appointed by the Federal
Government and such number of other officers as the Federal Government may,
from time to time, appoint to be members of the Agency.
2. Superintendence and administration of the Agency:
1. The Superintendence of the Agency shall vest in the Federal Government.
2. The administration of the Agency shall vest in the Director General who shall
exercise in respect of the Agency such of the powers of an Inspector General of
Police under the Police Act, 1861 (V of 1861), as may be prescribed by rules.
3. Powers of the members of the Agency:
1. Subject to any order which the Federal Government may make in this behalf, the
members of the Agency shall, for the purpose of an inquiry or investigation under this
Act, have throughout Pakistan such powers, including powers relating to search,
arrest of persons and seizure of property, and such duties, privileges and liabilities as
the officers of a Provincial Police have in relation to the investigation of offences
under the Code or any other law for the time being in force.
2. Subject to rules, if any, a member of the Agency not below the rank of a Sub-
Inspector may, for the purposes of any inquiry or investigation under this Act,
exercise any of the powers of an officer-in-charge of a Police Station in any area in
which he is for the time being and, when so exercising such powers, shall be
deemed to be an officer-in-charge of a Police Station discharging his functions as
such within the limits of his station.
3. Without prejudice to the generality of the provisions of the sub-section (1) and sub-
section (2), any member of the Agency not below the rank of Sub-Inspector
authorized by the Director General in this behalf may arrest without warrant any
person who has committed, or against whom a reasonable suspicion exists that he
has committed, any of the offences referred to sub-section (1) of Section 3.
4. For the purpose of the exercise by the members of the Agency of the powers of an
officer-in-charge of a Police Station,” Police Station” includes any place declared,
generally or specially, by the Federal Government to be a Police Station within the
meaning of the Code.
5. If, in the opinion of a member of the Agency conducting an investigation, any
property which is the subject-matter of the investigation is likely to be removed,
transferred or otherwise disposed of before an order of the appropriate authority for
its seizure is obtained, such member may, by order in writing, direct the owner or any
person who is, for the time being, possession thereof not to remove, transfer or
otherwise dispose of such property in any manner except with the previous
permission of that member and such order shall be subject to any order made by the
Court having jurisdiction in the matter.
6. Any contravention of an order made under sub-section (5) shall be punishable with
rigorous imprisonment for a term which may be extend to one year, or with fine, or
with both.

5-A. Certain Officers of the Agency deemed to be public Prosecutors: Notwithstanding


anything contained in any order law for the time being in force the Assistant Directors (Legal)
and the Deputy Directors (Law) of the Agency shall be deemed to be Public Prosecutors and
shall be competent to institute and conduct any proceedings in cases sent up for trial by the
Agency in the Special Courts constituted under any law and the courts subordinate to the
High Court. (Added through FIA (Amendment) Ordinance 2002)
4. Power to amend the Schedule:
The Federal Government may, by notification in the official Gazette, amend the
Schedule so as to add any entry thereto or modify or omit any entry therein.
5. Delegation of Powers :
The Director-General may by order in writing, direct that all or any of his powers
under this Act or the rules shall, subject to such conditions, if any, as may be
specified in the order, be exercisable also by any member of the Agency so
specified.
6. Indemnity:
No suit, prosecution or other legal proceeding shall lie against the Federal
Government, any member of the Agency or any other person exercising any power
or performing any function under this Act or the rules for any thing which is in good
faith done or intended to be done under this Act or the rules.
7. Power to make rules:
1. The Federal Government may, by notification in the official Gazette, make rules for
carrying out the purposes of this Act.
2. In particular and without prejudice to the generality of the fore-going power, such
rules may provide for all or any of the following matters, namely: -
 The terms and conditions of service of the Director General and other
members of the Agency and the qualifications for recruitment to various
posts.
 The powers and functions of the members of the Agency in relation to the
conduct of inquiries and investigations;
 The nature and extent of the assistance with the Agency may provide to
Provincial investigating agencies;
 The powers of the Inspector General of Police under the Police Act, 1861 (V
of 1861), which shall be exercisable by the Director General and The manner
in which rewards may be given to the members of the Agency or of the public
for rendering commendable services.
8. Repeal:
1. The Pakistan Special Police Establishment, 1948 (VII of 1948), and the Special
Police and Provincial Police (Amalgamation) Order, 1962 (P.O. No.1 of 1962),
hereinafter referred to respectively as the said Ordinance and the said Order, are
hereby repealed.
2. Upon the repeal of the said Ordinance: -

 All persons who were members of the Special Police immediately before
such repeal, including the specified persons shall stand transferred to the
Agency and shall, subject to sub-section (5), be entitled to the same terms
and conditions to which they were entitled immediately before such repeal;
and
 Any inquiry or investigation pending with the Special Police immediately
before such repeal shall continue to be conducted by the Agency.
2. Notwithstanding the repeal of the said order, but subject to sub-section (4), every
specified person shall continue to be appointed in or under the Provincial Police in or
under which he was holding a post immediately before the commencement of this
Act.
3. On the recommendation of the Director General and with the concurrence of the
Provincial Government concerned, the Federal Government, may direct that such of
the specified persons referred to sub-section (3) as may, within thirty days of the
commencement of this Act, express their willingness to serve in or under the Agency
shall be appointed to posts in or under the Agency.
4. A specified person referred to in clause (a) of sub-section (2) and a person in respect
of whom a direction is issued under sub-section (4) shall, upon the repeal of the said
ordinance or, as the case may be, the issue of such direction, cease to hold a post in
or under the Provincial Police concerned and shall be entitled to the same terms and
conditions of service to which he was entitled immediately before such repeal or the
issue of such directions.

SCHEDULE OF FIA ACT, 1974


1)    Offences punishable under sections k[120-B, 121,122, 123, 123-A, 124, 124-A, p[161, 162, 163,
164, 165, 165-A, 168, 169], q[175, 182, 183, 186, 187, 188, 189], b[201], 217, 218, q[224, 225], 245,
255, 256, 257, 258, 259, 260, 261, 263 k[300, 301, 302, 324, 332, 333, 334, 335, 336, 337, 337-A,
337-B, 337-C, 337-D, 337-E, 337-F], q[342, 348], 353 k[365-A] 366-B, q[383], 402-A, 402-B, 402-C,
403, 404, b[406,407,408], p[409], b[411,418,419,], a[420], 435, 436, 440, r[462A, 462B, 462C, 462D,
462D, 462E, 462F] q[466], 467, a[468,471], b[472], q[473, 474, 475, 476], 477-A, 489-A, 489-B, 489-
C, 489-D, 489-E, g[489-F], q[499, 500, 501, 502, 506, 507], of the Pakistan Penal Code (Act XLV of
1860)

[TOTAL = 96]

2)    OFFENCES PUNISHABLE UNDER THE EXPLOSIVE SUBSTANCE ACT, 1908 (VI OF 1908)

3)    OFFENCES PUNISHABLE UNDER THE OFFICIAL SECRET ACT. 1923 (XIX OF 1923)

4)    OFFENCES PUNISHABLE UNDER THE FOREIGNERS ACT, 1946 (XXXI OF 1946)

5)    OFFENCES PUNISHABLE UNDER THE PREVENTION OF CORRUPTION ACT. 1947 (II OF 1947).

6)    OFFENCES PUNISHABLE UNDER THE FOREIGN EXCHANGE REGULATION ACT. 1947

7)    OFFENCES PUNISHABLE UNDER THE IMPORT AND EXPORT (CONTROL) ACT. 1950(XXXIX OF 1950)

8)    OFFENCES PUNISHABLE UNDER BANKING COMPANIES ORDINANCE, 1962 (LVII OF 1962)

9)    OFFENCES PUNISHABLE UNDER THE PAKISTAN ARMS ORDINANCE, 1965 (W.P. ORD XX OF 1965)

10)    OFFENCES PUNISHABLE UNDER SECTION THE 156 OF THE CUSTOMS ACT, 1969(IV OF 1969)

11)    OFFENCES PUNISHABLE UNDER THE FOREIGN EXCHANGE REPATRIATION REGULATION, 1972.

12)    OFFENCES PUNISHABLE UNDER THE FOREIGN ASSETS (DECLARATION) REGULATION 1972.

13)(Omitted)

14)    OFFENCES PUNISHABLE UNDER THE HIGH TREASON (PUNISHMENT) ACT, 1973 (LXVIII OF 1973)

15)    OFFENCES PUNISHABLE UNDER THE PREVENTION OF ANTI-NATIONAL ACTIVITIES ACT,1974 (VII OF


1974
16)    OFFENCES PUNISHABLE UNDER THE BANKS (NATIONALIZATION) ACT, 1974 (XIX OF1974)

17)    OFFENCES PUNISHABLE UNDER THE PASSPORT ACT, 1974 (XX OF 1974)

18)    OFFENCES PUNISHABLE UNDER THE DRUGS ACT, 1976 (XXXI OF 1976)

19)    OFFENCES PUNISHABLE UNDER EMIGRATION ORDINANCE, 1979 (XVIII OF 1979)

20)    OFFENCES PUNISHABLE UNDER THE EXIT FROM PAKISTAN (CONTROL) ORDINANCE, 1981(XLVI OF
1981)

[21]    OFFENCES PUNISHABLE UNDER THE ANTI-TERRORISM ACT, 1997(XXVII OF 1997) TO THE EXTENT

of dealing with cases which: -

        (a)    have Inter-provincial scope, or

        (b)    are entrusted to the Agency by the Federal Government

[22]    OFFENCES PUNISHABLE UNDER THE PREVENTION & CONTROL OF HUMAN TRAFFICKING


ORDINANCE 2002.

[23]     OFFENCES PUNISHABLE UNDER THE PAKISTAN TELECOMMUNICATION (RE-ORGANIZATION) ACT,


1996 (XVII OF 1996)

[24]     OFFENCES PUNISHABLE UNDER THE NATIONAL DATABASE AND REGISTRATION AUTHORITY


ORDINANCE, 2002.

[25]    OFFENCESPUNISHABLE UNDER SECTION 36 & 37 OF THE ELECTRONIC


TRANSMISSIONORDINANCE, 2002 (L1 OF 2002)

[26]    SECTION25-D AND SECTION 29 OF TELEGRAPHIC ACT, 1885

[27]    OFFENCES PUNISHABLE UNDER THE COPYRIGHT ORDINANCE, 1962 (XXXIV OF 1962).

[28]    OFFENCES PUNISHABLE UNDER THE ANTI-MONEY LAUNDERING ACT, 2010.

[29]    OFFENCES PUNISHABLE UNDER THE ELECTRICITY ACT, 1910 (IX OF 1910)

[30]    OFFENCES PUNISHABLE UNDER THE TRANSPLANTATION OF HUMAN ORGANS ANDTISSUES ACT,


2010

[31]     OFFENCES PUNISHABLE UNDER THE PREVENTION OF ELECTRONIC CRIME ACT, 2016

Services
Technical Branch
The technical branch is providing scientific assistance to various units of the F.I.A.NAB, Islamabad,
AJK Police and Railway Police, Federal Government Departments, Banks and Financial Institutions
and (on special request) Provincial Police Departments. Three sections of the Branch are
Questioned Documents section , Fingerprint section and Chemical Analysis section.

Questioned Documents:

 Determination of genuineness / authorship of signatures and writings


 Determination of the presence of erasures, alterations, additions, substitutions in writings
and figures whether handwritten, typed or printed.
 Determination of original figures and writings whether handwritten, printed or typed.
 Determination of false additions, replacements, removals in the leaves of books, registers,
files etc.
 Determination of artificial ageing of documents.
 Determination of removal, replacement, affixation etc of revenue stamps on various types of
documents.
 Determination of counterfeit documents / currency notes / prize bonds / financial instruments
etc.
 Determination of alterations in passports / visas etc.
 Determination of the type and quality of ink and comparison by two or more specimens to
find out if they are of common origin or otherwise.

Fingerprint

 Examination of fingerprints on documents.


 Development of latent fingerprints and their identification.
 Examination of crime scene for development and lifting of fingerprints.
 Examination of foot and palm prints.
 Collection and maintenance of classified fingerprint record of convicts.
 Training of proficient.
 Maintaining hard copy data base of 10-Print & Palm Print cards.

Chemical Testing

 Examination of Engine / Chassis numbers of suspected vehicles and weapons.


 Determination of cut and welding of metallic sheets / plates.

Computer Forensics
In today’s ever changing criminal world the use of computers for fraud and the pursuit of other
crimes has increased to dramatic proportions. NR3C-FIA is a specialized department to deal with the
computer crime. Computer crime is not only about fraud – online or otherwise – it also encompasses
areas such as pornography, child sex abuse and the sale of black market goods online. The wide
range of data content present in hard drives is potential evidence if seized from a crime scene. The
process of forensic acquisition, analysis and reporting of computer storage devices is Computer
Forensic. NR3C has state of the art computer forensic facility, and posses leading forensic experts
to deal with all computer related crimes.

Mobile Forensics
The increased utility of mobile devices such as smart phones has leveraged the criminals to
communicate and use digital application, resultantly storing tremendous amount of data on the
device. Criminals use smart phones for a number of activities such as committing fraud over e-mail,
harassment through text messages, trafficking of child pornography, communications related to
narcotics, etc. The data stored on smart phones is extremely useful to forensic analysts through the
course of an investigation. The forensic acquisition, analysis and presentation of data content stored
on mobile devices is known as Mobile Forensics. NR3C since inception has dealt with numerous
mobile forensic cases, and also facilitates other government installations on such technical
assistance.

Video Forensics
Video recordings can provide a real time, eyewitness account of a crime so investigators can watch
or hear what transpired. For instance, a surveillance video captures a bank robbery in progress, or a
hidden camera records. For most crimes, however, high quality video recordings are often not
available. This is where forensic video expertise can help. Forensic experts have many techniques
to enhance recordings that can bring out details and provide a clearer picture of what occurred.
NR3C experts have engaged in numerous video forensic investigations and have successfully
identified criminals and terrorist through this forensic method.

Network Forensics
Network forensics is the capture, storage, and analysis of network events. Regardless of the name,
the idea is the same: record every packet of network traffic (all emails, all database queries, all Web
browsing–absolutely all traffic of all kinds traversing an organization’s network) to a single
searchable repository so the traffic can be examined in detail. It also includes the forensic
examination of network devices such as router, VOIP gateways, IDS/IDP etc. The network device
configuration and related data present in these devices is important in cyber crime cases. NR3C has
a specialized team to investigate and process network forensic cases. They have successfully
analyzed numerous network forensic investigations in past.

Technical Training
Development of human resource leverages the organizations to perform efficiently. Trainings,
seminars and workshops are instant source of information that gives an edge to professionals to
understand and excel in their respective fields. NR3C over years has trained around thousands of
individuals of academia, law enforcement agencies, judiciary, police academy, intelligence agencies
etc. Trainings disseminated in relation to digital forensic comprehension of interpreting forensic
reports, evidence extraction methods, laws application to judicial community. 12, 458 individuals
from all walks of life ranging from a 6 grade kid to a decorated officers have been trained by NR3C
to serve the purpose cyber crime mitigation

NAB
ABOUT US

The National Accountability Bureau is Pakistan's apex anti-corruption organization. It is charged with the
responsibility of elimination of corruption through a holistic approach of awareness, prevention and enforcement. It
operates under the National Accountability Ordinance-1999. With its headquarter at Islamabad, it has seven regional
offices at Karachi, Lahore, Peshawar, Quetta, Rawalpindi, Multan and Sukkur. It takes cognizance of all offences
falling within the National Accountability Ordinance (NAO).

For the initial three years, the focus of its functions was directed only at detection, investigation and prosecution of
white-collar crime. Those prosecuted include politicians, public service officials and other citizens who were either
guilty of gross abuse of powers, or through corruption had deprived the national exchequer of millions or resorted to
other corrupt practices. In February 2002, NAB launched the National Anticorruption Strategy (NACS) project. The
NACS team conducted broad based surveys, studied external models of international anti-corruption agencies and
involved local stakeholder. All pillars of National Integrity System were studied in detail. After identifying the causes
of corruption in each pillar, a comprehensive strategy and a detail action plan was recommended. Breaking away
from traditional enforcement based routines NACS has recommended a comprehensive process. Relevant
amendments have been made in NAO and now NAB is empowered to undertake prevention and awareness in
addition to its enforcement functions.

Top 

  VISION

The National Accountability Bureau is to be a credible, effective, efficient and dynamic anti-corruption organization
creating an enabling environment for a corrupt free society.

Top 

  MISSION

The National Accountability Bureau is to work to eliminate corruption through a comprehensive approach
encompassing prevention, awareness, monitoring and combating.

Top 

  OBJECTIVES

The National Accountability Bureau derives its objectives from its approved project document titled 'National Anti
Corruption Strategy' or NACS and defines them as follows:

Short Term Setting in motion systemic improvements that will strengthen the national integrity system and the
people against corruption.

Long Term The elimination of corruption by engaging all the stakeholders in the fight against corruption, through a
programme, which is holistic, comprehensive and progressive.

Top 

  SALIENT FEATURES of the NAO
o Setting up of a National Accountability Bureau so as to eradicate corruption and corrupt practices and hold
accountable all those persons accused of such practices and matters.

o Take effective measures for the detection, investigation and prosecution of cases involving corruption,
corrupt practices, misuse / abuse of powers, misappropriation of property, kickbacks & commissions and
ensuring speedy disposal.

o Recovery of the outstanding amount from those persons who have committed willful default in repayments
to banks, development finance institutions (DFIs), government and other agencies.

o Implement policies and procedures for awareness, prevention, monitoring and combating corruption in the
society.

Top 

  ACCOUNTABILITY

WHY
For better future of our generations.
For implementation of transparency.
For speedy accountability drive.

HOW
Provide evidence against CORRUPT PUBLIC OFFICE HOLDER
Guide us through constructive critique & suggestions.
Provide information regarding money being siphoned abroad and regarding foreign assets of fugitives and their
activities.

What Do You Get In Return


Informers are rewarded, if evidence leads to conviction.
More details available on personal contact.
While Passing Information Fill In Following:

1. Identity
Name of the individual or group involved in corruption. For example Mr. XYZ or ABC Company or ABC Group of
Companies etc.
2. Occupation
Occupation/status or position of the individual. For example Chairman XYZ, Political figure, Civil Bureaucrat Name,
Ministry of XYZ, Director of ABC Group etc.
3. Address
Official / Business / Residential or Hideout.
4. Type of Corruption
Type of corruption indulged in. For example Corruption and corrupt practices, Misuse of Authority, Bank default and
Loan write off.
5. Assets
The known or suspected assets of the culprit.
6. Evidence.
a. Evidence Held.
b. Where evidence is held or can be obtained.
c. Name(s) and addresses of witnesses.
7. Miscellaneous information.
Any thing which is not covered above.
Please provide us your comments and suggestions on the following links:
Feed Back Form, (click for further Information)
Performance and notable operations[edit]
Financial recoveries[edit]
Since its formation, the institution has recovered over ₨. 240 Bn (approximately $ 4 Bn) from
corruption committed by country's elite politicians, bureaucrats, former military officers, and those
involved in the white-collar crimes. According to Musharraf the "NAB was created to put the fear of
God in the corrupt, as Pakistan was on the brink of being declared a failed state before he came to
power."
In its research studies published by NAB in 2011, the institution has recovered ₨. 119.5Bn from
bank defaults and provided ₨. 60Bn to restructured the banks.[8] by september 2019 it has also
recovered Rs 71b under the chairmanship of javed iqbal.

Prosecution and investigations[edit]


In 2011, the NAB reported that it has 1791 cases that were under prosecution, out of which, 1093
cases prosecutions were completed.[9]

Infrastructure[edit]
In 2013, NAB inducted a large number of officers and conducted their Investigation Training at
COMSATS University in Islamabad. The officers, after successful completion of the Seven Months
off-job and 2 Months on-job training, were posted to different bureaus within the country. There are
various challenges currently faced by NAB, including a slow judicial process, difficulty in collecting
prosecutable evidence since the majority of country's public record is not electronically archived or
integrated into a central database.
NAB employees are consistently kept up to date with new training programs in financial crimes.

Criticism[edit]
The National Accountability Bureau has been criticized by the Supreme Court for mismanagement.
Justice Jawad S. Khawaja of the Supreme Court criticized the institution for its practice of 'plea
bargain' and described it as 'institutionalized corruption.' Under the said practice the Bureau arrests
suspects and negotiates for an out-of-court settlement under which the suspect is made to sign a
confession and deposit funds of an amount determined by NAB. Justice Khawaja stated during court
proceedings that he believed some NAB officials warn influential suspects before arrest to allow
them sufficient time to escape.[10][11]

ANF

MANADATE

 To inquire, investigate and prosecute all offences related or connected


with intoxicants, narcotics and precursors.
 Trace and freeze the assets.
 Coordinate elimination and destruction of Poppy cultivation.
 Provide assistance to other law enforcement agencies and share
information with all national and International agencies on drug related matters.
 Arrange and coordinate training of own staff and members of other law
enforcement agencies related to narcotics.
 Maintain liaison with all international narcotics control authorities and
represent Pakistan in conferences and seminars.
 Perform any other related functions that may be assigned by the Federal
Government.
FUNCTIONS

 Conduct of drug law enforcement operations through its field component


and subsequently ensuring culmination of law enforcement operational cycle
through legal proceedings.
 Investigation, freezing, litigation, legal disposal of assets acquired with
drug money.
 Launching of yearly campaigns by relevant Regional Directorate(s) to
eliminate/destroy Poppy cultivation.
 Training of own and other law enforcement agencies' students in Anti
Narcotics Force Academy.
 Acting as leading drug law enforcement agency, heads the Inter Agency
Task Force that comprises all relevant law enforcement agencies.
 Has signed Memorandum of Understanding with numerous countries and
works in close coordination with their drug law enforcement agencies.
 All above functions are conducted in coordination with relevant
Directorates in Headquarters Directorate General Anti Narcotics Directorate.

Anti Narcotics Force has a strategic role in fight against the drugs. Specific
responsibilities have been given by the Federal Government through SRO
787(I)/2004 dated 16 September 2004 to Anti Narcotics Force, Provincial Excise
and Police Departments, Customs Department, Frontier Corps (Balochistan),
Frontier Corps (Khyber Pakhtunkhwa), Pakistan Rangers (Sindh), Pakistan
Rangers (Punjab), Coast Guards and Maritime Security Agency to exercise
powers and perform functions under Sections 21, 22, 23, 37(2) and 38 of Control
of Narcotic Substances Act, 1997 (XXV of 1997) within the areas of their
respective jurisdiction.

MOTO/VISION/MISSION

Moto : "Drug Free Society"


Vision: ANF functions through multipronged strategy, which also focuses on
reducing vulnerability through awareness and rehabilitation of addicts.
Mission : Pakistan being in the neighborhood of epicenter of world, Opium and
Heroin production has become both a transit and victim state and is facing ever
increasing spillover effects. Despite persistent and commendable efforts of all
stakeholders, illicit trafficking of opium and heroin remains a serious concern.
Given the scale and size of the problem, the Pakistan Government has put in
place stringent measures to contain the flow of illicit drugs. Pakistan possesses
single mandated Anti Narcotics Force (ANF) under Ministry of Narcotics Control
(MNC), working closely with domestic counterparts and International partners.
ANF is a principal agency in Pakistan for combating supply and demand
reduction of illicit narcotic drugs that enter Pakistan mainly through the long
porous border with Afghanistan.

ANF Intelligence and Investigation[edit]


There are distinct stages for Investigating a case.

Stages[edit]
Assets of the convicts in narcotics cases are confiscated in favour of Federal Government through
following stages usually:

 Tracing: Finding out the true sources, disposition, movement or ownership of assets and
includes determining the movement or conversion of assets by any means.
 Freezing: Prohibiting by an order made by the Special Court or an officer authorised under
CNS Act 1997 the transfer, conversion, disposal or movement of any assets and includes the
holding, controlling, assuming custody or managing any assets in pursuance of such order and,
in the case of assets which are perishable the disposal thereof
 Forfeiture: Forfeiting of asset /property in favour of Federal Government.
 Realization: On finalisation of forfeiture of assets and execution petition, the assets are
realised in favour of Federal Government.
Laws[edit]
Assets Investigation is conducted under relevant sections / provisions provided by the following
laws:

 Control of Narcotics Substance Act, 1997 [1]


 Anti Narcotics Force Act, 1997
 Criminal Procedure Court 1898
 Anti Money Laundering Act, 2010
 Prevention of Smuggling Act, 1977
The Operations[edit]
According to activities of smugglers and areas which facilitate their interest, the operations of the
Anti Narcotics force can be divided into following two categories:

 Anti Narcotics, Arms and Ammunition


 Anti Explosive Chemicals
 Anti Money Laundering

ANF's Charter of Duty[edit]


ANF official checking passengers at Jinnah International Airport

Anti Norcotics Force (ANF) is responsible to perform the following


Supply Reduction
Limiting the smuggling trafficking and distribution of Narcotics. Coordinating eradication of opium
poppy. Ensuring no heroin lab becomes functional. Inquire/Investigate assets of drug barons.
Pursuing Legal cases relentlessly.
Demand Reduction
Reducing the demand of illicit drugs through preventive education, treatment and rehabilitation as
well as harm reduction programmes.
Coordination Liaison at National and International Level
Enhancing international co-operation in the fight against drugs and liaison with the United Nations
Office on Drugs and Crime, International Narcotics Control Board, International Police, Narcotics
Affairs Section (US Embassy), Drugs Enforcement Agency, Foreign Anti Narcotics Community, Drug
Liaison Officers etc.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy