0% found this document useful (0 votes)
86 views

Cyber Crime and Cyber Forensic: Central University of South Bihar

The document discusses cyber terrorism and defines it as unlawful attacks against computers, networks, and stored information done to intimidate or coerce governments or populations for political or social goals. To qualify, an attack must result in violence, death, injury, explosions, or severe economic loss. The scope of cyber terrorism includes conventional terrorism using classic weapons in the physical world and techno terrorism using weapons to destroy infrastructure in cyberspace. Cyber terrorism specifically refers to using malicious software, electromagnetic weapons, and microwaves to destroy data in cyberspace and aspects of the physical world. Unlike cyber crimes, cyber terrorism must cause large-scale disruption, economic ruin, or impact lives and health to qualify.

Uploaded by

Sapna Rajmani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
86 views

Cyber Crime and Cyber Forensic: Central University of South Bihar

The document discusses cyber terrorism and defines it as unlawful attacks against computers, networks, and stored information done to intimidate or coerce governments or populations for political or social goals. To qualify, an attack must result in violence, death, injury, explosions, or severe economic loss. The scope of cyber terrorism includes conventional terrorism using classic weapons in the physical world and techno terrorism using weapons to destroy infrastructure in cyberspace. Cyber terrorism specifically refers to using malicious software, electromagnetic weapons, and microwaves to destroy data in cyberspace and aspects of the physical world. Unlike cyber crimes, cyber terrorism must cause large-scale disruption, economic ruin, or impact lives and health to qualify.

Uploaded by

Sapna Rajmani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 19

CENTRAL UNIVERSITY OF SOUTH BIHAR

SCHOOL OF LAW & GOVERNANCE

**********************************
Cyber Crime and Cyber Forensic
************************************
Project Title: Cyber Terrorism Threat –Fact or Fancy
Under the Supervision of: -

Dr. Pallavi Singh

Assistant Professor of Law

School of Law and Governance

Central University of South Bihar

Submitted By: -

Sapna Rajmani,

B.A.LL. B (Hons.) 8th Semester

CYBER CRIME AND CYBER FORENSIC Page 1


Acknowledgement

Writing a project after a research is never an easy task to perform. It is one of the most
significant academic challenges. Though this paper is presented by me yet there are various other
persons who remain in veil and gave all the possible support to complete this project. This
project is a result of hard work incorporated by immense dedication and moral support. I, hereby,
would like to first of all thank my law Dr. Pallavi Singh Ma’am who gave me an opportunity to
work on this specified project. Due to her support only, I successfully completed this paper.
Secondly, I would like to thanks to my friends whom I discussed the problem with and got to
understand the right methodology to be adopted to accomplish the task. Moreover, there have
also been various other factors that helped me complete this paper. I ask for sorry if there have
been any mistakes in the paper. At the same time, I would also like to ask the same to those
whose name has not been mentioned hereby in the acknowledgement. But I wholeheartedly
thank all those who have stood there for me every time and supported me. Last but not the least,
I would like to express thank to my seniors who reviewed my paper for rendering constructive
and valuable suggestions and comments that have helped a lot in improving the quality and
content of this paper.

SAPNA RAJMANI

CUSB1813125089

B.A.LL.B. (Hons.) – 8th Semester

Section- A

School of Law & Governance

Central University of South Bihar

CYBER CRIME AND CYBER FORENSIC Page 2


CYBER CRIME AND CYBER FORENSIC Page 3
TABLE OF CONTENT -

Serial Topic Page


No. No.
1. Introduction 4

2. Definition and Scope of Cyber Terrorism 5&6

3. Relevant aspects of Cyber Terrorism 7 to 9

4. Cyber Terrorism in World 9 & 10

5. Cyber Terrorism In India 10 to 13

6. Famous cases and Incidents 13 to 15

7. Suggestion 16 to 18

8. Conclusion 18

CYBER CRIME AND CYBER FORENSIC Page 4


1.Introduction

Information and communication technology plays a crucial role in the modernization of the
world. ICT was mainly designed for unified communications along with the integration of
telecommunication and computers with other systems which would help facilitate networking,
access to information, storing, transmission and manipulation of data. It made human functioning
easier and promoted interaction and networking which eased the difficulties across the lives of
the globe. But isn’t it human nature to fall into the pits of revenge, cheating and destruction
through misuse, that they always find some or the other way to inappropriate the blessings of
wonderful resources that do nothing but benefit them? This started the ill commission of
terrorist-related offences in the form of cyber-enabled terrorism leading to the rise of targeted
victims. ICT thus being no exception to the ravages of human behavior began to be used to
promote, support, facilitate, and engage in acts of heinous crimes like terrorism. 

Nowadays Cyber terrorism is flourishing as threat and through this paper we will examine this
threat, how far this threat is real or it is mere fancy. Also, we are not that much aware about what
exactly this cyber-terrorism is known as. Even after several trials and analysis, there has been no
clear cut definition of the term ‘cyber terrorism’. Most of the discussion regarding the topic has
been through the media which is a firm believer of adding drama and sensation. Thus, no good,
effective and operational definitions have been produced yet.

Research Methodology
This method of making this research paper is theoretical and practical. This research paper is
based on articles, journals, statutes, books, landmark cases, and various other committees and
statistical reports. The researchers focused on the meaning, nature and concept of cyber
terrorism. Especially focusing on the threat cyber terrorism spread all across the globe.

Research Questions

1. How real the cyber terrorism threat is?


2. What is the nature and scope of cyber terrorism?
3. What is the recent trend of cyber terrorism across the globe?

Objectives of the Research Paper


Examining the extend of threat of cyber terrorism on cyber security and suggestions to overcome
threat by analyzing different cases and relevant provisions of Information Technology Act.

CYBER CRIME AND CYBER FORENSIC Page 5


2. Definitions and Scope of Cyber- terrorism

There is no definite definition of cyber crime yet accepted but there are various scholars who
tried to define the term cyber –terrorism in their own ways given below are some definitions
given which will help us to understand the concept as well as the context related with newly
emerging cyber crime i.e., cyber terrorism.

Denning, professor of computer science has put forward a definition in numerous articles and in
her testimony on the subject, before the House Armed Services Committee in May 2000 – 

“Cyber-terrorism is the convergence of cyberspace and terrorism. It refers to unlawful attacks


and threats of attacks against computers, networks and the information stored therein when done
to intimidate or coerce a government or its people in furtherance of political or social objectives.
Further, to qualify as cyber-terrorism, an attack should result in violence against persons or
property, or at least cause enough harm to generate fear. Attacks that lead to death or bodily
injury, explosions, or severe economic loss would be examples. Serious attacks against critical
infrastructures could be acts of cyber-terrorism, depending on their impact. Attacks that disrupt
nonessential services or that are mainly a costly nuisance would not.”

Other scholars have also given unique definition of cyber terrorism. Pollitt defined cyber
terrorism as “the premeditated, politically motivated attack against information, computer
systems, and data which results in violence against non-combatant targets by sub-national groups
and clandestine agents.”

2.1.Scope of Cyber-terrorism

Cyber terrorism and its scope based on the place where it occurs than through the medium i.e.
the virtual/cyber world. Thus it is not a distinguished crime but a form of terrorism executed
through a unique mode dismissing every claim of it being an independent crime. There have
been no concrete set of rules, definitions or provisions related to cyber terrorism in the
international arena, except countries having their code of conduct, hence, giving en edge to the

CYBER CRIME AND CYBER FORENSIC Page 6


greater importance of defining cyber-terrorism in an apt manner.1 Terrorism in today’s age
consists of conventional terrorism, where classic weapons are used to destroy property and kill
victims in the physical world and techno terrorism, in which weapons are used to destroy
infrastructure, targets and causes a disruption in cyberspace and cyber-terrorism is where new
weapons like malicious software, electromagnetic and microwave weapons will operate to
destroy data in cyberspace to destroy certain aspects of the physical world. 

A terrorist attack can be carried out through cyberspace or by using information and
communication technologies and, particularly, the internet to carry out a series of actions linked
to the objectives it pursues which do not necessarily constitute cyber-terrorism but may lead to
the existence of facilitation of future cyber-terrorism behaviors. The definition of cyber-terrorism
has come to include both disruption and violence in cyberspace in the same manner as in the
traditional form of terrorism with physical destruction and violence. The upcoming use of new
technology is helping terrorist groups to have a global reach although they may have very few
members. 

So in widely accepted terms, Terrorist behavior being perpetrated in cyberspace is known as


cyber-terrorism and for such terrorist activities to be executed in cyberspace, it is necessary that
the behavior carried out “in” or “through” cyberspace has a structure, a harm principle and the
elements that follow the classification which must be jointly present to prove the conduct in a
question as cyber-terrorism. Unlike cyber crimes, it is not just the manipulation of data or
software that causes a large number of people to lose money or information through the internet,
unless such loss leads to economic ruin, leakage of relevant scientific or academic information
and a consequent impact on the life or health of its victims. 

So far, according to various experts, terrorist groups “still prefer bombs to bytes” giving an apt
picture of the fact that although “cybernetic attacks can be cheaper and easier to execute than a
physical attack they are less dramatic and effective than attacks carried out in the real world”. 

1
Available at https://scielo.conicyt.cl/scielo.php?script=sci_arttext&pid=S0719-258420180002000 ( Visited on
Feb 1st 2022 at 16:40)

CYBER CRIME AND CYBER FORENSIC Page 7


3. Relevant Aspects of Cyber- terrorism -

3.1. Harm principle 

Establishing the harm principle helps identify the sufferers of a crime and the people being
targeted to bear the consequences. Cyber-terrorism does not immediately attack an individual
interest. It majorly affects an interest that is owned by the general public. It can also be affirmed
that cyber-terrorism constitutes an attack against institution, state, or national interests to violate
the constitutional order and create a greater impact with long-lasting consequences to prove and
extend a political agenda. 

3.2.Elements 

Cyber-terrorism in its entirety consists of two crucial elements, the teleological element and
instrumental element.2 The teleological element describes cyber-terrorism being committed with
the objectives of altering the constitutional order or to capsize the legitimately elected
government, through a major political agenda The instrumental element perpetrates that acts
must be executed in a manner that instill a sense of terror in people’s minds, establishing a belief
that anyone anywhere could be a victim of cyber-terrorism, involving the realization of an
indiscriminate attack “in” or “through” the cyberspace, with devastating consequences like
deaths, serious injuries or other similar outcomes in the real world.

3.3.Weapons 

The weapons of the cyber-terrorists exist to destroy or modify computer data and files with the
weapons and the targets being the electrons moving within cyberspace. 

Joseph Seanor of CIBIR Corporation gave his viewpoint on the Methods of Operations of
Cyberterrorists. According to him, The critical element in cyberterrorism, and information
warfare, is knowledge. He also talks about the potential weapons in cyber-terrorism that can
cause the required destruction –

2
Available at https://www.mmc.com/insights/publications/2018/nov/global-cyber-terrorism-incidents-on-the-
rise.htm ( Visited on Feb 21st 2022 on 16:23)

CYBER CRIME AND CYBER FORENSIC Page 8


1.  Viruses

2. Trojan Horses

3. Worms

4. Humans

5. Electro-Magnetic Pulse Weapons 

3.4.Cyber security

Cyber Security is defined under Section 2(1)(nb) of IT Act, 2000 as the protection of


information, Equipment, devices, computer resources, communication devices and information
from unauthorised access, use, disclosure, disruption, modification and destruction.

Cyber-security deals with technologies, processes, and practices that are designed to protect
networks, devices, software, systems, programs, and data and sensitive information from attack,
damage, or uninvited access. It is an effort to secure ICT, to protect ICTs
from unauthorized access that affects the CIA triad of Confidentiality, Integrity and
Accessibility.3 The notion of unauthorized access refers to the presence of an adversary capturing
intentional threats. There is a growing need for cybersecurity because the government, military,
financial, corporate, and medical organizations collect, process, and store large amounts of data
which can be sensitive information, on computers and other devices. Leakage of such
information might lead to negative consequences which make situations like transmission of
sensitive data across networks vulnerable to exploitation. Cyber-security aims at protecting the
information from being placed in the wrong hands. The most difficult challenge and barrier in
the implementation of cybersecurity is the evolving nature and uncertainty of security risks.

Thus there is a significant need on the part of organizations and companies to respond to any
cyber incident with force to restore normalcy and bring back on the track the company’s assets
and reputation by focussing on three key areas:

3
Available on https://www.theguardian.com/technology/2017/dec/30/wannacry-petya-notpetya-ransomware
(Visited on Feb 3rd 2022 on 12:30)

CYBER CRIME AND CYBER FORENSIC Page 9


1. identifying the most valuable information that requires protection;

2. identifying the potential threats and risks facing the information;

3. outlining the damage that would incur and being prepared beforehand if anything goes
wrong. 
International Organization for Standardization (ISO) is the international cybersecurity
organization which works for the development of Information Technology Management
Systems.

In India, we have the National Cyber Security Policy, headed by the Minister of Communication
and Information Technology that protects the public and private infrastructure from cyber-
attacks.4

4.Cyber- terrorism in World

Terrorism is a global phenomenon that is not limited to any national borders. Terrorism doesn’t
take into account geographical limitations and transcends the boundaries. Due to the increasing
dependence on computer networks and virtual connections, a global sphere in cyberspace has
been created which has the greatest potential to be misused, to carry out cyberterrorism and
pursue other international terrorist goals. With new technology coming up every day and changes
in its usage and development, the risks of potential threats have been rising continuously, ranging
from leaking of valuable information to misuse of the power and irreversible consequences
across the globe.

Terrorists have given way to cyberterrorism over conventional terrorism as it is easier for them
to launch their attack from far off distances as they do not confine themselves to boundaries and
need a larger impact for their propagandas. Cyberspace gives the arena so convenient to direct
their motives to the destinations. The result of such attacks too are hefty and have major
consequences compared to the traditional methods because the traditional terrorist attack is

4
Available on https://www.theguardian.com/technology/2017/dec/30/wannacry-petya-notpetya-ransomware
( Visited on 3rd Feb 2022 on 10:30).

CYBER CRIME AND CYBER FORENSIC Page 10


restricted to a vicinity, while cyber terrorism is potentially capable of being committed over a
wide area or a network through information and cyber-attacks, using computers in an area
remote from the place the attack occurs. The result of these attacks does not only remain in the
virtual world but reach real life by the destruction of property and the loss of life.5

Till 2017, no major incidents as such led to major setbacks or risks in the arena of cyberspace,
but this dynamic changed after the WannaCry and NotPetya incidents in 2017, raising questions
about the provisions and need for stringent regulations in this field. These attacks affected
organizations in more than 150 countries and prompted business interruption along with other
losses estimated at well over USD 300 million by some companies. There was an outroar due to
reputational damage and loss of sensitive customer data.

5.Cyber terrorism in India

India has begun its development and reliance on technology depicting its steady growth and
shifting to a modern form of governance. Sectors like income tax, passports and visas have taken
the driver seat to e-governance with police and judiciary culminating its way upward. This
growth has both positive as well as negative aspects to it. With use comes greater responsibility
of handling data online with care as any damage can have catastrophic consequences and India
cannot afford to collapse. The episodes of online warfare and cyber-attacks are high against
India. Time and again we have been attacked in full force by China and Pakistan.

China, who on one hand is strengthening its ability to wage electronic warfare, on the other hand,
Pakistan has increased cyber attacks on India and its crucial websites in retaliation to the Jammu
and Kashmir issue, thus extending their warfare to completely new, unpredictable and dangerous
zones like cyberspace. Hacker groups have intensified their raging attacks on India and we need
a strong and structured system to fight the digital war. The acts of cybercrimes and terrorism
have multiplied in lots and bounds, the Parliament of the Republic of India has not yet enacted
any legislation that specifically addresses the problem of cyber coercion. However, there are

5
Available on https://iclg.com/practice-areas/cybersecurity-laws-and-regulations/india (visited on 23rd Feb 2022 at
14:35 )

CYBER CRIME AND CYBER FORENSIC Page 11


some existing legislation and some amendments to incorporate it at intervals to deal with the
issues.

5.1.The Indian system 

India has always taken a tough stance and fought against acts of terrorism. It does not come as a
shocker that India, in the context of cyberterrorism, has formulated stringent laws and policies to
overcome the uncertain yet grave danger to the society and important infrastructure. Our nation
has equipped its Information and Technology Act,2000 with stringent laws. The original IT
Act was drafted by T. Vishwanathan, but the idea of cyber terrorism wasn’t included in the
parental legislation. In the year 2008 after witnessing the incidents of international and national
incidents of cyber-terrorism, there was a realized need for strong and stringent provision as well
as punishment of cyber terrorism.6 

 The use of technology in the Mumbai attacks of November 2008 made India adopt the
amendments to its 2000 IT Act in December 2008, which inculcated provisions related
to cyber terrorism, which might be applied in the future. In the purview of these
amendments, Section 66F had been inserted in the Act by Information Technology
(Amendment) Act, 2008. This section contains the substantive offence of committing
the act of cyber terrorism. The insertion of this provision was a necessary step to
prevent jeopardy of civil liberties as we are increasingly relying on information
technology to serve our essential government services. 7

1. This section attracts imprisonment or life imprisonment in case the offence is


committed to threaten the integrity, unity, sovereignty and security of India along with
inciting terror in the minds of the people.

2. It constitutes the denied access to a person who is authorized to access computer


resources or Attempting to penetrate or access a computer resource without

6
Available on https://shodhganga.inflibnet.ac.in/bitstream/10603/268180/10/10_chapter%204.pdf ( Visited on 24th
Feb 2022 at 13 :40)

7
Available on https://fas.org/irp/threat/cyber/docs/npgs/terror.htm ( visited on 22nd Feb at 12 :30)

CYBER CRIME AND CYBER FORENSIC Page 12


authorization or exceeding the limits of authorized access or introducing any computer
contaminant.

3. The section says if by the means of such conduct, the person causes or is very likely to
cause death or injuries to persons or to damage to or disrupts or knowing that it is like
to cause damage or disruption of supplies and services essential to the life of the
community or destruction of property or is likely to adversely affect the critical
information infrastructure specified under section 70, the act would be punishable. 

4. If the person knowingly or intentionally accesses a computer resource without the


authority or exceeding the authorized access, and obtains access to information, data or
computer database that is restricted for reasons for the security of the state or foreign
relations, or any restricted information, with sufficient reasons to believe that such
information, data or computer database can be misused, will have committed an
offence. 

5. The scope of cyber terrorism is exhaustive according to this section. 

The Sections 66-F, 70, 70-A and 70-B of the Information Technology Act, 2000 makes it
possible for the government to maintain cyber security in the country.

 The term “Critical Information Infrastructure”8 in Section 66F is defined in the


Explanation enshrined in the amended Section 70. It talks about protected systems and
allows the government to notify a computer resource affecting the facility of critical
information infrastructure to be a protected system. 

 Section 70A has been formed to secure the CII through a National Nodal Agency which
will be established by the Central Government. 

 Section 70B gives power to the Indian Computer Emergency Response Team (CERT-
IN) as the national focal point for gathering information on threats and to facilitate the
Central Government’s response to computer centered incidents. 

8
Critical Information Infrastructures also include the things listed above, which are in the possession or under the
control of the State (national, provincial or local), and anyone exercising a public power or performing a public
function. https://www.michalsons.com/blog/what-is-a-national-critical-information-infrastructure/17701 ( Visited on
24th Feb 2022 at 14: 56)

CYBER CRIME AND CYBER FORENSIC Page 13


 Sections 70-A and 70-B cover both the investigatory process and the preventive
measures.

6.Famous cases and incidents

The WannaCry outbreak

With improving computer security techniques, worm outbreaks have become rare as it is very
hard to engineer a piece of malware that automatically executes on a remote machine without
any user involvement. 

The WannaCry was a worm, in the computing parlance. It was a type of a piece of malware that
was able to spread itself to be far more damaging than a normal computer virus. This kind of
worm self-replicates, bouncing from host to host, and obeying all the rules, growing dramatically
and taking off when they infect well-connected nodes through the implementation of the Server
Message Block protocol.9

A mysterious hacking group called The Shadow Breakers pointed out a weakness in Microsoft’s
Windows operating systems that could be used to automatically run programs on other
computers on the same network in April 2017. Even with the kill switch active, the outbreak
caused huge damage. After infecting Windows computers, the worm encrypted files on the
computer’s hard drive, making it impossible for users to access the drive. Along with the loss of
access, the malware then demanded a ransom payment in bitcoin in order to decrypt them, failing
which the files would have been permanently deleted.

The WannaCry outbreak shut down computers in around 80 NHS organizations in England due
to which 20000 appointments were cancelled, hospitals diverted ambulances being unable to
handle emergency cases and 600 GP surgeries had to return to pen and paper. There was a threat

9
Available on https://www.theguardian.com/technology/2017/dec/30/wannacry-petya-notpetya-ransomware 9
visited on 13 rd Feb 2022 at 14:50)

CYBER CRIME AND CYBER FORENSIC Page 14


to life, health and major finances due to the malware. It is estimated this cybercrime caused
around $4 billion in losses across the globe.10

It was believed that the U.S. National Security Agency discovered this vulnerability and misused
the information by developing a code to exploit it called EternalBlue rather than reporting it to
the Infosec community. 

Microsoft provided with SBM patches which were released 2 months before the cyberattack, but
patchless PC’s were still vulnerable and vastly affected by the outbreak.WannaCry is still
infecting systems which can be seen in another incident which took place in March 2018, where
Boeing was hit with a suspected WannaCry attack. The company claimed it did little damage
affecting only a few production machines. Boeing was able to stop the attack and settle back in
due to the publicity of the attack and the readily available patches by Microsoft.

WannaCry spread like wildfire throughout computers across the world encrypting hundreds of
thousands in more than 150 countries in a matter of hours. It was a first time experience for the
world that a malware that encrypts a user’s files and then demands cryptocurrency in ransom to
unlock them has managed to spread across the world. It looked like what they call, a coordinated
cyberattack.

This led to serious consequences for the NHS and its ability to provide care to patients which
could have been prevented if the NHS had agreed to follow basic IT security practices that had
been released and provided. Thus there is a need to get the world’s act together to ensure that
what happened in the case of the NHS is better protected against future attacks.11

The NotPetya was a similar incident which highlighted the importance of stringent measures and
laws to be taken up exposing a systemic risk and affecting a broad cross-section of businesses

10
Available on https://www.kaspersky.com/resource-center/threats/ransomware-wannacry ( visited on 23rd Feb
2022 at 14:50)

11
https://www.researchgate.net/publication/
257101606_Cyber_terrorism_challenges_The_need_for_a_global_response_to_a_multi-jurisdictional_crime
(visited on 22nd Feb 2022 at 12:34)

CYBER CRIME AND CYBER FORENSIC Page 15


without specific targeting, thus demonstrating the potential for the increasing threat of cyber
terrorism.

The incident of 9/11

“Our nation is at great risk of a cyberattack that could devastate national psyche and economy
more broadly than did the 9/11”.- Roy Maxion 

The ‘still entrenched in the minds’ event that took place on September 11, 2001, in America
which shook the whole world and raised a very big question, about the safety in the uncertain
and unknown areas of cyberspace and its potential to create a terrorist attack. Before the incident,
no country was ready to face or question the dangers of cyberspace and the kind of impact it
could create on such a massive level. The U.S then decided to replenish their priorities and
remove all the cyber threats which were threatening their country. They took measures to stop
any further harm and get back what they had lost. The concept of cybersecurity dug its roots
deeper into the importance of provisions and laws along with a safety net seriously and thus, was
created a challenge to accomplish all possible methods to reduce the cyber threat. It was a wake-
up call for the world to deal with the ever-rising issue. Even after 9/11 similar attacks continue to
take place and require a lot of attention to face the potential threat cyberspace poses to the globe. 

Ahmedabad Bomb Blast

On 26 July 2008, The Ahmedabad bomb blast took place which was a series of 21 blasts in 70
mines where more than 70 people were killed and around 200 got injured. News agencies
reported that they had received 14 page long emails from the terror group called Indian
Mujahedeen, Islamic Militant Group (Harkat-Ul-Jihad-al-Islam) claiming responsibility of terror
attack just 5 minutes before the blast referring to an Awaited 5 minute patient act to take
Revenge from Gujarat in retaliation to the 2002 Gujarat Godhead Train Burning incident. The
mail was sent to incite the terror of death along with threats to the Chief Minister of Maharashtra
and his deputy, reminding them of the events of the evening of 11 July 2006. It also warned
Mukesh Ambani of Reliance Industries for building a citadel on land in Mumbai that belonged to
Waif board and few Bollywood actors to stop acting.

CYBER CRIME AND CYBER FORENSIC Page 16


The incident of 26/11

The date 26th November 2008 was a dark day for Witnesing a very tragic Incident of 12
coordinate shooting and bombing that lasted 4days across Mumbai. According to Experts, it was
a major cyber attack. There were ten Pakistani men related to the phobia cluster terrorist group
attacked buildings in Bombay, killing 164 individuals, 9 gunmen were killed throughout the
attacks, one survived. They began their journey from Karachi, West Pakistan to Bombay via
boat. Hijacking a fishing trawler and killing four crew members and slitting the captain’s throat.
The terrorists thrived in the Bombay city district close to the entryway of the Republic of India
monument. They hijacked cars, police vans and used automatic weapons and grenades. 

The terrorists were in touch with Pakistan the whole time through the use of cellphones VOIP,
and all the Computer systems of Taj Hotel, Leopal cafe, Shivaji Maharaj Terminus, Oberoi
Trident, Came Hospital, Nariman House which were hacked, giving them access to all the data
of the hotel and other places. Their targets were the Foreigner guests from the U.S, England and
other places. The blasts lasted four days .26/11 was one of the major incidents in our country
which made the government aware of the cybersecurity and cyber threat and what steps should
be taken for it.

7.Suggestions

With the rise in the percentage of cyber terrorism acts being conducted, situational understanding
is critical at the moment to understand the nature and the grave consequences. The world
together needs to work on the improvement of systems of security, improvement of defense
against future attacks, identify the nature of potential threats and take a stand on improved
situational awareness. Clear communication strategies and intelligence about the attacks should
be shared between countries and governments, to strengthen security networks against future
attacks and its results.12

12
Available on https://law.stanford.edu/wp-content/uploads/2018/03/stocktongoldman.pdf
https://bib.irb.hr/datoteka/878827.Duic_Cvrtila_Ivanjko_International_cyber_security_challenges_.pdf (visited on
13rd Feb 2022 at 13:56)

CYBER CRIME AND CYBER FORENSIC Page 17


 There is a need to strengthen the normative foundations by states to build responsible
behaviour in the use of ICTs. 

 International norms and policies which have been already signed and agreed upon
should be practically implemented in a responsible manner. 

 Along with readily accessible and affordable technology, advantages and


disadvantages must be weighed in and precautions should be taken to prevent a
breach. 

 The existing gaps between the capacity needs should be narrowed by conducting
discussions on less tangible issues.

 Trust and confidence should be encouraged and built between the states to ease out the
differences and search for ideal solutions to the issues and create a healthy political
environment. 

 Relevant actors should be involved and encouraged to give their expertise in the
formation of solutions to the issues.

 Insurance policies should be evolved to cover the failure of technology and loss of
revenue. 

 Cyber policies should include provisions for business interruption and breach of data.

 There should be a highlighted importance of proper education and training to handle,


manage and investigate computer evidence. 

 The importance of having a form of accreditation to validate the experiences, skills,


and qualifications should be introduced. 

 Because of global society’s increasing dependency on ICTs and the increase in their
misuse, stringent police submissions and changes on ICTs to propagate international
peace and security by the United Nations leadership needs to be scaled up a notch to
get the desired results and prevent any major outbreak in the future along with justice
to the victims of any such mishappening. 

CYBER CRIME AND CYBER FORENSIC Page 18


 Provisions for cyber-security must be incorporated in IT and the recommendations
made by the Malimath Committee Report on recommendations for criminal justice
system must be given due attention to prevent the cyber offences in India.

 There is a need to inform the common citizens about the dangers of cyber terrorism. 

 Qualified faculty should be appointed to explain the usage of countermeasures.

8.Conclusion

Modern Information technologies can leverage economic as well as social benefits. The states
have continuously strived to achieve a shared vision of a secure, open, peaceful and accessible
ICT environment. Despite all the efforts the problem doesn’t seem to go away. The
psychological perspective shows the combination of two growing yet compelling fears, cyber
and terrorism which are yet bewildered and need stringent exploration to conquer the dread of
the unknown. The fear and anxiety revolving around these concepts paired with the uncertainty
give all the more reason to acknowledge the grave consequences of its presence. The source of
the problem is not just the technologies which are prone to vulnerabilities, errors and flaws but
human behaviour is too at fault due to its inclination towards the negative and destructive forces,
mainly to overcome insecurities, feelings of revenge, cheating and rebel to destroy.

A lot of State and non-State actors have been using cyberspace and related ICT tools for a range
of malicious purposes. Thus affecting the trust of the people in the technologies and related
products and services and undermining trust between governments threatening international
peace and security.

The Information Technology Act,2000 has outlined bound offences and penalties to overpower
omissions, that are known to return inside the characterization of cybercrimes. A change is
inevitable and required due to which the dilemmas posed by the new advancements in
technology every day cannot be avoided.

CYBER CRIME AND CYBER FORENSIC Page 19

You might also like