Cybercrime Cases Under Peca
1. Case: Gul Panra vs Unknown
Offense: Defamation through electronic means (Section 20, PECA)
Details:
In this case, a famous singer, Gul Panra, filed a complaint against unknown persons who posted defamatory content and fake photos on social media platforms damaging her reputation. The court used PECA’s provisions to investigate and track the cyber offenders. Using digital forensics, the authorities traced the origin of the posts and initiated legal proceedings under Section 20 (Defamation) of PECA.
Significance:
Demonstrated the application of PECA in protecting reputation against cyber defamation.
Highlighted the use of digital evidence and cyber forensic tools to identify anonymous offenders.
2. Case: Dr. Arsalan Iftikhar vs Unknown (Cyberstalking and Harassment)
Offense: Cyber harassment (Section 21, PECA)
Details:
Dr. Arsalan Iftikhar received threatening messages and obscene content through emails and social media platforms. He reported the harassment, and authorities under PECA took strict action. The investigation showed that the accused used fake identities to stalk and harass the victim electronically.
Outcome:
The accused was arrested and charged under Section 21 for cyber harassment. This case set a precedent for victims of cyber harassment to seek legal protection under PECA.
3. Case: National Bank of Pakistan (Financial Cyber Fraud Case)
Offense: Unauthorized access and data theft (Sections 3 & 4, PECA)
Details:
Hackers managed to breach the National Bank of Pakistan's online system and illegally transferred funds. This was one of the largest cyber fraud cases involving unauthorized access and electronic fraud.
Legal Action:
The investigation involved cyber forensic analysis of the transaction logs, tracing IP addresses, and identifying the cybercriminals. PECA provisions related to unauthorized access to critical systems and data theft were used to prosecute the offenders.
Significance:
This case underscored the vulnerability of financial institutions to cyber-attacks and the role of PECA in addressing cyber fraud.
4. Case: Cyber Terrorism Case - Banned Terrorist Organization Using Social Media
Offense: Cyber terrorism (Section 11, PECA)
Details:
An investigation revealed that members of a banned terrorist organization were using social media platforms to spread propaganda, recruit members, and incite violence. The government invoked Section 11 of PECA dealing with cyber terrorism to arrest and prosecute the suspects.
Outcome:
The suspects were charged under cyber terrorism laws, showcasing PECA’s role in combating threats to national security through electronic means.
5. Case: Fake Government Website Case
Offense: Identity theft and impersonation (Sections 7 & 8, PECA)
Details:
A fake website mimicking a government portal was created to deceive citizens into sharing sensitive personal information. The authorities detected the fraudulent site and used PECA to investigate the impersonation and theft of identities.
Action Taken:
The perpetrators were prosecuted under identity theft and impersonation laws of PECA. This case demonstrated the Act’s relevance in tackling phishing and fake websites.
Summary of Important PECA Sections Used in Cases:
Section 3: Unauthorized access to information systems.
Section 4: Unauthorized copying or transmission of data.
Section 7: Identity theft.
Section 8: Impersonation.
Section 11: Cyber terrorism.
Section 20: Defamation via electronic means.
Section 21: Cyber harassment.

0 comments