Cyber Crime and Cyber Terrorism in India
Cyber Crime and Cyber Terrorism in India
ISSN: 2319-7064
SJIF (2019): 7.583
Abstract: From cars to kitchen appliances, computers and the Internet continue to pervade human life in everything. With the
discovery of machines, the Internet has amplified human enslavement. Although we have achieved many benefits in terms of
effectiveness and management, many detrimental consequences and drawbacks have also been brought to the forefront. Cyberspace
may now be used by individuals or organizations to serve foreign governments, or to terrorize a nation's people. By hooking a person
"Cracking" on a government or military-maintained website, the crime of "cracks" will accelerate into terrorism. Cyber-terrorism
could be a hospital hack. As a retaliatory act, dose. Informatics is a double-edged sword that can be used both for negative and positive
work. Therefore, the fate of many businesses depends on the benevolent or vice intentions of the individual working with and through
the technology, as the case may be. A malevolent intention communicated in the form of hacking, data theft, virus attack, etc., for
example, can only bring negative effects. However, these methods can also be used to search for the authenticity, protection and
security of one's technical device, which has been mainly relied on and effective to provide a specific organization with security. The
whole thing seems to be intolerable, for example, the train ticketing system, if we currently think of society without the machine. Airline
Ticketing and Traffic Control as well. Bill for electricity. The Telephone Bill Office functions etc. Without the machine, it seems to be
intolerable. The most important means of communication, information, trade and entertainment has become computers with the aid of
the Internet today. The internet is like life being expanded and carrying on in the real world in another medium that cuts space, time,
nationality, citizenship, across borders, Competence, gender, sexual orientation, and age. Likewise, each coin has two sides, the internet
with all the advantages of obscurity, transparency, and convenience has become an ideal place for criminals involved in making the net
for illicit lucrative purposes, either monetary or otherwise.
Keywords: The Information Technology IT Act, 2000, Joint Academic Network, JANET, National Science Foundation
Network, NSENET
The Information Technology (IT) Act, 2000 has exposed the In terrorist acts, cyber terrorism is the action of internet
consumer to a vast information bank of data on anything and terrorism. Which implies the deliberate use of computers,
everything. It still has more aspects of terrorism, however. networks and the public internet to cause disruption and
The latest stories tell us that the terrorist is now being damage to a person for their own purposes. These terrorists
furnished to use the cyber space to carry out terrorist attacks. may have a political or ideological motive, which can then
It is difficult to ignore the possibility of such attacks in the be seen as a form of terrorism. There are militant groups
near future. Cyber space-related terrorism is commonly such as Al-Qaida, ISIS, Mujahidin, etc. In order to connect
referred to as 'cyber terrorism.' with their members, these organizations use the Internet.
India has engraved a niche in IT for itself in the last couple 2. Conceptual Analysis of Cyber Crime
of years. By replacing the manual method, most of India's
banking industry, post offices, other offices, and financial Computers are currently becoming an integral part of the
institutions have implemented IT. In these IT agencies, rapidly growing population in India as well as around the
cyber terrorist attacks are often carried out, i.e. hacking, world. Computers are used in many areas, such as banking,
fraud e-mails, ATM hacking, mobile phones, satellite phone manufacturing, health care, defense, insurance, scientific
hacking, etc. i.e. hacking, fraud e-mails, ATM hacking, cell analysis, strategic decision making, law enforcement, etc.
Cyber Crime against Government (i) Unauthorized access & Hacking: Unauthorized access
can be described as any kind of access without either the
(Cyber Terrorism) rightful owner or the individual who is allowed to access a
There are various languages, religions, cultures and device, computer system or computer network being
geographic regions, but the birth process is the same. A man approved by anyone. Hacking is any act committed to
sees the sunshine in the said identical phase regardless of breaching a device or network. To attack the target
caste and religion in the entire world. A developed computer, hackers inscribe or use acceptable computer
mechanism regulates the birth and death of a man. There can programs. They own the ability to kill, and they get the kick
be no difference in the S3 method between politics, culture, out of destruction like that. Some of the person hacks for
linguistic religion and geographical areas. The birth right of own fiscal gains, such as theft of credit card numbers,
every human being is the right to life, the right to liberty, the transfer of money to their own account from different bank
right to speech, free air and water pollution, small shelter accounts, followed by withdrawal of money. By hacking the
over the head, a piece of cloth and bare minimum food to web server of someone or taking control of the web site of
save life. some other person called web hijacking.
These rights are the fundamental rights of a civilized human (ii) Trojan Attack:
being without whatever language he speaks or wherever he The software is called Trojans, which behaves like
lives, without which no one can survive a decent life, but something valuable but does stuff that are quietly hindering.
because of the structure itself creating a gap between the The Trojan horse is a common name. Trojans come in two
classes and the people, those rights are again and again parts, a pail for the client and a section for the server. The
affected today. attacker will then use the client to connect to the server and
start using the Trojan while the victim (mistakenly) is
The innocent poor people do not get their proper share of running the server on his computer. The TCP/IP' 'protocol is
what they are entitled to and for this reason some segments the normal form of protocol used for communication, but the
of people are unhappy with the system and resort to taking UDP protocol is often used by some Trojan functions.
the law into their own hands to accomplish their goals by
violence that is an expression of frustration or indignation, (iii) Virus and Worm attack:
and this phenomenon is not to be labeled as terrorism. In The virus is a program that has the potential to contaminate
order to achieve specific objective or desired objectives other programs and render copies of itself and the banquet
through force, terrorism can be described as a method of into other programs. Worms are named programs that spread
violence-murder, abduction, bombing, hijacking of aircraft, like viruses but feast from machine to machine. The
and taking air hostages. "Michael Jackson e-mail virus-Remembering Michael
Jackson" is the most recent of these attacks. Once the
2
computer is contaminated, the worm will spread to other
Navin Bhai Shah and Ors. v. State of Gujarat and Another Air internet users automatically.
2006
Volume 10 Issue 2, February 2021
www.ijsr.net
Licensed Under Creative Commons Attribution CC BY
Paper ID: SR21223183642 DOI: 10.21275/SR21223183642 1434
International Journal of Science and Research (IJSR)
ISSN: 2319-7064
SJIF (2019): 7.583
E-mail & IRC related crimes 4. Conclusion and Suggestions
(i) Email spoofing: 4.1 Conclusion
Email spoofing refers to emails that appear to have come
from a source when they have actually been sent from Changes are inevitable and it is not possible to escape the
another source. dilemmas presented by advances in technology. As per
current society, the fact is that criminals have modified their
crime tactics and have just begun to rely on technological
(ii) Email Spamming: innovation, and now society, civil, and law enforcement
Email spamming, similar to a chain letter, refers to the agencies, private businesses, as well as organizations, will
sending of emails to thousands of people. need to adapt their mechanism to combat it in order to cope
with these types of crimes.
(iii) Sending malicious codes through email-
This is the offense when e-mails are used to send any In addition, such experts not only need to be competent, but
viruses, trojans, etc. as an attachment via emails or by also need to be equipped with necessary technological
sending some sort of website connection that downloads hardware and software to combat cyber criminals
different malicious code when visiting. effectively. Therefore, in many parts of the country, the
requisite facilities need to be recognized so that crimes can
(iv) Email bombing: be monitored in the virtual world.
E-mail bombing is characterized by abusers who deliver an
identical email to one specific address repeatedly. The alternative factor to be stressed is that the culture of
continuous cyber education and learning needs to be
Attack on Infrastructure These are all managed, regulated educated among law enforcement officials as well as law
and facilitated by sophisticated computers, networks and enforcement authorities, since the field of information
software by our banks and financial institutions, or technology is now very complex as expertise has become
transportation systems such as air, sea, rail and highways, redundant in a very short period of time.
telecommunications, electrical power grids, oil and natural
gas supply lines. Characteristically, in these networks, Finally, the prelude to the Information Technology Act 2000
control centers and main nodes are far more vulnerable to provides that the Act was passed in order to provide legal
cyber than physical assaults, giving many cyber terrorists appreciation for transactions carried out through the
significant opportunities. In addition to infrastructure or exchange of electronic data and other means of e-commerce,
business, there may be several potential sanctions for a and the Act has also made several amendments to the Indian
cyber-terrorism act, including a separation of costs into Penal Code 1860, Indian Evidence Act 1872, The Bankers
direct as well as indirect effects. Books of Evidence Act 1872. While the purpose of the Act
is not to resolve unlawful crime, certain wrongdoings and
Attacks on Human Life: punishments to overcome such omissions are well
established in this act.
Examples: -In the case of an air traffic system that is strictly
high-tech and is designed to classify aircraft flight paths, the It can be indirect from this that the legislation cannot
flight courses shall be calculated for all aircraft to be continue to be stagnant, it must be altered with the
followed in the air. Aircraft pilots will need to search the advancing times.
course as well as the other aircraft around using the on-
board locator systems that are not linked to external Since with the rise in the number of computer device and
networks, so the cyber terrorist can target it. The act of internet users worldwide day by day. With the aid of the
cyber-terrorism against a highly automated factory or plant internet, which is the intermediary for enormous facts and a
production of any kind of food goods, machinery, cars, etc. large communications base around the world, it is becoming
will be another example. easier to access any information quickly in very few
seconds. People need to take clear protective steps when
Rajagopalvs. State of Tamil Nadu.3Violation of both civil using the internet, which will help to challenge the major
and criminal penalties under the respective rules. Modem threat of cybercrime.
effort and exploration have exposed him to mental pain and
suffering by assaults on his privacy, far greater than mere Countries around the world are facing these challenges and
physical injury could inflict. The right to privacy is are doing their best to avoid this problem. However, this
protected under Article 21 of the Constitution of India and issue cannot be successful without the assistance of the
forms part of the right to life and personal liberty. The general public and the judiciary. In addition to general
traditional notion of the right to privacy has taken on new public sentiment, the legislature does not support a rule for
dimensions with the advent of information technology, the country at large. Therefore, it is first important to receive
which needs a distinct legal viewpoint. public support not only at the national level but also at the
international level. People around the world are not opposed
to the interpretation of legislation prohibiting the use of
malware, but they are also mindful of their own legitimate
rights.
3
Rajagopal vs. State of Tamil Nadu Air 1994
Volume 10 Issue 2, February 2021
www.ijsr.net
Licensed Under Creative Commons Attribution CC BY
Paper ID: SR21223183642 DOI: 10.21275/SR21223183642 1435
International Journal of Science and Research (IJSR)
ISSN: 2319-7064
SJIF (2019): 7.583
Thus, on a priority basis, the legislation to be enacted by the 7) Switch off the network, disable file sharing on
legislature ought to take care of the public interest. This can machines, etc. during extended periods of non-use.
only be done if legislation embraces the necessary 8) Check your online account regularly to make sure that
technologies, which could only take care of the threat all the transactions listed are accurate. Using a number
created by computers by sending malware. Therefore, before of passwords, not the same for your whole account.
a law is enacted that explicitly deals with cyber terrorism, 9) Never respond to text messages from someone you don't
we should not feel shy and unwilling to use the existing know and carefully open an email attachment.
provisions. To sum up, because the achievements in the field 10) Never let your mobile phone be used by someone you
of communications and information technology lie in the don't know and stop sharing your cell phone number
contemporary world, it is highly imperative to check the online.
appearance and rising danger of cybercrime.
References
4.2 Suggestions
[1] https://www.meity.gov.in/content/cyber-laws
1) In the enforcement of cyber law, the judiciary can only
[2] https://www.ikigailaw.com/cyber-security-framework-
play a critical role if it is equipped with high
under-the-it-act-in-india/#acceptLicense
technology. To be recognized as e-justice, it must
[3] Text book the art of invisbility by kevinmitnick release
follow new mechanisms of justice administration.
date 4 Feb 2017
Electronic justice will have speedy trials without
[4] https://www.indiacode.nic.in/bitstream/123456789/199
unnecessary delay in order to prosecute cyber criminals.
9/3/A2000-21.pdf
Delay in trial may result in loss of evidence as,
compared to other records, electronic records are not of
a permanent nature. It is proposed to enact the
Electronic Code of Criminal Procedure for e-courts for
expeditious trial by the Indian Parliament. The Law
Commission of India has stressed the need for more
cyber laws to be enacted and for electronic courts to be
created to deal with cybercrimes.
2) It is proposed that the scope of current legislation can be
expanded to include a range of cyber operations, but it
is not appropriate to overlook the compliance element.
Prevention is better than cure, so proactive steps to
secure electronic data are more fruitful than enactment,
and this mission can be better accomplished by high-
tech professionals. Law is an important tool for
controlling human actions, but scientists and technical
people should play a better role here in high-tech. It is
noted that adolescents commit cybercrimes and often
play hacking games to take on daring tasks.They are
unaware of the results of their actions. They are also
unaware of the cyber law's deterrence provisions. In
school education, cyber ethics should also be included
in the course curriculum. Hacking-minded children's
programs can be used for constructive purposes.
3) Some training and infrastructure development in this
field should also be supported by our judiciary.
4) Investigative agencies must be allowed to deface
extremist websites and networks in order to stop and
monitor net warfare.
5) There is a need to establish laws to deter and monitor
cyber terrorism where terrorists use mobile and wireless
devices. Specific legislation was required to establish
the responsibility, liability and transparency of internet
service providers: e.g., they must be prevented from
using their customers' user numbers.
6) Through investigating suspected wireless, mobile
phones, and service providers such as 'history' in
computers, cyber terrorism can be monitored via
Change administrator's password from the default
password. If the wireless network does not have a
defaulting password, create one and use it to defend the
network.