Cyber Terrorism and Indian Law
Cyber Terrorism and Indian Law
Cyber Terrorism and Indian Law
1 | Page
ACKNOWLEDGEMENT
The success and final outcome of this project required a lot of
guidance and assistance from many people and I am extremely
fortunate to have got this all along the completion of my
project work. Whatever I have done is only due to such
guidance and assistance and I would not forget to thank them.
But foremost I thank Dr. Golak Prasad Sahu, my Information and
Technology Law professor, for giving me an opportunity to do
the project work on "Cyber Terrorism" and I am extremely
grateful to him for providing all the support and guidance. I
would also like to thank the almighty God and my other friends.
Thank you.
2 | Page
CONTENTS
TOPIC
PAGE NO.
Abstract
4-5
Introduction
6-7
Reasons for the Surge in Cyber Terrorism
8
Forms of Cyber Terrorism
9-11
Who are the Cyber Terrorists?
13-14
Some Major Incidents of Cyber Terrorism
15-17
Indian Law on Cyber Terrorism
18-19
Latest Case Laws
20
Cyber Terrorism Laws in Different Countries
21
3 | Page
ABSTRACT
The Modern Thief can steal more with a computer than
with a gun. Tomorrows terrorist may be able to do more
damage with a keyboard than with a gun.
Over the past few decades, the world has seen a drastic and
momentous change. It has become a global village thanks to
the ever-developing science and technology. The access to
internet has grown manifolds over the last few years and even
second and third world countries are now very well connected
with the internet. The benefits of internet are uncountable and
it has brought revolutionary changes to the world. One of the
greatest changes has been the growing connectivity between
4 | Page
all corners of the world via the Internet. In many ways, this
has been a boon to humanity. However, there is also a dark side
to this achievement.
If internet can act as a boon to millions, it can also prove to be
a huge destructive weapon in nefarious hands. Internet can be
put to some very bad usages and such usages have been rising
meteorically over the past few years. Cyber-crimes, cyberattacks, espionages, hacks and even cyber terrorism has gone
rampant.
Computers and the internet are becoming an essential part of
our daily life. They are being used by individuals and societies
to make their life easier. They use them for storing information,
processing
data,
communications,
sending
controlling
and
receiving
machines,
messages,
typing,
editing,
property,
whether
tangible
or
intangible,
of
others.
For
INTRODUCTION
The term "cyber terrorism" was coined by Barry Collion and is
relatively new. It is often used in day-to-day parlance. However,
if you ask people to define it, you can expect a slightly different
definition every time. It is relatively hard to define cyber
terrorism and confine its boundaries within a frame, because as
6 | Page
8 | Page
their
Cyber terrorism can take many forms, and the increasing use of
IT means that anything can be its target. Some of these
possibilities of Cyber Terrorism have been outlined herein:
(I) Privacy violation:
The law of privacy is the recognition of the individual's right to
be let alone and to have his personal space inviolate. The right
to privacy as an independent and distinctive concept originated
in the field of Tort law, under which a new cause of action for
damages resulting from unlawful invasion of privacy was
recognized. In recent times, however, this right has acquired a
constitutional status, the violation of which attracts both civil as
well as criminal consequences under the respective laws. The
intensity and complexity of life have rendered necessary some
retreat from the world. Man under the refining influence of
culture, has become sensitive to publicity, so that solitude and
privacy have become essential to the individual. Modern
enterprise and invention have, through invasions upon his
privacy, subjected him to mental pain and distress, far greater
than could be inflicted by mere bodily injury. Right to privacy is
a part of the right to life and personal liberty enshrined under
Article 21 of the Constitution of India. With the advent of
information technology, the traditional concept of right to
privacy has taken new dimensions, which require a different
legal outlook. To meet this challenge recourse of Information
Technology Act, 2000 can be taken. The various provisions of
the Act aptly protect the online privacy rights of the citizens.
Certain acts have been categorized as offences and
contraventions, which have tendency to intrude with the
privacy
rights
of
the
citizens.
(II) Secret information appropriation and data theft:
The information technology can be misused for appropriating
the valuable Government secrets and data of private
individuals and the Government and its agencies. A computer
network owned by the Government may contain valuable
information concerning defence and other top secrets, which
the Government will not wish to share otherwise. The same can
be targeted by the terrorists to facilitate their activities,
10 | P a g e
(ii)
(iii)
(iv)
(v)
(vi)
(vii)
12 | P a g e
13 | P a g e
15 | P a g e
sender has been traced to Patna in Bihar. The ISP is Sify. The
email ID was created just four minutes before the email was
sent. The sender had, while creating the new ID, given two
mobile numbers in the personal details column. Both the
numbers belong to a photo frame-maker in Patna.
23 | P a g e
HOW
TO
TERRORISM?
COMBAT
CYBER
24 | P a g e
CONCLUSION
The menace of cyber terrorism is not peculiar to any particular
country as the it is global in nature. The countries all over the
world are facing this problem and are trying their level best to
eliminate this problem. The problem, however, cannot be
effectively curbed unless popular public support and a vigilant
judiciary back it. Also, there is a need for mutual co-operation
on the global level as cyber terrorism transcends all boundaries
and it cant be curbed without the mutual co-operation among
different countries and the global organisations.
Cyber terrorism is a scary concept for many reasons. It can do
possible serious damages to various aspects of our lives. It is
even scarier that cyber terrorism is so difficult to catch and
track and prosecute. The information age has brought us many
good things, but along with those good things came some bad
things too. All we can do as citizens is to protect ourselves by
protecting our information, who we give it to and how much we
give it out.
We, however, must understand that the law dealing with cyber
terrorism will never be adequate to meet the precarious
intentions of the cyber terrorists. With the rapid growth in
technology, they will always stay a few steps ahead of us.
For a effective solution, the laws have to take care of the
problems originating at the international level because the
25 | P a g e
BIBLIOGRAPHY
Rastogi, Anirugh, Law of Information Technology and
Internet, 1st Edition, Lexis Nexis Publication
Sharma, Vakul, Information Technology, Law and Practice,
4th Edition, Universal Law Publishing
Syed Balkhi: 25 Biggest Cyber Attacks in History
http://www.cyberlawsindia.net/
https://www.symantec.com/avcenter/reference/cyberterror
ism
www.academia.edu
26 | P a g e