0% found this document useful (0 votes)
30 views7 pages

Cyber Crime and Cyber Terrorism in India

Uploaded by

Ashutosh Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views7 pages

Cyber Crime and Cyber Terrorism in India

Uploaded by

Ashutosh Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

International Journal of Science and Research (IJSR)

ISSN: 2319-7064
SJIF (2019): 7.583

Cyber Crime and Cyber Terrorism in India


Sarita Singh

Abstract: From cars to kitchen appliances, computers and the Internet continue to pervade human life in everything. With the
discovery of machines, the Internet has amplified human enslavement. Although we have achieved many benefits in terms of
effectiveness and management, many detrimental consequences and drawbacks have also been brought to the forefront. Cyberspace
may now be used by individuals or organizations to serve foreign governments, or to terrorize a nation's people. By hooking a person
"Cracking" on a government or military-maintained website, the crime of "cracks" will accelerate into terrorism. Cyber-terrorism
could be a hospital hack. As a retaliatory act, dose. Informatics is a double-edged sword that can be used both for negative and positive
work. Therefore, the fate of many businesses depends on the benevolent or vice intentions of the individual working with and through
the technology, as the case may be. A malevolent intention communicated in the form of hacking, data theft, virus attack, etc., for
example, can only bring negative effects. However, these methods can also be used to search for the authenticity, protection and
security of one's technical device, which has been mainly relied on and effective to provide a specific organization with security. The
whole thing seems to be intolerable, for example, the train ticketing system, if we currently think of society without the machine. Airline
Ticketing and Traffic Control as well. Bill for electricity. The Telephone Bill Office functions etc. Without the machine, it seems to be
intolerable. The most important means of communication, information, trade and entertainment has become computers with the aid of
the Internet today. The internet is like life being expanded and carrying on in the real world in another medium that cuts space, time,
nationality, citizenship, across borders, Competence, gender, sexual orientation, and age. Likewise, each coin has two sides, the internet
with all the advantages of obscurity, transparency, and convenience has become an ideal place for criminals involved in making the net
for illicit lucrative purposes, either monetary or otherwise.

Keywords: The Information Technology IT Act, 2000, Joint Academic Network, JANET, National Science Foundation
Network, NSENET

1. Introduction phones, satellite phone hacking, etc. The paper envisages


and understands the essence and efficacy of cyber-attacks
In our daily lives, the threat of cyber terrorism has created a and makes an attempt to research and evaluate India's
huge challenge. The insufficiency of the state system to attempts to resolve the problem and illustrate what else
resolve the problem has been proven by terror attacks in could be done
major metropolises, cities and tourist resorts around the
world. Definition of cyber terrorism and cyber crime
Cybercrime is a crime linked to information technology and
Many primary protection schemes are being introduced by computer technology. The system may have been used in a
countries to cope with the challenges. Most of the attempts, crime, or it may be an object. Cyber-crimes can influence
however, are designed as a common technique that could be the national security and economic situation of a country.
effective in traditional terror attacks.
Hacking, copyright infringement, child pornography, and
However, the insufficiency of the state system to resolve the child grooming are all forms of crime. In this aspect,
problem has been checked by restrictions when it comes to a individuals can be affected by disclosure in open place of
terror attack of an exceptional type. Many key counter their confidential issues such as ATM Pin, bank information,
measures for addressing the challenges are accomplished by etc.
the states. Most of the attempts, however, are designed as a
common technique that could be effective in traditional When any terrorist groups write about women's protection,
terror attacks. There are limits, however, when it comes to a cross-border crimes, fiscal robbery, etc., a nation would be
conventional-type terror attack. targeted.

The Information Technology (IT) Act, 2000 has exposed the In terrorist acts, cyber terrorism is the action of internet
consumer to a vast information bank of data on anything and terrorism. Which implies the deliberate use of computers,
everything. It still has more aspects of terrorism, however. networks and the public internet to cause disruption and
The latest stories tell us that the terrorist is now being damage to a person for their own purposes. These terrorists
furnished to use the cyber space to carry out terrorist attacks. may have a political or ideological motive, which can then
It is difficult to ignore the possibility of such attacks in the be seen as a form of terrorism. There are militant groups
near future. Cyber space-related terrorism is commonly such as Al-Qaida, ISIS, Mujahidin, etc. In order to connect
referred to as 'cyber terrorism.' with their members, these organizations use the Internet.

India has engraved a niche in IT for itself in the last couple 2. Conceptual Analysis of Cyber Crime
of years. By replacing the manual method, most of India's
banking industry, post offices, other offices, and financial Computers are currently becoming an integral part of the
institutions have implemented IT. In these IT agencies, rapidly growing population in India as well as around the
cyber terrorist attacks are often carried out, i.e. hacking, world. Computers are used in many areas, such as banking,
fraud e-mails, ATM hacking, mobile phones, satellite phone manufacturing, health care, defense, insurance, scientific
hacking, etc. i.e. hacking, fraud e-mails, ATM hacking, cell analysis, strategic decision making, law enforcement, etc.

Volume 10 Issue 2, February 2021


www.ijsr.net
Licensed Under Creative Commons Attribution CC BY
Paper ID: SR21223183642 DOI: 10.21275/SR21223183642 1430
International Journal of Science and Research (IJSR)
ISSN: 2319-7064
SJIF (2019): 7.583
For example, if we think about the current society without The US authorities released ARPANET in the year 1990 and
the machine, it seems to be an impossible railway ticketing moved it to the National Science Foundation (NSFNET).
system. Ticketing for airlines and traffic control. Electricity
charge, office working for the telephone bill, etc. In the year 1993, he was the person who created the Time
Bemers-Lec,
Without a machine, it all appears to be an impossible thing.
Computers today have become the most important medium The World Wide Web (www) at the European Particle
for communication, information, commerce and Physics Laboratory (CERN).
entertainment with the aid of the Internet. In the real world, The first commercial browser known as Netscape was
the internet has become like life that is being enlarged and released in 1994, with the aid of the previous year's launch
carried on by another platform that cuts between the borders of its own Internet Explorer by Microsoft. So, there are
of space, time, nationality, citizenship, authority, sex, sexual browsers that make access to the internet from personal
orientation, and age. Likewise, each and every coin has two computers possible. A number of commercial Internet
sides, the internet has all the advantages of anonymity, a Service Providers (ISPs) have entered the market since the
liability, and convenience has become an ideal place for mid-1990s and provided a number of Internet connections
pensions involved in making the net for illicit gains, either via traditional telephone lines.
monetary or otherwise.
The Federal Networking Council (NFNC) has consistently
The Internet has just turned the world into the Global adopted a resolution describing the word 'Internet' on the
Village of Knowledge. History is also a witness to much of date 24 October 1955. This concept was created in
the evidence that the destructive application of all technical conjunction with members of the Internet and the
inventions is as much as the positive one. IT is no longer community of Intellectual Property Rights.
different, with the majority of decent people using IT to find
better ways that will improve the quality of human life. The term internet is characterized as a global information
system that is logically connected by some globally specific
History and development of Internet Internet Protocol (IP)-based address space or its various
The Internet has turned the world into a Global Village for extensions that can support communications using protocols
Knowledge. The Internet has made this planet a virtual such as the transmission control protocol/internet protocol
global marketplace without sleep. The Internet is a part of (TCP/IP) suit or its subsequent extensions, or the other IP-
the global computer network. Internet and online networks, compatible protocol.
also referred to as "new media" services, as they provide
some production-oriented content such as music, audio, Evolution Nature and scope of Cyber Crime
video, graphics, text and games in certain ways close to
conventional media. In this age, cybercrime is the harmless broad-range that
threatens our world. Like a multi-headed hydra, it raised its
The internet's origins can be traced back to the 1950s. The head. Cybercrime can involve criminal acts that are usual in
first satellite, Sputnik I, was launched by the Soviet Union in nature, such as theft, fraudulent forgery, defamation and
1957, leading US President Dwight Eisenhower to create the mischief, where one is cutting other and newer forms of
ARPA agency for the arms race. Thus, through the use of crimes are apparent or suddenly rising. The above machine
ARPANET, funded by the US military, which was set up in also provides a variety of new-age crimes such as hacking,
1969, the evolution of the internet may be said to have been cyber stalking, web defacement, web jading, etc. In 1820,
developed. The very first point of contact between research the first cybercrime was registered. The loom was designed
centers at Los Angles University of California and the by Joseph-Marie Jacquai'd, a textile not produced in France.
Stanford Research Institute. The device made it possible to reproduce a series of steps in
the interlacing of special fabrics. This resulted in a distress
ARPANET was a joint venture between the Massachusetts in Jacquard's jobs that threatened their normal employment
Institute of Technology and the Advance Research Project and livelihoods. The acts of disruption were committed to
Administration of the American Department of Defense as a freeing Jacquard from further use of the new technology. So,
source of contact in the event of wars between remote this is the first cybercrime that has been noted.
computer resources. The contact ties to the military, defense
contractors and the university laboratories involved in 3. Cyber Criminality Categories
defense-related research were cramped. The developments
took place in the early 1970s, such as the likelihood of There are various cybercrime groups that are as follows:
electronic mail increased. Other networking equivalent to
the ARPANET started during the time, such as the Joint 3.1 Data Crime
Academic Network of the United Kingdom (JANET) and as
the National Science Foundation Network of the United a) Data Interception
States. (NSENET). In order to collect information, an attacker observes a data
stream to or from a target. This attack may be tackled in
In the year 1990, the US authorities have released order to gather information to help a later attack, or the
ARPANET and have transferred it to the National Science ultimate aim of the attack might be the data collected.
Foundation (NSFNET). Sniffing network traffic also involves this attack, but it can
involve detecting other forms of data brooks, such as radio.
Volume 10 Issue 2, February 2021
www.ijsr.net
Licensed Under Creative Commons Attribution CC BY
Paper ID: SR21223183642 DOI: 10.21275/SR21223183642 1431
International Journal of Science and Research (IJSR)
ISSN: 2319-7064
SJIF (2019): 7.583
The attacker is passive in most varieties of this attack and programs such as viruses, worms, Trojan horse, Time Bomb,
merely follows normal contact, however the attacker Logic Bomb, Rabbit and Bacterium.
attempts to recruit the formation of a data brook in certain
variants or affect the existence of the communicated data. 3.4 Related Crimes
Furthermore, The attacker is not the intended receiver of the
data stream in all variants of this attack and distinguishes a) Aiding and Abetting Cyber Crimes
this attack from other data collection methods. The attacker For most assisting and assisting charges against a person,
detects explicit data channels (e.g. network traffic) and there are three components. The first is that the crime was
understands the information, unlike some other data committed by another person. Second, the person who was
infiltration attacks. This differs from attacks that gather charged had knowledge of the crime or the intent of the
more contextual information not freely shared through a data principals. Third, the person supplied the principal with
source, such as contact frequency. some sort of assistance. Usually, an addition in legal terms is
characterized as an individual who assists in the commission
b) Data Modification of a crime committed by someone or others.
Communication privacy is important to safeguard
information that cannot be modified or accessed in b) Content-Related Crimes: Unwanted lucrative
transportation. Dispersed environments carry with them the communications, cyber fraud and cyber risks are included in
risk that by messing with information as it travels between content-related offenses for cyber-sex. The overall cost to
sites, a mischievous third party may commit a computer victims of these attacks is in the millions of dollars each
crime. In a data manipulation attack, before retransmitting it, year, which is critical for turning the condition of immature
an unauthorized party on the network interrupts data in or underdeveloped countries into industrialized countries.
transportation and changes parts of that data.
Classification of Cybercrime
c) Data Theft Mostly speaking, the cybercrimes refer to all actions done
The time used to determine when information is illegally with criminal intention in cyber space. Which is divided into
copied or taken from a corporation or another individual. three categories:
This information is also operator information, such as
passwords, social security numbers, and information about 1) Cyber Crime against person;
credit cards, other private information, or other sensitive 2) Cyber Crime against property (against business and
corporate information. Because this information is Non business organization);
unlawfully taken, it is possible that he or she will be 3) Cyber Crime against Government.
punished to the fullest extent of the law when the person
who took this information is arrested. 1) Cyber Crime against Person
The first classification of cybercrimes perpetrated against
3.2 Network Crime people, including many such as child pornography
transmission, sexual abuse against someone using a
a) Network Interferences computer, such as e-mail and cyber stalking. Stalking can be
Network Interfering with a computer network's operation by considered to be any unwelcome communication between
accessing, distributing, harming, removing, failing, two individuals who directly or indirectly communicate a
modifying, or overpowering network data. threat or put the victim in fear. One of the most relevant
cybercrimes is today recognized by human trafficking,
b) Network Sabotage uploading and dissemination of absence content like
Sabotage Network' or incompetent administrators are pornography, indecent exposure and child pornography
attempting to do the jobs of the people who are normally institutions. "The potential harm to humanity from such a
responsible for the network. It could be just the overhead, or crime can hardly be overestimated." Similarly, cyber
a combination of things. But if Verizon uses the kids' aid, harassment is a different cybercrime that can and does occur
delaying the line of first responders, then they might use in cyber space or in cyberspace. The internet is a wonderful
network issues as an excuse to get the federal government to place to work, play and not less than a mirror of the real
intervene with the public safety interest. Of course, if these world, which means that it also contains electronic
people are returned to work by the federal government representations of real-life problems,
military, what is the point of unions and strikes anyway’
2) Cyber Crime against property
3.3 Access Crime The second type of cybercrime is that against property of all
sorts. Hacking is an unauthorized use of computer and
a) Unauthorized Access “The machine biscuit network resources and breaking any breaks into another
underground is an insider's point of view. An Unauthorized computer system often on a network or deliberately violates
Access 'looks at the characters behind the computer screens computer protection, Vims is a programmed computer that
and tries to distinguish the outlaw hacker's media ads from can duplicate itself and cause data contamination to be lost,
the reality. copy-right protects creative or artistic works. Patent is a
collection of exclusive rights given by a state to an author or
b) Virus Dissemination to his assignment for a specified period of time in return for
Examples of malicious software that ruins the victim's the disclosure of an invention. You can only copy or
device are deceptive software that attributes itself to other patented work with a violation of the copyright owner's
Volume 10 Issue 2, February 2021
www.ijsr.net
Licensed Under Creative Commons Attribution CC BY
Paper ID: SR21223183642 DOI: 10.21275/SR21223183642 1432
International Journal of Science and Research (IJSR)
ISSN: 2319-7064
SJIF (2019): 7.583
permission. Violation. Cyber-squatting is registering, trading Ors.1The key concern in this situation is if accessing the
in or using a domain name with the intention of bad faith to email account of a husband and father-in-law without their
benefit from the goodwill of a trademark belonging to permission amounts to 'unauthorized access'. It was a case
someone else, etc. Among the most serious cybercrimes where the first respondent had accessed her husband and
known to date are hacking and cracking. Knowing that father in law's email account in order to collect evidence in a
someone has cracked into your operating networks without Dowry abuse case. The Adjudicating Officer held that it is a
your knowledge and consensus has messed with priceless violation of section 43 of the Information Technology Act
sensitive information and information is an awful feeling. 2000 to access an e-mail account without authorization. The
The truth, coupled with this, is that no computer device in claimant was not given any money because the respondent
the world is evidence of hacking. So, it is unanimously had only provided the details collected to the police
accepted that it is possible to hack any and every scheme in department and the court.
the world.
However, the Adjudicating Officer ordered the first
Cyber Crime against Government respondent to pay a fine of Rs.100, as it was held to be in
It would be possible to describe cyber terrorism as violation of the IT Act 2000, Section 66-C (identity theft and
premeditated. Politically attacking the information system, deceptive use of any other person's password). It should be
computer systems, and data to refuse service or obtain noted that, in the event of a breach of privacy by accessing
information in order to damage the target's political, social e-mail accounts without the consent of the recipient, there
or physical infrastructure, resulting in public violence. can be no defense of bonafide intent. It will still be
During 1998, LTTE Liberation Tigers of Tamil Elam construed as 'unauthorized entry'.
attacked a large number of the computer system of the Sri
Lankan Embassy around the world by releasing 800 e-mails It will still be construed as 'unauthorized entry'. It is also
to each embassy, usually with the messages over a two-week interesting to note that the adjudicating officer relied on the
span, we are internet black tigers and we are using this to reasoning that only the Court and the police were aware of
disrupt your communications: this is the first documented the details collected by the 'unauthorized access, so the
terrorist attack on the computer system of a country. respondent is not liable to pay the claimant any
compensation.
Cybercrime and Indian Position
The first cyber-crime occurred in the year 1820. But only in Publishing of information, which is obscene in electronic
the recent past did India gain traction. The Indian Parliament form
thus gave effect to a resolution of the United Nations Any person who publishes, transmits or causes to be
General Assembly on the adoption of a Model Law on published in electronic form, any material that is lascivious,
Electronic Commerce. The passage of the Information or if its effect is such that it threatens to harm and corrupt
Technology Act 2000 was significant. The Act aims to persons who are likely to read, see or hear the matter
control and legalize e-commerce and to take cognizance of contained or incorporated in it, shall be liable to punishment.
crimes coming from there. The IT Act covenants with the Publishing (generally making known or releasing copies for
following cybercrimes together with others: sale to the public) or distributing (transferring or acting as a
conduit for) or causing (the effect of publishing)
Tampering with computer source documents pornographic content in electronic form are essential
An individual who knows or intends to conceal, rescind components of such an offense.
(demolish or reduce), alter (change features) or cause
another person to hide, rescind, and change any computer Child Pornography
source code that is used for a computer, computer program, It is a part of cyber pornography, but it is a vital offense that
computer system, or computer network is punishable if the is often known as a cybercrime by individuals. The Internet
computer source code is needed to be preserved or is highly used by its users around the world to access and
maintained by law. For e.g, beating the C.D.ROM where the sexually assault children. A domiciliary product in India is
source code files are stored, converting the C file to a CPP very easily flattered by the Internet. The explosion made the
file, or deleting a file's read-only attributes. children a potential cyber-crime suspect. If more families
have access to the Internet, more of the children use the
Hacking Internet, and so are the chances of falling prey to Pedophiles'
The unauthorized access to a computer system and networks violence. In order to lure children and even contact them in
is commonly considered to be hacking. The word "hacker" different chat rooms, the pedophiles use their fake identity to
initially defines any amateur computer programmer who has support them and obtain personal information from the
found ways to run software more resourcefully. Hackers innocent prey. They also began to target kids through their
typically "hack" on a problem before they find a solution e-mail addresses. In order to assess sexual harassment or to
and keep trying to operate in new and more efficient ways use them as a sexual object, these pedophiles slog children
with their equipment. A Code Thief, Cracker, or a Cyber to the net.
Punk may be a hacker.Whoever intends to cause or
recognize that it is likely to cause unjust loss or harm to the Breach of confidentiality and privacy
public or any person abolishes or erases or modifies any Any person who, without the consent of the person
information in a computer resource or decreases its value or concerned, obtains access to any electronic record, book,
usefulness or damages it by means of hacking is said to
commit.VinodKaushik and Ors. Vs Madhvika Joshi and 1
VinodKaushik and Ors. v. Madhvika Joshi and Ors Air 2015
Volume 10 Issue 2, February 2021
www.ijsr.net
Licensed Under Creative Commons Attribution CC BY
Paper ID: SR21223183642 DOI: 10.21275/SR21223183642 1433
International Journal of Science and Research (IJSR)
ISSN: 2319-7064
SJIF (2019): 7.583
register, correspondence, information, document or other Terrorism defined by Federal Bureau of Investigation "
material or discloses such electronic record, book, register, Unlawful use of force or violence against individuals or
correspondence, information, document or other material to property in order to threaten or induce a government or a
any other person shall be liable for punishment under the civilian population, or any component thereof, to achieve
Information Technology Act. Nirav Navin Bhai Shah and political and social goals. As individual terrorism, group
Ors Vs State of Gujarat and Another.2The appellants terrorism, state terrorism, revolutionary terrorism,
were accused of having hacked into the complainant's international terrorism and the last one developed through
computer system and pilfered substantial data. The key technological growth, i.e. cyber terrorism
question was whether criminal charges could be quashed on
the basis that an amicable settlement had been reached by Forms of Cyber Terrorism
the parties. The Court ruled that the Court would quash Cyber terrorism is a very severe problem which involves a
criminal charges to that effect if the 'whole' dispute had been wide variety of attacks. Cybercrime is a crime that attacks
amicably resolved. In this case, along with other offences devices. Cybercrime may include theft of intellectual
under the Indian Penal Code 1860, the appellants were property, patent defilement, trade secrets, or copyright laws.
convicted under sections 66 and 72 of the Information Cybercrime, however, also involves attacks on machines in
Technology Act 2000. The defendant argued before the order to purposely disrupt processing, which can include
Court that, because the issue is civil in nature, the criminal spying to produce unsanctioned copies of sensitive data.
procedure should be quashed. The Court dismissed the Botnets, Estonia, 2007, Malicious Code Hosted on Websites,
claim, arguing that the crime cannot be treated as a civil Cyber Espionage etc., may be some of the main cybercrime
conflict since the offences are offenses against society under methods.
sections 66 and 72 of the Information Technology Act 2000
and cannot be condoned. The Gujarat High Court ruled that It is necessary to note here that other forms may be included
privacy and hacking breaches are offences against society under the heading of Cyber Crime and are also important
and cannot be condoned or viewed as a civil conflict. instruments for terrorist activity at the same time. One by
However, if the parties agree to a settlement of the 'whole' one, these illegal acts are addressed as follows:
conflict, in the interest of justice, the Court can approve such
a settlement. Attacks via Internet

Cyber Crime against Government (i) Unauthorized access & Hacking: Unauthorized access
can be described as any kind of access without either the
(Cyber Terrorism) rightful owner or the individual who is allowed to access a
There are various languages, religions, cultures and device, computer system or computer network being
geographic regions, but the birth process is the same. A man approved by anyone. Hacking is any act committed to
sees the sunshine in the said identical phase regardless of breaching a device or network. To attack the target
caste and religion in the entire world. A developed computer, hackers inscribe or use acceptable computer
mechanism regulates the birth and death of a man. There can programs. They own the ability to kill, and they get the kick
be no difference in the S3 method between politics, culture, out of destruction like that. Some of the person hacks for
linguistic religion and geographical areas. The birth right of own fiscal gains, such as theft of credit card numbers,
every human being is the right to life, the right to liberty, the transfer of money to their own account from different bank
right to speech, free air and water pollution, small shelter accounts, followed by withdrawal of money. By hacking the
over the head, a piece of cloth and bare minimum food to web server of someone or taking control of the web site of
save life. some other person called web hijacking.

These rights are the fundamental rights of a civilized human (ii) Trojan Attack:
being without whatever language he speaks or wherever he The software is called Trojans, which behaves like
lives, without which no one can survive a decent life, but something valuable but does stuff that are quietly hindering.
because of the structure itself creating a gap between the The Trojan horse is a common name. Trojans come in two
classes and the people, those rights are again and again parts, a pail for the client and a section for the server. The
affected today. attacker will then use the client to connect to the server and
start using the Trojan while the victim (mistakenly) is
The innocent poor people do not get their proper share of running the server on his computer. The TCP/IP' 'protocol is
what they are entitled to and for this reason some segments the normal form of protocol used for communication, but the
of people are unhappy with the system and resort to taking UDP protocol is often used by some Trojan functions.
the law into their own hands to accomplish their goals by
violence that is an expression of frustration or indignation, (iii) Virus and Worm attack:
and this phenomenon is not to be labeled as terrorism. In The virus is a program that has the potential to contaminate
order to achieve specific objective or desired objectives other programs and render copies of itself and the banquet
through force, terrorism can be described as a method of into other programs. Worms are named programs that spread
violence-murder, abduction, bombing, hijacking of aircraft, like viruses but feast from machine to machine. The
and taking air hostages. "Michael Jackson e-mail virus-Remembering Michael
Jackson" is the most recent of these attacks. Once the
2
computer is contaminated, the worm will spread to other
Navin Bhai Shah and Ors. v. State of Gujarat and Another Air internet users automatically.
2006
Volume 10 Issue 2, February 2021
www.ijsr.net
Licensed Under Creative Commons Attribution CC BY
Paper ID: SR21223183642 DOI: 10.21275/SR21223183642 1434
International Journal of Science and Research (IJSR)
ISSN: 2319-7064
SJIF (2019): 7.583
E-mail & IRC related crimes 4. Conclusion and Suggestions
(i) Email spoofing: 4.1 Conclusion
Email spoofing refers to emails that appear to have come
from a source when they have actually been sent from Changes are inevitable and it is not possible to escape the
another source. dilemmas presented by advances in technology. As per
current society, the fact is that criminals have modified their
crime tactics and have just begun to rely on technological
(ii) Email Spamming: innovation, and now society, civil, and law enforcement
Email spamming, similar to a chain letter, refers to the agencies, private businesses, as well as organizations, will
sending of emails to thousands of people. need to adapt their mechanism to combat it in order to cope
with these types of crimes.
(iii) Sending malicious codes through email-
This is the offense when e-mails are used to send any In addition, such experts not only need to be competent, but
viruses, trojans, etc. as an attachment via emails or by also need to be equipped with necessary technological
sending some sort of website connection that downloads hardware and software to combat cyber criminals
different malicious code when visiting. effectively. Therefore, in many parts of the country, the
requisite facilities need to be recognized so that crimes can
(iv) Email bombing: be monitored in the virtual world.
E-mail bombing is characterized by abusers who deliver an
identical email to one specific address repeatedly. The alternative factor to be stressed is that the culture of
continuous cyber education and learning needs to be
Attack on Infrastructure These are all managed, regulated educated among law enforcement officials as well as law
and facilitated by sophisticated computers, networks and enforcement authorities, since the field of information
software by our banks and financial institutions, or technology is now very complex as expertise has become
transportation systems such as air, sea, rail and highways, redundant in a very short period of time.
telecommunications, electrical power grids, oil and natural
gas supply lines. Characteristically, in these networks, Finally, the prelude to the Information Technology Act 2000
control centers and main nodes are far more vulnerable to provides that the Act was passed in order to provide legal
cyber than physical assaults, giving many cyber terrorists appreciation for transactions carried out through the
significant opportunities. In addition to infrastructure or exchange of electronic data and other means of e-commerce,
business, there may be several potential sanctions for a and the Act has also made several amendments to the Indian
cyber-terrorism act, including a separation of costs into Penal Code 1860, Indian Evidence Act 1872, The Bankers
direct as well as indirect effects. Books of Evidence Act 1872. While the purpose of the Act
is not to resolve unlawful crime, certain wrongdoings and
Attacks on Human Life: punishments to overcome such omissions are well
established in this act.
Examples: -In the case of an air traffic system that is strictly
high-tech and is designed to classify aircraft flight paths, the It can be indirect from this that the legislation cannot
flight courses shall be calculated for all aircraft to be continue to be stagnant, it must be altered with the
followed in the air. Aircraft pilots will need to search the advancing times.
course as well as the other aircraft around using the on-
board locator systems that are not linked to external Since with the rise in the number of computer device and
networks, so the cyber terrorist can target it. The act of internet users worldwide day by day. With the aid of the
cyber-terrorism against a highly automated factory or plant internet, which is the intermediary for enormous facts and a
production of any kind of food goods, machinery, cars, etc. large communications base around the world, it is becoming
will be another example. easier to access any information quickly in very few
seconds. People need to take clear protective steps when
Rajagopalvs. State of Tamil Nadu.3Violation of both civil using the internet, which will help to challenge the major
and criminal penalties under the respective rules. Modem threat of cybercrime.
effort and exploration have exposed him to mental pain and
suffering by assaults on his privacy, far greater than mere Countries around the world are facing these challenges and
physical injury could inflict. The right to privacy is are doing their best to avoid this problem. However, this
protected under Article 21 of the Constitution of India and issue cannot be successful without the assistance of the
forms part of the right to life and personal liberty. The general public and the judiciary. In addition to general
traditional notion of the right to privacy has taken on new public sentiment, the legislature does not support a rule for
dimensions with the advent of information technology, the country at large. Therefore, it is first important to receive
which needs a distinct legal viewpoint. public support not only at the national level but also at the
international level. People around the world are not opposed
to the interpretation of legislation prohibiting the use of
malware, but they are also mindful of their own legitimate
rights.
3
Rajagopal vs. State of Tamil Nadu Air 1994
Volume 10 Issue 2, February 2021
www.ijsr.net
Licensed Under Creative Commons Attribution CC BY
Paper ID: SR21223183642 DOI: 10.21275/SR21223183642 1435
International Journal of Science and Research (IJSR)
ISSN: 2319-7064
SJIF (2019): 7.583
Thus, on a priority basis, the legislation to be enacted by the 7) Switch off the network, disable file sharing on
legislature ought to take care of the public interest. This can machines, etc. during extended periods of non-use.
only be done if legislation embraces the necessary 8) Check your online account regularly to make sure that
technologies, which could only take care of the threat all the transactions listed are accurate. Using a number
created by computers by sending malware. Therefore, before of passwords, not the same for your whole account.
a law is enacted that explicitly deals with cyber terrorism, 9) Never respond to text messages from someone you don't
we should not feel shy and unwilling to use the existing know and carefully open an email attachment.
provisions. To sum up, because the achievements in the field 10) Never let your mobile phone be used by someone you
of communications and information technology lie in the don't know and stop sharing your cell phone number
contemporary world, it is highly imperative to check the online.
appearance and rising danger of cybercrime.
References
4.2 Suggestions
[1] https://www.meity.gov.in/content/cyber-laws
1) In the enforcement of cyber law, the judiciary can only
[2] https://www.ikigailaw.com/cyber-security-framework-
play a critical role if it is equipped with high
under-the-it-act-in-india/#acceptLicense
technology. To be recognized as e-justice, it must
[3] Text book the art of invisbility by kevinmitnick release
follow new mechanisms of justice administration.
date 4 Feb 2017
Electronic justice will have speedy trials without
[4] https://www.indiacode.nic.in/bitstream/123456789/199
unnecessary delay in order to prosecute cyber criminals.
9/3/A2000-21.pdf
Delay in trial may result in loss of evidence as,
compared to other records, electronic records are not of
a permanent nature. It is proposed to enact the
Electronic Code of Criminal Procedure for e-courts for
expeditious trial by the Indian Parliament. The Law
Commission of India has stressed the need for more
cyber laws to be enacted and for electronic courts to be
created to deal with cybercrimes.
2) It is proposed that the scope of current legislation can be
expanded to include a range of cyber operations, but it
is not appropriate to overlook the compliance element.
Prevention is better than cure, so proactive steps to
secure electronic data are more fruitful than enactment,
and this mission can be better accomplished by high-
tech professionals. Law is an important tool for
controlling human actions, but scientists and technical
people should play a better role here in high-tech. It is
noted that adolescents commit cybercrimes and often
play hacking games to take on daring tasks.They are
unaware of the results of their actions. They are also
unaware of the cyber law's deterrence provisions. In
school education, cyber ethics should also be included
in the course curriculum. Hacking-minded children's
programs can be used for constructive purposes.
3) Some training and infrastructure development in this
field should also be supported by our judiciary.
4) Investigative agencies must be allowed to deface
extremist websites and networks in order to stop and
monitor net warfare.
5) There is a need to establish laws to deter and monitor
cyber terrorism where terrorists use mobile and wireless
devices. Specific legislation was required to establish
the responsibility, liability and transparency of internet
service providers: e.g., they must be prevented from
using their customers' user numbers.
6) Through investigating suspected wireless, mobile
phones, and service providers such as 'history' in
computers, cyber terrorism can be monitored via
Change administrator's password from the default
password. If the wireless network does not have a
defaulting password, create one and use it to defend the
network.

Volume 10 Issue 2, February 2021


www.ijsr.net
Licensed Under Creative Commons Attribution CC BY
Paper ID: SR21223183642 DOI: 10.21275/SR21223183642 1436

You might also like