Cyber Terrorism Laws in India
Cyber Terrorism Laws in India
Cyber Terrorism Laws in India
IS GOING TO BE CYBERTERORISM
-BILL CLINTON IN DECEMBER 2000
1|Page
ACKNOWLEDGEMENT
The success and final outcome of this project required a lot of guidance and
assistance from many people and I am extremely fortunate to have got this all
along the completion of my project work. Whatever I have done is only due to
such guidance and assistance and I would not forget to thank them.
But foremost I thank Dr. Golak Prasad Sahu, my Information and Technology Law
professor, for giving me an opportunity to do the project work on "Cyber
Terrorism" and I am extremely grateful to him for providing all the support and
guidance. I would also like to thank the almighty God and my other friends.
Thank you.
2|Page
CONTENTS
TOPIC
PAGE NO.
Abstract
4-5
Introduction
6-7
9-11
12-13
14-15
16-17
Conclusion
18-19
Bibliography
3|Page
20
ABSTRACT
Over the past few decades, the world has seen a drastic and momentous change.
It has become a global village thanks to the ever-developing science and
technology. The access to internet has grown manifolds over the last few years
and even second and third world countries are now very well connected with
the internet. The benefits of internet are uncountable and it has brought
revolutionary changes to the world. One of the greatest changes has been the
growing connectivity between all corners of the world via the Internet. In
many ways, this has been a boon to humanity. However, there is also a dark side
to this achievement.
If internet can act as a boon to millions, it can also prove to be a huge destructive
weapon in nefarious hands. Internet can be put to some very bad usages and
such usages have been rising meteorically over the past few years. Cyber-crimes,
cyber-attacks, espionages, hacks and even cyber terrorism has gone rampant.
Computers and the internet are becoming an essential part of our daily life. They
are being used by individuals and societies to make their life easier. They use
them for storing information, processing data, sending and receiving messages,
communications, controlling machines, typing, editing, designing, drawing, and
almost all aspects of life. The deadliest and most destructive consequence of this
helplessness is the emergence of the concept of cyber terrorism. The
traditional concepts and methods of terrorism have taken new dimensions,
which are more destructive and deadly in nature. In the age of information &
technology, the terrorists have acquired an expertise to produce the deadliest
combination of weapons and technology, which if not properly safeguarded in
due course of time, will take its own toll. The damage so produced would be
almost irreversible and most catastrophic in nature. In short, we are facing the
4|Page
5|Page
INTRODUCTION
The term "cyber terrorism" is relatively new and is often used in day-to-day
parlance. However, if you ask people to define it, you can expect a slightly
different definition every time. It is relatively hard to define cyber terrorism and
confine its boundaries within a frame, because as weve seen with changing
time, the scope and boundaries of cyber terrorism have grown enourmously.
The definition of "cyber terrorism" cannot be made exhaustive as the nature of
crime is such that it must be left to be inclusive in nature. The nature of
"cyberspace is such that new methods and technologies are invented regularly;
hence it is not advisable to put the definition in a straightjacket formula or
pigeons hole. In fact, the first effort of the Courts should be to interpret the
definition as liberally as possible so that the menace of cyber terrorism can be
tackled stringently and with a punitive hand. The law dealing with cyber
terrorism is, however, not adequate to meet the precarious intentions of these
cyber terrorists and requires a rejuvenation in the light and context of the latest
developments all over the world.
Cyberterrorism is described by FEMA as an unlawful attack and threats of an
attack against computers done to intimidate or coerce a government or its
people in furtherance of political or social objectives. A cybercrime is a crime
that targets computers and usually includes theft of intellectual property or
deliberately disrupting a process. A cyberattack is a malicious attack on a
computer network. Security experts caution that all U.S. federal agencies should
pay close attention to cyberattacks because malicious actors do not distinguish
between military and civilian targets.
The most widely cited paper on the issue of Cyberterrorism is Dennings
Testimony before the Special Oversight Panel on Terrorism (Denning, 2000)1.
Cyberterrorism has been defined here as:
Cyberterrorism is the convergence of terrorism and cyberspace. It is generally
understood to mean unlawful attacks and threats of attack against computers,
networks, and the information stored therein when done to intimidate or
coerce a government or its people in furtherance of political or social
objectives. Further, to qualify as cyberterrorism, an attack should result in
violence against persons or property, or at least cause enough harm to
1
6|Page
generate fear. Attacks that lead to death or bodily injury, explosions, plane
crashes, water contamination, or severe economic loss would be examples.
Serious attacks against critical infrastructures could be acts of cyberterrorism,
depending on their impact. Attacks that disrupt nonessential services or that
are mainly a costly nuisance would not.
Cyber terrorism is the premeditated use of disruptive activities, or the threat
thereof, in cyber space, with the intention to further social, ideological, religious,
political or similar objectives, or to intimidate any person in furtherance of such
objectives.
To sum it up, we can describe "cyber terrorism" as the premeditated,
politically motivated attack which uses computers and IT to cause large-scale
disruption or widespread fear. The main targets of these attacks are computer
operated infrastructure (Critical Information Infrastructure) and other
facilities that are critical in nature such as that of e-government systems,
financial institutions, military installations, power plants, air traffic controls,
water systems, etc.
7|Page
8|Page
10 | P a g e
11 | P a g e
the system. These parasitic programs can cause systems to perform the wrong
tasks.
They also can spoof data, thus causing record alterations with troublesome
effects. Much of the basic knowledge needed to carry out acts of cyber terrorism
is readily available through the Internet. Many hacking tools can be downloaded
freely from the Internet through quick and easy searches. The beginner requires
only knowledge of English and the capability to follow directions.
13 | P a g e
14 | P a g e
accessed to identify and kill guests from other countries like the US and UK65.
The use of computers in the 26/11 attacks indicates an indirect from of cyber
terrorism, where the easily and publicly available information on computers was
used for perpetrating terrorism.
Few other global notable incidents of cyber terrorism are mentioned below:
In 1998, ethnic Tamil guerrillas swamped Sri Lankan embassies with 800 emails a day over a two-week period. The messages read "We are the Internet
Black Tigers and we're doing this to disrupt your communications." Intelligence
authorities characterized it as the first known attack by terrorists against a
country's computer systems.
During the Kosovo conflict in 1999, NATO computers were blasted with e-mail
bombs and hit with denial-of-service attacks by hacktivists protesting the NATO
bombings. In addition, businesses, public organizations, and academic institutes
received highly politicized virus-laden e-mails from a range of Eastern European
countries, according to reports. Web defacements were also common.
Since December 1997, the Electronic Disturbance Theatre (EDT) has been
conducting Web sit-ins against various sites in support of the Mexican
Zapatistas. At a designated time, thousands of protestors point their browsers
to a target site using software that floods the target with rapid and repeated
download requests. EDT's software has also been used by animal rights groups
against organizations said to abuse animals. Electro hippies, another group of
hacktivists, conducted Web sit-ins against the WTO when they met in Seattle in
late 1999.
One of the worst incidents of cyber terrorists at work was when crackers in
Romania illegally gained access to the computers controlling the life support
systems at an Antarctic research station, endangering the 58 scientists involved.
More recently, in May 2007 Estonia was subjected to a mass cyber-attack by
hackers inside the Russian Federation which some evidence suggests was
coordinated by the Russian government, though Russian officials deny any
knowledge of this. This attack was apparently in response to the removal of a
Russian World War II war memorial from downtown Estonia.
15 | P a g e
damage to properties, disruption of civil services which are essential to the life
of a community, and also affects the critical information infrastructure.
Critical Information Infrastructure
Section 70 of the Information technology act, 2000 (amended in 2008) describes
protected system and regulations related to it as follows: (1) The appropriate
Government may, by notification in the Official Gazette, declare any
computer resource which directly or indirectly affects the facility of Critical
Information Infrastructure, to be a protected system. Explanation: For the
purposes of this section, "Critical Information Infrastructure" means the
computer resource, the incapacitation or destruction of which, shall have
debilitating impact on national security, economy, public health or safety.
Critical Information Infrastructure is a computer resource, the incapacitation or
destruction of which will have debilitating impact on national security, economy,
public health or safety. Declaration as protected system even amounts to
copyright3.
National Nodal Agency
The National Nodal Agency is the body designated by the central government
for the purposes of protection of the Critical Information Infrastructure,
including research and development. The National Critical Information
Infrastructure Protection Centre (NCIIPC) of the National Technical Research
Organisation has been designated as the nodal agency under Section 70A of the
IT Act.
17 | P a g e
CONCLUSION
The menace of cyber terrorism is not peculiar to any particular country as the it
is global in nature. The countries all over the world are facing this problem and
are trying their level best to eliminate this problem. The problem, however,
cannot be effectively curbed unless popular public support and a vigilant
judiciary back it.
Currently there are no fool proof ways to protect a system. The completely
secure system can never be accessed by anyone. Most of the militaries classified
information is kept on machines with no outside connection, as a form of
prevention of cyber terrorism. Apart from such isolation, the most common
method of protection is encryption. The wide spread use of encryption is
inhibited by the governments ban on its exportation, so intercontinental
communication is left relatively insecure. The Clinton administration and the FBI
oppose the export of encryption in favour of a system where by the government
can gain the key to an encrypted system after gaining a court order to do so. The
director of the FBI's stance is that the Internet was not intended to go unpoliced
and that the police need to protect people's privacy and public-safety rights
there. Encryption's drawback is that it does not protect the entire system, an
attack designed to cripple the whole system, such as a virus, is unaffected by
encryption.
Others promote the use of firewalls to screen all communications to a system,
including e-mail messages, which may carry logic bombs. Firewall is a relatively
generic term for methods of filtering access to a network. They may come in the
form of a computer, router other communications device or in the form of a
network configuration. Firewalls serve to define the services and access that are
permitted to each user. One method is to screen user requests to check if they
come from a previously defined domain or Internet Protocol (IP) address.
Another method is to prohibit Telnet access into the system.
Now its high time to take action. It is a fact that counter terrorists are duty
bound to save property and lives. We all are increasingly connected, dependent
and vulnerable. With combination of knowledge, responsibility and expertise, a
counter- cyber terrorism team can build an effective policy for preventing cyber
terrorist incidents, managing threats and responding to Cyber- Terrorist acts. So
now we agree the fact that the traditional concepts and methods of terrorism
have taken new dimensions, which are more deadly and destructive in nature.
The damage so produced would be almost irreversible and most catastrophic in
nature. The law dealing with cyber terrorism is however not adequate to meet
18 | P a g e
19 | P a g e
BIBLIOGRAPHY
Law of Information Technology and Internet, 1st Edition, Lexis Nexis
Publication by Anirugh Rastogi
Information Technology, Law and Practice, 4th Edition, Universal Law
Publishing by Vakul Sharma
Syed Balkhi: 25 Biggest Cyber Attacks in History
http://www.cyberlawsindia.net/
https://www.symantec.com/avcenter/reference/cyberterrorism
www.academia.edu
20 | P a g e