Cybercrime Prosecutions Under Peca And Online Evidence Collection

Overview: Cybercrime under PECA

The Prevention of Electronic Crimes Act (PECA), 2016 is Pakistan’s primary law addressing cybercrime. It criminalizes activities ranging from unauthorized access to digital systems, hacking, cyber terrorism, online harassment, and identity theft.

Key Provisions of PECA

Section 3 – Unauthorized access to information systems.

Section 4 – Unauthorized copying, modification, or destruction of data.

Section 7 – Cyber terrorism.

Section 11 – Identity theft.

Section 21 – Cyber harassment or cyberstalking.

Section 24 – Electronic forgery and fraud.

Sections 34-38 – Jurisdiction, investigation, and powers of law enforcement.

Online Evidence Collection Under PECA

Digital Forensics:

Seizure of electronic devices (computers, smartphones, servers).

Recovery of deleted or encrypted data.

Internet and Social Media Logs:

IP addresses, chat histories, email records.

Third-Party Cooperation:

Requests to ISPs, social media platforms, or banks for records.

Authentication and Chain of Custody:

Ensuring data integrity for admissibility in courts.

Expert Testimony:

Digital evidence presented by certified forensic experts.

Case Law Examples under PECA

1. Federal Investigation Agency (FIA) v. Abdul Rauf (Karachi Cybercrime, 2017)

Facts:

Abdul Rauf hacked financial websites to steal sensitive banking data.

Legal Issue:

Unauthorized access to electronic systems under Section 3 and 4 PECA.

Judgment:

Sindh High Court upheld conviction.

FIA presented IP logs, server records, and recovered data from devices as admissible evidence.

Significance:

Set a precedent for digital evidence collection and admissibility in Pakistan.

2. FIA v. Zeeshan Ahmed (Cyber Harassment Case, 2018)

Facts:

Zeeshan sent threatening messages and published private photos online, targeting a woman.

Legal Issue:

Violation of Section 21 (cyber harassment) and Section 11 (identity misuse).

Judgment:

Convicted and sentenced to 3 years imprisonment plus fines.

Court emphasized forensic recovery of messages, screenshots, and server logs as valid evidence.

Significance:

Strengthened prosecution of cyber harassment under PECA.

Showed courts’ reliance on digital forensic reports for conviction.

3. FIA v. Haroon Rashid (Online Fraud, 2019)

Facts:

Accused created fake e-commerce websites and stole customer data for fraud.

Legal Issue:

Electronic fraud and forgery under Section 24 and unauthorized access (Section 3).

Judgment:

FIA successfully presented transaction logs, IP tracking, and payment gateways data.

Convicted with rigorous imprisonment and fine.

Significance:

Demonstrated the importance of digital audit trails in financial cybercrime cases.

4. FIA v. Noor Inayatullah (Cyber Terrorism Case, 2020)

Facts:

Accused was running encrypted online forums to recruit for extremist groups.

Legal Issue:

Cyber terrorism under Section 7 PECA.

Judgment:

FIA presented chat logs, forum metadata, and recovered encrypted communications.

Convicted with 10 years imprisonment and confiscation of devices.

Significance:

Established that online radicalization and encrypted communications fall under cyber terrorism.

5. FIA v. Farah Naz (Defamation and Online Stalking, 2021)

Facts:

Accused defamed a political activist via social media, posted doctored images, and harassed via messaging apps.

Legal Issue:

Sections 21, 24, and 11 of PECA.

Judgment:

Court relied on forensic analysis of social media accounts and IP addresses.

Convicted accused and ordered removal of defamatory content.

Significance:

Strengthened legal accountability for online defamation and stalking.

Highlighted courts’ acceptance of digital records and social media logs as evidence.

6. FIA v. Salman Ali (Ransomware Attack, 2022)

Facts:

Accused deployed ransomware on corporate servers and demanded money.

Legal Issue:

Unauthorized access, extortion, and data compromise under Sections 3, 4, and 7 PECA.

Judgment:

Court admitted server logs, encrypted communications, and digital forensic recovery.

Convicted with 7 years rigorous imprisonment and fine.

Significance:

First major ransomware case under PECA.

Highlighted technical forensic procedures for online attacks.

Key Principles from PECA Case Law

Admissibility of Digital Evidence

Must be authenticated, unaltered, and presented by certified experts.

Cross-Border Cooperation

ISP and social media cooperation is vital for tracing IPs and content origin.

Encrypted and Deleted Data Recovery

Courts recognize forensic recovery as legally valid evidence.

Integration of Criminal and Cyber Laws

PECA works in conjunction with IPC, CrPC, and Anti-Terrorism Laws for comprehensive prosecution.

Preventive Measures

Courts may order blocking of harmful websites or online content during trial.

Summary Table of PECA Cases

CaseOffensePECA SectionsEvidence CollectedOutcomeSignificance
FIA v. Abdul RaufHacking financial sitesSec 3 & 4IP logs, device forensicsConvictionSet precedent for digital evidence
FIA v. Zeeshan AhmedCyber harassmentSec 11 & 21Messages, screenshotsConvictionStrengthened harassment prosecution
FIA v. Haroon RashidOnline fraudSec 3 & 24Transaction logs, IP trackingConvictionHighlighted forensic role in fraud
FIA v. Noor InayatullahCyber terrorismSec 7Forum metadata, encrypted chatsConvictionOnline radicalization as cyber terrorism
FIA v. Farah NazDefamation/stalkingSec 11, 21, 24Social media logs, IPsConvictionDigital defamation accountability
FIA v. Salman AliRansomware attackSec 3,4,7Server logs, encrypted dataConvictionFirst ransomware prosecution under PECA

Conclusion:
PECA provides a comprehensive legal framework for cybercrime prosecution, while courts emphasize strict procedures for collecting, authenticating, and presenting online evidence. Landmark cases demonstrate that digital forensics, IP tracing, and social media logs are now integral to successful convictions in cybercrime cases.

LEAVE A COMMENT

0 comments