Skip links

The Pakistan Telecommunication Authority (PTA) has clarified its position regarding the security of electronic devices, stating that it is not responsible for identifying explosive materials in such devices. This clarification comes in response to recent incidents involving the explosion of pager devices in Lebanon and Syria, which have raised concerns about potential threats and the need for operational preparedness.

In official documents, the PTA emphasized that the identification of explosive materials does not fall within its jurisdiction, as these issues are unrelated to telecommunications. The Authority pointed out that explosive materials can be concealed in various electronic devices, including TVs and refrigerators, not just telecommunications equipment.

The PTA’s primary responsibility is to regulate terminal devices under Section 29 of the Pakistan Telecommunication (Re-organization) Act. This includes ensuring compliance with prescribed standards, verifying mobile device IMEIs against GSMA validity, and confirming that IMEIs are not reported as stolen, duplicated, or cloned. Additionally, the PTA type approves other wireless and fixed telecommunication devices, such as VHF/UHF radios, gateways, and routers.

Under the Type Approval regime, the PTA validates applications based on international standards testing reports from accredited international labs. The Authority ensures that a sample of the terminal device submitted by the applicant meets the technical standards defined in the Type Approval Regulations 2021. However, the physical verification or inspection for illegal materials in imported devices is the responsibility of relevant agencies.

In line with the Prevention of Electronic Crime Act 2016 and the National Cyber Security Policy 2021, the Federal Government has introduced the Computer Emergency Response Team (CERT) Rules 2023. These rules mandate the establishment of a Forensics Lab and a Screening/Evaluation Lab to support CERT’s functions and services.

The Digital Forensics Lab will focus on collecting, preserving, documenting, and analyzing evidence from compromised systems to determine changes and reconstruct events leading to the compromise. Meanwhile, the Screening and Evaluation Lab will screen information systems for bugs, malware, and hardware implants before their procurement, deployment, or operationalization. Further information on these initiatives can be obtained from the relevant organizations.

Leave a comment

Social Media Auto Publish Powered By : XYZScripts.com
RBN Community

Join our whatsapp channels below to get the latest news and updates.

rBusiness rMarkets