CYBER TERRORISM AND LAW
By Vibhuti :-
INTRODUCTION
Cyber terrorism is the use of the Internet to carry out violent activities that cause or threaten serious physical harm or the loss of life in order to advance political or ideological goals through intimidation or threat. Internet terrorism can take the form of planned, widespread disruption of computer networks, particularly of personal computers connected to the Internet, using techniques including computer viruses, computer worms, phishing, malicious software, hardware approaches, and programming scripts. The phrase “cyberterrorism” is debatable. Some authors choose to use a very specific definition, referring to the use of disruption attacks on information systems by known terrorist organisations with the primary goal of inciting alarm, panic, or physical disturbance. Some writers favour a broader definition that include cybercrime. Even if a hack is not conducted violently, participating in it still has an impact on how people perceive the terror threat. It may be challenging to determine which online behaviours qualify as cyber terrorism or cybercrime according to some definitions.
Cyber terrorism is also the deliberate use of computers, networks, and the open internet to harm and destroy for one’s own ends. Hackers with extensive experience and talent can seriously harm government systems and force a nation to flee out of fear of further attacks. Since this is a sort of terrorism, the goals of such terrorists may be political or ideological. In order to frighten or coerce a government or its people for the promotion of covert political or illegal social and religious objectives, unlawful attacks and threats of attacks against computers, networks, and information held therein are referred to as cyberterrorism. These assaults result in violence against people or property or stir up disturbance in the community.
Explosions, aeroplane crashes, and significant losses are a few instances. It is well known that terrorists utilise the internet to plan their plots, raise money, and disseminate cyber terrorism. For instance, Razmi Yousef, a key figure in the World Trade Center attack, kept plans for destroying the encrypted files on American aeroplanes on his laptop. The Indian Information Technology Amendment Act of 2008 includes Section 66F as a specific provision addressing the issue of cyber terrorism. Section 66F addresses denial of access, unauthorised access, introduction of computer contamination leading to harm to persons, property, critical infrastructure, disruption of supplies, theft of “sensitive data,” and other acts that are punishable by imprisonment that may result in life imprisonment.
Governmental organisations like the Federal Bureau of Investigation (FBI) and the Central Intelligence Agency (CIA) are making efforts to stop cyberattacks and cyber terrorism as a result of the widespread concern expressed by government and media sources about the potential harm that could be caused by cyber terrorism.
There have been both significant and minor cyber terrorism incidents. Al-Qaeda made use of the internet to interact with followers and even find new recruits. Following disagreements over the removal of a WWII Soviet statue located in Estonia’s capital Tallinn, Estonia, a Baltic nation that is rapidly developing in terms of technology, became a battleground for cyber terrorism in April 2007.
The fundamental description of the scope of cyber terrorism is up for debate. These definitions can be specific, such as when someone uses the Internet to target other online systems and causes harm to people or property. They can also be very broad, covering everything from traditional attacks on IT infrastructures to terrorists using any method of Internet access. There are differences in qualification based on motive, aims, tactics, and how heavily computer use was included into the act. Various definitions are also used by U.S. government organisations, and none of them has yet tried to establish a norm that applies outside of their purview.
Cyber terrorism can be described as the use of a target’s computers and information, particularly over the Internet, to cause physical, real-world harm or serious disruption of infrastructure. If it is considered similarly to traditional terrorism, it only encompasses assaults that threaten property or lives.
CONCERNS
On social media nowadays, cyber terrorism is getting more and more prevalent. As the Internet spreads, people and organisations can use the anonymity it provides to threaten other people, particular groups (whose membership is based, for example, on ethnicity or belief), communities, and entire countries without running the risk of being recognised, apprehended, hurt, or killed themselves as would happen if they were physically present. Many groups, including Anonymous, use tactics like denial-of-service assaults to target and restrict oppositional groups, raising issues about freedom and tolerance of different viewpoints.
EXAMPLES
One of the most common example was The Bluewhale game which actually led people to commit suicide so how do you think it’s done? In my opinion, it’s because of clear cyber terrorism. Because of that particular game mass population was affected.
26/11 Mumbai attack the terrorist the community communicated with handlers in pakistan with cellphone using VOIP { voiceover internet protocol}
9/11 twin towers attack- AL-QUEDA’S laptop was found in Afghanistan it contained sabotaged handbook. They researched public information relating to critical infrastructure posted on website.
FUTURE DANGERS
On these intricate networks that we have put up, new security threats and weaknesses are exposed as technology is increasingly ingrained in society. These networks have the potential to endanger entire communities or economic systems if an intruder were to get access to them. Because it is impossible to predict what will happen in the future, it is crucial that systems be created that can adjust to the environment as it changes. The situation of remote work during the COVID-19 pandemic will present the greatest threat from cyberterrorism in the near future. Companies must establish a zero-trust strategy for home devices because they cannot assume that every home office is current and safe.
The police in India have enlisted ordinary citizens as volunteers who patrol the internet and report the suspected cyber terrorists to the government in order to combat cyber terrorists, also known as “white-collar jihadis.” These volunteers are divided into three groups: “Cyber Experts,” “Cyber Awareness Promoters,” and “Unlawful Content Flaggers.” Police detained five accused white-collar jihadis in August 2021 who were putting together a death list of police, journalists, social activists, lawyers, and political figures in order to instil fear in the public. White-collar jihadis are regarded as the “worst form of terrorists” since they remain undetected and safe in other countries while causing “immeasurable” harm and indoctrination.
The demand for cyber security experts in India has surged by over 100% in 2021 and will increase by 200% by 2024.
In India, 82 percent of businesses experienced a ransomware assault in 2020. In India, the price to restore operations after a ransomware attack increased from $1.1 million in 2020 to $3.38 million in 2021. The top 30 countries for ransomware assaults are all in India.
A power outage was caused by a cyber-attack on the Maharashtra electricity grid. The officials suspect China was behind this incident, which happened in October 2020.
CONCLUSION
It’s time to act right away. It is a fact that anti-terrorists have a responsibility to protect lives and property. We are all becoming more reliant, vulnerable, and connected. A counter-cyber terrorism team can create an effective policy for preventing cyber terrorism occurrences, managing risks, and responding to cyber terrorism acts by combining knowledge, responsibility, and skill. So, we can all now agree that the conventional ideas and practises of terrorism have evolved into something more lethal and destructive. The resulting damage would be extremely devastating and nearly irreversible.