Tag: arrest

System being installed to arrest grey traffict

| | No Comments

article image STAFF REPORT ISB: Ministry of Information Technology and Telecommunications (MoIT) is in process of developing an operating system to curb grey traffic and provide effective solutions for reducing revenue loss.The system will consist of four major building blocks whose purpose will be to collect data, analyse it, report in a meaningful format and use the results to monitor the traffic. According to details, the system will be installed at the Pakistan Internet Exchange (PIE). National…Read More

IT, telecom policy to be ready by June to arrest cyber crimes

| | No Comments

article image STAFF REPORT IBD: The government is vigorously engaged in devising a comprehensive IT and Telecom Policy to ensure maximum protection to masses from the widespread cyber crimes including financial scams, fraudulent online activities and women harassment. "Ministry of Information Technology and Telecommunication has finalized the draft of controlling electronic crime bill to be presented in the National Assembly at the earliest whereas the IT and Telecom Policy will be rolled out…Read More

Desperate need to arrest cyber crimes

| | No Comments

With the rise in technology, the risks and crimes have also come along. Cyber crimes like websites hacking, information stealing especially of sensitive nature or viruses injection have become pain in the neck of internet users both individuals and governments. The developed states have got control to much extent over this menace by securing data protection at almost all levels, but as far as the developing states are concerned they still need to do a lot in this regard as week internet…Read More

Utilising IT to arrest militancy!

| | No Comments

Militant groups especially in the sub-continent feel a little bit relaxed in hitting their targets at will without feeling any fear of being intercepted. Terrorism has gradually demonstrated increased abilities to adapt to counter-terrorism measures and repeated failures on the part of political leaderships. To exchange information, terrorists have exploited disposable cellular phones, over the counter long-distance calling cards, Internet cafes, and other means of anonymous communications.…Read More