Professional Documents
Culture Documents
Cyber Terrorism in India: A Physical Reality Orvirtual Myth: Original Article
Cyber Terrorism in India: A Physical Reality Orvirtual Myth: Original Article
has tendency of depiction of lethal, non-lethal hacking, generally to satisfy the ego of hackers of
psychological well being, public confidence and creating terror.
political attitudes. Generally, it is to consider as Sometimes it seems too similar or over lapping
Cyber terrorism affects only the national security with each other like cyber attack and cyber
system. But infect it also affects their psyche and terrorism. The objective of Cyber terrorism is to
cognition. The Cyber terrorist expanded growth of generate the feeling of terror in the mind of the
Cyber attacks, which is dramatically increased in Cyber victims. Cyber terrorism is also causing
past few years. It has caused mass destruction and threat to most vulnerable point, which cover
damage to nuclear facilities and critical command physical and virtual world. It includes commission
and control system. The Cyber experts are working of acts of destruction, alteration, acquisition and
to strengthen more and more capacity to restrain acts of transmission against the following:
Cyber attacks over Govt. system, defence websites,
financial and banking system and most important • Defence forces
nuclear facilities. • Financial Infrastructure
Cyber space is running in veins of modern • Civilians
digital system, business and other essential • Destructions of supervisory control and data
services. The Cyber security is one of important acquisition system of smart cities
aspect, the failure of which turned in to battle field
for Cyber attacks and Cyber terrorism. The Cyber • Exploration of smart army etc
crime or E- crimes are now become the reality of
life which includes the various kinds and modes of Historical Flashback of Cyber Terrorism
Cyber crimes like website hacking, ID or password
hacking, data theft or service denial to various
The first quoted case of Cyber terrorist attack
systems. The industrial Cyber espionage is also
was of 1996. The Cyber terrorist was suspected as
factor responsible for the growth of ‘Cyberattack’
co-accused of ‘White Supremacist Movement’, He
over others information system for the acquisition
was alleged for temporary disablement of part of
of ‘higher sensitive data’. The ‘hostile actor’ (Cyber
the ISP’s (Internet service provider) record keeping
terrorist) in order to control, manipulations and
system and ‘Massachusetts Internet service
command to Cyber infrastructure, they using
provider’. The ISP had made efforts to restrain
hacking, malware or ransomware programs
the hackers from spreading and sending racist
and softwares to corrupt and destroy the digital
massage worldwide. Finally, the attacker fleshes
information system that might be inclusive of
the message “You have yet to see electric terrorism.
strategic data, intellectual property rights and
This is a promise”, at signing-off the system. This
future development projects etc.
was the first Cyber attack, which opened the doors
of probabilities and possibilities of Cyber terrorism
Meaning of Cyber Terrorism worldwide.
restrictions. The citizen or non- citizen can operate In August 2013 Indira Gandhi International
secretly in any cyber domain against any person, Airport (IGI) faced Cyber attack. A destructive virus
Govt., group, infrastructure or organization. program called as ‘technical snag’ hit the operations
The public attention is most important for of terminal no. 03. This malicious code was spread
terrorist organizations then technical hurdles. remotely for the trespassing- ‘the security system
The present world terrorist organizations (for of Airport’. The cyber attackers tried to take
e.g. IS and Al Qaeda) adept themselves in Cyber advantage of weakness of security system. Their
world and use it to spread their propaganda, modus of oprendi was to transfer of virus program
recruitmentand for arrangement of funds. Some through ‘check-in centers’ of boarding gates and
terrorist groups use social media for recruitments, finally to the operation of CUPPS (Common use
dissemination of propaganda and aiding in the Passengers Processing System), which materially
radicalization process. But attack on cyber network affects airlines online reservation system and
is a completely different aspect. The world terrorist expected time of departure and capacity of waiting
organizations have intent to wage warfare by using lounge.
cyber domain. The most appropriate example is of- Furthermore, Pakistani Cyber Criminals deface
Inspire online magazine, published by Al Qaeda, nearly 60 Indian websites every day. Pakistani
and included articles on bomb making process and hackers conveniently hacked our websites and
instructions for how to contact with group. It’s not writing derogatory information against India for
pertinent to exclude large Cyber attacks in future spreading political, religious, social or financial
while considering future security threats to the cause. The latest Cyber weapon of Cyber terrorist is
nation. It would be horrible if the cyber-attacks- VoIP (Voice over Internet Protocol) for e.g. What’s app
targeting basic infrastructure or financial systems, voice and video calls, Skype, Video calls through
conducted in collaboration with a traditional attack Google talk etc., Coded chats, Secret message inside
with other capabilities. This is a deadly combination images, e-mail drafting and encrypted pen drive to
of Cyber techniques with traditional resources.1 propagate their agenda. According to NASSCOM-
The Cyber security is not a choice but a IDC surveys “The demand for ethical hackers is
national responsibility. The Indian Govt. has estimated at 77,000, in India and 188,000 worldwide
made satisfactory steps for the development and currently”.2
implementation of national cyber security strategy, The investigation of 26/11 Mumbai attack
but we must be more cautious about the future revealed the- evidence of Cyber telecommunication
complications. The Govt. Intelligence agency states of terriost, with the help of which they acquainted
that World terrorist organizations have keen interest with map, population infrastructure, place etc.
in developing destructive cyber technologies and They use the “Google earth” to execute their
capabilities, but they have financial constraints, plan, mobile network for command and control,
organizational limitations and competing priorities. social media to track the movement of Indian
Demarking line between Cyber attack and Cyber Rescue and defence forces. Furthermore, they use
terrorism is not clear and confusing. Our critical the technology for “conversion of audio signals
infrastructure is dependent (directly and indirectly) into data”, which made it impossible to track the
over the internet. source of Information by “Indian defence forces3.
This conversation is decoded by ethical hacker
Cyber threats to India Ankit Wadia.
Another Cyber attack was in year 2011, bomb
The Central Bureau of Investigation (CBI), India explosion in market Jhaveri Bazaar, Mumbai.
and Cyber experts continuously warned about In Varanasi bomb blast case of 2010, which was
the Cyber attack threat to India. Even CBI website also executed with the help of E-Communication.
is hacked by hackers in 2010 by ‘Pakistani Cyber Ultimately Govt. of India was compelled to develop
Army’. The Ex-President of India, Dr. Abdul Kalam a strong mechanism to deal with issue of Cyber
raise alarm in his lecture on Cyber terrorism, 2005. terrorism. As a result, the Information Technology
Instead of that our India has not yet expertise in Act, 2000, was amended in 2008 and includes Sec.
‘Cyber security system’. It is to consider a great 66F to deal with Cyber terrorism and other related
damage for India. In India, Companies, Govt. and issue, though that was not in detail. It also made
Private Infrastructure and Institutions including also to amend Indian Penal Code, 1860 and Indian
financial and insurance sector, spent less and least Evidence Act, 1872. Instead of this we Indian has
concerned for cyber security”. spend less for Cyber security.
Indian Journal of Law and Human Behavior / Volume 5 Number 2 (Special Issue) / May - August 2019
136 Cyber Terrorism in India: A Physical Reality Orvirtual Myth
Legal Provisions for Cyber Terrorism other collect traffic data or information through
relevant provisions any computer resource for cyber security.
• Sec. 70B: Indian Computer Emergency
India has no specific legislation to deal with Response Team to serve as national agency
Cyber Terrorism. The amendment act of 2008 in for incident response.
Information Technology Act, 2000 inserted Sec. 66F • Sec. 84B: Punishment for abetment of
to deal with Cyber terrorism. Those provisions and offences.
rules are complimentary with other legal provision
in legislations and special legislations relating • Sec. 84C: Punishment for attempt to commit
to terrorism. Section 66F is the only provision offences.
which deal with and covers any act committed • Implementation of Information Technology
with intent to threaten unity, integrity, security or (IT) Security Guidelines, 2000.
sovereignty of India or promoting terror with DoS
• The Information Technology (Procedure and
attacks, introduction of computer contaminant,
Safeguard for Interception Monitoring and
unauthorized access to a computer resource,
Decryption of Information) Rules, 2009.
stealing of sensitive information, any information
likely to cause injury to interests of sovereignty or • The Information Technology (Procedure
integrity of India, the security, friendly relations and Safeguard for Blocking for Access of
with other states, public order, decency, morality Information by Public) Rules, 2009.
or relating with contempt of court, defamation or • The Information Technology (Procedure and
incitement to an offence or to advantage of any Safeguard for Monitoring and Collecting
foreign nation or group of individuals. Traffic Data or Information) Rules, 2009.
For other offences mentioned in Sec. 66, • The Information Technology (Reasonable
punishment prescribed is three years and fine of Security Practices and Procedures and
five lakhs has been prescribed and these offences Sensitive Personal Data or Information)
are cognizable and bailable. Sec. 66A provides Rules, 2011.
punishment for sending offences messages through
communication service etc. Further Sec. 84B, • The Information Technology (Guidelines for
abetment to commit an offence is made punishable Cyber Cafe) Rules, 2011.
with the punishment provided for the offence • The Information Technology (Electronic
under the Act and the new Sec. 84C makes attempt Service Delivery) Rules, 2011.
to commit an offence also a punishable offence • The Information Technology (National
with imprisonment for a term which may extend Critical Information Infrastructure Protection
to one-half of the longest term of imprisonment Centre and Manner of Performing Functions
provided for that offence. In certain offences, such and Duties Rules, 2013.
as hacking (Sec. 66) punishment is enhanced from
three years of imprisonment and fine of two lakhs to
five lakhs. In brief following are the provisions and Matrixes’ of Cyber Terrorism
complimentary rules to deal with Cyber terrorism:
• Sec. 66: Computer related offences including The are the basic elements of cyber terrorism.
Hacking. Those are as follows:
• Sec. 66A: Punishment for sending offensive 1. Perpetrator or group of people i.e. Cyber
messages through communication service etc. Criminal
2. Place-Cyber Space
• Sec. 66C: Punishment for Identity theft.
3. Action/Method or mode of action-Any
• Sec. 66D: Punishment for cheating by Cyber techniques
personation by using computer resource.
4. Tools-Cyber Arsenal or Armory
• Sec. 66F: Punishment of Cyber Terrorism. 5. Targets-e.g. Govt. Company, Place,
• Sec. 69: Power to issue directions for individuals, administration or digital
interception or monitoring or decryption infrastructure
of any information through any computer 6. Affiliations-actual or claimed
resource. 7. Motivations-social, religious, communal or
• Sec. 69B: Power to authorize to monitor and revenge.4
Indian Journal of Law and Human Behavior / Volume 5 Number 2 (Special Issue)/ May - August 2019
Shiv Raman, Nidhi Sharma
137
Most Prominent targets of Cyber terrorism Council envisaged that ‘Computer could in the
future to be used to not only facilitate crime but also
The aim and objectives of every terrorist as the main too for criminal act. The modern thief
organization and every terror attack is different in can steal more with a computer then with a gun.
their own sphere. Here below is the list of possible Tomorrow terrorist may be able to do more damage
with a keyboard then with a bomb’.
Cyber attack or terrorism target but these are not
exhaustive:
What Internet offer to Terrorists
• Communication Infrastructure: News
Agencies, Media and Tele communications
companies The internet offers the following advantages to
the terrorist:
• Corporations: Component suppliers,
Civilian consulting companies • Easy Access
• Financial Institutions: Banks, public or • Minimum Regulation, Censorship, or any
private, Insurance and Government Funding type of Govt. control
Agencies or Institutions • Potentially high audience spread throughout
• Health care Industry: Drugs manufacturing the world
Companies (Vaccines, antibiotics), • Anonymity
Pharmacies, Hospital and Clinics
• Fast circulation of information
• Power Grids
• Low cost maintenance of web page
• Transportation Systems
• A multimedia effect- ability to combine text,
• Water Authorities graphics, audio-visual and to allow user to
• Nuclear power plants download movies, songs, books, posters
very fast
• Railways
• The ability to shape coverare in the traditional
• Information technology Systems etc may media, which increasingly use internet
as a source of stories
Cyber Terror Armory
Conventional Terrorism to Cyber Terrorism
There is long list of cyber weapons used to
create terror. Every weapon is unique in their own The subject of ‘terrorism’ is always controversial.
aspect and effects according to the objective of The origin of word terrorist is from French word
terrorist organizations, terrorist or Cyber attacker. ‘terrorisme’ that derives from Latin verb ‘terroeo’,
Following are most commonly weapons used from meaning thereby ‘I frighten’. Cyber terrorism is an
Cyber armory to spreadterror: extended form of conventional terrorism where the
• Hacking nature of weapons is in electronic form or devices
instead of arms and ammunitions. The objective
• Virtual sit-ins and blockades
of both is same i.e., creation of terror. Followings
• Automated email bombs are the qualification of an act to be address as
• Computer viruses and worms Cyber terrorism:
• Denial of services (DoS) • Place of occurrence must be cyber space
• Cryptography • Use of Computer system or like device to use
as tool
Cyber Terrorism: Social Media and Terrorist • The aim to act is to create fear, harm or
Groups violence
• Motive-religious, ideological, or political
Cyber terrorism has gravity to influence directly objectives
the victims of cyber attacks. The basic objectives of The ‘Electronic Jihad’, Use of Social Media and
terrorism is to draw attention by causing or with acts Internet by Terrorists: The “Electronic Jihad” by
of violence globally. In 1990, the National Security terrorist organizations improvises their terror
Indian Journal of Law and Human Behavior / Volume 5 Number 2 (Special Issue) / May - August 2019
138 Cyber Terrorism in India: A Physical Reality Orvirtual Myth
technique from traditional to technological. The and other synthesis. About 142 Indian citizens (132
International terrorist group Al-Qaeda, used internet named) have confirmed their affiliation with ISIS.
technology to spread their wings of terror in like The numbers of recruits are increasing year by year
manner. Similarly, ISIS completely revolutionized as illustrated in Figure 1. Furthermore, the figure 2
“terrorism world” with the use of “social media”. shown the ISIS statics in India.
The reason for this obvious: The South and Northern part of India seems to be
• To spread propaganda with electricity speed inclined towards ISIS. National Agencies identified
then, the speed of traditional cart. the following numbers of recruits States:
• Internet Communication like net calling, 1. Andhra Pradesh- 1 8. Maharashtra- 19
video calls etc.
2. Delhi- 1 9. Rajasthan- 1
• Lowest cost than other method.
• More complicated to trace. 3. Gujarat- 4 10. Tamil Nadu- 5
Indian Journal of Law and Human Behavior / Volume 5 Number 2 (Special Issue)/ May - August 2019
Shiv Raman, Nidhi Sharma
139
Indian Journal of Law and Human Behavior / Volume 5 Number 2 (Special Issue) / May - August 2019
140 Cyber Terrorism in India: A Physical Reality Orvirtual Myth
the economy’ organized by Centre for Eastern and brookings.edu (Visited on July 02, 2019)
North Eastern Regional Studies (CENERS-K), also 6. The Washington Post; Inside the surreal world of
focused on strengthening cyber warfare capacities the Islamic states’ propaganda machine, Available
for peace and security. He asserted that “India is at: https://www.google.co.in/search (Visited on
on the threshold of a digital age and the use of IT May 21, 2019)
technologies, which now turned ubiquitous. The 7. Cyber Terrorism and information warfare,
danger is that not only it is becoming easier to mask Available at: http://www.open.edu.ao (Visited
an identity online, but also once the malware codes on May 21, 2019)
come into the open market, it can be bought and
8. Available at: https://www.hsdl.org (Visited on
repurposed by hackers anywhere in the world”.12
May 7, 2019)
9. Digital India's response readiness against cyber
References attacks is frail, lack of online security awareness
biggest weakness – Firstpost https://www.
1. Cyber terrorism and the reality of threat, firstpost.com (Visited on June 21, 2019)
Available at https://www.aspistrategist.org.au 10. Govt to act tough on top militants, cyber terrorism,
(Visited on June 12, 2019) https://www.dailyexcelsior.com (Visited on
2. Ibid May 26, 2019)
3. Cyber terrorism: The Fifth Domain, available 11. Union Cabinet moves to strengthen anti-terrorism
at: http://www.indiabloom.com (Visited on law, India News - Times of India https://
March 13, 2019) timesofindia.indiatimes.com (Visited on 05 July,
4. Symantec Cyber terrorism?, Available at: https:// 2019)
www.symantec.com (Visited on June 18, 2019) 12. Govt to act tough on top militants, cyber terrorism,
5. Assessing the Islamic State threat to India: It is a https://www.dailyexcelsior.com (Visited on 05,
serious but manageable challenge: http://www. 2019)
Indian Journal of Law and Human Behavior / Volume 5 Number 2 (Special Issue)/ May - August 2019