Premium Essay

Essay On Cyber Terrorism

Submitted By
Words 2882
Pages 12
Rising Cyber Terrorism and Role of Law in India
Abstract:
This paper makes an attempt to realize how cyber-crime and the measures to contain it are implemented in India. With the rise of global terrorism, terrorists are more inclined to use the vast internet for their nefarious activities. Something that they can accomplish without them physically being present and having the assurance of not being caught has promoted this form of terrorism all the more. In this paper an attempt has been made to understand cyber-terrorism, its various facets and also the laws and legislations in our country that inhibit such acts of terror.
Introduction:
The separation between the real world and virtual world is vanishing. The dependence of life on computers has increased high level. This dependency is used by the terrorists to their advantage by the use of internet.
There are several types of cyber-crimes, such as Cyber Theft, Cyber Trespass, Cyber Stalking, Cyber Pornography, Cyber laundering, Cyber Theft, Cyber Vandalism and Cyber Terrorism, but the most threatening and dangerous are ones the that come under the category of the term cyber terrorism. Techno legal experts of India have been warning against growing incidences of cyber-attacks, cyber-crimes, cyber espionages, etc. …show more content…
The term was first coined by Barry Collins, a senior research fellow at the Institute for Security and Intelligence in California, who in 1997 was attributed for creation of the term "Cyberterrorism", defined cyber-terrorism as the convergence of cybernetics and terrorism. However it was unable to mark out a clear distinction with terms like cyber-crime, cyber activism and cyber extremism. In the nineties, the debates regarding cyber revolution widened to phenomenon such as information warfare and information superiority. Eventually leading to the fact that terrorists could enter cyber space and use that as a domain for terroristic

Similar Documents

Free Essay

Threatend Cyber Space.Docx

...increasingly using new information technology and the Internet to formulate plans, raise funds, spread propaganda, and engage in secure communications. Cyberterrorist- meaning the use of cyber tools to shut down critical national infrastructures(such as energy, transportation, or government operations) for the purpose of coercing or Intimidating a government or civilian population is clearly an emerging threat. (Dale Watson 2-6-2002) Cyberterrorism or digital terrorism cannot be concretely defined and has spurred significant debate over exactly what is means. Todays' battlefields have no national borders. Quickly describing terrorism is not easy work. However, cyber terrorism is specifically a premeditated publically or ideologically motivated attack or threat of attack against information, computer systems, programs, and data that can result in violence against civilian targets. Attacks are fast, easy and relatively inexpensive. The attack is a commission of a crime with the use of a computer and a network. Growth in the use of computers has caused computers to be a large part of illegal activities. The categories that we fall as a victim are Crimes committed using a computer as a target, as a tool, as incidental to computer use, or associated with the prevalence of computers. In most cases, caught cyber criminals have usually committed several types of crimes. The tools used required no extra training or financial aid. Many businesses that connect to large masses of people connect...

Words: 646 - Pages: 3

Premium Essay

Homeland

...SEC/460 Introduction The purpose of this essay is to review and calculate the risk for bombs, sniper attacks, biological weapons, and cyber viruses and identify existing countermeasures in the State of Florida. Being a highly susceptible region for illegal immigration coming across the border, Florida has a close watch for terroristic threats. The following pages will review the threats and measures taken in the State of Florida. Domestic Terrorism Domestic terrorism can be defined as a threatened use, or unlawful use, of violence or force by an individual or group that is operating without any foreign direction within the country and as an act that is violent and dangerous to human life and also against the jurisdiction of the country (Terrorism, 2005). Explosives, weapons, and chemicals are common means of violence in terrorist attacks. As the appendix lists, there are several types of terroristic attacks that must be watched for such as bombings, sniper attacks, biological weapons, and cyber viruses and counter action and safety measures must be planned. Victims can are defined as society. This includes civilians, government workers, the military, first responders, or any stakeholder within the region being terrorized. While reasons for attacks can vary, political motivations along with religious differences and social ideas are the main culprits. When terrorists are planning attacks...

Words: 2135 - Pages: 9

Free Essay

Global Crime Analysis Paper

...businesses, and institutions, as well as global security and stability. The classification of global crimes can be categorized according to if the behavior is international and constitutes a crime against the world, or if the act is transnational that affects the interests of more than one state (Global Solutions, n.d.). The contents of this essay will identify the various major global crimes and criminal issues that have a global impact on national and international justice systems and processes. In addition, the text will discuss the various international justice systems and how these global crimes and criminal issues are addressed. Fueled by open borders, global markets, and the advancement of telecommunications, international crime has become a rising universal problem. In 1995, President Clinton classified international crime as a danger to the national interest of the United States. Therefore, before and since then the federal government has been busy in a converging effort to address various major global crimes, such as human rights and war crimes, organized crime and narcotics, cybercrime, environmental crime, and terrorism (Global Solutions, n.d.). Human Rights and War Crimes are inhuman acts committed by an extensive or systematic attack aimed against individuals, such as genocide, crimes against humanity, slavery, torture, aggression, and war crimes. Organized crime is a profit-driven criminal organization or group who work together to commit illegal acts to...

Words: 1391 - Pages: 6

Premium Essay

Choose One Global Crime as a Case Study and Critically Evaluate the Effectiveness of the Transnational Policing of This Crime.

...Choose one global crime as a case study and critically evaluate the effectiveness of the transnational policing of this crime. This essay focuses on money laundering and argues the effectiveness of the transnational policing of this crime; money laundering is one of the world’s most prevailing organised crimes. This essay firstly defines policing from contrasting viewpoints of different philosophers as well as identifying modes of the police. I will explore the modes of policing and various definitions of policing; this essay considers definitions and approaches to policing through a transnational concept with influences from prominent figures within the ideology of transnational policing. The conventional process of money laundering is clarified together with implications of the how this global crime effects other crimes as well as society as a whole. Aided with two case studies I give examples of how money laundering takes place; taking into hindsight the effectiveness of the policing of money laundering. This essay also addresses the connection between money laundering and the risk society theory whilst also taking into consideration the contrasting views of domestic police modes and transnational police modes. Through addressing ways in which money laundering is combated through global organisations such as Interpol, I critically address significant notions of the policing of money laundering. Policing is typically understood as a method of crime control; however the...

Words: 3023 - Pages: 13

Free Essay

Critically Discuss to What Extent, If Any, Technological Progress Has Undermined the Ability of the Law of Armed Conflict to Regulate the Conduct of Hostilities. Support Your Answer with Reference to Practical Examples

...advancement of contemporary military technologies. Moreover, recent technological advances raise the prospect of upheavals in practice so fundamental that they challenge assumptions underlying long-established international laws of war.3 This is because advances in technology have dramatically affected the weapons and tactics of future armed conflict, the “places” where conflicts are fought, the “actors” by whom they are fought, and the “means and methods” by which they are fought.4 These changes stress the fundamental principles of the LOAC, thus undermining its ability to regulate the conduct of hostilities; namely, by posing challenges to the principles of distinction, proportionality, military necessity and unnecessary suffering. This essay aims to assess the impact technology has had upon the LOACs ability to regulate the                                                                                                                 1 Dr. Jakob Kellenberger, 'International Humanitarian Law and New Weapon...

Words: 3294 - Pages: 14

Free Essay

Wahhabism

...“Wahhabism” and “Wahhabis” are names, often used and given to the doctrine and followers of Muhammad ibn Abdul Wahab, who, annoyed by practices which he claimed were bordering on kufr, launched a campaign to purify the Islamic faith. Many have compared the Wahhabi campaign to Islamic reformation and revivalist movements in various parts of the Muslim world. Muhammad Abd al-Wahhab was the founder and first modern Islamic fundamentalist and extremists allied to the Al-Saud clan who promoted an extreme version of Salafism which is a term used to describe fundamentalist islamic thought and the jihadist movement or ideology amond Salafi Muslims (Global, 2014). Wahhab made the central point of his reform movement the principle that absolutely every idea added to Islam after the third century of the Mulsim era was false and should be eliminated. Muslims, in order to be true Muslims, must adhere solely and strictly to the original beliefs set forth by Muhammad. The reason for this extremist stance, and the focus of Wahhab's reform efforts, was a number of popular practices which he believed represented a regression to pre-Islamic polytheism. These included praying to saints, making pilgrimages to tombs and special mosques, venerating trees, caves, and stones, and using votive and sacrificial offerings. These are all practices commonly and traditionally associated with religions, but they were unacceptable to Wahhab. Contemporary secular behaviors are even more anathema...

Words: 1442 - Pages: 6

Free Essay

Jurisdictional Issue in Cyber Crime

...Ad idem ‘12 | Jurisdictional Issues in Cyber Crimes | | | | | Arashdeep Singh Gurm Address: #181 Anand Nagar A, Gurudwara Street Patiala(147001) E-Mail Id: arashdeepgurm@gmail.com Contact Number: 7508729986,9646020181 RAJIV GANDHI NATIONAL UNIVERSITY OF LAW, PUNJAB Mohindra Kothi, Mall Road,  Patiala - 147 001 (PUNJAB) | ABSTRACT In this essay I wish to discuss the various types of crimes that are emerging with special reference to developing countries like India By developing we mean where growth of Information Technology is rampant but still it has not reached its peak. Cyber crimes can take place across various jurisdictions and hence the legal issue of jurisdiction of International Courts and country specific Indian Courts arises. Throw light on the present system in India, how it is ineffective and also upon international treaties and legal solutions to deal with the same. I have suggested possible ways to tackle the problem taking into consideration the domestic laws in India. The inefficiency of legislature to enact a more user friendly law is also examined in detail. Turning back our focus on the main legal dilemma of Jurisdiction of Cyber Crime Courts we have suggested a model that would be successful in India taking into consideration its working in other countries. In my concluding remarks a problem solution approach is taking where we have addressed the issue and after due consideration the solution is suggested. If proposal taken...

Words: 2824 - Pages: 12

Premium Essay

Crime

...wikipedia.org/wiki/Counter-terrorism Counter-terrorism (also spelled counterterrorism) is the practices, tactics, techniques, and strategies that governments, militaries, police departments and corporations adopt to prevent or in response to terrorist threats and/or acts, both real and imputed. The tactic of terrorism is available to insurgents and governments. Not all insurgents use terror as a tactic, and some choose not to use it because other tactics work better for them in a particular context. Individuals, such as Timothy McVeigh, may also engage in terrorist acts such as the Oklahoma City bombing. If the terrorism is part of a broader insurgency, counter-terrorism may also form a part of a counter-insurgency doctrine, but political, economic, and other measures may focus more on the insurgency than the specific acts of terror. Foreign internal defense (FID) is a term used by several countries[citation needed] for programs either to suppress insurgency, or reduce the conditions under which insurgency could develop. Counter-terrorism includes both the detection of potential acts and the response to related events. Anti-terrorism versus counter-terrorism Further information: Detentions following the September 11, 2001 Terrorist Attack The concept of anti-terrorism emerges from a thorough examining of the concept of terrorism as well as an attempt to understand and articulate what constitutes terrorism in Western terms. In military contexts, terrorism is a tactic, not an ideology...

Words: 6044 - Pages: 25

Premium Essay

Social Networking for the Betterment of Society

...Jason Evans English 103 Essay 3 Social networking and what it can do for you has been a hot topic for the last decade or so due in large part to the seemingly ever growing uses of such a tool. In the publication, Interactions, I found an essay explaining the trends of social networking and benefits for the future possibilities for this growing phenomenon. While the use of social networking is not new to us, this essay contends that we may have just begun to scratch the surface of what we can utilize our networks to work for us. The authors, Nichole Ellison, Cliff Lampe, and Charles Steinfield, discuss ways in which we not only can use these social mediums to gain a larger circle of friends and contacts, but that we can use them to further common goals in larger organizations of people and use our series of network connections to benefit us in the job market and business as a whole. The most prevalent users of these social networking sites are younger people, but in this essay, the authors point out that, “as adoption spreads to a wider audience, we expect such changes to be amplified across all segments of society” (Ellison, Lampe, Steinfeld, 2009). The use of social networking has the chance to alter our lives on both a personal and large scale. This ideal is something that these authors are directing at a global audience, and not just a small targeted group of people. Throughout the course of this essay, they highlight many positives for social networking and provide some...

Words: 1078 - Pages: 5

Free Essay

Hacktivism, Freedom of Speech or Cyber Terrorism

...Hacktivism, Freedom of Speech or Cyber Terrorism? Josh T. Diehl ITT-Tech Institute Abstract I will be doing my research paper on Hacktivism and looking into the subsector that is known as “Anonymous”. Hacktivism in itself is the use of computers and computer networks to promote political ends. To see this for what it truly can be, you must look at it with the understanding that it can be carried out under the same premise that proper (and skillful) use of technology can produce results similar to these of conventional acts of protest, activism, and civil disobedience. I plan on exploring whether it is freedom of speech or cyber terrorism, keeping an open mind when conducting my research will be the key to the integrity of this paper. I plan on researching online articles and post from credible sources. I will make set times while I am not at work to research and write this. Body First we need to look at what exactly is hacktivism and who practices it. Hacktivism in itself is defined as “The use of computers and computer networks to promote political ends, chiefly free speech, human rights, and information ethics. It is carried out under the premise that proper use of technology can produce results similar to those of conventional acts of protest, activism, and civil disobedience.” Certain groups such as Anonymous use this form (among others) as their way to speak out against what they see as injustice. We need to look closely, past the top layer of information, to...

Words: 2499 - Pages: 10

Premium Essay

Facebook

...Kelsey Baker English 099 Essay #3 Over the past few years, technology has developed and changed the way people communicate. With the development of the Internet and the associated structure technologies, many social networking sites like Facebook, Twitter and MySpace have emerged. These platforms allow the users to share their personal information and get connected with their friends around the globe. Currently, there has been a tremendous growth in cyber social networking. The popularity of using online social networks as a mean of communication has spread very quickly among the online users. It has almost become a daily activity in many people’s life. This phenomenon sparks much debate about the adverse effects of social networking. Facebook has good things and bad thing about it that need to be heard. The first and perhaps most disturbing problem would be a rapid growth in radical and hate groups. Cyber criminals love the popularity they receive on Facebook. In support of the above fact, a researcher claims that the number of hate groups on social networks rose by 20 percent last year (Reuters, 2010). Examples of anti-social groups on Facebook include “National Kick a Ginger Day” and “I Love Curry Bashing” (Reuters, 2010). In the case of the first group, the idea of establishing a National Kick a Ginger Day group was derived from a group of people who do not favor children with fair skin and red hair (National Kick a Ginger Day, 2008). The other site, I Love Curry...

Words: 1053 - Pages: 5

Premium Essay

Does America Have the Best Government

...Is the American Government the Best in the World? Taurean Gardner POL201: American National Government Instructor: Shawon Jackson-Ybarra 19 September 2015 I. The Constitution The American constitution has many strengths and weakness that make our political system best in the world. One major strength of the constitution is the believe that all men are created equal. One unique major weakness it can be extremely vague and it is a 100 years out of date. A way to enhance the strength and correct the weakness of the American constitution is to further push the believe, that all men are created equally, especially in the light of everything going on in today’s society. One way to fix the weakness is the update the constitution to modern language and make it easier to understand. “We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable Rights, that among these are Life, Liberty and the pursuit of Happiness. - That to secure these rights, Governments are instituted among Men, deriving their just powers from the consent of the governed, - That whenever any Form of Government becomes destructive of these ends, it is the Right of the People to alter or to abolish it, and to institute new Government, laying its foundation on such principles and organizing its powers in such form, as to them shall seem most likely to effect their Safety and Happiness. Prudence, indeed, will dictate that Governments...

Words: 2016 - Pages: 9

Free Essay

Censorship Online

...This essay talks about issues regarding Censorship of the Internet. According to the textbook, censorship is a way used by governments or religious institutions to supervise or regulate the public access to offensive or harmful materials (Quinn 2012, p.496). Internet censorship applies the same discipline which regulates the public access to harmful content on internet. Nowadays, internet is a place with huge potential for growth. Statistics suggest that the total growth of new internet users is 566.4% from December 31, 2000 to 2012 (Internet World Stats 2012) (Refer to Appendix one). In the mean time, the resources and contents on the internet are growing rapidly at an uncontrollable rate. To some extent, there are almost no restrictions of these materials on the internet. Basically people can almost find everything they want on internet no matter the information they found is right or wrong. Is it necessary to censor the internet and restrict the access to harmful contents? This is a controversial topic that leads to a hot debate these years. Some people think censorship can work effectively and is necessary on internet, while others think not. In the main part, the essay will explain and give evidence about how censorship can work in some cases but may become negatives in others. There is no doubt that internet censorship can work in some cases, especially when it comes to some vulnerable groups on internet such as children, youth and the old. One of the obvious instances...

Words: 1050 - Pages: 5

Premium Essay

Internet as an Innovation

...Describe a recent innovation, and discuss its social and economic impacts. In modern times, the majority of people worldwide have incorporated the use of new and evolving technology in daily living. Consequently, it has and continued to change the way we work, interact and learn. The internet is a vital medium that has affected us both economically and socially. This essay will focus on the economic and social impacts of the internet as a recent innovation. Innovations, whether in the form of technology, organizations or products, result in the application of research, technology, and the economic potential of business assimilated with the needs of the consumers (Kerchev, 2011). These promote the development and improvement of consumers’ lifestyle. An example of an important innovation is the internet, which was introduced in 1982. It had the concept of an interconnected system of networks to share information. Historically, communication was limited and information was once a valuable and expensive resource, specifically in remote regions of the world. Over the last two decades, the internet was developed dramatically, leading to an increased significance of its use. It enabled us a new form of communicating, obtaining information, and predominantly how we live our lives. The internet has made remarkable changes on the economy in both positive and negative sides. Primarily, it serves as a catalyst for global growth. It created opportunities for businesses in marketing...

Words: 966 - Pages: 4

Premium Essay

Cybercrime Law

...Cyber crimes essay THE INFORMATION TECHNOLOGY ACT AMENDMENT OF 2008 Cyber law, in a general sense, has been envisaged as a term that encapsulates the legal issues related to the use of communicative, transactional, and distributive aspects of networked information devices and technologies. And the crimes against these issues are termed as cyber crime Cyber law and cyber crime Cyber crime spans not only state and national boundaries, but the international boundaries as well. At the Tenth United Nations Congress on the Prevention of Crime and Treatment of Offenders, in a workshop devoted to the issues of crimes related to computer networks, cybercrime was broken into two categories and defined thus: * In a narrow sense, the term cyber crime has been defined as any illegal behavior directed by means of electronic operations that target the security of computer systems and the data processed by them. * In the broader sense, cyber crime has been defined as any illegal behavior committed by means of, or in relation to, a computer system or network, including such crimes as illegal possession [and] offering or distributing information by means of a computer system or network. The extent of cyber crime is so vast and complicated that an act which may be crime in one nation may not be so in another. Some of the basic examples of cyber crime are unauthorized access, damage to computer data and program, computer sabotage, unauthorized interception of communications, computer...

Words: 5688 - Pages: 23