Transnatrional Project
Transnatrional Project
Transnatrional Project
ON
SUBMITTED TO
VIKASH GOEL
SEMESTER IX
SUBMITTED ON
CYBER WARFARE AND CYBER TERRORISM
Acknowledgement
I feel highly elated to work on this dynamic topic on CYBER WARFARE AND CYBER
TERRORISM. Its ratio is significant in todays era when there is significant progress in the field of
internet and technology and growing threat of cyber terrorism on the whole world .
The practical realization of this project has obligated the guidance of many persons. I express my deepest
regard for our faculty M/s. Madhurima De Sarkar. Her consistent supervision, constant inspiration and
invaluable guidance and suggestions have been of immense help in carrying out the project work with
success.
I extend my heartfelt thanks to my family and friends for their moral support and encouragement.
Vikash Goel
Semester IX TH
Table of Contents
Acknowledgement.....................................................................................................2
INTRODUCTION.....................................................................................................3
STATEMENT OF PROBLEM..................................................................................5
HYPOTHESIS...........................................................................................................5
OBJECTIVE..............................................................................................................5
REVIEW OF LITERATURE....................................................................................6
RESEARCH METHODOLOGY..............................................................................6
CONCLUSION.......................................................................................................26
REFERENCES........................................................................................................28
INTRODUCTION
The world of Internet today has become a parallel form of life and living. The public are now
capable of doing things which were not imaginable few years ago. The Internet is fast becoming
a way of life for millions of people and also a way of living because of growing dependence and
reliance of the mankind on these machines. Internet has enabled the use of website
communication, email and a lot of anytime anywhere IT solutions for the betterment of human
kind.
Internet, though offers great benefit to society, also present opportunities for crime using new
and highly sophisticated technology tools. Today e-mail and websites have become the preferred
means of communication. Organizations provide Internet access to their staff. By their very
nature, they facilitate almost instant exchange and dissemination of data, images and variety of
material. This includes not only educational and informative material but also information that
might be undesirable or anti-social. Regular stories featured in the media on computer crime
include topics covering hacking to viruses, web-jackers, to internet paedophiles, sometimes
accurately portraying events, sometimes misconceiving the role of technology in such activities.
Increase in cyber crime rate has been documented in the news media. Both the increase in the
incidence of criminal activity and the possible emergence of new varieties of criminal activity
pose challenges for legal systems, as well as for law enforcement1
Cyber Warfare is using computers over the Internet to conduct acts of warfare against other
websites or groups on the Internet. This could include defacing websites, distributed denial of
service attacks, distributing propaganda, and gathering classified data over the Internet. Cyber
Terrorism is different from Cyber Warfare. Cyber Warfare can be inconvenient from having to
clean up a website from vandalism or suffering from downtime because of a denial of service
attack. With Cyber Terrorism, violence can result from an attack.2
The term cyber terrorism was coined in1996 by combining the terms cyberspace and
terrorism. Cyber terrorism is the dark side of the web world. Cyber terrorism is the
premeditated, politically motivated attack against information, computer systems, computer
programs, and data which result in violence against noncombatant targets by sub national groups
or clandestine agents. It is the use of disruptive activities or the threat thereof, in cyber space,
with the intention to further social, ideological, religious, political or similar objectives, or to
intimidate any person in furtherance of such objectives.3
According to Mark Pollitt of the Federal Bureau of Investigation, the definition of Cyber
Terrorism is, the premeditated, politically motivated attack against information, computer
systems, computer programs, and data which results in violence against noncombatant targets by
sub national groups or clandestine agents. This definition according to Verton, covers both
cyber terrorism and terrorism in general, he continues on that, not only can systems be
attacked through cyber means, but also attacking the physical hardware that makes up computer
systems.
3 DeNileon, Guy, The Who, What Why and How of Counter-terrorism Issues,
American Water Works Association Journal, May 2001, Volume 93, No. 5, pp. 7885
CYBER WARFARE AND CYBER TERRORISM
STATEMENT OF PROBLEM
The research deals with the imminent threat of cyber warfare and cyber terrorism to world
security whose importance has grown owing to the evolution of cyberspace and internet. It also
deals with the various preventive steps that mat be undertaken to tackle the same. Towards the
end, it deals with the various international and national laws that are intended to deal with the
problem.
HYPOTHESIS
The threat of cyber warfare and cyber terrorism can be effectively dealt with under the present
system of crime prevention at national and international level.
CYBER WARFARE AND CYBER TERRORISM
OBJECTIVE
The objective of the project is:
REVIEW OF LITERATURE
from our ignorance and the will to fight it. The law is stricter now on producing evidence
especially where electronic documents are concerned.
RESEARCH METHODOLOGY
The method of research adopted is analytical in nature. I have referred sources on the internet as
well as a few books on Transnational Law available in the university library besides adding my
personal views and knowledge of the topic. Books and other references as guided by the faculty
of Transnational Law have been primarily helpful in giving this project a firm structure.
Websites, dictionaries and articles have also been referred.
Cyber Warfare and Cyber Terrorism have both similarities and differences. They are similar in
sense that both involve using computer systems against other computer systems, although with
Cyber Terrorism the physical system can also be targeted. They are both different because in
Cyber Terrorism, violence can occur, such as people can be hurt or killed.
There are many reasons why these attacks occur. Probably one of the main reasons is to state a
goal or objective that disagrees with a view of another community. For example, an anti-abortion
group defacing an abortion clinics website, or performing a denial of service against a website
so that people cannot access it and receive information from it. These would be acts of Cyber
Warfare.
With Cyber Terrorism, these attacks occur because of numerous reasons. The word terrorism
itself has the word terror in it, which means to strike fear and dread into an individual. There
have been many Terrorism attacks throughout history, including the one on September 11, 2001.
CYBER WARFARE AND CYBER TERRORISM
With Cyber Terrorism, it uses that fear and dread by utilizing it over the Internet to attack
computer systems that control numerous things, hacking government websites and stealing top
secret information that could be used against that government by the terrorists. Similar to Cyber
Warfare, most terrorist goals, besides striking fear into other groups and nations, is to convey a
political message to the government or nation that they oppose.4
Fear Factor - The most denominator of the majority of the attacks is terrorists wishing to
create fear in individuals groups and societies. The best example is bombing of Bali
Nightclub, in 2002. This night club was nothing but watering for foreign tourists. The
influx of foreign tourists to Bali was significantly reduced after this attack.
Spectacular Factor - Spectacular means attacks aimed at either creating huge direct losses
and/or resulting in a lot of negative publicity. In 1999, the Amazon.com Web site was
closed for some time due to a denial of service (DOS) attack.
Vulnerability factor - Cyber activities do not always end up with huge financial losses.
Virus and worm attacks that are delivered via e-mail attachments, Web browser
Denial of service attacks designed to prevent the use of public systems by legitimate
Unauthorized intrusions into systems that lead to the theft of confidential and/or
proprietary information, the modification and/or corruption of data, and the inappropriate
usage of a system for launching attacks on other systems.
The roots of the notion of cyber-terrorism can be traced back to the early 1990s, when the rapid
growth in Internet use and the debate on the emerging information society sparked several
studies on the potential risks faced by the highly networked, high-tech dependent United States.
As early as 1990, the National Academy of Sciences began a report on computer security with
the words, We are at risk. Increasingly, America depends on computers. . . . Tomorrows
terrorist may be able to do more damage with a keyboard than with a bomb. At the same time,
the prototypical term electronic Pearl Harbor was coined, linking the threat of a computer
attack to an American historical trauma.
Its no surprise, argues Green, that cyber-terrorism now ranks alongside other weapons of
mass destruction in the public consciousness . . . but theres just one problem: There is no such
CYBER WARFARE AND CYBER TERRORISM
thing as cyber-terrorismno instance of anyone ever having been killed by a terrorist (or
anyone else) using a computer. Nor is there compelling evidence that al Qaeda or any other
terrorist organization has resorted to computers for any sort of serious destructive activity. 5 It
seems fair to say that the current threat posed by cyber-terrorism has been exaggerated. No
single instance of cyber-terrorism has yet been recorded: there were politically motivated cyber-
attacks, as a form of protest, usually involving website defacements (with a political message) or
some types of denial of service (DoS) attack.5 However, while the cyber-attacks were politically
motivated, from the outset the attacks were incapable of harming people or property or instilling
fear into the target population. Its impact was primarily designed to cause disruption and did not
have a serious impact on critical services or infrastructure. The vast majority of cyber-attacks are
launched by hackers with few if any political goals and no desire to cause the mayhem and
carnage of which terrorists dream. So, then, why has so much concern been expressed over a
relatively minor threat?
The reasons for the popularity of cyberterrorism angst are many. Psychological, political, and
economic forces have combined to promote the fear of cyberterrorism. First, from a
psychological perspective, two of the greatest fears of modern time are combined in the term
cyberterrorism. The fear of random, violent victimization segues well with the distrust and
outright fear of computer technology. An unknown threat is perceived as more threatening than a
known threat. Although cyberterrorism does not entail a direct threat of violence, its
psychological impact on anxious societies can be as powerful as the effect of terrorist bombs.
Moreover, the most destructive forces working against an understanding of the actual threat of
cyberterrorism are a fear of the unknown and a lack of information or, worse, too much
misinformation. 6
6 T. Spellman. 2004. Expert: U.S. At Risk of Cyberterrorism. The Dartmouth Online, 19 April
2004
CYBER WARFARE AND CYBER TERRORISM
Second, the mass media have added their voice to the fearful chorus, trumpeting the threat with
front-page headlines such as the following, which appeared in The Washington Post in June
2003: Cyber-Attacks by Al Qaeda Feared, Terrorists at Threshold of Using Internet as Tool of
Bloodshed, Experts Say. Cyberterrorism, the media have discovered, makes for eye-catching,
dramatic copy.
To study terrorism, on the Internet or elsewhere, a definition of what terrorism is must be found.
Even though most people can recognize terrorism when they see it, experts have had difficulty
coming up with an ironclad definition. There are more than one hundred different definitions
offered by scholars.11 Thus, a more fruitful approach would be to characterize terrorism;
Mullins provides a starting point by highlighting the terror of terrorism, that is, the argument
or pre-condition that without the terror induced by the terrorist, there can be no terrorism. 7Fear
is a key element in terrorism, and it is the fear evoked by the individuals or the small groups of
individuals whose capacity to constraint the behavior of others resides not in reason, in
numerical preponderance, or in any legitimate exercise of authority, but only in their perception
that they are able and willing to use violence unless their demands are satisfied.13 Hoffman
defined terrorism as Violence, or the threat of violence, used and directed in pursuit of, or in
service of, a political aim. The U.S. State Department defines terrorism as premeditated,
7 D. Verton. Cyberterrorism & security: New definitions for new realities, paper presented at
the Cato Institute Book Forum, 12 November 2003b, Washington, DC.
CYBER WARFARE AND CYBER TERRORISM
A fourth reason is that some politicians, whether out of genuine conviction or out of a desire to
stoke public anxiety about terrorism in order to advance their own agendas, have played the role
of prophets of doom. After 9/11, the security and terrorism discourse soon featured
cyberterrorism prominently.
First, it is cheaper than traditional terrorist methods. All that the terrorist needs is a personal
computer and an online connection. Terrorists do not need to buy weapons such as guns and
explosives; instead, they can create and deliver computer viruses through a telephone line, a
cable, or a wireless connection.
CYBER WARFARE AND CYBER TERRORISM
Second, cyberterrorism is more anonymous than traditional terrorist methods. Like many
Internet surfers, terrorists use online nicknamesscreen namesor log on to a website as an
unidentified guest user, making it very hard for security agencies and police forces to track
down the terrorists real identity. And in cyberspace there are no physical barriers such as
checkpoints to navigate, no borders to cross, no customs agents to outsmart. 8
Third, the variety and number of targets are enormous. The cyberterrorist could target the
computers and computer networks of governments, individuals, public utilities, private airlines,
and so on. The sheer number and complexity of potential targets guarantees that terrorists can
find weaknesses and vulnerabilities to exploit. Several studies have shown that critical
infrastructures, such as electric power grids and emergency services, are vulnerable to a
cyberterrorist attack because the infrastructures and the computer systems that run them are
highly complex, making it effectively impossible to eliminate all weaknesses.9
Fifth, as the I LOVE YOU virus showed, cyberterrorism has the potential to affect directly a
larger number of people than traditional terrorist methods, thereby generating greater media
coverage, which is ultimately what terrorists want.
A Variety of Threat Actors Criminals, terrorists, and spies rely heavily on cyber-based
8 DeNileon, Guy, The Who, What Why and How of Counter-terrorism Issues,
American Water Works Association Journal, May 2001, Volume 93, No. 5, pp. 7885,
Cyber-terrorists are state-sponsored and non-state actors who engage in cyber-attacks to pursue
their objectives. Transnational terrorist organizations, insurgents, and jihadists have used the
Internet as a tool for planning attacks, radicalization and recruitment, a method of propaganda
distribution, and a means of communication, and for disruptive purposes. While no unclassified
reports have been published regarding a cyber-attack on a critical component of U.S.
infrastructure, the vulnerability of critical life-sustaining control systems being accessed and
destroyed via the Internet has been demonstrated. In 2009, the Department of Homeland
Security (DHS) conducted an experiment that revealed some of the vulnerabilities to the nations
control systems that manage power generators and grids. The experiment, known as the Aurora
Project, entailed a computer-based attack on a power generators control system that caused
operations to cease and the equipment to be destroyed. Cyber-terrorists may be seeking a
destructive capability to exploit these vulnerabilities in critical infrastructure. 10
Cyber-spies are individuals who steal classified or proprietary information used by governments
or private corporations to gain a competitive strategic, security, financial, or political advantage.
These individuals often work at the behest of, and take direction from, foreign government
entities. Targets include government networks, cleared defense contractors, and private
companies. For example, a 2011 FBI report noted, a company was the victim of an intrusion
and had lost 10 years worth of research and development datavalued at $1 billionvirtually
overnight. Likewise, in 2008 the Department of Defenses (DOD) classified computer network
system was unlawfully accessed and the computer code, placed there by a foreign intelligence
agency, uploaded itself undetected onto both classified and unclassified systems from which data
could be transferred to servers under foreign control.11
10 A. Lake. Six Nightmares (New York: Little, Brown and Company, 2000)
Cyber-thieves are individuals who engage in illegal cyber-attacks for monetary gain. Examples
include an organization or individual who illegally accesses a technology system to steal and use
or sell credit card numbers and someone who deceives a victim into providing access to a
financial account. One estimate has placed the annual cost of cybercrime to individuals in 24
countries at $388 billion. However, given the complex and sometimes ambiguous nature of the
costs associated with cybercrime, and the reluctance in many cases of victims to admit to being
attacked, there does not appear to be any publicly available, comprehensive, reliable assessment
of the overall costs of cyber-attacks.
Cyber-activists are individuals who perform cyber-attacks for pleasure, philosophical, political,
or other nonmonetary reasons. Examples include someone who attacks a technology system as a
personal challenge (who might be termed a classic hacker), and a hacktivist such as a
member of the cyber-group Anonymous who undertakes an attack for political reasons. The
activities of these groups can range from nuisance-related denial of service attacks and website
defacement to disrupting government and private corporation business processes. The threats
posed by these cyber-aggressors and the types of attacks they can pursue are not mutually
exclusive. For example, a hacker targeting the intellectual property of a corporation may be
CYBER WARFARE AND CYBER TERRORISM
With Cyber Warfare, any website on the Internet and the people who are affiliated with them can
be affected by Cyber Warfare attacks. Going back to the previous example of the abortion clinic,
not only has the website been defaced by an anti-abortion group, it effects the people who run
the website, mainly those of the abortion clinic, and people who support abortion can be affected
by this act of vandalism. Also depending on the intensity of the vandalism, the clinic itself can
lose credibility. On the other side of this spectrum, the people who are against abortion are
pleased with the results.
Another example of who is affected by Cyber Warfare would be going back to the denial of
service attack against a website. Say this website is a bank website, and a hacker performs a
denial of service attack against this website. The website can now not be accessed by its patrons,
causing them not to be able to access their accounts, forcing them to physically go to the bank to
perform their daily transactions, increasing the business of the bank with lots of unhappy
patrons. This also affects the reputation of the banks online security, possibly scaring people out
of that bank and into another bank where they may feel more secure. On a side note, this attack
could have been performed by a rival bank to scare people out of one bank and having them
come to their bank. These are just a few possible ways of Cyber Warfare.12
With Cyber Terrorism either a small amount of people can be affected or entire nations can be
affected. A sinister Cyber Terrorism plot that was foiled would have occurred sometime in 1996
in London. Members of the Irish Republican Army (IRA) were planning to blow up and destroy
six key electric substations in London. Had the IRA succeeded in their goal, they would have
disrupted power to major portions of London for months.
12 D. Verton. Black Ice: The Invisible Threat of Cyberterrorism (New York: McGraw-
Hill Osborne Media, 2003a).
CYBER WARFARE AND CYBER TERRORISM
The prospect of internet-based warfare has come to the fore after a series of high-profile
international attacks. It has emerged that a gang of hackers, believed to be from China, had
infiltrated computer systems at the Pentagon and launched attacks on government networks in
Britain, Germany, India and Australia. US officials, who have labeled the group Titan Rain, have
accused them of operating under the auspices of officials in Beijing. Another strike in Estonia,
which has one of the most hi-tech governments in the world, was initially blamed on hackers
backed by the Russian authorities. However, only one teenager, an Estonian, has been arrested in
connection with the incident so far.
The annual E-Crime congress is one the largest gatherings of those who work to combat cyber
crime. Delegates included banking experts, police and IT industry luminaries, all keen to
discover new ways to fight online crime.
North Atlantic Treaty Organization (NATO) believes cyber warfare poses as great a threat as a
missile attack. NATO is treating the threat of cyber warfare as seriously as the risk of a missile
strike. Among the chief threats is cyber terrorism, in which attempts are made to shut down
online communication networks or use the internet to attack official institutions. Although some
have warned of the possible threat since the 1980s, it is only in recent years that the issue has
made it onto the radar of governments around the world.
Suleyman Anil, in-charge of protecting NATO against computer attacks and head of NATO's
computer incident response centre, said at the E-Crime congress held in London "Cyber defense
is now mentioned at the highest level along with missile defense and energy security. We have
seen more of these attacks and we don't think this problem will disappear soon. Unless globally
supported measures are taken, it can become a global problem."13
Kevin Poulsen, a former hacker who is now an editor with technology magazine Wired, has
accused politicians and the media of overplaying the fear factor. He opined before the London E-
13 . Hamid Mir, editor of Ausaf newspaper, cited in Verton 2003a, op. cit., p. 108.
CYBER WARFARE AND CYBER TERRORISM
Crime congress "In some ways, Estonia's attacks were less sophisticated than previous 'cyber
wars' - like those between Israeli and Palestinian hackers, India and Pakistan, China and the US.
Even those attacks fell short of a cyber war, at least as experts have defined the term. I'm
sceptical that real cyber war, or cyber terrorism, will ever take place."
Despite the lack of hard evidence on the nature or identities of cyber terrorists, however, the
threat is deemed serious enough for the White House to allocate $6bn (3bn) for strengthening
its systems against attack.
The real issue is how to prevent cyber crime. For this, there is need to raise the probability of
apprehension and conviction. There is no way to be completely secure from any type of Cyber
Warfare or Cyber Terrorism attack. The more security a computer system has in place, the easier
it can become to attack this system. For Cyber Warfare, one has to deal with securing
information systems, including computer networks, and all the data of a corporation or
government entity, having a good IT security team and security plan will help protect the
companys data. For Cyber Terrorism, physical systems need to be guarded, and if they are high
priority targets subject to attack, the appropriate measures to secure this data need to be in place.
India has a law on evidence that considers admissibility, authenticity, accuracy, and
completeness to convince the judiciary. The challenge in cyber crime cases includes getting
evidence that will stand scrutiny in a foreign court. For this India needs total international
cooperation with specialized agencies of different countries. Police has to ensure that they have
seized exactly what was there at the scene of crime, is the same that has been analyzed and the
report presented in court is based on this evidence. It has to maintain the chain of custody. The
threat is not from the intelligence of criminals but from our ignorance and the will to fight it.
The law is stricter now on producing evidence especially where electronic documents are
CYBER WARFARE AND CYBER TERRORISM
concerned.
As sophisticated political-military alliance, NATO has long been familiar with the use and
defense of electronic and information warfare. For years, NATO is involved in efforts to
transform the military organization and conduct of operations by networking oriented warfare
and network enabled capabilities. At the Prague Summit in November 2002, NATO leaders
decided to strengthen its capabilities to defend against cyber attacks. Decision in Prague resulted
in many initiatives.
A new NATO Cyber Terrorism Program is initiated, involving various NATO bodies: NATO
Communication and Information Systems Services Agency (NCSA), described as the first line
of defense against cyber terrorism, NATO INFOSEC Techinical Center (NITC ), responsible for
communication and computer security; NATO Information Assurance Operations Centre
(NIAOC), responsible for management and coordination of cryptographic equipment in response
to a cyber attack against NATO; NATO Computer Incident Response Capability (NCIRC), whose
task is to protect the NATO encrypted communications systems.14
Following the Summit, NATO established Cyber Defence Management Authority (CDMA), in
order to bring together all key players in the NATO activities related to cyber defense, and better
management of the cyber defense support to any member of the alliance in defense against cyber
attack, upon request.24 At the same time, NATO leaders agreed with the formal establishment of
the NATO Cooperative Cyber Defence Center of Excellence (CCD-CoE), which has been in
development since 2004. The significance of the CCD-CoE, based in Tallinn, was confirmed
during the attack of Estonia in 2007, so in October 2008 the NATO Council grants the Centre
14 D. Verton. Cyberterrorism & security: New definitions for new realities, paper
presented at the Cato Institute Book Forum, 12 November 2003b, Washington, DC.
CYBER WARFARE AND CYBER TERRORISM
full NATO accreditation and the organisation obtains the status of International Military
Organization. The mission and vision of the CCD-CoE are described as follows: enhance the
capability, cooperation and information sharing among NATO, NATO nations and partners
in cyber defence by virtue of education, research and development, lessons learned and
consultation and to be the main source of expertise in the field of cooperative cyber defence by
accumulating, creating, and disseminating knowledge in related matters within NATO, NATO
nations and partners.
the cyber security and cyber peace are some of the most critical concerns in the ICT
development, and ITU takes concrete measures through its Global Cybersecurity Agenda (GCA).
In September 2008, the ITU and the International Multilateral Partnership Against Cyber Threats
(IMPACT) signed an agreement under which GCA is located in IMPACT headquarter in
Cyberjaya, Malaysia.
Security of Information and Privacy (WPSIP), which aims is to provide a foundation for
developing national co-ordinated policies. 15
G-8
The main contribution of the G-8 in international cyber security policy is a Subgroup of High-
Tech Crime, created as a subset of Lyon Group in 1996 to combat trans- national organized
crime. The purpose of this subgroup was to enhance the ability of the G-8 countries to protect,
investigate and prosecute crimes committed using computers, network communications, and
other new technologies. The mission of the subunit was subsequently extended to include the
use of the Internet by terrorists and the protection of critical information infrastructure. Subgroup
is trying to deal with cyber crime not only within the jurisdiction of the G8 countries, but also to
create guidelines that could take and implement other countries. The subgroup has created 24/7
network of contact for high-tech crime and international Critical Information Infrastructure
Protection (CCIP) Directory.
CYBER WARFARE AND CYBER TERRORISM
Subgroup has published its best practice documents and guidelines for assessment of threats
to computer and network security and has organized international training conferences for cyber-
crime agencies.17
Cyber Law is seen as an essential component of criminal justice system all over the world. The
same applies to cyber law of India as well. The computer is the target and the tool for the
perpetration of crime. It is used for the communication of the criminal activity such as the
injection of a virus/worm which can crash entire networks.
The Information Technology (IT) Act, 2000, specifies the acts which have been made
punishable. Since the primary objective of this Act is to create an enabling environment for
commercial use of I.T., certain omissions and commissions of criminals while using computers
have not been included. With the legal recognition of Electronic Records and the amendments
made in the several sections of the IPC vide the IT Act, 2000, several offences having bearing on
cyber-arena are also registered under the appropriate sections of the IPC.
17 R. Bendrath. The American Cyber-Angst and the Real World. In Robert Latham
(Ed.): Bombs and Bandwidth: The Emerging Relationship between IT and Security
(New York: The New Press, 2003), pp. 4973.
CYBER WARFARE AND CYBER TERRORISM
India is the 12th country of the world having a cyber law. It covers areas like e-governance, e-
commerce, cyber contraventions and cyber offences. However, some critics and cyber law
experts have questioned the strength of IT Act, 2000.
Although India has done a good job by enacting the IT Act, 2000 yet it failed to keep it updated.
For instance, we need express provisions and specified procedures to deal with issues like denial
of service (DOS), distributed denial of services (DDOS), bot, botnets, trojans, backdoors, viruses
and worms, sniffers, SQL injections, buffer overflows etc. These issues cannot be left on mere
luck, implied provisions or traditional penal law of India (IPC). Even issues like cyber war
against India or cyber terrorism against India have not been incorporated into the IT Act, 2000
yet.
Some of these issues are also cross-linked with capacity building requirements of India in the
field of cyber security in India and cyber forensics in India. A crucial truth that India failed to
appreciate is that e-governance in India is useless till we are capable of securing it as well.
Without the crucial capabilities in the fields of cyber security and cyber forensics, India is
heading towards a big trouble. Even the basic e-mail tracking procedures sometimes pose as a
big challenge before the law enforcement agencies in India. Interestingly, some of the legal
experts have shown their support for prosecuting owners of e-mail addresses and Internet
Protocol addresses relying upon common law principles not knowing exactly the nature of the
Internet.
It would be a dangerous trend to follow to arrest or detain suspects on the basis of mere IP
addresses or e-mail addresses as they are very easy to be spoofed and forged. Eve n MAC
addresses can be spoofed in certain circumstances and for many purposes, particularly for
identity theft cases in wireless connections. It is important to apply common sense and first
ascertain the identity of real culprit. Of course, it requires tremendous cyber forensics expertise
to correctly trace the culprit. The recent case of wrongfully arresting an innocent person and
imprisoning him for a considerable time is a glaring example of faulty and novice cyber
forensics application in India. The inability of the Government of India to meet these
CYBER WARFARE AND CYBER TERRORISM
conspicuous deficiencies of the legal enablement of ICT systems in India is stifling the growth
of ICT laws in India.
The present cyber law of India does not cover these issues and there is a dire need of
incorporating the same as soon as possible.
Some of the Statutory Provisions under Indian Law to combat cyber crimes are:
The Indian parliament considered it necessary to give effect to the resolution by which the
General Assembly adopted Model Law on Electronic Commerce adopted by the United Nations
Commission on Trade Law. As a consequence of which the Information Technology Act 2000
was passed and enforced on 17th May 2000. The preamble of this Act states its objective to
legalise e-commerce and further amend the Indian Penal Code 1860, the Indian Evidence Act
1872, the Bankers Book Evidence Act1891 and the Reserve Bank of India Act 1934. The basic
purpose to incorporate the changes in these Acts is to make them compatible with the Act of
2000. So that they may regulate and control the affairs of the cyber world in an effective
manner.
The Information Technology Act deals with the various cyber crimes in chapters IX & XI. The
important sections are Ss. 43,65,66,67.
i. Section 43 in particular deals with the unauthorised access, unauthorised downloading,
virus attacks or any contaminant, causes damage, disruption, denial of access,
interference with the service availed by a person. This section provide for a fine up to Rs.
1 Crore by way of remedy.
ii. Section 65 deals with tampering with computer sourcedocuments' and provides for
imprisonment up to 3 years or fine, which may extend up to 2 years or both.
iii. Section 66 deals with hacking with computer system and provides for imprisonment up
to 3 years or fine, which may extend up to 2 years or both.
iv. Section 67 deals with publication of obscene material and provides for imprisonment up
to a term of 10 years and also with fine up to Rs. 2 lakhs
CYBER WARFARE AND CYBER TERRORISM
CONCLUSION
Cyber Warfare and Cyber Terrorism are a growing threat in this world. More and more groups
are becoming aware of the possibility of Cyber Warfare and Cyber Terrorism. Cyber Terrorism
has been occurring within the last twenty years and as time progresses and more and more
nations become even more computerized, there will be more and more attacks through
cyberspace.
A survey released by the UK government has revealed that the British public is now more
fearful of cyber crime than burglary and crimes against the person. According to its results,
Internet users fear bankcard fraud the most (27 percent), followed by cyber crime (21 percent)
and burglary (16 percent). This shows that hi-tech crime has firmly overtaken conventional
burglaries, muggings and thefts in the list of the publics fears, as the Internet has become firmly
CYBER WARFARE AND CYBER TERRORISM
embedded into the British society, with some 57 percent of households having online access.
Interestingly, University of Abertay in Dundee, Scotland (UK) is now offering a BSc Hons in
Ethical Hacking and Countermeasures.
Although hard, it is possible to try and combat cyber terrorism through the securing of systems,
but there will always be an exploit someplace whether its through the computer or through the
gullible user. Cyber Terrorism and Cyber Warfare are a looming threat in this technologically
advancing world.
The traditional national defense strategies are ill suited to protect the nations against this threat.
Enemies can launch a devastating attack, from almost anywherea cafe in London, a cave in
Afghanistan, or a coffee shop in our Midwest. They can mobilize large networks of captured
computers from around the world to do their bidding. They can do so with almost no trail, no
return address. Enemies of this kind, attacks of this nature, are almost impossible to deter, and
even harder to preempt.
In the face of threats, the systems that are to be depend upon, are vulnerable to the most
simplistic of hackers, even as constant efforts by sophisticated enemies to penetrate the systems,
probe vulnerabilities, plan future attacks and inject sleeper weapons into the IT systems is faced.
It is high time to make concentrated effort otherwise nations would leave themselves
unacceptably open to a devastating attack on our nation. Such an attack could compromise the
integrity of the financial industry. It could turn off the power to entire regions of the nation. It
could strike at any one of vital infrastructure sectors without warning and with devastating
effect.
Although India has formulated the National Cyber Security Policy of India 2013 (NCSP 2013)
yet it is deficient on many counts. For instance, it has no Coordination with the National Security
Policy of India. Similarly, the NCSP 2013 has Failed to Protect the Privacy Rights in India
(PDF). The Privacy Rights in India in the Information Age (PDF) have not at all been covered by
the NCSP 2013. Similarly, there is no E-Surveillance Policy of India (PDF) framed by Indian
CYBER WARFARE AND CYBER TERRORISM
Government so far. Obviously, we have no Cyber Warfare Policy of India as well. Even the
Cyber Law of India is weak and ineffective and deserves to be repealed.
The biggest hurdle before curbing Cyber Warfare Threats at the International Level is Lack of
Harmonisation in this regard. Till now we have no Internationally Acceptable Definition of
Cyber Warfare. Further, we have no Universally Acceptable Cyber Crimes Treaty as well. There
is also no International Cyber Security Treaty. India is not a part of any International Treaty or
Conventions regarding Cyber Crimes, Cyber Security, etc. We cannot have a Cyber Warfare
Policy in India till we have a Cyber Crimes Policy in India, Cyber Security Policy in India, cyber
Terrorism Policy in India and other similar Policies. Indian Government must urgently work in
this crucial direction as it is the most urgent need of the hour.
REFERENCES