Open Access Research Article

Terrorism And Cyber Crimes (By- Kalyani Ravindra Shegaonkar)

Author(s):
Kalyani Ravindra Shegaonkar
Journal IJLRA
ISSN 2582-6433
Published 2022/08/08
Access Open Access
Volume 2
Issue 7

Published Paper

PDF Preview

Article Details

Terrorism And Cyber Crimes
 
 
Authored By- Kalyani Ravindra Shegaonkar
Research
LL.M 2nd Year ( 4th Semester )
(Skill Development-1)
Under The Guidance Of
Prof. Mayura Borde Ma’am
Savitribai Phule Pune University
 


Abstract

Cyber terrorism is a global issue which is one of the most ignored & underestimated issue
considered in India. India has the maximum internet users, called as ‘Netizens’ after USA and China. The over dependency over the internet increase the vulnerabilities & transformed their
aggressions into feeling of revenge, which turned them criminals, Cyber warriors and hostility to the country. Most of the Indian citizens are insensitive towards cyber threats of being victimized of virtual world. The information technology has opened the ocean of opportunities to the world for development of their financial infrastructures. The Cyber crimes are increasing every moment. The netizens are ignorant and of state of mind that their activities are unnoticed. We generally share our significant & super sensitive data & information unintentionally on social media. The momentous growth of Cyber world posed the threats of Cyber terrorism. The Cyber attacks has tendency of depiction of lethal, non-lethal psychological well being, public
confidence & political attitudes. Generally, it is to consider as Cyber terrorism affects only the national security system. But infect- it also affects their psyche & cognition. The Cyber terrorist expanded growth of Cyber attacks, which is dramatically increased in past few years. It has
caused mass destruction & damage to nuclear facilities & critical command & control system. The Cyber experts are working to strengthen more and more capacity to restrain Cyber attacks over Govt. system, defiance websites, financial and banking system and most important nuclear facilities.

Introduction

Cyber terrorism is a global issue which is one Of the most ignored and underestimated issue Considered in India. India has the maximum Internet users, called as ‘Netizens’ after USA and China. The over dependency over the internet Increase the vulnerabilities and transformed their Aggressions into feeling of revenge, which turned Them criminals, Cyber warriors and hostility to the Country. Most of the Indian citizens are insensitive towards cyber threats of being victimized of virtual world. The information technology has opened the ocean of opportunities to the world for development of their financial infrastructures. The Cyber crimes are increasing
every moment. The netizens are ignorant and of state of mind that their activities are unnoticed. We generally share our signify cant and super sensitive data and information unintentionally on social media.
The momentous growth of Cyber world posed the threats of Cyber terrorism. The Cyber attacks Has tendency of depiction of lethal, non-lethal Psychological well being, public confidence and Political attitudes. Generally, it is to consider as Cyber terrorism affects only the national security System. But infect it also affects their psyche and Cognition. The Cyber terrorist
expanded growth of Cyber attacks, which is dramatically increased in Past few years. It has caused mass destruction and Damage to nuclear facilities and critical command And control
system. The Cyber experts are working To strengthen more and more capacity to restrain Cyber attacks over Govt. system, defense websites, Finance and banking system and most important Nuclear facilities.
Cyber space is running in veins of modern Digital system, business and other essential Services. The Cyber security is one of important Aspect, the failure of which turned in to battle file For Cyber attacks and Cyber terrorism. The Cyber Crime or E- crimes are now become the reality of Life which includes the various kinds and modes of Cyber crimes like website hacking, ID or password Hacking, data theft or service denial to various Systems. The industrial Cyber
espionage is also Factor responsible for the growth of ‘Cyberattack’ Over others information system for the acquisition Of ‘higher sensitive data’. The ‘hostile actor’ (Cyber Terrorist) in order to control, manipulations and Command to Cyber infrastructure, they using Hacking, malware or ransomware programs And software’s to corrupt and destroy the digital Information system that might be inclusive of Strategic data, intellectual property rights and Future development projects etc.
 

Meaning Of Cyber Terrorism

The term Cyber terrorism- is composition of cyber terms Cyber and terror. The Cyber terrorism is needed to be understood with term ‘terrorist’. Cyber terrorism was coined by Banny C. Collin of Institute for Security and Intelligence (ISI) in late 1980’s. This concept originates only to
resonate with general public, because countdown begun from year 2000 and the millennium buys
 
 
 
 
associated with the big date switch, which gained wide scale recognitions. The terror attacks on September 11, 2001. Further thrust the concept of Cyber terror into public discourse, which threat of giant disruptions to economy, infrastructure and national security were often discussed in depth by the media.
Cyber terrorism is also named as- electronic terrorism, electronic jihad, information warfare cyber warfare. The basic objective of Cyber attack is hacking, generally to satisfy the ego of
hackers of creating terror. Sometimes it seems too similar or over lapping with each other like cyber attack and cyber terrorism. The objective of Cyber terrorism is to generate the feeling of
terror in the mind of the Cyber victims. Cyber terrorism is also causing threat to most vulnerable point, which cover physical and virtual world. It includes commission of acts of destruction,
alteration, acquisition and acts of transmission against the following:
  Defense forces
  Financial Infrastructure
  Civilians
  Destructions of supervisory control and data acquisition system of smart cities
  Exploration of smart army etc.
 

Historical Flashback Of Cyber Terrorism

 

The first quoted case of Cyber terrorist attack was of 1996. The Cyber terrorist was suspected
as co-accused of ‘White Supremacist Movement’, He was alleged for temporary disablement of part of the ISP’s (Internet service provider) record keeping system and ‘Massachusetts Internet service provider’. The ISP had made efforts to restrain the hackers from spreading and sending racist massage worldwide. Finally, the attacker fleshes the message “You have yet to see
electric terrorism. This is a promise”, at signing-off the system. This was the first Cyber attack, which opened the doors of probabilities and possibilities of Cyber terrorism worldwide.

Hypothesis

1.      Understanding the situation Awareness in terrorism.
2.      Criminal behaviour of offenders in cyberspace is likely to be imported to physical space
3.      Persons from a ‘closed society’ are more likely to commit crimes in cyberspace than persons from an ‘open society’.
4.      The conflict of norms and values of physical space with the norms and values of cyberspace may lead to cybercrimes.

 

 

Cyber Terrorism

Cyber terrorism is a very terrifying term ever used for traditional crimes. If we consider the gravity of the terrorism and tools of cyber terror it seems to be similar in their sphere but not in reality. Cyber terror tools seem to be similar with cyber attacks. An ‘e-bomb’ is really terrorism or is it just hacking? It might be matter of debate. Computer system’s hacking in not a new phenomenon, which has been happening since the early 1980s.
The hacker of email account can’t be tagged as terrorist. Terrorists use various means to spread fear and terror, to accomplish their objectives. Now it is pertinent to explore probable outcomes of a terrorist actions initiated with cyber domain. The main feature of cyber attack is lack of jurisdictional restrictions. The citizen or non- citizen can operate secretly in any cyber domain
against any person, Govt., group, infrastructure or organization. public attention is most important for terrorist organizations then technical hurdles. The present world terrorist organizations (for e.g. IS and Al Qaeda) adept themselves in Cyber world and use it to spread their propaganda, recruitment and for arrangement of funds. Some terrorist groups use social media for recruitments, dissemination of propaganda and aiding in the radicalization process. But attack on cyber network is a completely different aspect. The world terrorist organizations have intent to wage warfare by using cyber domain. The most appropriate example is of Inspire online magazine, published by Al Qaeda, and included articles on bomb making process and instructions for how to contact with group. It’s not pertinent to exclude large Cyber attacks in
future while considering future security threats to the nation. It would be horrible if the cyber- attacks-targeting basic infrastructure or financial systems, conducted in collaboration with a traditional attack with other capabilities. This is a deadly combination of Cyber techniques with traditional resources. The Cyber security is not a choice but a national responsibility. The Indian Govt. has made satisfactory steps for the development and implementation of national cyber security strategy, but we must be more cautious about the future complications. The Govt. Intelligence agency states that World terrorist organizations have keen interest in developing destructive cyber technologies and capabilities, but they have financial constraints, organizational limitations and competing priorities. Demarking line between Cyber attack and Cyber terrorism is not clear and confusing. Our critical infrastructure is dependent (directly and indirectly) over the internet.

Cyber Threats To India

The Central Bureau of Investigation (CBI), India and Cyber experts continuously warned about the Cyber attack threat to India. Even CBI website is hacked by hackers in 2010 by ‘Pakistani Cyber Army’. The Ex-President of India, Dr. Abdul Kalam raise alarm in his lecture on Cyber terrorism, 2005. Instead of that our India has not yet expertise in ‘Cyber security system’. It is to consider a great damage for India. In India, Companies, Govt. and Private Infrastructure and
Institutions including financial and insurance sector, spent less and least concerned for cyber security. In August 2013 Indira Gandhi International Airport (IGI) faced Cyber attack. A destructive virus Program called as ‘technical snag’ hit the operations Of terminal no. 03.
 
 
This malicious code was spread Remotely for the trespassing- ‘the security system Of Airport’. The cyber attackers tried to take Advantage of weakness of security system. Their Modus of oprendi was to transfer of virus program Through ‘check-in centers’ of boarding gates and Finally to the operation of CUPPS (Common use Passengers Processing System), which materially Affects
airlines online reservation system and Expected time of departure and capacity of waiting Lounge.
Furthermore, Pakistani Cyber Criminals deface Nearly 60 Indian websites every day. Pakistani Hackers conveniently hacked our websites and Writing derogatory information against India for Spreading political, religious, social or financial Cause. The latest Cyber weapon of Cyber terrorist is VoIP (Voice over Internet Protocol) for e.g. What’s app Voice and video calls, Skype, Video calls through Google talk etc., Coded chats, Secret message inside Images, e-mail drafting and encrypted pen drive to Propagate their agenda. According to NASSCOM-IDC surveys “The demand for ethical hackers is Estimated at 77,000, in India and 188,000 worldwide Currently”. The investigation of 26/11 Mumbai attack Revealed the- evidence of Cyber telecommunication Of terriost, with the help of which they acquainted With map, population infrastructure, place
etc. They use the “Google earth” to execute their Plan, mobile network for command and control, Social media to track the movement of Indian Rescue and defense forces. Furthermore, they use The technology for “conversion of audio signals Into data”, which made it impossible to track the Source of Information by “Indian defense forces This conversation is decoded by ethical hacker Ankit Wadia.
Another Cyber attack was in year 2011, bomb Explosion in market Jhaveri Bazaar, Mumbai. In Varanasi bomb blast case of 2010, which was Also executed with the help of E-Communication. Ultimately Govt. of India was compelled to develop A strong mechanism to deal with issue of Cyber Terrorism. As a result, the Information Technology Act, 2000, was amended in 2008 and includes
Sec. 66F to deal with Cyber terrorism and other related Issue, though that was not in detail. It also made Also to amend Indian Penal Code, 1860 and Indian Evidence Act, 1872. Instead of this we Indian has Spend less for Cyber security. Legal Provisions for Cyber Terrorism other relevant provisions
India has no specific legislation to deal with Cyber Terrorism. The amendment act of 2008 in Information Technology Act, 2000 inserted Sec. 66F to deal with Cyber terrorism. Those provisions and rules are complimentary with other legal provision in legislations and special legislations relating to terrorism. Section 66F is the only provision which deal with and covers any act committed with intent to threaten unity, integrity, security or sovereignty of India or
promoting terror with Do’s attacks, introduction of computer contaminant, unauthorized access to a computer resource, stealing of sensitive information, any information likely to cause injury to interests of sovereignty or integrity of India, the security, friendly relations with other states, public order, decency, morality or relating with contempt of court, defamation or incitement to an offence or to advantage of any foreign nation or group of individuals. For other offences mentioned in Sec.
 
 66, punishment prescribed is three years and fi ne of five lakhs has been prescribed and these offences are cognizable and bailable.
Sec. 66A provides punishment for sending offences messages through communication service entail Sec. 84B, abetment to commit an offence is made punishable with the punishment provided for the offence under the Act and the new Sec. 84C makes attempt to commit an
offence also a punishable offence with imprisonment for a term which may extend to one-half of the longest term of imprisonment provided for that offence. In certain offences, such as hacking
(Sec. 66) punishment is enhanced from three years of imprisonment and fi ne of two lakhs to five lakhs. In brief following are the provisions and complimentary rules to deal with Cyber terrorism:
  Sec. 66: Computer related offences including Hacking.
  Sec. 66A: Punishment for sending offensive messages through communication service etc.
  Sec. 66C: Punishment for Identity theft.
  Sec. 66D: Punishment for cheating by personation by using computer resource.
  Sec. 66F: Punishment of Cyber Terrorism.
     Sec. 69: Power to issue directions for interception or monitoring or decryption of any information through any computer resource.
     Sec. 69B: Power to authorize to monitor and collect traffi c data or information through any computer resource for cyber security.
     Sec. 70B: Indian Computer Emergency Response Team to serve as national agency for incident response.
  Sec. 84B: Punishment for abetment of offences.
  Sec. 84C: Punishment for attempt to commit offences.
  Implementation of Information Technology (IT) Security Guidelines, 2000.
     The Information Technology (Procedure and Safeguard for Interception Monitoring and Decryption of Information) Rules, 2009.
     The Information Technology (Procedure and Safeguard for Blocking for Access of Information by Public) Rules, 2009.
     The Information Technology (Procedure and Safeguard for Monitoring and Collecting Traffi c Data or Information) Rules, 2009.
     The Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011.
  The Information Technology (Guidelines for Cyber Cafe) Rules, 2011.
  The Information Technology (Electronic Service Delivery) Rules, 2011.
 
     The Information Technology (National Critical Information Infrastructure Protection Centre and Manner of Performing Functions and Duties Rules, 2013.

 

Matrixes’ Of Cyber Terrorism

The are the basic elements of cyber terrorism. Those are as follows:
1.  Perpetrator or group of people i.e. Cyber Criminal
2.  Place-Cyber Space
3.  Action/Method or mode of action-Any Cyber techniques
4.  Tools-Cyber Arsenal or Armory
5.  Targets-e.g. Govt. Company, Place, individuals, administration or digital infrastructure
6.  Affiliations-actual or claimed
7.  Motivations-social, religious, communal or Most Prominent targets of Cyber terrorism The aim and objectives of every terrorist organization and every terror attack is different in their own sphere. Here below is the list of possible Cyber attack or terrorism target but these are not exhaustive:
  Communication Infrastructure: News Agencies, Media and Tele communications companies
  Corporations: Component suppliers, Civilian consulting companies
     Financial Institutions: Banks, public or private, Insurance and Government Funding Agencies or Institutions
     Health care Industry: Drugs manufacturing Companies (Vaccines, antibiotics), Pharmacies, Hospital and Clinics
  Power Grids
  Transportation Systems
  Water Authorities
  Nuclear power plants
  Railways
  Information technology Systems etc.

Cyber Terror Armory

There is long list of cyber weapons used to create terror. Every weapon is unique in their own aspect and effects according to the objective of terrorist organizations, terrorist or Cyber
attacker.
Following are most commonly weapons used from


Cyber Armory To Spread Terror:

  Hacking
  Virtual sit-ins and blockades
  Automated email bombs
  Computer viruses and worms
  Denial of services (DoS)
  Cryptography

Cyber Terrorism: Social Media And Terrorist Groups

 

Cyber terrorism has gravity to influence directly the victims of cyber attacks. The basic objectives of terrorism is to draw attention by causing or with acts of violence globally. In 1990, the National Security Council envisaged that ‘Computer could in the future to be used to not only facilitate crime but also as the main too for criminal act. The modern thief can steal more with a computer then with a gun. Tomorrow terrorist may be able to do more damage with a keyboard then with a bomb’.
 

What Internet Offer To Terrorists

 

The internet offers the following advantages to the terrorist:
  Easy Access
  Minimum Regulation, Censorship, or any type of Govt. control
  Potentially high audience spread throughout the world
  Anonymity
  Fast circulation of information
  Low cost maintenance of web page
     A multimedia effect- ability to combine text, graphics, audio-visual and to allow user to download movies, songs, books, posters very fast
     The ability to shape cover are in the traditional may media, which increasingly use internet as a source of stories

 

 

Conventional Terrorism To Cyber Terrorism

The subject of ‘terrorism’ is always controversial. The origin of word terrorist is from French word ‘terrorisme’ that derives from Latin verb ‘terroeo’, meaning thereby ‘I frighten’. Cyber terrorism is an extended form of conventional terrorism where the nature of weapons is in
electronic form or devices instead of arms and ammunitions. The objective of both is same i.e., creation of terror. Followings are the qualification of an act to be address as

 

Cyber Terrorism:

  Place of occurrence must be cyber space
  Use of Computer system or like device to use as tool
  The aim to act is to create fear, harm or violence
  Motive-religious, ideological, or political objectives
 
The ‘Electronic Jihad’, Use of Social Media and Internet by Terrorists: The “Electronic Jihad” by terrorist organizations improvises their terror technique from traditional to technological. The International terrorist group Al-Qaeda, used internet technology to spread their wings of terror in like manner. Similarly, ISIS completely revolutionized “terrorism world” with the use of “social media”.

The Reason For This Obvious:

  To spread propaganda with electricity speed then, the speed of traditional cart.
  Internet Communication like net calling, video calls etc.
  Lowest cost than other method.
  More complicated to trace.
  Cab ne commit without jurisdictional hurdles.
  Can affect public at large.
Cyber terrorism is worldwide phenomenon. About forty terrorist groups all over the world maintain their websites and use of different languages, which provide the information about them. Generally, their basis objective is to change public ideology, weaken public support to the govt.
 

Relation Between Hackers And Terrorists

Hacker groups are numerous and they are divide each other by the level of education in technological field. Membership in a high level educated hacker groups frequently can be limited and exclusive membership is allowed only for individuals who develop and share set of sophisticated information communication tools for hacking. This “exclusive” hacker groups make efforts to be cover and not to attract attention due to confidentiality allows them to be more effective. Although some hacker groups can be a globally dispersed, they have similar aims as a political interest or they are connected through another basis as a religious or social ideology.
Other groups can be motivated from profit which comes together with organize crime. Also it is possible to meet hacker groups which are guided from their aspiration to sell their computer skills to sponsors as a terroristic groups or countries which it is depend on emerging political interest. As a conclusion should be stated that there are numerous reports on the above, where the actors appear as governments, companies, associations and other stakeholders. On the same manner, it should be stressed that connection between hackers, terrorist and nations that support terrorism is very hard to prove it. On other hand activities that are caused by the cyber terrorist can be detected through carefully monitoring social networks, chat, mirc and other cyber virtual location where anonymously hackers meet to exchange their information.
 
Nevertheless, in order to prevent and avoid damages from terrorist and crime activities are developed numerous research projects which should give contribution to find out technology, tactics, techniques and other stuff associated to cyber threats.
 

Differences Between Terms Cyber Crime And Cyber Terrorism

In a present time are many definitions about cyber crime and cyber terrorism. Recently was confusion whether or not this two terms - cyber crime and cyber terrorism are synonym each
other. However, some authors support definition that they two terms are synonym other authors do not support that definition and they formulate two different definitions. In a global view, the most relevant definitions are definitions which are exploited according to formulate terminology of USA.On the other hand, to make clear distinction between terms cyber crime and cyber terrorism in a following paragraphs it is necessary to be exposed differences. Defining term
cyber terrorism is crucial and the officials motivate it. Major purpose of cyber terrorism is infiltration in the system on certain institution where it can cause violence and damage (financial damage, property) in order to make and lower security in the country that is victim. Hackers that are actors which usually cause cyber crime, and they often do it for enjoyment or they struggle between each other for bigger individual success, in addition they can do it for achieving
financial or in other purposes. While hackers (cyber terrorists) who are often component of terrorist organization as a Al Qaeda, ETA, IRA etc., they make it to fulfill certain political goals (Ottis, Rain, and Lorentz, Peeter, 2010).
 
Furthermore, some authors formulate differences about hackers that hackers who commit attacks for enjoyable reasons they can be classified in a group of simple and plain criminals while cyber terrorist should be classified in a specific rigid form of crime (Guice, J., and Duffy, R., 2000).
Cyber terrorist can attack on clear defined targets that are significant strategic points for certain countries but it does not means that attack is limited and cannot have a wide range in order to
achieve definite aim. As a example of previous mentioned, target of cyber terrorist can be electrical plant which supply citizens with electricity who live in near that environment. Committing this type of attack, cyber terrorist can be effective in a wide range with a little resource. If chain of electricity supply is broken with this kind of attack that situation has
influence on daily citizens routine to fulfilling essential needs. Another example about cyber terrorism can be hospital computer system hacking and changing medical prescriptions and cause damage with prescribing wrong medicine to the patient So that everyone can be a victim of this terrorist act. AS a conclusion about differences between cyber crime and cyber terrorism is that they use same weapon to commit terrorist or crime act and this weapon is computer or ICT in a wider range.
 

ISIS’s (Islamic State Of Iraq And Syria) Presence In India

 
The ISIS (Islamic State of Iraq and Syria) or ‘Daesh’, also trying to spread their network in India. This fact is revealed when US Army killed Indian ‘IS fighter’ in Afghanistan. It was
revealed and confirmed after investigation that Indian citizens confirmed their affiliations with
IS. Some of made successful or attempted to travel to Syria, Afghanistan or Iraq for recruitment, propagandists, financers, conspirators other synthesis. About 142 Indian citizens (132 named) have confirmed their affiliation with ISIS.
India Successful Counter ISIS. About 85 of 142 IS sympathies were arrested and interrogated, some returned to and intercepted their homes, some were arrested from Airport and some deported back to India before or during their transit. Digital Promotion of terror propaganda
Terrorist spread their propaganda by various means including internet and social media platform like Facebook, twitter, WhatsApp etc. Actually, there is not any web source of www.isis.com or www.alqueda.org, but their propaganda can still be found. ISIS used twitter for the propaganda of their message, video and recruiting material online. In 2016 twitter freeze about 1,25,000
accounts linked with ISIS. It was contended by Abu Abdullah al Malghribi, ISIS detector that “The media people are more imported then solders”, he said. “Their monthly income is higher. They have better cars. They have the power to encourage those inside to fight and the power to bring more recruits to the Islamic State”.6
The ISIS Cyber campaign is differ from terrorist group in social media such as Al Qaeda in
context of their content in vey brutal in posting video massages, beheading of with Social media and internet there terrorist group trying to glorify their acts especially in the eyes of the youth.
 
 
 
 
Why Cyber Crime And Terrorism At Swansea?
 
As a postgraduate student at the Hillary Rodham Clinton School of Law, you will be part of a globally recognised law school, with a thriving academic environment committed to excellence in teaching and research, and offering an exceptional student experience.
You can engage directly with project work and with stakeholders who can provide insights and cutting-edge knowledge of cyber crime and terrorism.
The course has strong relationships with national and international partners, including policymakers, government and industrial security practitioners, military organizations, and communities. Swansea University is ranked 26th in the UK for research quality and 22nd for research impact (REF 2014).
 

 

CYBER CRIME AND TERRORISM MA EMPLOYMENT OPPORTUNITIES

Cyber crime and online terrorism are major priority areas for governments and in the private sector, and the knowledge you gain from this degree offers potential careers in:
 
·         Public sector – government, civil service, political and policy advice
 
·         Private sector – global, national or local business
·                        Non-governmental sector Research
 
 

Cyber Terrorism And Cyber Warfare

In Cyber warfare there is use of information and information systems as weapons, projecting two potentially contradictory policy issues. At one end there is obligation to restrain and guard
against information attack, on other side, the requirement to protect the right to use a non-lethal instrument in obtaining national or international requirement. At a time apparently ripe to mobilize international sentiment against all forms of terrorism, it could be particularly
worthwhile to canvas the relevant international treaties, agreements and resolutions in search of principles that might be helpful in formulating new norms to help states to distinguish between legal and illegal uses of information warfare techniques. According to Denning “Information
warfare consist of these actions intended to protect, exploit, corrupt, deny or destroy information or information resources in order to achieve a significant advantages, objective, or victory over an adversary”.
The Information technology boon opened new horizons for criminals. The Cyber warfare involves ‘attack and defense of ‘information and information system’ both in time of armed
conflict and in operations short of war. The information technology provides the promise of a new class of less lethal military instruments.
 
 
These vulnerabilities, when exploited by those who would target civilians to inspire widespread fear in hopes of accomplishing a political agenda.
The Indian govt. also sent a notice to Mark Zuckerberg, Facebook for the information regarding possible data breaches and manipulation in about 241 million active members. Indian Govt. also seek the information “whether personal data of votes has compromised by Cambridge Analytica, world’s leading data mining firm, or other downstream entity. It was alleged that Cambridge
Analytica misused data of millions of social media user and attempted to influence election

Conclusion

From the above dissection we can conclude that We could not deny apprehension of cyber terrorism activities in future. We should be act on preventive mode rather then remedial mode of this virtual and physical realities. Today digital India needs response readiness for cyber attacks which is moving ahead for digitized economic system. Which required a quick response and preparedness against cyber attacks. India should be more aggressive in responding to cyber threats and attacks. The cases of ransom demand cases have been reported in private companies
for protections of their data secrets and information infrastructures. Despite of digital awareness among netizens, another aspect of preventive actions is regulating the role of software developers and IT product companies. We should ensure the accountability and liability of software developers and companies launching such exploitable softwares for accessing. Further mishandling of software tools should have more severe punitive consequences, which require
regulation of making and leaking of such tools. Such regulatory controls should be on similar pattern of manufacturing or mishandling of fi rearms or ammunitions.9 Recently the Daily
Excelsior, a leading news paper of Jammu, published an article on June 25, 2019 which says ‘Govt to act tough on top militants, cyber terrorism’ through major amendments to the anti- terrorism. The Indian Govt. would soon present a Parliament, which would prove another
milestone to activities and prevention of cyber terrorism. Some of the amendments proposed in the Law included curbing activities through cyber terrorism by registering cases under various provisions of law. These proposed amendments not only help the Government to keep strict vigil and surveillance on militants operating in Jammu and Kashmir but also in various parts of India.
The Govt. accepted the proposal for amendment of NIA Act, which equipped the agency to
register and investigation terrorist acts on foreign countries if any Indian Citizens or interests are harmed. This draft bill seeks to extend the scope of cases, which an agency is empowered to investigate. New offences being added to the schedule of NIA Act including cyber terrorism cases under IT Act as well as crimes under Sec. 370-371 of Indian Penal Code relating to human traffi caking those often have international connections. Further former National Security Adviser M.K.
Narayana at a seminar on ‘Cyber-terrorism and the economy’ organized by Centre for Eastern
and North Eastern Regional Studies (CENERS-K), also focused on strengthening cyber warfare capacities for peace and security. He asserted that “India is on the threshold of a digital age and the use of IT technologies, which now turned ubiquitous. The danger is that not only it is becoming easier to mask an identity online, but also once the malware codes come into the open market, it can be bought and repurposed by hackers anywhere in the world.
 

Article Information

Terrorism And Cyber Crimes (By- Kalyani Ravindra Shegaonkar)

Authors: Kalyani Ravindra Shegaonkar

  • Journal IJLRA
  • ISSN 2582-6433
  • Published 2022/08/08
  • Volume 2
  • Issue 7

About Journal

International Journal for Legal Research and Analysis

  • Abbreviation IJLRA
  • ISSN 2582-6433
  • Access Open Access
  • License CC 4.0

All research articles published in International Journal for Legal Research and Analysis are open access and available to read, download and share, subject to proper citation of the original work.

Creative Commons

Disclaimer: The opinions expressed in this publication are those of the authors and do not necessarily reflect the views of International Journal for Legal Research and Analysis.