Criminology Notes
Criminology Notes
Meaning of Criminology
According to an eminent sociologist Sutherland: “Criminology is the body
of knowledge regarding crime as a social phenomenon.”
This definition exhibits sociological bias and regards crime to be re
action to certain set of social factors and causes.’’
According to an eminent criminologist Elliot: “Criminology may be defined as
the scientific study of crime and its treatment.” This definition, besides
emphasizing the scientific investigation into the nature and etiology of crime,
stresses the practical or utilitarian nature of this body of knowledge, namely,
devising ways and means to prevent or reduce the incidence of crime and
rehabilitate criminals as normal members of the society.
Nature of Criminology
(a) The Nature of Crime-What are the features of crime? What type of action is
crime? In what respect does a criminal act differ from a social or moral act? Is it
just the action which may be considered criminal or can the motive make
difference to our description of a crime? For example, the theft committed for
personal gain and the theft committed for impersonal reasons or social gain are
both cases of theft. Can we make any distinction between the two? The
answers to these questions tell us the nature of crime.
The foregoing discussion about the meaning and description of criminology
makes abundantly explicit and clear the nature of this science. Fundamentally
speaking, the task of criminology is a scientific, systematic, statistical, structural
and functional in depth study of crime.
MULTIDISCIPLINARY STUDY CONCERNED WITH SCIENTIFIC, AND SYSTEMATIC
STUDY OF CRIME
Criminology is concerned with the scientific and systematic study of crime. It is
essentially a multi- disciplinary study. It shouldn’t be confused with the science
of criminal detection or forensic science and forensic pathology. There is no
direct connection between the detection of crime and the study of crimes and
criminal behaviour carried out by criminologists. A criminologist is concerned
more with how and why crimes come to be committed rather than who did it
and providing proof of guilt.
SOCIAL SCIENCE CONCERNED WITH ASPECTS PROHIBITED BY LAW
Criminology is best seen as a social science concerned with those aspects of
human behavior regarded as criminal because they are prohibited by the
criminal law, together with such aspects of socially-deviant behaviour as are
closely related to crime and may usefully be studied in the connection.
Like other social sciences, the scope of criminology is also quite vast and
extensive. It is related to each and every social class and structure. Though the
scope of criminology is very vast and coextensive with many sciences, the
criminologists have tried to limit its scope in order to be able to study the
subject scientifically, systematically and exhaustively. The viewpoints of certain
notable criminologist is given below:
According to Sutherland the science of criminology, “includes within its scope
the processes of making laws, of breaking laws, and of reacting towards the
breaking of laws.”
In the opinion of Sutherland criminology has three distinct aspects of
departments. Though distinct, these are nonetheless not independent, but
inter-linked. A thorough study of these aspects exhausts the scope of
criminology; to study all of them is the same as studying the whole science of
criminology.
In accordance with Sutherland’s description of the scope of criminology, we
can divide it into departments:
(a) The sociology of law-In this we study the nature of crime from legalistic
point of view. Also we investigate into the effects of present laws upon them
and study the possible reforms in the laws in order to prevent and control the
occurrence of crime. The major concern of the sociology of law is to critically
examine the impact of various legal systems upon crime. This study can go a
long way to evolve suitable changes in the laws to curb crime.
(b) Criminal Etiology-In this department a systematic investigation into the
various causes of crime is made. Here we study the social and personal factors
responsible for the occurrence of crime and growth of criminals.
(c) Penology-Besides knowledge and determination of the causes and factors
which generate or encourage crime, it is equally, if not more essential to know
the ways and means of controlling and preventing the crime. This aspect is
studied systematically and in a scientific manner to achieve control over crime.
The facts and theories in this regard from the scope of Penology, is an
important department of criminology.
THEORETICAL SIGNIFICANCE OF CRIMINOLOGY
i. Aids in understanding causes of Crimes
ii. Policy formulation vis control of Crime
iii. Provide theoretical base for enactment of Criminal Law
iv. Rehabilitation and Treatment of Offenders
v. Planning, Operation, Evaluation and Revamping of Criminal Justice System
vi. Reformation of offenders
vii. Study of Social factors instilling criminal behavior
viii. Aids in study of juvenile delinquency and measures to address the same.
1. Knowledge of Crime-Data-In every social community and group, there are
always some criminals and incidences of crime. The nature of crime and
criminals may undergo change, but the very existence of crime cannot be
uprooted. In crime psychosis we have two kinds of factors: personal and social.
It is not possible to eliminate the aggressive and acquisitive tendencies from
man and, again, it is equally impossible to eliminate all inequalities and
anomalies from any society. This is borne out by the fact that even under
communist regime crimes are not non-existent. Therefore, a systematic,
scientific and unbiased study of criminology furnishes us with factual, true and
realistic data about crimes and criminals. By studying criminology, we also learn
about the kinds or types of crimes and criminals and also about the modus
essendi as well as modus operandi of crimes. This enables us to compile what
may be called taxonomy of crime, that is, an extensive and deep classification
of crimes. We also learn about the causes and reasons of criminal behavior.
The J.J. Committee is set to consist of four members, including a serving Judicial
Magistrate with powers under section 30 of CrPC (Head of Committee); District
Public Prosecutor; Member of local Bar having at least 7 years experience,
appointed by the concerned Sessions Judge for a period of 2 years; and serving
probation officer or social welfare officer not below BPS-17. One thing that is
missing is the presence of a qualified child rights activist that understands the
plight of the underage victims, and is equipped to deal with their issues.
11) Preventive Detention: No child shall be arrested under any of the laws
dealing with preventive detention or under the provisions of chapter VIII of the
Code of criminal procedure.
Juvenile justice in Pakistan deals with crimes committed by Pakistani children.
The minimum age for criminal responsibility in Pakistan is seven years. Section
83 of the Pakistan Penal Code 1860 also protects the rights of children.
Juvenile Justice System Act 2018 repealed Juvenile Justice Ordinance 2000,
and prior to JJSO 2000 Pakistan had four major laws for dealing with child
delinquents, i.e. Reformatory Schools Act 1897, The Punjab Borstal Act 1926,
The Sindh Children Act 1955, and The Probation of Offenders Ordinance 1960.
All these laws have been in place since their promulgation but found to be
dormant for all practical purposes. Apart from these codified laws Section 399
of Pakistan Criminal Code 1898 provided for the confinement of a child
delinquent sentenced to imprisonment below the age of 15-year to
reformatory school established by the provincial government concerned. Until
1974 all these special codified laws remained dormant and neglected.
However, in 1974 some efforts appeared to have been made to implement
these across Pakistan to the reason that a few notifications had been floated
across authorities at provincial and federal levels.
Under newly enacted law, the investigation officer by virtue of section 8 (1)
requires to inquiry into the age of the arrested person through medical testing
with permission of the presiding court and this has to be done in case (s) no
documentary evidence of age is adduced himself by the arrested delinquent or
not found by the officer himself during the course of investigation. At glance,
investigation officer has to have a documentary evidence of age and this is a
point- where issue arises giving discretionary power to the officer either to go
for medical testing by virtue of section 8 (2) and/or tentatively record age on
police investigation fileon ‘Saza Slip’without supporting it with evidence. It has
been transpired in recent timesin such like situations officers’ do not wish to
state age of arrested person below 18-year in order to avoid giving rise to JJSA
2018 provisions. In writer’s view JJSA 2018 can only rise,if and only if age is
recorded in the police file below 18-year- otherwise not. Recording of age
below 18-year giving rise to the role probation officer under Section 5 of JJSA
2018 that provided officer in charge of investigation to inform probation officer
concerned about arrest of a juvenile within 24-hours of arrest. It is observed in
Legal Awareness Watch (LAW) reports that the Reclamation and Probation
Department simply negates rising of their duties under JJSA 2018 labelling
ignorance and negligence falling on part of the police by not informing
concerned probation officer about arrest of a juvenile. In legal and logical
perspective reception of information about arrest of a juvenile may happen
from any source by virtue of section 5.Its hibernation adds fuel to the system-
which is already burning for many years.
JUVENILE COURTS
It was believed that separate juvenile courts across Pakistan at provincial level
would establish within three months of promulgation of JJSA 2018 however no
such court until this date has established in Punjab and Sindh. Moreover, under
JJSA 2018 Juvenile Justice Committee had to be notified under section 10 until
today not a single such committee notified across Punjab. However, in Sindh
such committee has been notified in Shakarpur division. JJSA 2018 shall be
implemented in its letters and spirit if we have just age determination system
to the reason that every child matters.
Rule 289 of the Pakistan Prison Rules 1978 stipulates that before passing any
order pertaining to the detention of a juvenile offender, a magistrate or
sessions judge must inquire about the age of the offender after taking into
account appropriate evidence.
CHALLENGES FACED BY JUVENILE JUSTICE SYSTEM 2018
The Juvenile Justice System (JIS) Act of 2018 is a new law, which has been
enacted by the federal government earlier this year. The JJS Act of 2018
overcomes the shortcomings, which were present in the JJSO 2000 and
provides a much better system of criminal justice and rehabilitation for juvenile
offenders. The JJS Act of 2018 provides specialised procedures for arrest,
investigation, bail, trial, detention and the rehabilitation of juvenile offenders in
order to protect them from maltreatment. But some of the key challenges in
implementation of this Act are:
designate juvenile court for one or more sessions divisions within a period of
three months from the commencement of this Act-failed to implement
1. It is clearly mentioned in the JJS Act of 2018 that the government in
consultation with the concerned high court shall by notification in the official
Gazette establish or designate juvenile court for one or more sessions divisions
within a period of three months from the commencement of this Act. But
separate juvenile courts are still not established in of Punjab and Sindh,
excluding a juvenile court at the Judicial Complex in Lahore that was
established to deal with cases involving children on December 19, 2017.
establish the Committee for each sessions division no later than three months
from the commencement of this Act-failed
2. Moreover, under JJSA 2018 Juvenile Justice system it had to be notified
under section 10 that the government in consultation with the concerned
Sessions Judge shall establish the Committee for each sessions division no later
than three months from the commencement of this Act. The committees shall
dispose of the cases of juvenile offenders without resorting to formal judicial
proceedings until today not a single such committee notified across Punjab.
However, in Sindh such committee has been notified in Shakarpur division.
no proper monitoring of juvenile cells and not establishing separate jails for
juveniles.
3. Juvenile offenders are maltreated and sexually abused in prisons, because of
no proper monitoring of juvenile cells and not establishing separate jails for
juveniles. The JJS Act of 2018 says that the government shall establish and
maintain observation homes and juvenile rehabilitation centres for reception of
juveniles, including separate centres for female juveniles. Not a single
observation home and juvenile rehabilitation centre has been established or
certified so far.
10% of the current death row population consists of juvenile offenders,lack of
age determination method
4. Although the law expressly prohibits corporal punishment and sentencing of
juvenile offenders to death, 10% of the current death row population consists
of juvenile offenders, according to a Justice Project Pakistan’s report. Low birth
registration rate, weak implementation of juvenile justice law and lack of age
determination methods are primary reasons for several juveniles being
sentenced to capital punishment and executed in the country.
enactment of new rules of business for carrying out the purposes of JJS Act of
2018-lack of infrastructure and resources
5. The last challenge is the enactment of new rules of business for carrying out
the purposes of JJS Act of 2018. Because the previously enacted rules are
repealed after the promulgation of the JJS Act of 2018, so the federal and
provincial governments are required to make new rules in this regard.
Complete implementation of law is further challenging predominantly due to
inadequate infrastructure and resources.
The newly elected Prime Minister, Imran Khan, and President, Dr Arif Alavi,
assured in their inaugural speeches that resolving the child protection issues
and implementation of child rights and national action plan for children are one
of their top priorities. Hence, the PTI government should take up the matter of
implementation of the JJS Act of 2018 on a priority basis and must allocate a
sufficient budget and resources for this cause.
More than four million children are engaged in child labor according to an
estimate. Which means, such a high number of children are susceptible to
being exploited and are at risk of being delinquent.
Surprisingly, Pakistan lacks a clear cut difference line between juvenile
criminals and adult culprits, in practice. Fundamental difference between
juvenile justice system and criminal justice system is that the earlier system
rehabilitates delinquents and the later is a system of retribution against adult
criminals.
a. The statuary age in Pakistan is furnished as seven to twelve. Juvenile
between age 7-12 lies responsible if he/she realizes what he/she has
committed, otherwise up till 12 minor falls under the category of juveniles.
Contrarily, Hadood Ordinance establishes separate age of maturity for men
and women, i-e 16 for females and 18 for males.
Additionally, it also refers an individual as mature if he/she reached to age of
puberty. Under the Hadood Ordinance, juveniles were sentenced to capital
punishments even of the age below twelve. On the other hand, according to
“society for the protection of rights of the child, (SPARC)” in PATA and FATA
where there are no normal courts, juveniles are not treated under JJSO 2000.
Moreover, in Pakistan juveniles are reported to be harassed by police officers.
Still there are no rehabilitation centers established separately for delinquents.
Though in Karachi and Lahore some reforms are introduced but its need of
hour to spread them to all districts. Juvenile offenders are even kept with adult
criminals. Researches showed that delinquents if accompanied adult offenders,
repeat crime litigation after release.
RECOMMENDATION
ROBUST MECHANISM FOR AGE DETERMINATION
As a signatory to various international conventions, especially the Convention
on the Rights of the Child (CRC), the government should adopt robust
mechanisms for age determination that are internationally recognized. These
include the latest dental X-rays that ought to be made a mandatory component
of medical reports at the time of arrest and the point when a juvenile offender
is taken to jail to avoid any controversies.
COMMUNITY PUNSIHMENT FOR CHILDREN
we should introduce community punishment for children. Under the present
system Station House Officers are bound to lodge FIR against juveniles. In
Europe police officers or court can send a child in some welfare centre to work
for some time as a form of punishment.”The same method can be
implemented in Pakistsn to rehabilitate them.
Recommendations for Reform
Administrative Measures
SEPARATE JUVENILE COURTS
Separate juvenile courts should be created/designated for the trial of children
as mentioned in jjs2018 in order to expedite fair and just trial by reducing the
workload of existing courts. Also there is need to increase the number of
judges.
SEPARATE JUVENILE INSTITUTIONS
The Government should establish separate juvenile placement institutions for
the protection, reform and rehabilitation of juvenile offenders. Appropriate
facilities for board, lodging, health care, education and training of the inmates
must be provided in such institutions. Where appropriate, philanthropists, NGO
representatives and other volunteers may also be associated in the task.
TRAINING OF STAFF
The staff and personnel responsible for managing the juvenile justice system,
namely, police personnel, judicial officers, probation officers, prison staff, court
personnel and lawyers, etc must be given proper orientation/training so that
they are sensitised to and educated about the manners and methods of
handling children.
PROBATION SYSTEM SHOULD BE ORGANIZED
The present system of probation should be properly organised so that
children-in-detention are entrusted to the care/protection of probation
officers, under the overall supervision of the court of law.
Legislative Measures
RECOMMENDATIONS
PHYSICAL PRESENCE AND UP-TO-DATE MEANS OF COMMUNICATION FOR
MULTI-AGENCY AND COMMUNITY REHABILITATION WORK
Strong physical presence and up-to-date means of communication are the basic
requirements for Any institution mandated for multi-agency and community
rehabilitation work. As a follow up action to the recommendations made by the
National Judicial Policymaking Committee, the government of Baluchistan has
taken a step forward in constructing a new R&P Directorate building . Such
actions need to be replicated in the rest of provinces, particularly in the
province of Sindh.
ALLOCATION OF FUNDS TO ESTABLISH A DIRECTORATE OF HUMAN RIGHTS AT
DISTRICT LEVEL INCLUDING OFFICE ACCOMODATION FOR
PROBATION/PAROLE OFFICER FOR INFRASTRUCTURE ISSUES
As one of the outcomes of the “post crises need assessment KPK and federally
administered tribal areas, Sep 2010”, the KPK government has allocated funds
to establish a Directorate of Human Rights at the district level including office
accommodation for district probation/parole officers, Public 17 Prosecutor and
public pleaders . This will resolve the current infrastructure issues in the
districts and will contribute in strengthening the probation services in KPK. In
the rest of the three provinces the infrastructure for R&P at district level needs
immediate attention of the authorities,
PROVIDE TRANSPORTATION FACILITIES TO PROBATION/PAROLE OFFICER
At present, no transportation facilities are provided to probation and parole
staff to carry out their field work. The provincial government KPK has taken a
positive step and sanctioned twenty four 800cc cars and a motorbike to
improve the mobility of probation/parole staff to the far-flung areas. Such
steps have also been taken by the respective provincial directorates of other
provinces but needs approval of the concerned authorities. It is highly
recommended that civil society organizations through effective advocacy and
media campaigns influence the decision makers to prioritise provision of office
accommodation and equipments (telephone, fax, computer printers) to make
the probation and parole officers accountable and able to play their due role in
the rehabilitation and community reintegration of offenders.
INVESTMENT IN HUMAN CAPITAL TO ENSURE SYSTEM EFFECTIVENESS
Having up to date infrastructure and equipments is important but also needs
skilled and knowledgeable R&P staff to ensure its effectiveness. Investment in
human capital is necessary in order to yield the desired results. At present no
regular trainings are held for R&P personnel. It is recommended that chapters
on probation and parole system should be added to the training curriculum of
judicial academy, police training academies and to update the syllabus of the
National Academy for Prison Administration. Multi-agency focused trainings
are required to empower the key players in criminal justice system to offer
their services in a more holistic and integrated manner. This will also help to
bridge the communication gap between the judiciary, police, probation and
prison departments.
CAPACITY BUILDING TO PAVE THE WAY FOR PENAL REFORM WORLDWIDE
The capacity building component can best be achieved through involvement of
civil society organisation to design public private partnerships. Such
interventions will pave the way for Promoting penal reform worldwide more
sustainable system change. Sensitisation trainings are also required for the bar
association as most of the legal community is not aware of how the probation
system works.
Amendments are required in the current probation of offender ordinance TO
ENSURE REHABILITATION IN PRACTICE
Amendments are required in the current probation of offender ordinance to
widen its scope to include community service as part of community sentencing.
At present the law is silent about any such provisions, particularly in the
existing situation of Pakistan where there is no framework for formal
rehabilitation of offenders outside the prison. Evidence suggests that voluntary
work under the supervision of probation officers does help to improve an
offender's self image and increases his/her acceptability by community
members leaving a longer lasting effect in breaking the crime cycle.
use of cautions at the police station to divert the offender in minor cases from
the formal criminal justice system
Additional measures need to be taken to address the issue of overcrowding in
prisons. For example, introducing the use of cautions at the police station to
divert the offender in minor cases from the formal criminal justice system. A
caution is a formal warning about future conduct given by a senior police
officer, usually in a police station, after a person has committed an offence and
admitted guilt. It is used as an alternative to a charge and possible prosecution.
Likewise the provision of conditional discharge under section 4 of the Pakistan
Probation of Offender Ordinance 1960 needs to be brought to the immediate
attention of the judiciary to increase releases on conditional discharge.
Musalihat Anjumans can also play a vital role in this case through victim-
offender mediation.
CRIMINAL JUSTICE SYSTEM OF PAKISTAN
Pakistan’s criminal justice system has become notorious, and rightly so, for its
delays and inefficiencies. Not only is it now known to be a tool for the
powerful, but its performance has also resulted in individuals taking law into
their own hands. When discussing these issues, people tend to relate the
matter to judicial reforms. However, what they fail to realize is that the issue at
hand is far broader than they believe it to be, expanding over various
institutions and departments. From reporting to investigation; prosecution to
conviction, every stage in the criminal justice needs reforms. In order to
understand the shortcomings, one must study the criminal justice system
focusing individually on its three pillars i.e. the Police, the Prosecution and the
Judiciary.
APATHETIC POLICE SYSTEM
When asked the first thing that comes to an individual’s mind when he hears
the word “Police”, one of the most common answers in Pakistan is “corrupt”. It
is wrong to generalize an entire institution in such a harsh way, when many put
their sweat and blood into their work but nonetheless, corruption is by far the
biggest issue our police force faces. This does not mean however, that the
police only resort to this for benefiting their own pockets. Police are often seen
asking for fuel money if the investigation requires travelling, the reason being
lack of basic funds. At many stations, severe lack of resources leads to officers
paying for office equipment themselves. Apart from corruption and budget,
recruitment and training add to the long list of problems. It is normally the
senior officers who receive specialized and updated training even though the
ones who need it the most are those carrying out investigations; the junior
officers. If we have a look at their investigation methods, they are highly
outdated considering we live in an era of forensic and digital investigation. Not
only this, but the evidence they manage to collect is often poorly recorded and
stored, whereas the crime scene is normally contaminated. It is surprising
enough that although the investigation procedure is one of the most crucial
parts of criminal justice, investigating officers make up only a rough thirteen
percent of the entire police force.
PROSECUTOR
After the investigation of a criminal case, the next step is to take the case to
trial which is a decision that ultimately rests with prosecutor. The prosecution
is perhaps the most underrated part of the criminal justice process even
though it is them who makes a case presentable in court. It is the job of the
prosecutor to present the evidence against the alleged in court, and ensure this
evidence is enough for conviction. However, like the police, the prosecution
faces severe lack of funds, especially since it has been separated from the
police. Induction of recruits with criminal expertise still remains one of the
biggest challenges. Prior to induction, there is no exclusive training for a lawyer
that can enable him to become a better prosecutor. To make matters worse,
even after these young lawyers have been inducted as prosecutors, there is no
specialized training either. These prosecutors then have limited role and
influence in the investigative phase which eventually leads to a weak trial. If, on
the other hand, prosecutors were given this access, they would have been able
to advise the police timely and cases would not go to court with insufficient
evidence and witnesses who constantly change their statements.
Unfortunately, in our country, cases are lost before they even make it to court.
COURT SYSTEM
If a criminal case is able to make it past the police and prosecution, landing
itself in court, our inefficient judiciary ensures it takes years for the victim to
get justice. Just like its predecessors, this pillar too faces severe financial
constraints with insufficient number of courts and judges. However, this
problem is only one out of many. According to a report by World Prison Brief,
in 2019, pre-trial detainees in Pakistan’s Prisons made up 62.1% of the total
number of prisoners. This means that more than two-thirds of our prisoners
have not even been proven guilty. Instead, they are simply waiting for their
case to be heard in court. One major reason for this is the frequent
adjournment of cases. According to a study conducted by the Legal Aid Office,
on any given day, there was a 58.65 per cent chance that their case would be
adjourned. Even if we manage to make enough courts and hire enough judges,
the expertise of these judges could still come under question. Many judges are
fresh graduates with minimal years of experience. They lack specialization,
meaning they have acquired no special training in either civil or criminal law.
Topping this off are our outdated legislations, both substantive and procedural,
which have been amended far less than they should have been.
SUGGESTIONS
Analyzing these problems can make any individual lose hope in Pakistan’s
Criminal Justice System, however, reform always needs to begin somewhere.
The first issue to tackle would be the budget provided for this purpose but that
too is related to the economy and the financial stability of the country. What
needs to be emphasized the most is the training of anyone recruited in this
sector, be it the police, prosecutor or the judge. Modern techniques and
specialization in their areas need to be ensured so that a case can transition
smoothly from its investigation to the conviction. Special importance needs to
be given to the protection of both judges and special witnesses, perhaps
building an efficient witness protection system of our own. All three branches
need to work with cooperation and coordination, making the prosecutor
involved since day one. Apart from these institutional corrections, our
parliament must be able to set aside their differences in order to make all
necessary changes to the legislation. It will indeed be a difficult journey,
however, this journey ought to begin sooner than later.
MENACE OF MONEY LAUNDERING
With the Financial Action Task Force and its sword of Damocles hanging over
Pakistan’s head, the state has been keener to fight money laundering in recent
years than it has ever been before. This new-found enthusiasm, however, does
not mean that money laundering is a new concept for the country. It only
signifies that in a world becoming more interdependent day by day, the
“image” a state carries with itself can either help it reach new heights or play a
role in its isolation.
Often misperceived to be the acquisition of illegal money, the scope of the
term money laundering is vaster in both meaning, techniques and effects.
According to the United Nations Office on Drugs and Crime: “Money-
laundering is the method by which criminals disguise the illegal origins of
their wealth and protect their asset bases, so as to avoid the suspicion of law
enforcement agencies and prevent leaving a trail of incriminating evidence.”
Therefore, this term not only relates to how illegal money is obtained and
hidden, but also to why it is being hidden in the first place. One major reason
for this is to use the illegally obtained money for further illegal activities making
money laundering not only just a crime itself, but also being intertwined with
several other serious crimes. This is perhaps the reason why the FATF is
keeping its eyes on Pakistan. Not for the sake of the public’s money being
looted, but primarily because it believes this laundered money is eventually
used for terrorist activities that threaten the peace and security of the world.
Traditionally there is a three-step phase to money laundering, placement,
layering and integration
LAWS FOR MONEY LAUNDERING
Following the attack on an Army Public School in Peshawar the Pakistani
Government created the National Action Plan (NAP) to tackle the issue of
terrorism. This included measures to combat terrorist finance. The following
legislation is relevant to dealing with terrorist finance and money laundering
cases.
Legislation
Anti- Money Laundering Act 2010
This enables the seizure of assets and cash involved in money laundering and
financing of terrorism. This provides a framework for the search and seizure of
property and assets linked to money laundering.
Anti -Terrorist Act 1997
This covers the seizure of assets and property of persons involved in terrorism
and proscribed organisations.
LOOPHOLES
It would still, however, be wrong to say that this act too does not have
loopholes of its own. One such shortcoming is the failure to address the major
issue of Hawala and Hundi, which is an illegal way of sending remittance. Such
channels, if still prevalent, can make all other efforts against money laundering
futile.
The AMLA had initially given three agencies, the National Accountability
Bureau (NAB), the Federal Investigation Agency (FIA) and the Anti-Narcotics
Force (ANF) the power to investigate and prosecute parties involved in these
illicit activities. Eventually, under a notification by the Ministry of Finance, the
Federal Board of Revenue (FBR) was also added to this list of investigating
agencies. Despite having such major investigative bodies, further loopholes in
their jurisdiction and power leave gaps for suspects to escape. The FIA, though
having ample power, has jurisdiction only at federal level, which is why it is
unable to operate at the provin- cial level, let alone private persons committing
offenses. The NAB, despite having jurisdiction at both federal and provincial
level, has no authority to investigate cases related to terrorist financing.
Similarly, the pream-ble of the ANF limits the agency’s functioning to narcotic
drugs and psychotropic items, making its role in counter terrorism financing
practically non-existent. Having four separate agencies working in their own
areas, lacking both cooperation and coordination with each other, has proven
to be one of the major obsta- cles in countering terrorist financing. It is
therefore a need of the hour to establish one specialized agency, a joint task
force, for this purpose.
Although the notion exists that as AMLA provides a punishment for money
laundering ranging from one to ten years, this punishment is enough to deter
the act. On the contrary, section 21 (a) of the AMLA states that each crime
punished under it is non-cognizable. This statement itself takes away the true
essence of the punishment, as it strips away the right of the investigative
agencies to make an arrest without getting the courts involved. It also declares
that money laundering is not a serious or heinous crime. To understand this
flaw, we do not need to take a look at laws in more developed countries. In
fact, making a comparative analysis with other countries in our own region
proves to be sufficient. As stated earlier, the minimum punishment for money
laundering in Pakistan is of one year, whereas in India, Bangladesh and Sri
Lanka, the minimum sentence is of three, four and five years respectively. Such
comparisons highlight how insignificant our laws consider money laundering to
be.
It is high time for Pakistan to understand the shortcomings in its Anti Money
Laundering legislations and agencies. Not only are they ineffective in achieving
their own stated objectives, but also fail to meet the international standards
and requirements presented to curb money laundering. A ray of hope is the
recent claim by Pakistan’s government stating that it aims to introduce new
anti-money laundering and anti-terror-ism financing laws. However, not only
their timely introduction, but positive implementation will eventually
determine the future of the country and its journey against money laundering.
Criminal Activities
Drug Trafficking
Afghanistan is the major global manufacturer of heroin. There are at least 1.3m
users in Europe with a growing number (8m) of users in Pakistan. There is
always going to be a massive demand for heroin and therefore it will continue
to be a major source of revenue in this part of the world. The growing and
harvesting of the opium crop, the manufacturing process and the supply routes
and workforce are all protected by terrorist groups for a source of the revenue.
This yields vast sums of cash that require laundering to avoid detection.
Case Study
In Colombia FARC was heavily involved in the cocaine trade to raise
significant funds for their cause. They protected the factories and
clandestine landing strips in the jungle. They liaised with other criminal
gangs in to facilitate and control the drugs distribution in return for a share
of the profits. They also liaised with other terrorist groups such as the Irish
Republican Army and ETA a Basque separatist group from Spain over urban
terrorist techniques.
Smuggling
The Pakistan border with Afghanistan is over 2000 kilometres long. The
Northern territories reach up to China. It is estimated that the Pakistan
Government loses $2.6 billion of revenue through the smuggling of 11 types of
legitimate goods such as TVs, phones, car parts, diesel and cigarettes. These
smuggling routes are well established and whatever goods are in demand will
be smuggled to order. The routes will almost certainly pass through areas
controlled by terrorist groups who will demand payment for safe passage or
simply take over the smuggling routes for themselves.
Case Study
November 2018 Customs officials in Quetta raided a train and found it full of
smuggled goods, such as carpets and other household essentials. The goods
had been well concealed within the train. The concealment showed that this
well organised and all the available space had been packed with goods.
The police were not able to catch the smugglers, again showing their caution
and ability to evade detection. – Source Dawn News
In 2016 Pakistan lost $2.63 billion of revenue from the smuggling of household
goods such as TVs, car parts, diesel, mobile phones etc.
Case Study 1
A domestic Non-profit organization (NPO) raising funds for humanitarian relief
in an area of conflict was collecting funds in donation boxes outside of religious
institutions. The funds were then paid into a domestic bank account.
The founder of the NPO was suspected of diverting funds to facilitate terrorism
rather than humanitarian aid. A law enforcement investigation resulted in the
arrest of the founder of the NPO and the seizure of $60,000 from the domestic
account. (source: FATF)
EXTORTION
In areas where law and order has broken down it is easy for terrorist groups to
exert influence on the local communities. They are able to tax local businesses
through direct demands or payments to move goods through checkpoints. The
access to utilities such as water and electricity can also be controlled. Failure to
comply with these demands can be met with violent punishments.
Case Study
In Peshawar 2015 many businesses received extortion demands from
phones with Afghan SIM cards. Some businesses and individuals that failed
to pay demands suffered attacks with grenades and small improvised explosive
devices (IEDs). The Counter terrorism department (CTD)
believes that these demands are from groups based in Afghanistan. The
Pakistan Telecommunications Authority is currently working on blocking
unregistered phones.
Counterfeit Goods
The revenue from counterfeit goods is now more than illegal drugs. 80% of
counterfeit goods are believed to come from China. This includes
pharmaceutical products and a recent report from the Pakistan Government
estimated that up to 50% of pharmaceutical products were counterfeit. This
poses a massive health risk to the public and a massive source of revenue for
criminals and terrorists who get involved in the trade.
Case Study
The terrorists responsible for the Paris attacks in 2015 raised funds through
drug trafficking and the sale of counterfeit goods including Nike shoes. The
Belgium city of Molenbeek is home to a disproportionately large number of
people who sympathise with Islamic terrorism. They are in turn associated with
the sale of counterfeit goods. In 2012 3 tons of counterfeit clothes and
accessories were seized by the authorities. UNIFAB said ‘Law enforcement
agencies in France and abroad need to stop treating counterfeiting as a ‘petty
crime’ and understand that it bankrolls terrorist activity.’
UNIFAB report commissioned by French Government 2016
Interviews
In all investigations interviewing of suspects and witnesses is a key component.
Interviews should be planned and prepared to ensure that the interviewer has
access to all the relevant information and has structured the interview to cover
all the relevant areas.
The PEACE model is a simple structure to conduct interviews.
P - Plan and prepare, make sure all the information, exhibits are available, plan
structure for you interview and a list of questions you want to cover
E – Engage and explain, spend some time to develop a relationship with the
interviewee and make them relax as much as possible. Explain what will
happen in the interview
A – Account and clarify – Try and elicit an account from the interviewee to
explain the points you have identified in your plan. Financial questions will
often be answered as the majority will be seen as routine. Challenge any
inconsistencies to ensure that you understand the answers given.
C – Closure – End the interview and explain what will happen next
E – Evaluate – Review all the answers and decide if a further interview is
required to clarify any points or issues
• In another example, the police force in High Point, North Carolina, applied
intelligence-led policing to domestic violence offenders and found these
offenders were often connected with other criminal activity, such as drugs,
assault, and robbery.7 Domestic violence offenders have a tendency to believe
their chances of being caught are very low because only one out of every five
incidents are reported. However, knowing that perpetrators of one type of
crime are likely to commit other types of crime makes it easier for law
enforcement to track and identify these individuals if they are picked up for
other crimes. When this happens, the police take the opportunity to warn them
of the consequences of continued violence and, hopefully, deter them from
further abuse.
High Point has been successful in applying this same technique to gang
intervention.8 When one gang is attacked, police know there will often be
retaliation, so they talk to the members of both gangs and give them a
deterrence message, telling them what to expect from law enforcement if
retaliation does occur.
These examples clearly shows the potential successes of intelligence-led
policing.
BACKGROUND
Intelligence-led policing (ILP) is a modern approach to law enforcement. First
introduced in the United Kingdom in the 1990s,
Traditional reactive law enforcement models have encountered severe
difficulties in coping with today’s risks and threats, and reacting to new criminal
opportunities caused by, inter alia, an increase in personal mobility and
migration, rapid technological and communication changes, free movement of
goods and services, and growing income inequality. Violent extremism and
radicalization that lead to terrorism (VERLT) as well as terrorist incidents in
recent years have highlighted the need to share, connect and centrally analyze
relevant data and information (intelligence) from all levels, in compliance with
national legislations, international human rights standards and OSCE
commitments. Intelligence-led policing (ILP) developed as a response to these
growing challenges by inspiring and facilitating a proactive policing approach,
complementing the traditional, reactive policing model. It has proved to be an
effective tool to address organized crime, to make better use of resources, and
to identify and address priority tasks in a targeted manner. The proactive and
future-oriented approach of ILP facilitates crime prevention, reduction,
disruption and dismantling. Key to the ILP approach is the systematic gathering
and analysis of information and data relevant to the prevention, reduction and
dismantling of crime, followed by the development of intelligence reports. On
this basis, informed and forward-looking policy-making and managerial
decisions can be made and resources allocated, addressing the most pressing
security concerns, threats, crime types and criminals. ILP has furthermore
proved to be an effective and sustainable tool for countering terrorism and
VERLT.
“Intelligence-led policing is crime fighting that is guided by effective
intelligence gathering and analysis – and it has the potential to be the most
important law enforcement innovation of the 21st century.” – Kelling and
Bratton (2006: 5).
Botnets
Botnets are networks from compromised computers that are controlled
externally by remote hackers. The remote hackers then send spam or attack
other computers through these botnets. Botnets can also be used to act as
malware and perform malicious tasks.
Identity Theft
This cybercrime occurs when a criminal gains access to a user’s personal
information to steal funds, access confidential information, or participate in tax
or health insurance fraud. They can also open a phone/internet account in your
name, use your name to plan a criminal activity and claim government benefits
in your name. They may do this by finding out user’s passwords through
hacking, retrieving personal information from social media, or sending phishing
emails.
Cyberstalking
This kind of cybercrime involves online harassment where the user is subjected
to a plethora of online messages and emails. Typically cyberstalkers use social
media, websites and search engines to intimidate a user and instill fear.
Usually, the cyberstalker knows their victim and makes the person feel afraid or
concerned for their safety.
Social Engineering
Social engineering involves criminals making direct contact with you usually by
phone or email. They want to gain your confidence and usually pose as a
customer service agent so you’ll give the necessary information needed. This is
typically a password, the company you work for, or bank information.
Cybercriminals will find out what they can about you on the internet and then
attempt to add you as a friend on social accounts. Once they gain access to an
account, they can sell your information or secure accounts in your name.
PUPs
PUPS or Potentially Unwanted Programs are less threatening than other
cybercrimes, but are a type of malware. They uninstall necessary software in
your system including search engines and pre-downloaded apps. They can
include spyware or adware, so it’s a good idea to install an antivirus software to
avoid the malicious download.
Phishing
This type of attack involves hackers sending malicious email attachments or
URLs to users to gain access to their accounts or computer. Cybercriminals are
becoming more established and many of these emails are not flagged as spam.
Users are tricked into emails claiming they need to change their password or
update their billing information, giving criminals access.
Prohibited/Illegal Content
This cybercrime involves criminals sharing and distributing inappropriate
content that can be considered highly distressing and offensive. Offensive
content can include, but is not limited to, sexual activity between adults, videos
with intense violent and videos of criminal activity. Illegal content includes
materials advocating terrorism-related acts and child exploitation material. This
type of content exists both on the everyday internet and on the dark web, an
anonymous network.
Online Scams
These are usually in the form of ads or spam emails that include promises of
rewards or offers of unrealistic amounts of money. Online scams include
enticing offers that are “too good to be true” and when clicked on can cause
malware to interfere and compromise information.
Exploit Kits
Exploit kits need a vulnerability (bug in the code of a software) in order to gain
control of a user’s computer. They are readymade tools criminals can buy
online and use against anyone with a computer. The exploit kits are upgraded
regularly similar to normal software and are available on dark web hacking
forums.
MEASURES TO CONTROL
AT INDIVIDUAL LEVEL
. Keep the Computer System Up-To-Date & Firewall turned-on
Generally, Cyber criminals use software flaws to attack computer systems
frequently and anonymously. Most Windows based systems can be configured
to download software patches and updates automatically and this will help to
monitor all online activity and protect the system from viruses and other
malicious programs. To be safe on the Internet, the antivirus software should
be configured to update itself every time the system connects to the Internet.
ii. Protect Your Personal Information Using many of the online services today
involves sharing basic personal information to include name, home address,
phone number, and email address. Using common sense is the best way to
protect against and prevent Cyber Crime. Any financial transaction website
should have an “s” after the letters “http” (e.g., https://www.mystore.com AND
NOT http://www.mystore.com). The “s” stands for secure and should appear
when you are in an area requesting you to login or provide other sensitive data.
Another sign that you have a secure connection is the small lock icon in the
bottom of your web browser (usually the right-hand corner). Hackers might try
to gain access to crash it, delete information, or steal passwords and other
sensitive information. Software firewalls are widely recommended for single
computers. The software is prepackaged on some operating systems or can be
purchased for individual computers. For multiple networked computers,
hardware routers typically provide firewall protection
B. Surveillance
Safety of the public is an important concern for any offender supervision
program. To maintain public safety, offenders under supervision should be
assessed to determine the degree of risk posed by their participation in
community programs. Offenders who pose a serious danger to society or to
themselves should not be in a community corrections program. Instead, these
offenders should be incarcerated in jail or prison until they are no longer
dangerous to themselves or others. For those on community supervision,
compliance with court-ordered sanctions is carefully monitored by trained
community officers. Finally, violations of supervised conditions are taken
seriously for those who cannot or will not comply with the conditions.
C. Addressing Problems Related to Criminal Behavior
Correcting some of the problems that are directly linked to criminal behavior
and continued involvement in the criminal justice system is another goal. Some
of these problems include drug or alcohol addiction, lack of emotional control,
inadequate education or vocational training, parenting problems, and mental
illness or developmental disability. The offender attends classes to address
these issues while on supervision with greater access to treatment programs
than the individual would have had in jail or prison. The basis of effective
rehabilitation is the use of cognitive-behavioral techniques and selecting
offenders who have the desire to change.
D. Community Reentry
Community reintegration is an important goal for offenders released from jail
or prison to gradually ease their reentry into society. Community-based
correctional programs help in this endeavor with a minimal level of supervision
while simultaneously allowing the offender to assume responsibilities and
parental roles. In this way, getting released from prison is not such a culture
shock, and this will hopefully decrease the probability of recidivism (Austin,
2001).
E. Restorative Justice
Restorative justice assumes that a crime harms the community and that
sometimes there are individual victims involved. Often, victims of property
crimes just want to be paid back or have things restored to their former
condition— something that may not be possible if the offender goes to jail or
prison. Restorative justice emphasizes offender responsibility to repair the
injustice that offenders have caused their victims. Through victim and
community involvement, such as face-to-face mediation sessions, victim impact
panels, and volunteer mentoring, the offender remains in the community,
completes community service, and pays victim restitution. Restorative justice is
most effective for property crimes, particularly those committed by juveniles or
first-time adult felony offenders (Bazemore & Stinchcomb, 2004).
Community-based programs are available at three decision points in the
criminal justice process: at pretrial release before a defendant is convicted,
after an offender is sentenced as an alternative to incarceration, and as an aid
in reentering the community following a prison sentence. Within these decision
points, a wide variety of community programs are available, including
residential halfway houses; nonresidential options such as probation, parole,
and electronic monitoring; and economic sanctions such as restitution, fines,
and forfeitures.
USE OF INTERNET BY TERRORIST TO REINFORCE THEIR IDEOLOGY
The September attacks in 2001 against the United States of America paralleled
with the outburst of satellite televisions, particularly in the Middle East. This
communication development enabled terrorists, particularly AlQaida
organisation, to broadcast its messages via Al-Jazeera. As a result of media
scoop by this satellite and other media outlets which provided terrorists with a
platform, the United States warned the public from the influx of Al-Qaida
propaganda and paid attention to the role of American media outlets in
launching the war on terrorism.
However, the emergence of the Internet, or by other words online media,
which embeds virtual media platforms, has enabled the extremists and
terrorists to have their own webpages. Some of these webpages used to recruit
fighters in Western countries Regarding the organisational use, many extremist
and terrorist organisations, such as ISIS, tend to use various forms of media
outlets, including online mediums, to transmit their messages whether to
market their ideology; to address the followers and sympathisers; or to wage a
psychological warfare against their enemies.
Lachow & Richardson (2007) point out that the Internet provides terrorists with
an ideal platform for five reasons: the control over time in sending messages;
the low cost of using the Web; it allows a small organization to reach global
audiences; it allows disseminating complex and sensitive information; and
"modern encryption technologies allow Internet users to surf the Web, transfer
funds, and communicate anonymously—a serious (though not insurmountable)
impediment to intelligence and law enforcement organizations trying to find,
track, and catch terrorists".
This counterstrategy posits the problem in the virtual media platforms as the
main source of extremism and terrorism. In this regard, the Grand Mufti of
Australia Doctor Ibrahim Abu Mohammed accused these platforms of
brainwashing the minds of some Muslim youths inciting them to commit
terrorists' attacks (Olding, 2015).
However, the policy of this counterstrategy and Mufti's accusation postulate a
hypothesis that the current main medium of transmitting extremism and
terrorism is the Internet.The former British Prime Minister Margaret Thatcher
warned in 1980s that, “publicity is the oxygen of terrorism”.
In certain communities, the relevant socialization process into terrorism
begins at a very young age, with propaganda playing a large role. For example,
there are accounts of Palestinian neighborhoods where graffiti glorifies suicide
bombers and calendars are illustrated with the “martyr of the month.”
Role models can serve as an important source of authoritative legitimacy for
the justification of violent action.
“We are in a battle, and more than half of this battle is taking place in the
battlefield of the media.”43 In 2005, Ayman al-Zawahiri, then al-Qaeda’s
secondin-command, allegedly wrote these words in a letter to Abu Musab al-
Zarqawi,
the al-Qaeda leader in Iraq at the time.
The Internet has revolutionized terrorism in many ways. For example,
activities that were once conducted face-to-face, such as fundraising or
training, are now conducted through websites and virtual training camps.
Geospatial imagery, such as Google Earth, can be used to study locations and
plan potential attacks. Hacking and cyber-attacks present the possibility that
great harm can be done to a country’s infrastructure from a computer halfway
across the world. Likewise, the Internet has emerged as a dangerous tool for
terrorist propaganda and recruitment purposes. There are at least nine key
ways that the Internet has changed the way that terrorists use propaganda.
First, social media allows terrorist groups to provide limitless content directly
to numerous websites or individuals, without having to go through a third
party.45 Traditionally, the media had a monopoly on covering and interpreting
terrorist incidents. Now, terrorists have the ability to instantly convey their
messages directly to their target audience. The terrorists can also tailor their
recruiting pitch, sending different messages to individuals based on their age,
gender, location, or other factors. For example, ISIS sends starkly different
messages to Muslims in the West than those closer to the Middle East.46 The
Second, social media provides terrorist organizations with an efficient way to
recruit new members, spread propaganda, and spread their ideology to a large
audience with minimal effort. Physical geography is no barrier to
communications between potential recruits and terrorists. Terrorists can create
any number of account names on social media platforms, making
communication cheap, easy, and almost impossible to stop. Twitter and other
social media platforms have attempted to thwart terrorist groups by
suspending ISIS-supporting Twitter accounts, only to find that the accounts are
replaced quickly by other ISIS supporting accounts. Like the mythical Hydra, the
suspension of an ISIS supporting Twitter account seems to yield two more ISIS
supporting accounts in its place.
Third, social media “lowers the barrier of access” to terrorist propaganda.49
Social media platforms provide individuals with ways to easily reach terrorist
propaganda and terrorist users. Unlike terrorist websites, which typically
require individuals to intentionally locate the specific site, individuals may also
stumble across terrorist social media accidently.50 For example, an individual
may click on a link posted by a friend and unintentionally land on a jihadist
forum. Furthermore, smart phones have made it possible for individuals to
constantly have access to the Internet at almost all times and places. Thus,
physical location and time are no longer relevant constraints on an individual’s
ability to access terrorist information.
FOURTH, terrorists can gain knowledge about social media in order to distort
the prevalence and ranking of their messages on search results. Social media, in
particular Twitter, allows terrorists to amplify their messages by posting links to
their propaganda and “hashtags” at an unnaturally fast pace, causing the
postings to place higher in search results and in content aggregated by third
parties. ISIS and al Qaeda reportedly both use “bots,” which are computer
controlled Twitter accounts that automatically send out content in a similar
manner.
Fifth the Internet allows for multidirectional communication between the
terrorists and the potential recruits. Individual communication allows terrorists
to craft propaganda specifically tailored for certain types of individuals.
Furthermore, interactive participation can foster a sense of cohesion and
generate a sort of virtual community between the terrorists and potential
recruits, thereby creating a sense of unity.
Sixth, terrorist groups can use social media to search for and target individuals
who might be particularly vulnerable to their ideology.58 For example, ISIS
utilizes social media platforms that are popular with teenagers to attract and
recruit young people, who are more susceptible to its propaganda. Terrorists
can craft their propaganda to appeal to certain vulnerable populations by
portraying their organization as the solution to individuals’ problems.
Furthermore, terrorists can weed out less susceptible populations by blocking
apparent nonbelievers from their communications.
CRIMINAL INVESTIGATION
TECHNIQUES OF INVESTIGATION
LEGAL AND ETHICAL GUIDELINES FOR INVESTIGATORS
INTERPOL