Cyber Crime and Cyber Forensic: Central University of South Bihar
Cyber Crime and Cyber Forensic: Central University of South Bihar
**********************************
Cyber Crime and Cyber Forensic
************************************
Project Title: Cyber Terrorism Threat –Fact or Fancy
Under the Supervision of: -
Submitted By: -
Sapna Rajmani,
Writing a project after a research is never an easy task to perform. It is one of the most
significant academic challenges. Though this paper is presented by me yet there are various other
persons who remain in veil and gave all the possible support to complete this project. This
project is a result of hard work incorporated by immense dedication and moral support. I, hereby,
would like to first of all thank my law Dr. Pallavi Singh Ma’am who gave me an opportunity to
work on this specified project. Due to her support only, I successfully completed this paper.
Secondly, I would like to thanks to my friends whom I discussed the problem with and got to
understand the right methodology to be adopted to accomplish the task. Moreover, there have
also been various other factors that helped me complete this paper. I ask for sorry if there have
been any mistakes in the paper. At the same time, I would also like to ask the same to those
whose name has not been mentioned hereby in the acknowledgement. But I wholeheartedly
thank all those who have stood there for me every time and supported me. Last but not the least,
I would like to express thank to my seniors who reviewed my paper for rendering constructive
and valuable suggestions and comments that have helped a lot in improving the quality and
content of this paper.
SAPNA RAJMANI
CUSB1813125089
Section- A
7. Suggestion 16 to 18
8. Conclusion 18
Information and communication technology plays a crucial role in the modernization of the
world. ICT was mainly designed for unified communications along with the integration of
telecommunication and computers with other systems which would help facilitate networking,
access to information, storing, transmission and manipulation of data. It made human functioning
easier and promoted interaction and networking which eased the difficulties across the lives of
the globe. But isn’t it human nature to fall into the pits of revenge, cheating and destruction
through misuse, that they always find some or the other way to inappropriate the blessings of
wonderful resources that do nothing but benefit them? This started the ill commission of
terrorist-related offences in the form of cyber-enabled terrorism leading to the rise of targeted
victims. ICT thus being no exception to the ravages of human behavior began to be used to
promote, support, facilitate, and engage in acts of heinous crimes like terrorism.
Nowadays Cyber terrorism is flourishing as threat and through this paper we will examine this
threat, how far this threat is real or it is mere fancy. Also, we are not that much aware about what
exactly this cyber-terrorism is known as. Even after several trials and analysis, there has been no
clear cut definition of the term ‘cyber terrorism’. Most of the discussion regarding the topic has
been through the media which is a firm believer of adding drama and sensation. Thus, no good,
effective and operational definitions have been produced yet.
Research Methodology
This method of making this research paper is theoretical and practical. This research paper is
based on articles, journals, statutes, books, landmark cases, and various other committees and
statistical reports. The researchers focused on the meaning, nature and concept of cyber
terrorism. Especially focusing on the threat cyber terrorism spread all across the globe.
Research Questions
There is no definite definition of cyber crime yet accepted but there are various scholars who
tried to define the term cyber –terrorism in their own ways given below are some definitions
given which will help us to understand the concept as well as the context related with newly
emerging cyber crime i.e., cyber terrorism.
Denning, professor of computer science has put forward a definition in numerous articles and in
her testimony on the subject, before the House Armed Services Committee in May 2000 –
Other scholars have also given unique definition of cyber terrorism. Pollitt defined cyber
terrorism as “the premeditated, politically motivated attack against information, computer
systems, and data which results in violence against non-combatant targets by sub-national groups
and clandestine agents.”
2.1.Scope of Cyber-terrorism
Cyber terrorism and its scope based on the place where it occurs than through the medium i.e.
the virtual/cyber world. Thus it is not a distinguished crime but a form of terrorism executed
through a unique mode dismissing every claim of it being an independent crime. There have
been no concrete set of rules, definitions or provisions related to cyber terrorism in the
international arena, except countries having their code of conduct, hence, giving en edge to the
A terrorist attack can be carried out through cyberspace or by using information and
communication technologies and, particularly, the internet to carry out a series of actions linked
to the objectives it pursues which do not necessarily constitute cyber-terrorism but may lead to
the existence of facilitation of future cyber-terrorism behaviors. The definition of cyber-terrorism
has come to include both disruption and violence in cyberspace in the same manner as in the
traditional form of terrorism with physical destruction and violence. The upcoming use of new
technology is helping terrorist groups to have a global reach although they may have very few
members.
So far, according to various experts, terrorist groups “still prefer bombs to bytes” giving an apt
picture of the fact that although “cybernetic attacks can be cheaper and easier to execute than a
physical attack they are less dramatic and effective than attacks carried out in the real world”.
1
Available at https://scielo.conicyt.cl/scielo.php?script=sci_arttext&pid=S0719-258420180002000 ( Visited on
Feb 1st 2022 at 16:40)
Establishing the harm principle helps identify the sufferers of a crime and the people being
targeted to bear the consequences. Cyber-terrorism does not immediately attack an individual
interest. It majorly affects an interest that is owned by the general public. It can also be affirmed
that cyber-terrorism constitutes an attack against institution, state, or national interests to violate
the constitutional order and create a greater impact with long-lasting consequences to prove and
extend a political agenda.
3.2.Elements
Cyber-terrorism in its entirety consists of two crucial elements, the teleological element and
instrumental element.2 The teleological element describes cyber-terrorism being committed with
the objectives of altering the constitutional order or to capsize the legitimately elected
government, through a major political agenda The instrumental element perpetrates that acts
must be executed in a manner that instill a sense of terror in people’s minds, establishing a belief
that anyone anywhere could be a victim of cyber-terrorism, involving the realization of an
indiscriminate attack “in” or “through” the cyberspace, with devastating consequences like
deaths, serious injuries or other similar outcomes in the real world.
3.3.Weapons
The weapons of the cyber-terrorists exist to destroy or modify computer data and files with the
weapons and the targets being the electrons moving within cyberspace.
Joseph Seanor of CIBIR Corporation gave his viewpoint on the Methods of Operations of
Cyberterrorists. According to him, The critical element in cyberterrorism, and information
warfare, is knowledge. He also talks about the potential weapons in cyber-terrorism that can
cause the required destruction –
2
Available at https://www.mmc.com/insights/publications/2018/nov/global-cyber-terrorism-incidents-on-the-
rise.htm ( Visited on Feb 21st 2022 on 16:23)
2. Trojan Horses
3. Worms
4. Humans
3.4.Cyber security
Cyber-security deals with technologies, processes, and practices that are designed to protect
networks, devices, software, systems, programs, and data and sensitive information from attack,
damage, or uninvited access. It is an effort to secure ICT, to protect ICTs
from unauthorized access that affects the CIA triad of Confidentiality, Integrity and
Accessibility.3 The notion of unauthorized access refers to the presence of an adversary capturing
intentional threats. There is a growing need for cybersecurity because the government, military,
financial, corporate, and medical organizations collect, process, and store large amounts of data
which can be sensitive information, on computers and other devices. Leakage of such
information might lead to negative consequences which make situations like transmission of
sensitive data across networks vulnerable to exploitation. Cyber-security aims at protecting the
information from being placed in the wrong hands. The most difficult challenge and barrier in
the implementation of cybersecurity is the evolving nature and uncertainty of security risks.
Thus there is a significant need on the part of organizations and companies to respond to any
cyber incident with force to restore normalcy and bring back on the track the company’s assets
and reputation by focussing on three key areas:
3
Available on https://www.theguardian.com/technology/2017/dec/30/wannacry-petya-notpetya-ransomware
(Visited on Feb 3rd 2022 on 12:30)
3. outlining the damage that would incur and being prepared beforehand if anything goes
wrong.
International Organization for Standardization (ISO) is the international cybersecurity
organization which works for the development of Information Technology Management
Systems.
In India, we have the National Cyber Security Policy, headed by the Minister of Communication
and Information Technology that protects the public and private infrastructure from cyber-
attacks.4
Terrorism is a global phenomenon that is not limited to any national borders. Terrorism doesn’t
take into account geographical limitations and transcends the boundaries. Due to the increasing
dependence on computer networks and virtual connections, a global sphere in cyberspace has
been created which has the greatest potential to be misused, to carry out cyberterrorism and
pursue other international terrorist goals. With new technology coming up every day and changes
in its usage and development, the risks of potential threats have been rising continuously, ranging
from leaking of valuable information to misuse of the power and irreversible consequences
across the globe.
Terrorists have given way to cyberterrorism over conventional terrorism as it is easier for them
to launch their attack from far off distances as they do not confine themselves to boundaries and
need a larger impact for their propagandas. Cyberspace gives the arena so convenient to direct
their motives to the destinations. The result of such attacks too are hefty and have major
consequences compared to the traditional methods because the traditional terrorist attack is
4
Available on https://www.theguardian.com/technology/2017/dec/30/wannacry-petya-notpetya-ransomware
( Visited on 3rd Feb 2022 on 10:30).
Till 2017, no major incidents as such led to major setbacks or risks in the arena of cyberspace,
but this dynamic changed after the WannaCry and NotPetya incidents in 2017, raising questions
about the provisions and need for stringent regulations in this field. These attacks affected
organizations in more than 150 countries and prompted business interruption along with other
losses estimated at well over USD 300 million by some companies. There was an outroar due to
reputational damage and loss of sensitive customer data.
India has begun its development and reliance on technology depicting its steady growth and
shifting to a modern form of governance. Sectors like income tax, passports and visas have taken
the driver seat to e-governance with police and judiciary culminating its way upward. This
growth has both positive as well as negative aspects to it. With use comes greater responsibility
of handling data online with care as any damage can have catastrophic consequences and India
cannot afford to collapse. The episodes of online warfare and cyber-attacks are high against
India. Time and again we have been attacked in full force by China and Pakistan.
China, who on one hand is strengthening its ability to wage electronic warfare, on the other hand,
Pakistan has increased cyber attacks on India and its crucial websites in retaliation to the Jammu
and Kashmir issue, thus extending their warfare to completely new, unpredictable and dangerous
zones like cyberspace. Hacker groups have intensified their raging attacks on India and we need
a strong and structured system to fight the digital war. The acts of cybercrimes and terrorism
have multiplied in lots and bounds, the Parliament of the Republic of India has not yet enacted
any legislation that specifically addresses the problem of cyber coercion. However, there are
5
Available on https://iclg.com/practice-areas/cybersecurity-laws-and-regulations/india (visited on 23rd Feb 2022 at
14:35 )
India has always taken a tough stance and fought against acts of terrorism. It does not come as a
shocker that India, in the context of cyberterrorism, has formulated stringent laws and policies to
overcome the uncertain yet grave danger to the society and important infrastructure. Our nation
has equipped its Information and Technology Act,2000 with stringent laws. The original IT
Act was drafted by T. Vishwanathan, but the idea of cyber terrorism wasn’t included in the
parental legislation. In the year 2008 after witnessing the incidents of international and national
incidents of cyber-terrorism, there was a realized need for strong and stringent provision as well
as punishment of cyber terrorism.6
The use of technology in the Mumbai attacks of November 2008 made India adopt the
amendments to its 2000 IT Act in December 2008, which inculcated provisions related
to cyber terrorism, which might be applied in the future. In the purview of these
amendments, Section 66F had been inserted in the Act by Information Technology
(Amendment) Act, 2008. This section contains the substantive offence of committing
the act of cyber terrorism. The insertion of this provision was a necessary step to
prevent jeopardy of civil liberties as we are increasingly relying on information
technology to serve our essential government services. 7
6
Available on https://shodhganga.inflibnet.ac.in/bitstream/10603/268180/10/10_chapter%204.pdf ( Visited on 24th
Feb 2022 at 13 :40)
7
Available on https://fas.org/irp/threat/cyber/docs/npgs/terror.htm ( visited on 22nd Feb at 12 :30)
3. The section says if by the means of such conduct, the person causes or is very likely to
cause death or injuries to persons or to damage to or disrupts or knowing that it is like
to cause damage or disruption of supplies and services essential to the life of the
community or destruction of property or is likely to adversely affect the critical
information infrastructure specified under section 70, the act would be punishable.
The Sections 66-F, 70, 70-A and 70-B of the Information Technology Act, 2000 makes it
possible for the government to maintain cyber security in the country.
Section 70A has been formed to secure the CII through a National Nodal Agency which
will be established by the Central Government.
Section 70B gives power to the Indian Computer Emergency Response Team (CERT-
IN) as the national focal point for gathering information on threats and to facilitate the
Central Government’s response to computer centered incidents.
8
Critical Information Infrastructures also include the things listed above, which are in the possession or under the
control of the State (national, provincial or local), and anyone exercising a public power or performing a public
function. https://www.michalsons.com/blog/what-is-a-national-critical-information-infrastructure/17701 ( Visited on
24th Feb 2022 at 14: 56)
With improving computer security techniques, worm outbreaks have become rare as it is very
hard to engineer a piece of malware that automatically executes on a remote machine without
any user involvement.
The WannaCry was a worm, in the computing parlance. It was a type of a piece of malware that
was able to spread itself to be far more damaging than a normal computer virus. This kind of
worm self-replicates, bouncing from host to host, and obeying all the rules, growing dramatically
and taking off when they infect well-connected nodes through the implementation of the Server
Message Block protocol.9
A mysterious hacking group called The Shadow Breakers pointed out a weakness in Microsoft’s
Windows operating systems that could be used to automatically run programs on other
computers on the same network in April 2017. Even with the kill switch active, the outbreak
caused huge damage. After infecting Windows computers, the worm encrypted files on the
computer’s hard drive, making it impossible for users to access the drive. Along with the loss of
access, the malware then demanded a ransom payment in bitcoin in order to decrypt them, failing
which the files would have been permanently deleted.
The WannaCry outbreak shut down computers in around 80 NHS organizations in England due
to which 20000 appointments were cancelled, hospitals diverted ambulances being unable to
handle emergency cases and 600 GP surgeries had to return to pen and paper. There was a threat
9
Available on https://www.theguardian.com/technology/2017/dec/30/wannacry-petya-notpetya-ransomware 9
visited on 13 rd Feb 2022 at 14:50)
It was believed that the U.S. National Security Agency discovered this vulnerability and misused
the information by developing a code to exploit it called EternalBlue rather than reporting it to
the Infosec community.
Microsoft provided with SBM patches which were released 2 months before the cyberattack, but
patchless PC’s were still vulnerable and vastly affected by the outbreak.WannaCry is still
infecting systems which can be seen in another incident which took place in March 2018, where
Boeing was hit with a suspected WannaCry attack. The company claimed it did little damage
affecting only a few production machines. Boeing was able to stop the attack and settle back in
due to the publicity of the attack and the readily available patches by Microsoft.
WannaCry spread like wildfire throughout computers across the world encrypting hundreds of
thousands in more than 150 countries in a matter of hours. It was a first time experience for the
world that a malware that encrypts a user’s files and then demands cryptocurrency in ransom to
unlock them has managed to spread across the world. It looked like what they call, a coordinated
cyberattack.
This led to serious consequences for the NHS and its ability to provide care to patients which
could have been prevented if the NHS had agreed to follow basic IT security practices that had
been released and provided. Thus there is a need to get the world’s act together to ensure that
what happened in the case of the NHS is better protected against future attacks.11
The NotPetya was a similar incident which highlighted the importance of stringent measures and
laws to be taken up exposing a systemic risk and affecting a broad cross-section of businesses
10
Available on https://www.kaspersky.com/resource-center/threats/ransomware-wannacry ( visited on 23rd Feb
2022 at 14:50)
11
https://www.researchgate.net/publication/
257101606_Cyber_terrorism_challenges_The_need_for_a_global_response_to_a_multi-jurisdictional_crime
(visited on 22nd Feb 2022 at 12:34)
“Our nation is at great risk of a cyberattack that could devastate national psyche and economy
more broadly than did the 9/11”.- Roy Maxion
The ‘still entrenched in the minds’ event that took place on September 11, 2001, in America
which shook the whole world and raised a very big question, about the safety in the uncertain
and unknown areas of cyberspace and its potential to create a terrorist attack. Before the incident,
no country was ready to face or question the dangers of cyberspace and the kind of impact it
could create on such a massive level. The U.S then decided to replenish their priorities and
remove all the cyber threats which were threatening their country. They took measures to stop
any further harm and get back what they had lost. The concept of cybersecurity dug its roots
deeper into the importance of provisions and laws along with a safety net seriously and thus, was
created a challenge to accomplish all possible methods to reduce the cyber threat. It was a wake-
up call for the world to deal with the ever-rising issue. Even after 9/11 similar attacks continue to
take place and require a lot of attention to face the potential threat cyberspace poses to the globe.
On 26 July 2008, The Ahmedabad bomb blast took place which was a series of 21 blasts in 70
mines where more than 70 people were killed and around 200 got injured. News agencies
reported that they had received 14 page long emails from the terror group called Indian
Mujahedeen, Islamic Militant Group (Harkat-Ul-Jihad-al-Islam) claiming responsibility of terror
attack just 5 minutes before the blast referring to an Awaited 5 minute patient act to take
Revenge from Gujarat in retaliation to the 2002 Gujarat Godhead Train Burning incident. The
mail was sent to incite the terror of death along with threats to the Chief Minister of Maharashtra
and his deputy, reminding them of the events of the evening of 11 July 2006. It also warned
Mukesh Ambani of Reliance Industries for building a citadel on land in Mumbai that belonged to
Waif board and few Bollywood actors to stop acting.
The date 26th November 2008 was a dark day for Witnesing a very tragic Incident of 12
coordinate shooting and bombing that lasted 4days across Mumbai. According to Experts, it was
a major cyber attack. There were ten Pakistani men related to the phobia cluster terrorist group
attacked buildings in Bombay, killing 164 individuals, 9 gunmen were killed throughout the
attacks, one survived. They began their journey from Karachi, West Pakistan to Bombay via
boat. Hijacking a fishing trawler and killing four crew members and slitting the captain’s throat.
The terrorists thrived in the Bombay city district close to the entryway of the Republic of India
monument. They hijacked cars, police vans and used automatic weapons and grenades.
The terrorists were in touch with Pakistan the whole time through the use of cellphones VOIP,
and all the Computer systems of Taj Hotel, Leopal cafe, Shivaji Maharaj Terminus, Oberoi
Trident, Came Hospital, Nariman House which were hacked, giving them access to all the data
of the hotel and other places. Their targets were the Foreigner guests from the U.S, England and
other places. The blasts lasted four days .26/11 was one of the major incidents in our country
which made the government aware of the cybersecurity and cyber threat and what steps should
be taken for it.
7.Suggestions
With the rise in the percentage of cyber terrorism acts being conducted, situational understanding
is critical at the moment to understand the nature and the grave consequences. The world
together needs to work on the improvement of systems of security, improvement of defense
against future attacks, identify the nature of potential threats and take a stand on improved
situational awareness. Clear communication strategies and intelligence about the attacks should
be shared between countries and governments, to strengthen security networks against future
attacks and its results.12
12
Available on https://law.stanford.edu/wp-content/uploads/2018/03/stocktongoldman.pdf
https://bib.irb.hr/datoteka/878827.Duic_Cvrtila_Ivanjko_International_cyber_security_challenges_.pdf (visited on
13rd Feb 2022 at 13:56)
International norms and policies which have been already signed and agreed upon
should be practically implemented in a responsible manner.
The existing gaps between the capacity needs should be narrowed by conducting
discussions on less tangible issues.
Trust and confidence should be encouraged and built between the states to ease out the
differences and search for ideal solutions to the issues and create a healthy political
environment.
Relevant actors should be involved and encouraged to give their expertise in the
formation of solutions to the issues.
Insurance policies should be evolved to cover the failure of technology and loss of
revenue.
Cyber policies should include provisions for business interruption and breach of data.
Because of global society’s increasing dependency on ICTs and the increase in their
misuse, stringent police submissions and changes on ICTs to propagate international
peace and security by the United Nations leadership needs to be scaled up a notch to
get the desired results and prevent any major outbreak in the future along with justice
to the victims of any such mishappening.
There is a need to inform the common citizens about the dangers of cyber terrorism.
8.Conclusion
Modern Information technologies can leverage economic as well as social benefits. The states
have continuously strived to achieve a shared vision of a secure, open, peaceful and accessible
ICT environment. Despite all the efforts the problem doesn’t seem to go away. The
psychological perspective shows the combination of two growing yet compelling fears, cyber
and terrorism which are yet bewildered and need stringent exploration to conquer the dread of
the unknown. The fear and anxiety revolving around these concepts paired with the uncertainty
give all the more reason to acknowledge the grave consequences of its presence. The source of
the problem is not just the technologies which are prone to vulnerabilities, errors and flaws but
human behaviour is too at fault due to its inclination towards the negative and destructive forces,
mainly to overcome insecurities, feelings of revenge, cheating and rebel to destroy.
A lot of State and non-State actors have been using cyberspace and related ICT tools for a range
of malicious purposes. Thus affecting the trust of the people in the technologies and related
products and services and undermining trust between governments threatening international
peace and security.
The Information Technology Act,2000 has outlined bound offences and penalties to overpower
omissions, that are known to return inside the characterization of cybercrimes. A change is
inevitable and required due to which the dilemmas posed by the new advancements in
technology every day cannot be avoided.