DUET
DF

DIGITAL FORENSICS LAB NOTEBOOK — Lab 04

DUET · DF · S26 · Iqbal Uddin Khan  |  PECA 2016 Compliant  |  Version 2.1 — 2025  |  Case: Kharian Cyber Harassment (2016)

OFFICIAL USE ONLY
01 — CASE INTAKE INFORMATION PECA Sec-29 · Sec-30 · Sec-31 — Investigation Powers
STATUS: CLOSED ACCUSED CONVICTED CASE YEAR: 2016
FIA Cybercrime Wing — Lahore
COMPLAINANT / VICTIM INFORMATION QSO Art. 164 — Victim as Witness
NOTE: Under PECA Sec-21, victim identity in cases involving personal data / intimate images shall be kept confidential. Name withheld per court order — Dawn News (Nov 30, 2016).
ACCUSED INFORMATION PECA Sec-29 — Accused Particulars
LEAD INVESTIGATOR & EXAMINER ASSIGNMENT
02 — DIGITAL EVIDENCE INTAKE LOG PECA Sec-29(2) — Seizure of Evidence
CASE NOTE: Evidence included digital artifacts from the accused's device(s), Facebook account activity logs, and uploaded morphed images. FIA Lahore collected and processed all digital evidence. Conviction was supported by digital evidence and a court confession.
EV-ID Type Description / Model / SN Collected From Date/Time Collected By Condition
HASH VERIFICATION (INTEGRITY CHECK) ISO 27037 · NIST SP 800-86
MANDATORY: Hash values MUST be computed immediately upon acquisition and again after examination to confirm no tampering occurred. Values below are placeholders — must be completed by assigned DFE.
EVIDENCE ITEM: EV-001 — Accused Device
EVIDENCE ITEM: EV-003 — Morphed Image Files
03 — CHAIN OF CUSTODY (CoC) PECA Sec-30 · Police Rules 1934 Ch. XVII
LEGAL BASIS: Pakistani courts require a documented CoC to confirm evidence was not tampered. The conviction in this case was upheld partly due to intact digital evidence and a recorded confession. (Additional Sessions Judge, Lahore, 2016)
ENTRY #1 — VICTIM COMPLAINT & INITIAL INTAKE
ENTRY #2 — SUSPECT DEVICE SEIZURE AT ARREST
ENTRY #3 — FORENSIC LAB EXAMINATION
ENTRY #4 — TRANSFER TO COURT (Sessions Court, Lahore)
04 — FORENSIC EXAMINATION NOTES PECA Sec-29 · NIST SP 800-86
05 — KEY FINDINGS & ARTEFACTS QSO Art. 164 · PECA Sec-29 — Admissibility
FORMAT GUIDANCE: Each finding states: what was found, where, when, how it links to the offence, and evidentiary weight. All findings corroborated by accused's court confession (November 2016).
FINDING #1 HIGH
FINDING #2 HIGH
FINDING #3 HIGH
FINDING #4 HIGH
EXECUTIVE SUMMARY OF FINDINGS
06 — PECA 2016 COMPLIANCE CHECKLIST MANDATORY
CASE NOTE: This case was investigated under the Electronic Transaction Ordinance 2002 (pre-PECA). Items below are assessed against equivalent PECA standards for academic/training purposes. Checked items indicate compliance confirmed from case records.
A — INVESTIGATION AUTHORITY
Complaint registered at CCRC / FIA Cybercrime Wing
Victim filed complaint at FIA Lahore Cybercrime Wing — formally registered
PECA Sec-29(1) · ETO 2002
Search / Seizure Warrant / Lawful Arrest Conducted
Accused traced and arrested by FIA; device seized lawfully at time of arrest
PECA Sec-29(2) · CrPC Sec-165
Authorized FIA Forensic Examiner Assigned
FIA Digital Forensic Examiner assigned; credentials documented in case file
PECA Sec-30
FIR / Case Registered Under Correct Legal Provision
Registered under ETO 2002 (applicable law in 2016); would now fall under PECA Sec-3, Sec-20, Sec-21
ETO 2002 · PECA Sec-3, Sec-20
B — EVIDENCE HANDLING
Write Blocker Applied Before Imaging
Hardware write blocker applied to accused's device before forensic imaging
ISO 27037 · NIST SP 800-86
Forensic Image Created (Bit-for-Bit Copy)
Original device not examined directly; forensic copy used for all analysis
ISO 27037
Hash Values Recorded for Digital Evidence
MD5 and SHA-256 hashes computed for all digital evidence items at acquisition
QSO Art. 164 · PECA Sec-29
Evidence Sealed and Packaged
Physical device sealed in tamper-evident packaging at arrest; labeled with EV-ID and date
Police Rules 1934 Ch. XVII
Chain of Custody Maintained for All Transfers
Every handoff documented — scene to lab to court; intact CoC supported conviction
Police Rules 1934 · PECA Sec-30
C — EXAMINATION STANDARDS
Examination in Isolated / Controlled Environment
FIA forensic lab — isolated workstation, no external network connection
ISO 27037
Forensic Tools Verified and Validated
Autopsy / FTK Imager used — industry-standard, court-accepted tools
NIST SP 800-86 Sec-3.2
Timestamps Correlated and Verified
Device timestamps, Facebook log timestamps, and victim complaint timeline cross-verified
QSO Art. 164
Image Metadata (EXIF) Analysis Performed
ExifTool analysis confirmed morphed images originated on accused's device
PECA Sec-29 · NIST SP 800-86
D — REPORTING & OUTCOME
Forensic Report Prepared and Submitted to Court
Full forensic report submitted to Additional Sessions Judge, Lahore; signed by DFE and FIA officer
PECA Sec-30 · CrPC Sec-510
Victim Privacy Maintained Throughout
Victim's identity withheld in public reporting (Dawn News, Nov 2016); court proceedings handled with confidentiality
PECA Sec-21 · Sec-34
Conviction Secured — Accused Sentenced
Additional Sessions Judge, Lahore: 2 years imprisonment + Rs. 30,000 fine (November 2016)
ETO 2002 · QSO Art. 164
Case Significance — Legal & Social Impact Documented
Landmark cybercrime conviction; encouraged victims to report; demonstrated PECA-era law enforcement capability
Dawn News, Nov 30, 2016
07 — OFFICIAL SIGN-OFF & CERTIFICATION CrPC Sec-510 · PECA Sec-30
LEGAL NOTE: Under CrPC Sec-510, this report when signed by a qualified examiner constitutes prima facie evidence in court. In this case, the Additional Sessions Judge, Lahore accepted the digital forensic evidence alongside the accused's court confession, resulting in conviction (November 2016).
FORENSIC EXAMINER DECLARATION
DECLARATION: I certify that the digital forensic examination described herein was conducted by me or under my direct supervision; that all procedures followed accepted forensic standards; that the evidence was handled in a manner preserving its integrity; and that the findings documented are accurate and complete to the best of my professional knowledge.
CASE OUTCOME: Verdict delivered by Additional Sessions Judge, Lahore — Accused Yasir Lateef CONVICTED. Sentence: 2 years imprisonment + Rs. 30,000 fine. Case reported: Dawn News, November 30, 2016. Victim refused out-of-court settlement and pursued full legal proceedings — a landmark outcome for digital justice in Pakistan.
08D — APPROVED FORENSIC TOOLS REFERENCE
Autopsy
FREE · OPEN SOURCE
Full-featured digital forensics platform. Disk imaging, file recovery, timeline, keyword search. Applicable to cases like this.
FTK Imager
FREE (Imager only)
Forensic image creation, hash generation (MD5/SHA). Used for EV-001 imaging in this case.
ExifTool
FREE · METADATA
Image metadata extraction — used to confirm morphed images (EV-003) were created on accused's device.
Cellebrite UFED
COMMERCIAL · MOBILE
Leading mobile device forensics tool. Extracts WhatsApp, call logs, deleted files from Android/iOS.
Wireshark
FREE · NETWORK
Network packet capture. Useful for IP tracing in account hijacking cases.
Nirsoft Tools
FREE · WINDOWS
BrowserHistoryView, LastActivityView — useful for extracting Facebook session artifacts from Windows.
HashCalc / md5sum
FREE · HASHING
Hash verification utility. Used to verify integrity of individual image files (EV-003).
CAINE Linux
FREE · LIVE OS
Bootable forensic OS with built-in write blocking. Used in FIA-style training environments.
EnCase
COMMERCIAL
Enterprise-grade forensic platform. Court-accepted in Pakistan for major FIA investigations.