Академический Документы
Профессиональный Документы
Культура Документы
Terrorism are those criminal acts, including against civilians, committed with the intent to cause
death or serious bodily injury, or taking of hostages, with the purpose to provoke a state of terror in
the general public or in a group of persons or particular persons, intimidate a population or compel
a government or an international organization to do or to abstain from doing any act. [ UN]
The United Kingdom’s Terrorism Act 2000 defines terrorism to include an act “designed seriously
to interfere with or seriously to disrupt an electronic system”. An act of violence is not even
necessary under this definition.
Cyber-terrorism
“a cyber-attack using or exploiting computer or communication networks to cause
sufficient destruction or disruption to generate fear or to intimidate a society into
an ideological goal.”- NATO
• ‘Pakistani cyber army’ is a group of hackers in Pakistan who are known for their
defacement of websites. Some noticeable instances are hacking of BSNL, CBI
India and Kerala State's websites.
Cont…
• Groups such as G-Force and Doctor Nuker, have attempted to deface and hack the
websites of some of the most prominent institutions in India, namely The Indian Institute
of Science, Bhabha Atomic Research Center. These groups are based in Pakistan. Many
other instances of online terrorist recruitments have risen in the recent past.
• The recent instances of ISIS terrorism are perfect examples of cyber-terrorism. The
videos released by them are potential cyber threats and the way they have intruded into the
systems of major countries poses a serious question to the vulnerability of the security
systems. Furthermore, the beheading videos of various journalists and social activists
created a sense of psychological fear in the minds of people.
CONVENTIONS ON CYBERTERRORISM
Twenty-second G-7 Summit on Cybercrime (1996)
Member nations to accelerate mutual consultations and co-operation through appropriate bi-lateral and
multilateral meetings on encryption that allows lawful government access to data and communications in
order to prevent the instances of cyber-terrorism while at the same time protecting the privacy of
legitimate communications. The focus of the deliberation was on protection of security of IT related
information, privacy violation and protection of intellectual protection rights.
A specific legislation for this purpose may solve the problem to an extent, but
as the gamut of cyber-terrorism is expanding, a holistic legal development is
required to tackle this issue effectively. This may demand amendments in the
existing statutes, a lot more oriented research and development, combined
with the ability of secure technology, an active government agency and an
open-eyed Judiciary.