Cyberterrorism is a new terrorist tactic that makes use of information systems or digital technology, especially the Internet, as either an instrument or a target. As the Internet becomes more a way of life with us, it is becoming easier for its users to become targets of the cyberterrorists. The number of areas in which cyberterrorists could strike is frightening, to say the least.

Tools of Cyber terrorists: •Hacking Virus/Trojan horse/Worm •attacks Email Related Crimes •Denial of Service Attacks •Use of Cryptography and Steganography Legal provisions .

Cyberterrorism is the convergence of terrorism and cyberspace. and the information . networks. It generally means : unlawful attacks.  threats of attack against computers.

religious or nationalist entities (all of these can include other terrorist groups) identified as "the enemy" • threats to security forces • threats to nation states .Cyber terrorist threats can include: • rapid communication of threats to a wide or specific audience • threats to public utilities and transportation threats to commercial institutions and transnational corporations • threats to IGOs and NGOs • threats to individuals • threats to political groups or other ethnic.

 Serious attacks against critical infrastructures could be acts of cyberterrorism.  At least cause enough harm to generate fear. . explosions.Further. water contamination. depending on their impact.  Attacks that lead to death or body injury. plane crashes. an attack should result in : Violence against persons or property. to qualify as cyberterrorism. or severe economic loss would be examples.

Public utilities and transportation. Individuals. . Political group or other ethnic. religious or nationalist entities. IGOs and NGOs. Security forces.

Targets that are vulnerable to attack Actors with the capability and motivation to carry them Misuse of the technology .

.Types Of Cyber Crimes: Broadly three types of cyber crimes are recognized: *Hacking without any intention to commit any further offence. miss-appropriations. These can include theft. *Distribution of digital information through use of virus. logic bombs. fraud. trogon horses. cracking. forgery. *Unauthorized access with intention to commit further offences.

acting alone or in concert with the other terrorist misusing their access capabilities. .Factors Leading To Cyberterrorism: •Whether there are targets that are vulnerable to attack that could lead to violence or severe harm. •Role of consultants and contractor causing grave harm. •Whether there are actors with the capability and motivation to carry them •Misuse of the technology that make it open to attack even after the high security •Involvement of the insiders.

don’t access it. If you are unsure about the safety of the web-site or receive suspicious email. .Pick passwords that are unusual and difficult to guess. Check for software vendors to get security upgrades and patches.

Jama Masjid (Delhi) attack.  Mumbai serial blasts of July 13. before this attack IM activists sent out e-mails to various media organisations.  In 1999. ethnic Tamil guerrillas swamped Sri Lankan embassies with 800 e-mails a day over a two-week period. NATO computers were blasted with e-mail bombs. that the IM had sent a threat e-mail from the IP address of a computer in Mumbai.  After the terrorist attack on Delhi High Court on September 7. 2010. a day later.  . 2011 Terrorists had hacked into unsecured wi-fi internet connections to send e-mails after the attack.In 1998. 2011. Delhi Police confirmed.  After the September 19.

 .  Accounts should have unusual passwords and difficult to guess. don’t access it.Change the network configuration when defects become known.  If you are unsure about the safety of the web-site or receive suspicious e-mail.  Check with venders for upgrades and patches.


Use strong passwords that includes special characters .1.

2. Do not use unnecessary Application and Services .

Keep Software Up-to-Date .3.

4. Do Not Trust Mail Attachments All The Time .

Make Use of Anti-Virus Software .5.

5. Make Use of Anti-Virus Software .

Main activities: • Research • Publishing Information (recruitment) • Communication between members of terrorist groups • Terrorist financing and money laundering • Committing Cybercrime (political motivated attacks) .

ORGANISATION: • Decentralised structure of subversive organisations is supported by decentralised structure of the Internet • Lack of physical territory and infrastructure is compensated by network infrastructure (virtual territory) • Redundancy of the networks ensures the operability even if cells are uncovered • Flexibility of modern communication allows quick reconstruction of destroyed structures (Afghanistan) •International dimension of the Internet allow the terrorists to play an international role .

security or sovereignty of India or to strike terror in the people or any section of the people by— .Punishment for Cyberterrorism Whoever. integrity.— •(A) with intent to threaten the unity. 2000 has defined the term “Cyberterrorism” . • It reads as under:.ACTS UNDER CYBER TERRORISM: •Amendments under the Information Technology Act. • This is the first ever attempt in India to define the term.

and by means of such conduct causes or is likely to cause death or injuries to persons or damage to or destruction of property or disrupts or knowing that it is likely to cause damage or disruption of supplies or services essential to the life of the community or adversely affect the critical information infrastructure specified under Section 70. or (iii) introducing or causing to introduce any computer contaminant. . or (ii) attempting to penetrate or access a computer resource without authorisation or exceeding authorised access.(i) denying or cause the denial of access to any person authorized to access computer resource.

defamation or incitement to an offence. public order. friendly relations with foreign States. In relation to contempt of court. with reasons to believe that such information. data or computer database. •Accessing any restricted information. • By means of such conduct obtains access to information. data or computer database so obtained may be used to cause or likely to cause injury to the interests of the sovereignty and integrity of India. the security of the State. or to the advantage of any foreign nation. decency or morality. data or computer database that is restricted for reasons for the security of the State or foreign relations. .(B) knowingly or intentionally penetrates or accesses a computer resource without authorisation or exceeding authorised access.

etc. Imprisonment not exceeding fourteen years (Sec. unauthorised access. 70) and thereby strikes terror amongst people. 55.What should be done??? • Whoever commits or conspires to commit cyber terrorism shall be punishable with imprisonment which may extend to imprisonment for life. •Illustration Rohit. a Hacker. denial of service attack.e. but motive and intention of the perpetrator differentiates the attack from an ordinary to an act of terrorism. Rohit is said to have done an act of Cyberterrorism. IPC) •This Section has defined conventional Cyber attacks like. gains unauthorised access into Railway traffic control grid (the grid has been declared as Critical Information Infrastructure U/Sec. •I. .


Sign up to vote on this title
UsefulNot useful