File Copyright Online - File mutual Divorce in Delhi - Online Legal Advice - Lawyers in India

Cyber Terrorism: Legal Challenges

These days, computers and the internet are almost necessities. Both individuals and society use them to make their lives simpler. Like keeping records, communicating, processing data, coordinating machinery, typing, editing, designing, and drawing, as well as nearly every other facet of office work. Because of computers' enormous potential, terrorists and criminals have chosen to use them as their primary means of target attack. In the current internet era, the number of "Cyber Crimes" rises daily.

The difference between "cyber crime" and "conventional crime" is not really great. Both involve actions or inactions that violate the law and are reconciled by the government's penalties. Additionally, this crime is done online or in a networked setting. A computer can be used as a target, a tool, or both while committing this kind of crime.

Identity theft, carding, hacking, Web jacking cracking, cyber or child pornography, cyber stalking, cyber squatting, computer fraud or forgery, cyber terrorism, and cyber warfare are a few examples of the many different kinds of cybercrimes.

Cyber terrorism and cyber welfare are the two types of cybercrimes that have an impact on national security. The unauthorized assaults and threats such attacks towards the network, computer, and data that is kept on it. cyber terrorist attacks on the websites of numerous academics, executives from the government and intelligence services, etc.The combination of cyberspace and terrorism is known as cyber terrorism. The Information Technology Act's Section 66F addresses cyber terrorism and associated penalties. The closest thing to cyber terrorism to date may have been the Internet Black Tigers' 1998 email attack of Sri Lankan embassies.

Introduction
Cyber Terrorism and Cyber Warfare are two cybercrimes that have an impact on national security. Unlawful assaults and threats against the network, computer, and data that is kept on it. The term "cyber terrorism" refers to the deliberate employment of disruptive actions, or the threat of such activities, in cyberspace with the goal of advancing political, social, ideological, or other related objectives, or of intimidating any individual in the process.

Attacks on computer networks are used by terrorists to further their political goals of destroying large amounts of property, instilling fear in the populace, and attacking government targets. The goal of cyber terrorism is to break into networks that protect the country's security and destroy data that is crucial to strategy.

Hacking into different critical infrastructure (CI) systems can result in severe environmental damage, international economic instability, and the loss of human life. It is one of the biggest risks to national security . cyber-terrorism stands out for its ability to employ economic might to secure unprecedented levels of fear over cyberspace and the physical world through the deployment of cyber-engineered techniques such as data exfiltration, denial-of-service assaults, and network devastation.

The threats posed by cyber-terrorism demand prompt international attention. States, however, have not been able to advance a cooperative strategy that would allow various acts of terrorism in cyberspace to be brought to justice.

What Difficulties Do Cyber-attacks Present for India?

  • Critical Vulnerability in Infrastructure: Critical infrastructure in India, including networks for communication, power grids, and transportation systems, is susceptible to cyberattacks that might jeopardize national security and key services.
     
  • Threats to the Financial Sector: Cybercriminals who aim to make money by stealing or extorting money pose a serious threat to India's financial sector. Financial losses, identity theft, and a decline in confidence in the financial system can result from attacks on banks, financial institutions, and online payment systems.

    For example, a malware assault on the SWIFT system of the City Union Bank in March 2020 resulted in unlawful transactions totaling $2 million USD.
     
  • Data Breaches and Privacy Issues: With India transitioning to a digital economy, there is a rise in the quantity of private and public data being kept online. Additionally, this raises the possibility of data breaches, in which unauthorized users get and divulge private data. Data breaches can have detrimental effects on an organization's and an individual's security and privacy.
     
  • Cyber Espionage: The use of cyberattacks to spy on or undermine the objectives of other nations or organizations is known as cyberespionage. Like other nations, cyber espionage operations target India in an effort to obtain a tactical advantage and steal sensitive data.

    APTs, or advanced persistent threats, APTs are lengthy, intricate cyberattacks that are typically executed by highly experienced and resourceful groups. Because APTs employ sophisticated methods and instruments to get beyond security systems, they are challenging to identify and counter.
     
  • Chain of Supply Vulnerabilities: Vulnerabilities in the hardware or software that enterprises and the government employ to run their operations are referred to as supply chain vulnerabilities. In December 2020, for instance, a worldwide cyberattack on the software company SolarWinds, based in the United States and offering network management tools, had an impact on a number of Indian organizations, such as the Ministry of Electronics and Information Technology (MeitY), Bharat Heavy Electricals Limited (BHEL), and the National Informatics Centre (NIC).

India's initiatives include the Information Technology Act and the Cyber Terror Law

The Information Technology Act (hereinafter referred to as the Act) enforces legislative laws pertaining to cyber terrorism. Section 66F of the Act establishes a statutory framework for cyber terrorism. It allows for punishment, ranging from life imprisonment, for cyber terrorism, as well as three fundamental criteria for an act to be considered cyber terrorism:

Intention: The act must be intended to instill fear among people or threaten India's unity, integrity, security, or sovereignty.

The act must result in unlawful denial of access to authorized individuals, unauthorized intrusion into computer resources, or the introduction of computer contaminants.

Harm: The act must also cause harm, such as death, injuries to individuals, unfavorable or destructive effects on the vital information infrastructure (CII), damage or destruction of property, or such disruptions likely to cause disturbances in such services or supplies that are essential to life.

Furthermore, Section 66F applies in cases where a person intentionally penetrates or accesses a computer resource without authorization or exceeds his legitimate authorization and gains access to data, information, or a computer base that has been restricted for Indian security interests, or whose disclosure would jeopardize India's sovereign interests, etc.

Secure systems and Critical Information Infrastructure (CII) The Act includes a provision for 'protected systems', which allows the appropriate government to declare any computer resource that directly or indirectly affects the facility of CII as a 'protected system'. Section 70(3) punishes a person with a fine of up to ten years for securing or attempting to secure access to a protected system. Section 70's explanation clause defines CII as "the computer resource whose incapacitation or destruction will have a debilitating impact on national security, economy, public health, or safety."

Under Section 70A of the Act, the federal government designated the National Critical Information Infrastructure Protection Centre (NCIIPC) as the National Nodal Agency for CII protection. The union government has also established the Defense Cyber Agency. Indian Computer Emergency Response Team (CERT-IN) Section 70B of the Act establishes CERT-In to safeguard India's cybersecurity and counter cyber attacks against it. The CERT-In is meant to defend India's cyberspace from cyber attacks, issue alerts and advisories on the most recent cyberthreats, and coordinate countermeasures to prevent and respond to any potential cybersecurity incident.

The national watch and alert system collects, analyzes, and disseminates information on cybersecurity incidents, forecasts and issues alerts, implements emergency measures, coordinates response activities, and issues guidelines and advisories.

Conclusion And Suggestions:
The development of cyberspace has resulted in a decentralized communication network that transcends national boundaries. Therefore, to effectively combat cyber-terrorism, a cooperative cybersecurity framework and international regulation are necessary.

It is time to fortify international law so that it can combat cyber-terrorism, as the current framework is ill-equipped to handle the threat. Additionally, India needs to consider updating its legal system or passing special cybersecurity laws that might include provisions for cyber-terrorism.

Cyberspace has been integrated into a number of disciplines, including governance, public administration, trade, and business operations. This is partly because of the global pandemic and the prime minister's advocacy of using technology for development and administration. Furthermore, there is ongoing integration of the internet with CI.

It is necessary to develop a multidimensional cybersecurity framework as a result. The COVID-19 pandemic has expedited the digitization of economic enterprises and various other endeavors. Terrorist cyberattacks have the potential to completely shut down the nation's financial and economic systems, including the Goods and Services Tax (GST) network in India. Therefore, to encourage governments to implement countermeasures against cyber-terrorism

'Cybersecurity' as one of the factors to determine the ease of doing business index, and fortify the cybersecurity framework. Along with trying to align its laws and procedures with international best practices, India must also work to lessen overlap among cybersecurity organizations.

In addition, the pandemic's acceleration of digital corporate operations has made the state constitutionally obligated to safeguard India's internet. The right to practice or pursue any kind of livelihood within the bounds of the law is granted by Article 19(1)(g) of the Constitution, as read in conjunction with the Sodan Singh and Anuradha Bhasin instances. Therefore, the state needs to ensure that Indian citizens' fundamental freedom to work from home in cyberspace is safeguarded under the current legal framework. It is important to remember that any organization can only thrive in a digital environment if there is a secure cyberspace in place. As a result, the government is required under the constitution to defend India's cyberspace against online dangers, such as cyber-terrorism.

These days, India's major commercial, economic, and other interests connect with the cyberspace. The union must implement strict deterrent policies and cybersecurity reforms at all levels of operation in order to safeguard India's strategic, sovereign, economic, and commercial interests in cyberspace. When analyzing cyber-terrorism concerns, it's critical to have a broad view. New procedures and corrective measures must be devised, with a particular emphasis on the state's constitutional obligations under Article 19(1)(g) and Article 355 of the Indian Constitution.

References:
  • Section 66F (2)
  • Section 66F (1) (A)(i)
  • Section 66F (1) (A)(ii)
  • Section 66F (1) (A)(iii)
  • Section 70
  • Section 70B

Law Article in India

Ask A Lawyers

You May Like

Legal Question & Answers



Lawyers in India - Search By City

Copyright Filing
Online Copyright Registration


LawArticles

How To File For Mutual Divorce In Delhi

Titile

How To File For Mutual Divorce In Delhi Mutual Consent Divorce is the Simplest Way to Obtain a D...

Increased Age For Girls Marriage

Titile

It is hoped that the Prohibition of Child Marriage (Amendment) Bill, 2021, which intends to inc...

Facade of Social Media

Titile

One may very easily get absorbed in the lives of others as one scrolls through a Facebook news ...

Section 482 CrPc - Quashing Of FIR: Guid...

Titile

The Inherent power under Section 482 in The Code Of Criminal Procedure, 1973 (37th Chapter of t...

The Uniform Civil Code (UCC) in India: A...

Titile

The Uniform Civil Code (UCC) is a concept that proposes the unification of personal laws across...

Role Of Artificial Intelligence In Legal...

Titile

Artificial intelligence (AI) is revolutionizing various sectors of the economy, and the legal i...

Lawyers Registration
Lawyers Membership - Get Clients Online


File caveat In Supreme Court Instantly