Doctrinal Research LLM 3rd-1
Doctrinal Research LLM 3rd-1
Submitted to
Affiliated to
Kaviyitri Bahinabai Chaudhari
North Maharashtra University, Jalgaon
By
Year 2024-2025.
Guide
Prof. Nayana Zope
DECLARATION
I, Manisha Santosh Patil hereby declare that the present work in the form
of Practical Training Doctrinal Research Title “CYBER CRIME AND CYBER
TERRORISM : A STUDY” is an original work carried by me under the guidance of
Prof.Nayana Zope. The Doctrinal Research submitted for the partial fulfillment of the
degree of Master in Laws, has not been previously submitted by him for the award of
degree, diploma aasociateship or any other similar title of this University.
This is to certify that the present work in the form of Doctrinal Research titled
“CYBER CRIMES AND CYBER TERRORISM: A STUDY” is an original work carried
by your name Manisha Santosh Patil, under my guidance at the North Maharashtra
University, Jalgaon.
The Doctrinal Research submitted for the partial fulfillment of the degree of Master in
Laws, has not been previously submitted by him for the award of degree, diploma
associate ship or any other similar title of this University or any other University.
Place: Jalgaon
Date: / /2024
I would like to express my special thanks to our principal sir Prof. NAYANA
Zope for their guidance and support in completing my project work. During the
research of this project, I came to know about many new things and new dimension
regarding my topic this, I am really thankful towards the sir and other teaching staff
for their valuable support.
TITILE
CERTIFICATE
DECLARATION
ACKNOWLEDGEMENT
CHAPTER – I INTRODUCTION
BIBLIOGRAPHY
CHAPTER I
INTRODUCTION:-
Cyber law is a part of the overall legal system that deals with the Internet,
cyberspace, and their respective legal issues. Cyber law covers a fairly broad area,
encompassing several subtopics including freedom of expression, access to and
usage of Internet, and online privacy. Generically, cyber law is referred to as the Law
of the Internet.
2) The second group is computer related crimes, where the computer becomes
a part of evidence and a crime has taken place with the help of a computer or
where computer forms a part of the complete crime scene.
The victim of cyber-crime can claim for remedy or compensation with the help of
following provisions,
4) Web hacking: - It is controlling others websites forcefully. Due to this he/she will
lose control on his/her website and content.
8) Email Spoofing: - The case in which email appears to originate from one source
but actually has been sent from another and may cause monetary damage.
9) E-commerce and Investment Fraud: - These are the cases in which false offers
are given to customer relating to loans, investment for purchasing any property
or counterfeit securities etc.
10)Cyber Defamation: - When a particular person sends any defamatory matter to
all of the person’s friends.
I.
Online cell of arms act.
II.
Online cell of Drugs under Narcotic Drugs and Psychotropic
Substances act.
According to whitepaper ‘Current state of cybercrime -2019’, released by RSA
Security (an American company of parent organization Dell technologies), social
media fraud has increased by 43% in 2018. It says the trend will continue in 2019
because of ease of using, absence of fees and multiple other benefits of these
platforms.
PENALTY FOR DAMAGE TO COMPUTER OR COMPUTER SYSTEM:-
If any person without permission of the owner or any other person who is in
charge of a computer, computer system or computer network –
a) Accesses or secures access to such computer, computer system or
computer network;
b) Downloads, copies or extracts any data, computer data base or information
from such computer which is stored in any secondary storage or removable
storage medium;
c) Introduces or causes to introduce any computer contaminant or computer
virus into any computer, computer system or computer network
d) Damages or causes to damage any computer, computer system or computer
network , data, computer data base or any other programs residing in such
computer, computer or computer network;
e) Disrupts or causes disruption of any computer, computer system or computer
network;
f) Denies or causes denial of access to any person authorized to access any
computer, computer system or computer network by any means;
g) Provides any assistance to any person to facilitate access to a computer,
computer system or computer network;
h) Charges the services availed of by a person to the account of another
persone by tampering with or manipulating any computer, computer system,
or computer network,
He shall be liable to pay damages by way of compensation not exceeding one
crore rupees to the persona so affected.
CHAPTER III
CYBER TERRORISM
We know that Cyber terrorism is the crime that has emerged in recent times, to use
the medium of Internet to terrorize the minds of citizens. Admirably, the Laws
through the implementation of the Information technology Act, 2000, is one of the
efficient steps taken towards the creation of punishment of these kinds of crimes.
There is need of innovative laws and global standards on preventive action.
The Indian Information Technology Amendment Act 2008 lays down Section 66F as
a specific provision dealing with the issue of cyber terrorism that covers denial of
access, unauthorized access, introduction of computer contaminant leading to harm
to persons, property, critical infrastructure, disruption of supplies, ‘sensitive data’
thefts, acts which are punishable with imprisonment which may extend to
imprisonment for life.
The peril imposed by cyber terrorism has snatched the attention of the world
mass media, the security population, and the Information Technology (IT) industry.
Journalists, politicians, and experts in a variety of fields have popularizes a scenario
in which sophisticated cyber terrorists electronically break into computers that control
dams or air traffic systems, wreaking havoc and endangering not only millions of
lives but national security itself.
General John Gordon indicated that whether someone explodes a bomb that
cause bodily harm to innocent people or hacked into a web-based IT system in a
way that could, for instance take a power grid offline and result in blackout, the result
is ostensibly the same. He also stated that the potential for terrorist cyber is real.
CHAPTER IV
The law of privacy is the recognition of the individual's right to be let alone and
to have his personal space inviolate. In recent times, however, this right has
acquired a constitutional status, the violation of which attracts both civil as well as
criminal consequences under the respective laws. The intensity and complexity of
life have rendered necessary some retreat from the world. Man under the refining
influence of culture, has become sensitive to publicity, so that solitude and privacy
have become essential to the individual. Right to privacy is a part of the right to life
and personal liberty enshrined under Article 21 of the Constitution of India. With the
advent of information technology the traditional concept of right to privacy has taken
new dimensions, which require a different legal outlook. To meet this challenge
recourse of Information Technology Act, 2000 can be taken.
The various provisions of the Act aptly protect the online privacy rights of the
citizens. Certain acts have been categorized as offences and contraventions, which
have tendency to intrude with the privacy rights of the citizens.
In R.K. Dalmia v Delhi Administration the Supreme Court held that the word
"property" is used in the I.P.C in a much wider sense than the expression "movable
property". There is no good reason to restrict the meaning of the word "property" to
moveable property only, when it is used without any qualification. Whether the
offence defined in a particular section of IPC can be committed in respect of any
particular kind of property, will depend not on the interpretation of the word "property"
but on the fact whether that particular kind of property can be subject to the acts
covered by that section.
The cyber terrorists may also use the method of distributed denial of services
(DDOS) to overburden the Government and its agencies electronic bases. This is
made possible by first infecting several unprotected computers by way of virus
attacks and then taking control of them. Once control is obtained, they can be
manipulated from any locality by the terrorists. These infected computers are then
made to send information or demand in such a large number that the server of the
victim collapses. Further, due to this unnecessary Internet traffic the legitimate traffic
is prohibited from reaching the Government or its agencies computers. This results
in immense pecuniary and strategic loss to the government and its agencies.
The main aim of cyber terrorist activities is to cause networks damage and
their disruptions. This activity may divert the attention of the security agencies for the
time being thus giving the terrorists extra time and makes their task comparatively
easier. This process may involve a combination of computer tampering, virus
attacks, hacking, etc.
While the number of random Internet cyber attacks has been increasing, the
data collected to measure the trends for cyber attacks cannot be used to accurately
determine if a terrorist group, or terrorist-sponsoring state, has initiated any of them.
A recent private study found that during the latter half of 2002, the highest rates for
global cyber attack activity were directed against critical infrastructure industry
companies. A new report on industrial cyber security problems, produced by the
British Columbia Institute of Technology, and the PA Consulting Group, using data
from as far back as 1981, reported a 10-fold increase in the number of successful
cyber attacks on infrastructure Supervisory Control and Data Acquisition systems
since 2000. DOD officials have also observed that the number of attempted
intrusions into military networks has gradually increased, from 40,076 incidents in
2001, to 43,086 in 2002, 54,488 in 2003, and 24,745 as of June 2004.
- $17 billion dollars will be spent worldwide on security products and services
- $200 - $300 is spent by US companies for every host that needs patching
- In 2003, $221.2 billion dollars were lost worldwide due to identity theft (up from
$73.8 billion in 2002) with $73.8 billion (up from $24.6 billion) of those losses in the
United States.
“Whoever:- (A) With the intent to threaten the unity, integrity, security or
sovereignty of India or to strike terror in the people or any section of the people by—
(i) By denying or cause the denial of access to any person authorized to access
computer resource; or (ii) Attempting to penetrate or access a computer resource
without authorization or exceeding authorized access; or (iii) Introducing or causing
to introduce any computer contaminant;
The sensational episodes of online warfare are high against this nation. But
still we witness that mostly we are not prepared to counter the cyber terror attack by
China and Pakistan against our great India. Recently gaping holes in the Indian e-
security environment were shown when a Swedish “ethical hacker” blogged details
of e–mail accounts and passwords of several Indian government institutions,
including the Defence Research and Development Organization, the National
Defence Academy etc. he matter assumes significance particularly because China
has been steadily strengthening its ability to wage electronic warfare alongside its
rapid (and non-transparent) modernization of its military and armory.
Hackers from Pakistan and terrorist organizations are increasing their attacks
on Indian websites to provide a new dimension to the ongoing Indo- Pak conflict over
Jammu and Kashmir. The terrorist organizations were resorting to the internet and
information systems to extend their warfare into a completely new ground to give a
new, lost-cost dimension, with maximum effect and reach. Hacker groups from
Pakistan like Pakistan Hacker Club had intensified their attacks on Indian websites,
especially over the last few years.
With the Middle East Conflict as a very heated moment between bordering
countries Pro- Palestinian and Pro- Israel Cyber Groups have been launching an
offensive against websites and mail services used by the political sectors the
opposing groups show support for. The attacks had been reported by the NIPC
(National Infrastructure Protection Center) in October of 2000 to U.S officials. The
attacks were a volley of e-mail floods. DoS attacks and Ping flooding of such sites as
the Israel Foreign Ministry, Israeli Defense Forces, and in reverse, sites that
belonged to groups such as Hamas and Hezbollah.
Now it’s high time to take action. It is a fact that counter terrorists are duty
bound to save property and lives. We all are increasingly connected, dependent and
vulnerable. With combination of knowledge, responsibility and expertise, a counter-
cyber terrorism team can build an effective policy for preventing cyber terrorist
incidents, managing threats and responding to Cyber- Terrorist acts. So now we
agree the fact that the traditional concepts and methods of terrorism have taken new
dimensions, which are more deadly and destructive in nature. The damage so
produced would be almost irreversible and most catastrophic in nature. The law
dealing with cyber terrorism is however not adequate to meet the precarious
intentions of these cyber terrorists and requires a transformation in the light and
context of the latest developments all over the world. The laws have to take care of
the problems originating at the international level because the internet, through
which these terrorist activities are carried out, recognizes no boundaries. Thus a
cyber terrorist can collapse the economic structure of a country from a place with
which a country may not have reciprocal arrangements, including an “extradition
treaty”. The only safe guard which is available to us is to use the latest technology to
counter these problems. Thus, we understand that a good combination of the latest
security technology and a law dealing with cyber terrorism is the need of the hour.
Bibliography