Functions of Anti Corruption Wing
Functions of Anti Corruption Wing
Functions of Anti Corruption Wing
The Anti Corruption Wing is an important part of FIA, which deals with organized crimes other than
terrorism and human trafficking. This wing is headed by a senior police officer as Additional Director
General at the HQ who is responsible for assisting the Director General and coordinating operations
of the zonal directors.
Anti-Corruption
Spurious Drugs
Counterfeit Currencies
PPC and other Special Laws
Important Cases of ACW
Spurious Drugs
The illicit trade of production/ supply, distribution, and sale of drugs are posing a serious threat to the
lives of the innocent citizens and has serious ramifications such as:
FIA’s crime wing has taken up the challenge to eradicate the illicit trade in drugs and has recovered
spurious drugs valuing over Rs.416 million and seized eight illegal manufacturing units. Special drug
units have been established in the provincial headquarters. The FIA has registered 67 cases in the
years 2005 & 2006.
Counterfeit Currencies
The increasing instances of counterfeiting of currency in various parts of the country hold serious
repercussions for the national economy. FIA crime wing is responsible to deal with the currency
counterfeiting. A task force is working led by the Governor, State Bank of Pakistan and the FIA is a
member thereof. The FIA is maintaining a database of all the culprits of counterfeit currency cases
across the country. The FIA coordinates with the provincial/ local law enforcement agencies in cases
registered in their jurisdictions.
On receipt of source information regarding electricity theft by Maqsood Ahmed owner M/s
Aziz Steel Re-Rolling Mills, M.S. Road, Momin Pura, Daroghawal Lahore in connivance with
the employees of LESCO Shalimar Division Lahore, a team of FIA officials along with
technical expert Mr. Adnan Riaz Mir Manager Testing & Inspection LESCO Lahore raided
the above mentioned factory and on checking the meters installed were found dead stop
against a running load of 600 amperes. The owner was using the supply through direct
hooking methods by making hole in the supply lines and fixing the lines with the floor with
wooden clamps. Two air circuit breakers were installed to switch over the load to meter or
direct hooking
The FIA Crime Circle Lahore registered a case and arrested the accused Maqsood Ahmed
on 12.06.2009. Crime Circle also recovered switching equipment used for theft of electricity
and amount of Rs. 3, 20, 000/- from accused Maqsood Ahmed during remand.
Investigation is at final stage and shall be concluded within a fortnight
An information was received on 12-06-09 at FIA Crime Circle Lahore that some persons are
involved in manufacturing, preparing, filling, selling and the distribution of Spurious Drugs. A
raid was conducted by the officials of FIA Crime Circle Lahore and as a result of raid
approximately 65000 empty ampoules labeled with “Dyperon “, three blocks of printing
screens and two Italian made ampoule manufacturing machines etc were recovered.
Shahzad Anjum owner and Hamid Ali Manager of Factory residents of Lahore were present
at the premises and did not have any plausible reply against the allegations of printing forged
labels / marks of drugs for using them as genuine. Hence both of them were arrested and
case was registered on 4/7/2009 u/s 420, 468, 471, 109 PPC in FIA Crime Circle,
Lahore.During investigation the accused Munir Ahmed recorded his confessional statement
U/S 164 CrPC.
On receipt of Istighasa from Drug Inspector on 18.07.2009, relevant sections of Drug Act,
1976 have been added. Interim Challan was submitted in the Drug Court on 20.07.2009. the
accused are in judicial lock up. Post arrest bail has been adjourned for 22.07.2009 on
20.07.2009.
Investigation is under progress to detect where the injections were being supplied.
A case was registered on the complaint of Principal Edwards College Peshawar in PS East
Peshawar Cantt for the embezzlement of Rs. 60 Million in the accounts of the college against
Haroon Shahid, Asstt. Accountant Edwards College Peshawar Nimatullah and Ijaz.. Being
Federal employees the case was transferred to FIA Peshawar for investigation.
FIA Crime Circle Peshawar registered the subject case and arrested the accused. All the
accused were tactfully interrogated by the FIA officials due to which accused Haroon Shahid
confessed his guilt before the court and the judicial magistrate recorded his statement U/S
164/364 CrPC. FIA Crime Circle also recovered the amount of Rs. 304,000/- and two
vehicles
Further investigation is in progress.
Operation Sukuk
This case was registered in FIA Crime Circle Lahore after enquiry against employees of
WAPDA officers/officials and others on the charges of misappropriation, forgery and
impersonation etc. The accused were found involved in the illegal transfer and sale of
WAPDA SUKUK BONDS valuing more than Rs. 190 Million. These bonds were originally
purchased by M/s National Fertilizer Corporation. The accused in connivance with one
another transferred the same to Swift Engineering Solutions, Lahore and later to Al-Meezan
Investment Management Ltd Karachi. The crime proceeds were withdrawn from branches of
MCB and HBL Main Market Gulberg Lahore.
FIA Crime Circle Lahore arrested 8 accused persons out of 15 and recovered cash & prize
bonds of amounting to Rs. 2.525 Million during the house search of 2 accused persons
Muhammad Naqi Riaz (Mastermind) and Syed Riaz Hussain Shah . Total cash recoveries
amount to Rs. 9.8 Million. Properties purchased form crime proceeds valuing Rs. 17.5 Million
approximately have been recovered. Accused have been placed on Watch List. Help from
SOCA is being sought to apprehend accused Muhammad Naqi Riaz.
Further investigation is in progress.
Raid Report
Upon receipt of a complaint from Shakeel Ahmad s/o Lal Muhammad r/o Jalalpur Peer Wala
Distt. Multan that Muhammad Arif SDO MEPCO sub-Division Jalapur Peer Wala is
demanding Rs. 5000/- as illegal gratification to revise the detection bill of Rs. 23,600/- for
May 2009 of his tube-well connection, a raiding party of FIA under the supervision of a
Magistrate was constitute.
FIA Crime Circle Multan conducted a raid and caught red-handed Muhammad Arif SDO
MEPCO (BPS-17) while receiving illegal gratification of Rs. 5000/- from complaint Shakeel
Ahmad. Case FIR No. 34/09 dated 19-06-2009 U/S 161 PPC R/W 5(2)47 PCA has been
registered in FIA Crime Circle Multan against Muhammad Arif SDO who has been arrested
in this case.
Investigation is in progress.
It is to inform that an exemplary conviction has been awarded to accused waris s/o Ghulam
Hussain Incharge Utility Stores Corporation Johi, District Dadu, Sindh in case FIR No. 02/97
dated 23/02/1997, registered u/s 409 PPC 5(2) Act 1947 of FIA Sindh against him. He was
involved in misappropriation of stocks worth Rs. 2, 12,519/-. On 29/08/2009 the accused was
convicted and sentenced by the Honourable Court of Special Judge (Central) Hyderabad to
suffer R.I for 10 years and also to pay a fine of Rs. 3,00,000/-, in default of payment of fine
further S.I for 06 months.
This is an exemplary conviction ever awarded to any accused in such cases
Smuggling of migrants:
Smuggling of migrants involves the procurement for financial or other material benefit of illegal entry
of a person into a State of which that person is not a national or resident.According to the prevention
of smuggling of migrant Act,2018,Smuggling of migrant Act is defined as,"the facilitation, for
benefits,of illegal entry of another person who is a foreigner,into Pakistan or from Pakistan into a
country of which the person is not a national or a permanent resident,or is a citizen of Pakistan into
another country of which the person is not a national or a permanent resident."
Functions of AHS
To curb the menace of Human Traffickers/Human Smuggling, by following the strategy i.e
Protection, prosecution, punishment, prevention and promotion.
To Provide policies / guidelines to the field offices and circles to combat human trafficking
make sure its implementation through its field offices.
Arrangement of special seminars and training programs for the capacity building of its field
staff.
To monitor the performance of operational circles.
To maintain a data base of Human Trafficking / Smuggling crime.
To make analysis and research of the crime data in order to formulate policies accordingly.
To share information related to Human Trafficking and Migrant Smuggling with the ministry of
interior, Senate, National Assembly, FIA Link offices and international organizations as an
active partner of world community against Human Trafficking.
To maintain the record of most wanted Smugglers / Traffickers and Publication of Most
wanted Human Trafficker / Smugglers yearly Redbook. To maintain the record of most
wanted Smugglers / Traffickers and Publication of Most wanted Human Trafficker /
Smugglers yearly Redbook
To monitor counter measures against Human Traffickers / Smugglers with the coordination
of other law enforcement Agencies.
To process the complaints received to this directorate, through its operational circles and get
its feedback.
To prevent and protect victims of Human Trafficking / Smuggling through apprehension of
Human trafficker/smugglers.
Verification of Visas / Passports from concerned Embassies in order to stop travelling
through forged documents.
APPLICABLE LAWS
Prevention of Trafficking in Persons Act 2018.
In order to combat the menace of human trafficking especially in respect of women and
children (victim), the law "Prevention of Trafficking in Person Act 2018" has been enacted
which says “Anyone who commits the offence of trafficking in person is liable to be punished
with imprisonment upto seven years or fine upto one million or with both. But if this offence is
committed in respect of women and children the punishment has been extended upto ten
years.”
Forged Documentation
The Human traffickers / smugglers mostly use forged documents to travel abroad.So, concerned
departments are being involved and taken into loop to adopt measures to avoid forgery of
documents and solid evidence collection
Interpol
Interpol issues Red notices against proclaimed offenders of human trafficking and Smuggling.These
offices in coordination with other NCBs extradite and deport the accused wanted in human
Trafficking and Smuggling cases in Pakistan
CTW Vision
To identify, arrest and prosecute Most Wanted Terrorists and to become a centre of excellence for
specialized counter terrorist investigations.
Case FIR
No. 291
dated
06.06.08
Rawalpin
di
(attempte
d suicide
attacks
on
President
Camp
Office
RWP).
Case FIR
No. 09/08
dated
19.06.08
Explosive
Act FIA
Crime
Circle
Lahore.
Case FIR
No. 10/08
FIA
Crime
Circle
Rawalpin
di.
SIG is
part of
JIT
investigat
ing
Marriott
Bomb
Blast
(Case
FIR No.
127/08
dated
20.09.08
Police
Station:
Secretari
at
Islamaba
d).
Case FIR
No. 01/09
SIU FIA
Terrorist
attacks
on
Mumbai.
Final
Report
submitted
to ATC
Rawalpin
di.
Director
SIG is
heading
JIT
constitute
d by the
Federal
Governm
ent to
investigat
e
Mohtara
ma
Benazir
Bhutto
Assassin
ation
case
Rawalpin
di.
Books Published
Hand book on Cyber Terrorism.
Hand book on Explosives, Bombs & IEDs.
Hand book on Terrorist Finance Investigations.
INTERPOL
NATION
AL
CENTRA
L
BUREAU
PAKISTA
N OF
INTERPO
L
The
International
Criminal
Police
Organization
- ICPO,
INTERPOL
was founded
in 1914 with
the founding
principle to
coordinate
efforts
relating to
international
police
cooperation.
The
membership
of
INTERPOL
today
consists of
187
countries,
with its
General
Secretariat
in Lyon,
France.
Each
member
country
establishes
a National
Central
Bureau NCB
to serve as
the focal
point for that
nation's
involvement
in the
collection of
evidence,
the pursuit
of fugitives,
locating
missing
persons
including
missing
children, the
identification
of
unidentified
bodies, and
the
exchange of
or request
for
information
related to
law
enforcement
investigation
s across
international
borders.
Pakistan became member of ICPC (International Criminal Police Commission) in 1952. The National
Central Bureau (NCB) of Pakistan was created under the new constitution of ICPO in 1957. It is
attached with Federal Investigation Agency since its inception. The Director General FIA is an ex-
officio, the Head of NCB-Pakistan. In 1990 the Secretariat General (SG) of ICPO Interpol Lyon
introduced new Communication System namely X-400 to exchange mails electronically amongst all
Interpol member states. NCB Pakistan was connected with X-400 system in 1999. Interpol SG Lyon
replaced X-400 System in 2002 with new Web based Communication System namely I/24-7. In May
2004, Interpol SG Lyon provided the equipments for the system free of cost. During 2005, Interpol
SG Lyon has also provided equipments for the extension of I-24/7 Communication System beyond
NCB-Pakistan Islamabad.
National
Reponse
Centre for
Cyber Crime
(NR3C), is the
latest
introduction to
mandate of the
FIA, primarily to
deal with
technology
based crimes in
Pakistan. It is
the only unit of
its kind in the
country and in
addition to the
directly
received
complaints also
assists other
law
enforcement
agencies in
their own
cases.
NR3C has
expertise in
Digital
Forensics,
Technical
Investigation,
Information
System
Security Audits,
Penetration
Testing and
Trainings. The
unit since its
inception has
been involved
in capacity
building of the
officers of
Police,
Intelligence,
Judiciary,
Prosecutors
and other Govt.
organizations.
NR3C has also
conducted a
large number of
seminars,
workshops and
training/awaren
ess programs
for the
academia,
print/electronic
media and
lawyers. Cyber
Scouts is the
latest initiative
of NR3C, in
which, selected
students of
different
private/public
schools are
trained to deal
with computer
emergencies
and spreading
awareness
amongst their
fellow students,
teachers and
parents.
VISION
A law enforcement agency that combats Cyber Crime, provides state of the art digital forensic
services, enjoys the respect in the society for its integrity, professional competence, impartial attitude
and serves as a role model for provincial police forces.
MISSION
To achieve excellence by promoting culture of merit, enforcing technology based law, extending
continuous professional training, ensuring effective internal accountability, encouraging use of
technology and possessing an efficient feedback mechanism.
SERVICES
COMPUTER FORENSICS
In today’s ever changing criminal world the use of computers for fraud and the pursuit of other
crimes has increased to dramatic proportions. NR3C-FIA is a specialized department to deal with the
computer crime. Computer crime is not only about fraud – online or otherwise – it also encompasses
areas such as pornography, child sex abuse and the sale of black market goods online. The wide
range of data content present in hard drives is potential evidence if seized from a crime scene. The
process of forensic acquisition, analysis and reporting of computer storage devices is Computer
Forensic. NR3C has state of the art computer forensic facility, and posses leading forensic experts
to deal with all computer related crimes.
MOBILE FORENSICS
The increased utility of mobile devices such as smart phones has leveraged the criminals to
communicate and use digital application, resultantly storing tremendous amount of data on the
device. Criminals use smart phones for a number of activities such as committing fraud over e-mail,
harassment through text messages, trafficking of child pornography, communications related to
narcotics, etc. The data stored on smart phones is extremely useful to forensic analysts through the
course of an investigation. The forensic acquisition, analysis and presentation of data content stored
on mobile devices is known as Mobile Forensics. NR3C since inception has dealt with numerous
mobile forensic cases, and also facilitates other government installations on such technical
assistance.
VIDEO FORENSICS
Video recordings can provide a real time, eyewitness account of a crime so investigators can watch
or hear what transpired. For instance, a surveillance video captures a bank robbery in progress, or a
hidden camera records. For most crimes, however, high quality video recordings are often not
available. This is where forensic video expertise can help. Forensic experts have many techniques
to enhance recordings that can bring out details and provide a clearer picture of what occurred.
NR3C experts have engaged in numerous video forensic investigations and have successfully
identified criminals and terrorist through this forensic method.
NETWORK FORENSICS
Network forensics is the capture, storage, and analysis of network events. Regardless of the name,
the idea is the same: record every packet of network traffic (all emails, all database queries, all Web
browsing–absolutely all traffic of all kinds traversing an organization’s network) to a single
searchable repository so the traffic can be examined in detail. It also includes the forensic
examination of network devices such as router, VOIP gateways, IDS/IDP etc. The network device
configuration and related data present in these devices is important in cyber crime cases. NR3C has
a specialized team to investigate and process network forensic cases. They have successfully
analyzed numerous network forensic investigations in past.
TECHNICAL TRAINING
Development of human resource leverages the organizations to perform efficiently. Trainings,
seminars and workshops are instant source of information that gives an edge to professionals to
understand and excel in their respective fields. NR3C over years has trained around thousands of
individuals of academia, law enforcement agencies, judiciary, police academy, intelligence agencies
etc. Trainings disseminated in relation to digital forensic comprehension of interpreting forensic
reports, evidence extraction methods, laws application to judicial community. 12, 458 individuals
from all walks of life ranging from a 6 grade kid to a decorated officers have been trained by NR3C
to serve the purpose cyber crime mitigation
CYBER CRIME
Any activity commissioned via computer, digital devices and networks used in the cyber realm, and
is facilitated through the internet medium. It can include the distant theft of information belonging to
an individual, government or corporate sector through criminal tress-passing into unauthorized
remote systems around the world. It includes from stealing millions of rupees from online bank to
harassing and stalking cyber users.
Cyber Crime also includes sending viruses on different systems, or posting defamation messages.
Commission of cyber crime can be:
Cyber crime has now surpassed illegal drug trafficking as a criminal moneymaker
Somebody’s identity is stolen every 3 seconds as a result of cyber crime
Without a sophisticated security package, your unprotected PC can become infected within
four minutes of connecting to the Internet.
Social networking
Online banking
Internet surfing
Audio & video communication
Entertainment
Online shopping
Map directions / GPS
Online auction
Information sharing
Medical assistance
Online games
WEBSITE DEFACEMENT
Website defacement is an attack on a website that changes the visual appearance of the site or a
webpage. This is typically the work of system crackers, who break into a web server and replace the
hosted website with one of its own. The most common method of defacement is using SQL
Injections to log on to administrator accounts. Defacements usually consist of an entire page. This
page usually includes the defacer’s pseudonym or “Hacking Codename.” Sometimes, the Website
Defacer makes fun of the system administrator for failing to maintain server security. Most times, the
defacement is harmless, however, sometimes it can be used as a distraction to cover up more
sinister actions such as uploading malware or deleting essential files from the server. NR3C has
successfully investigated cases relating to website defacement.
CYBER BULLYING
Cyber stalking (also called cyber harassment) is when someone uses the Internet to threaten or
make unwanted advances towards someone else. This sort of harassment can cause physical,
emotional, and psychological damage to the victim. Children are particularly vulnerable because of
their trusting nature and give away their personal information. This information later is used against
them for stalking purpose, therefore the NR3C officials advice that until the person is not a trusted
individual, no information should shared over the internet.
CYBER STALKING
Using the Internet to threaten or make unwanted advances towards someone else Cyber stalking
(also called cyber harassment) is when someone uses the Internet to threaten or make unwanted
advances towards someone else. This sort of harassment can cause physical, emotional, and
psychological damage to the victim. Children are particularly vulnerable because of their trusting
nature
CHILD PORNOGRAPHY
The internet evolution has made children a viable victim to the cyber crime. As more homes have
access to internet, children use the internet and chances have increased where they can fall victim
to the aggression of pedophiles. The easy access to pornographic contents available over the
internet lowers the inhibition of the children. Pedophiles lure the children by distributing pornographic
material, and try to meet them for sexual activities which also include collection of their explicit
photographs and videos. Mostly pedophiles try to contact children in chat rooms posing as
teenagers, and start to befriend them to win their confidence.
Each year, countless children around the world fall prey to sexual predators. These young victims
are left with permanent psychological, physical, and emotional scars. When a recording of that
sexual abuse is made or released onto the Internet, it lives on forever. It haunts the children depicted
in it, who live daily with the knowledge that countless strangers use an image of their worst
experiences for their own gratification. NR3C, cyber crime unit has zero tolerance for pedophiles,
and is driven to make cyber space a safe place for our children.
SOCIAL ENGINEERING
Social engineering is a technique used by cyber criminals to get access to confidential information.
With social engineering, attackers use manipulation and deceit to trick victims into giving out
confidential information. Some of the social engineering methods used by attackers:
Sending messages that contain dangerous attachments (e.g. malware) with text that
encourage people to open the attachments.
Pretending to be the main administrator of a local network and asking for the victim’s
password in order to perform a maintenance check.
Telling a victim over the phone that he/she has won a prize, in return they ask for a credit
card number to deliver it.
Asking for a user’s password for a certain Internet service, such as a blog, and later use the
same password to access user’s computer. This technique works because users often use
the same passwords for many different portals.
DATA THEFT
Data theft is the act of stealing computer-based information from an unknowing victim with the intent
of compromising privacy or obtaining confidential information. Data theft is increasingly a problem for
individual computer users, as well as big corporate firms. The following categories are most common
in data theft cases.
E-commerce: You should make sure that your data is safe from prying eyes when you sell or
buy things on the Web. Carelessness can lead to leaking your private account information.
Password cracking: Intruders can access your machine and get valuable data if it is not
password-protected or its password can be easily decoded (weak password).
Eavesdropping: Data sent on insecure lines can be wiretapped and recorded. If no
encryption mechanism is used, there is a good chance of losing your password and other
private information to the eavesdropper.
Laptop theft: Increasingly incidents of laptop theft from corporate firms occur with the
valuable information stored in the laptop being sold to competitors. Carelessness and lack of
laptop data encryption can lead to major losses for the firm.
IDENTITY THEFT
Identity theft refers to a crime where an individual maliciously obtains and uses another individual’s
personal/sensitive information to commit frauds/scams by using the stolen identity. Mostly this crime
is committed for economic gain. The cyber criminal gains access to an individual’s information by
stealing e-mail details, stored information on computer databases, they eavesdrop over the networks
to get hold of transactions. Identity thefts include but not limited to shoulder surfing, dumpster diving,
spamming, spoofing, phishing, and skimming. NR3C has successfully investigated numerous cases
of identity theft.
FINANCIAL FRAUD
Financial fraud is a criminal behavior in which a person uses wrong methods to trick a victim out of
his money. The Internet fraud scheme is a common example of financial fraud, which includes
emulated online sales, retail schemes, business opportunity schemes, identity theft, market
manipulation schemes, and credit card schemes.
A worm is a software program that uses computer networks and security holes to replicate itself from
one computer to another. It usually performs malicious actions, such as using the resources of
computers as well as shutting down the computers
The Anti-Corruption and Economic Crime Wing of FIA transferred to National Accountability Bureau
(NAB) on 16.08.2004 have been restored vide notification dated 24.10.2008.
At the outset the Addl. Director General FIA conveyed a message of welcome of Director General
FIA Mr. Tariq Khosa, who could not make it to the meeting due to another official commitment. He
then warmly welcomed all the participants, especially the honorary members of Advisory Committee
and apprised them about the global importance of Intellectual Property Right in general and the
challenges on the subject being confronted with, in Pakistan, in particular. Federal Investigation
Agency genuinely needs the valuable guidance / assistance of the Advisory committee in our
commitments to combat the menace of IPR violations, keeping in view the basic core values, he
added.
Case FIR
No. 291
dated
06.06.08
Rawalpin
di
(attempte
d suicide
attacks
on
President
Camp
Office
RWP).
Case FIR
No. 09/08
dated
19.06.08
Explosive
Act FIA
Crime
Circle
Lahore.
Case FIR
No. 10/08
FIA
Crime
Circle
Rawalpin
di.
SIG is
part of
JIT
investigat
ing
Marriott
Bomb
Blast
(Case
FIR No.
127/08
dated
20.09.08
Police
Station:
Secretari
at
Islamaba
d).
Case FIR
No. 01/09
SIU FIA
Terrorist
attacks
on
Mumbai.
Final
Report
submitted
to ATC
Rawalpin
di.
Director
SIG is
heading
JIT
constitute
d by the
Federal
Governm
ent to
investigat
e
Mohtara
ma
Benazir
Bhutto
Assassin
ation
case
Rawalpin
di.
Books Published
Hand book on Cyber Terrorism.
Hand book on Explosives, Bombs & IEDs.
Hand book on Terrorist Finance Investigations.
1. Notwithstanding any thing contained in any other law of the time being in force, the
Federal Government may constitute an Agency to be called the Federal Investigation
Agency for inquiry into, and investigation of the offences specified in the Schedule,
including an attempt or conspiracy to commit, and abetment of, any such offence.
2. The Agency shall consist of a Director General to be appointed by the Federal
Government and such number of other officers as the Federal Government may,
from time to time, appoint to be members of the Agency.
2. Superintendence and administration of the Agency:
1. The Superintendence of the Agency shall vest in the Federal Government.
2. The administration of the Agency shall vest in the Director General who shall
exercise in respect of the Agency such of the powers of an Inspector General of
Police under the Police Act, 1861 (V of 1861), as may be prescribed by rules.
3. Powers of the members of the Agency:
1. Subject to any order which the Federal Government may make in this behalf, the
members of the Agency shall, for the purpose of an inquiry or investigation under this
Act, have throughout Pakistan such powers, including powers relating to search,
arrest of persons and seizure of property, and such duties, privileges and liabilities as
the officers of a Provincial Police have in relation to the investigation of offences
under the Code or any other law for the time being in force.
2. Subject to rules, if any, a member of the Agency not below the rank of a Sub-
Inspector may, for the purposes of any inquiry or investigation under this Act,
exercise any of the powers of an officer-in-charge of a Police Station in any area in
which he is for the time being and, when so exercising such powers, shall be
deemed to be an officer-in-charge of a Police Station discharging his functions as
such within the limits of his station.
3. Without prejudice to the generality of the provisions of the sub-section (1) and sub-
section (2), any member of the Agency not below the rank of Sub-Inspector
authorized by the Director General in this behalf may arrest without warrant any
person who has committed, or against whom a reasonable suspicion exists that he
has committed, any of the offences referred to sub-section (1) of Section 3.
4. For the purpose of the exercise by the members of the Agency of the powers of an
officer-in-charge of a Police Station,” Police Station” includes any place declared,
generally or specially, by the Federal Government to be a Police Station within the
meaning of the Code.
5. If, in the opinion of a member of the Agency conducting an investigation, any
property which is the subject-matter of the investigation is likely to be removed,
transferred or otherwise disposed of before an order of the appropriate authority for
its seizure is obtained, such member may, by order in writing, direct the owner or any
person who is, for the time being, possession thereof not to remove, transfer or
otherwise dispose of such property in any manner except with the previous
permission of that member and such order shall be subject to any order made by the
Court having jurisdiction in the matter.
6. Any contravention of an order made under sub-section (5) shall be punishable with
rigorous imprisonment for a term which may be extend to one year, or with fine, or
with both.
All persons who were members of the Special Police immediately before
such repeal, including the specified persons shall stand transferred to the
Agency and shall, subject to sub-section (5), be entitled to the same terms
and conditions to which they were entitled immediately before such repeal;
and
Any inquiry or investigation pending with the Special Police immediately
before such repeal shall continue to be conducted by the Agency.
2. Notwithstanding the repeal of the said order, but subject to sub-section (4), every
specified person shall continue to be appointed in or under the Provincial Police in or
under which he was holding a post immediately before the commencement of this
Act.
3. On the recommendation of the Director General and with the concurrence of the
Provincial Government concerned, the Federal Government, may direct that such of
the specified persons referred to sub-section (3) as may, within thirty days of the
commencement of this Act, express their willingness to serve in or under the Agency
shall be appointed to posts in or under the Agency.
4. A specified person referred to in clause (a) of sub-section (2) and a person in respect
of whom a direction is issued under sub-section (4) shall, upon the repeal of the said
ordinance or, as the case may be, the issue of such direction, cease to hold a post in
or under the Provincial Police concerned and shall be entitled to the same terms and
conditions of service to which he was entitled immediately before such repeal or the
issue of such directions.
[TOTAL = 96]
2) OFFENCES PUNISHABLE UNDER THE EXPLOSIVE SUBSTANCE ACT, 1908 (VI OF 1908)
3) OFFENCES PUNISHABLE UNDER THE OFFICIAL SECRET ACT. 1923 (XIX OF 1923)
5) OFFENCES PUNISHABLE UNDER THE PREVENTION OF CORRUPTION ACT. 1947 (II OF 1947).
7) OFFENCES PUNISHABLE UNDER THE IMPORT AND EXPORT (CONTROL) ACT. 1950(XXXIX OF 1950)
9) OFFENCES PUNISHABLE UNDER THE PAKISTAN ARMS ORDINANCE, 1965 (W.P. ORD XX OF 1965)
10) OFFENCES PUNISHABLE UNDER SECTION THE 156 OF THE CUSTOMS ACT, 1969(IV OF 1969)
13)(Omitted)
14) OFFENCES PUNISHABLE UNDER THE HIGH TREASON (PUNISHMENT) ACT, 1973 (LXVIII OF 1973)
20) OFFENCES PUNISHABLE UNDER THE EXIT FROM PAKISTAN (CONTROL) ORDINANCE, 1981(XLVI OF
1981)
[21] OFFENCES PUNISHABLE UNDER THE ANTI-TERRORISM ACT, 1997(XXVII OF 1997) TO THE EXTENT
[31] OFFENCES PUNISHABLE UNDER THE PREVENTION OF ELECTRONIC CRIME ACT, 2016
Services
Technical Branch
The technical branch is providing scientific assistance to various units of the F.I.A.NAB, Islamabad,
AJK Police and Railway Police, Federal Government Departments, Banks and Financial Institutions
and (on special request) Provincial Police Departments. Three sections of the Branch are
Questioned Documents section , Fingerprint section and Chemical Analysis section.
Questioned Documents:
Fingerprint
Chemical Testing
Computer Forensics
In today’s ever changing criminal world the use of computers for fraud and the pursuit of other
crimes has increased to dramatic proportions. NR3C-FIA is a specialized department to deal with the
computer crime. Computer crime is not only about fraud – online or otherwise – it also encompasses
areas such as pornography, child sex abuse and the sale of black market goods online. The wide
range of data content present in hard drives is potential evidence if seized from a crime scene. The
process of forensic acquisition, analysis and reporting of computer storage devices is Computer
Forensic. NR3C has state of the art computer forensic facility, and posses leading forensic experts
to deal with all computer related crimes.
Mobile Forensics
The increased utility of mobile devices such as smart phones has leveraged the criminals to
communicate and use digital application, resultantly storing tremendous amount of data on the
device. Criminals use smart phones for a number of activities such as committing fraud over e-mail,
harassment through text messages, trafficking of child pornography, communications related to
narcotics, etc. The data stored on smart phones is extremely useful to forensic analysts through the
course of an investigation. The forensic acquisition, analysis and presentation of data content stored
on mobile devices is known as Mobile Forensics. NR3C since inception has dealt with numerous
mobile forensic cases, and also facilitates other government installations on such technical
assistance.
Video Forensics
Video recordings can provide a real time, eyewitness account of a crime so investigators can watch
or hear what transpired. For instance, a surveillance video captures a bank robbery in progress, or a
hidden camera records. For most crimes, however, high quality video recordings are often not
available. This is where forensic video expertise can help. Forensic experts have many techniques
to enhance recordings that can bring out details and provide a clearer picture of what occurred.
NR3C experts have engaged in numerous video forensic investigations and have successfully
identified criminals and terrorist through this forensic method.
Network Forensics
Network forensics is the capture, storage, and analysis of network events. Regardless of the name,
the idea is the same: record every packet of network traffic (all emails, all database queries, all Web
browsing–absolutely all traffic of all kinds traversing an organization’s network) to a single
searchable repository so the traffic can be examined in detail. It also includes the forensic
examination of network devices such as router, VOIP gateways, IDS/IDP etc. The network device
configuration and related data present in these devices is important in cyber crime cases. NR3C has
a specialized team to investigate and process network forensic cases. They have successfully
analyzed numerous network forensic investigations in past.
Technical Training
Development of human resource leverages the organizations to perform efficiently. Trainings,
seminars and workshops are instant source of information that gives an edge to professionals to
understand and excel in their respective fields. NR3C over years has trained around thousands of
individuals of academia, law enforcement agencies, judiciary, police academy, intelligence agencies
etc. Trainings disseminated in relation to digital forensic comprehension of interpreting forensic
reports, evidence extraction methods, laws application to judicial community. 12, 458 individuals
from all walks of life ranging from a 6 grade kid to a decorated officers have been trained by NR3C
to serve the purpose cyber crime mitigation
NAB
ABOUT US
The National Accountability Bureau is Pakistan's apex anti-corruption organization. It is charged with the
responsibility of elimination of corruption through a holistic approach of awareness, prevention and enforcement. It
operates under the National Accountability Ordinance-1999. With its headquarter at Islamabad, it has seven regional
offices at Karachi, Lahore, Peshawar, Quetta, Rawalpindi, Multan and Sukkur. It takes cognizance of all offences
falling within the National Accountability Ordinance (NAO).
For the initial three years, the focus of its functions was directed only at detection, investigation and prosecution of
white-collar crime. Those prosecuted include politicians, public service officials and other citizens who were either
guilty of gross abuse of powers, or through corruption had deprived the national exchequer of millions or resorted to
other corrupt practices. In February 2002, NAB launched the National Anticorruption Strategy (NACS) project. The
NACS team conducted broad based surveys, studied external models of international anti-corruption agencies and
involved local stakeholder. All pillars of National Integrity System were studied in detail. After identifying the causes
of corruption in each pillar, a comprehensive strategy and a detail action plan was recommended. Breaking away
from traditional enforcement based routines NACS has recommended a comprehensive process. Relevant
amendments have been made in NAO and now NAB is empowered to undertake prevention and awareness in
addition to its enforcement functions.
Top
VISION
The National Accountability Bureau is to be a credible, effective, efficient and dynamic anti-corruption organization
creating an enabling environment for a corrupt free society.
Top
MISSION
The National Accountability Bureau is to work to eliminate corruption through a comprehensive approach
encompassing prevention, awareness, monitoring and combating.
Top
OBJECTIVES
The National Accountability Bureau derives its objectives from its approved project document titled 'National Anti
Corruption Strategy' or NACS and defines them as follows:
Short Term Setting in motion systemic improvements that will strengthen the national integrity system and the
people against corruption.
Long Term The elimination of corruption by engaging all the stakeholders in the fight against corruption, through a
programme, which is holistic, comprehensive and progressive.
Top
SALIENT FEATURES of the NAO
o Setting up of a National Accountability Bureau so as to eradicate corruption and corrupt practices and hold
accountable all those persons accused of such practices and matters.
o Take effective measures for the detection, investigation and prosecution of cases involving corruption,
corrupt practices, misuse / abuse of powers, misappropriation of property, kickbacks & commissions and
ensuring speedy disposal.
o Recovery of the outstanding amount from those persons who have committed willful default in repayments
to banks, development finance institutions (DFIs), government and other agencies.
o Implement policies and procedures for awareness, prevention, monitoring and combating corruption in the
society.
Top
ACCOUNTABILITY
WHY
For better future of our generations.
For implementation of transparency.
For speedy accountability drive.
HOW
Provide evidence against CORRUPT PUBLIC OFFICE HOLDER
Guide us through constructive critique & suggestions.
Provide information regarding money being siphoned abroad and regarding foreign assets of fugitives and their
activities.
1. Identity
Name of the individual or group involved in corruption. For example Mr. XYZ or ABC Company or ABC Group of
Companies etc.
2. Occupation
Occupation/status or position of the individual. For example Chairman XYZ, Political figure, Civil Bureaucrat Name,
Ministry of XYZ, Director of ABC Group etc.
3. Address
Official / Business / Residential or Hideout.
4. Type of Corruption
Type of corruption indulged in. For example Corruption and corrupt practices, Misuse of Authority, Bank default and
Loan write off.
5. Assets
The known or suspected assets of the culprit.
6. Evidence.
a. Evidence Held.
b. Where evidence is held or can be obtained.
c. Name(s) and addresses of witnesses.
7. Miscellaneous information.
Any thing which is not covered above.
Please provide us your comments and suggestions on the following links:
Feed Back Form, (click for further Information)
Performance and notable operations[edit]
Financial recoveries[edit]
Since its formation, the institution has recovered over ₨. 240 Bn (approximately $ 4 Bn) from
corruption committed by country's elite politicians, bureaucrats, former military officers, and those
involved in the white-collar crimes. According to Musharraf the "NAB was created to put the fear of
God in the corrupt, as Pakistan was on the brink of being declared a failed state before he came to
power."
In its research studies published by NAB in 2011, the institution has recovered ₨. 119.5Bn from
bank defaults and provided ₨. 60Bn to restructured the banks.[8] by september 2019 it has also
recovered Rs 71b under the chairmanship of javed iqbal.
Infrastructure[edit]
In 2013, NAB inducted a large number of officers and conducted their Investigation Training at
COMSATS University in Islamabad. The officers, after successful completion of the Seven Months
off-job and 2 Months on-job training, were posted to different bureaus within the country. There are
various challenges currently faced by NAB, including a slow judicial process, difficulty in collecting
prosecutable evidence since the majority of country's public record is not electronically archived or
integrated into a central database.
NAB employees are consistently kept up to date with new training programs in financial crimes.
Criticism[edit]
The National Accountability Bureau has been criticized by the Supreme Court for mismanagement.
Justice Jawad S. Khawaja of the Supreme Court criticized the institution for its practice of 'plea
bargain' and described it as 'institutionalized corruption.' Under the said practice the Bureau arrests
suspects and negotiates for an out-of-court settlement under which the suspect is made to sign a
confession and deposit funds of an amount determined by NAB. Justice Khawaja stated during court
proceedings that he believed some NAB officials warn influential suspects before arrest to allow
them sufficient time to escape.[10][11]
ANF
MANADATE
Anti Narcotics Force has a strategic role in fight against the drugs. Specific
responsibilities have been given by the Federal Government through SRO
787(I)/2004 dated 16 September 2004 to Anti Narcotics Force, Provincial Excise
and Police Departments, Customs Department, Frontier Corps (Balochistan),
Frontier Corps (Khyber Pakhtunkhwa), Pakistan Rangers (Sindh), Pakistan
Rangers (Punjab), Coast Guards and Maritime Security Agency to exercise
powers and perform functions under Sections 21, 22, 23, 37(2) and 38 of Control
of Narcotic Substances Act, 1997 (XXV of 1997) within the areas of their
respective jurisdiction.
MOTO/VISION/MISSION
Stages[edit]
Assets of the convicts in narcotics cases are confiscated in favour of Federal Government through
following stages usually:
Tracing: Finding out the true sources, disposition, movement or ownership of assets and
includes determining the movement or conversion of assets by any means.
Freezing: Prohibiting by an order made by the Special Court or an officer authorised under
CNS Act 1997 the transfer, conversion, disposal or movement of any assets and includes the
holding, controlling, assuming custody or managing any assets in pursuance of such order and,
in the case of assets which are perishable the disposal thereof
Forfeiture: Forfeiting of asset /property in favour of Federal Government.
Realization: On finalisation of forfeiture of assets and execution petition, the assets are
realised in favour of Federal Government.
Laws[edit]
Assets Investigation is conducted under relevant sections / provisions provided by the following
laws: