The National Conference of State Legislature (NCSL), a Non Governmental Organization (NGO) of the US defines 'cyber terrorism' as
follows:
"The use of information technologies by terrorist groups and individuals to further their agenda: This can include use of information
technology to organ ize and execute attacks against networks, computer systems and telecommunication infrastructures, or for exchanging
information or making threats electronically. Examples are: hacking into computer systems, introducing viruses to vulnerable networks,
website defacing Denial-of-Service attacks or terrorist threats made via electronic communication".
As per Kevin G Coleman of the Technolytics Institute, "Cyber terrorism is the premeditated use of disruptive activities, or the threat thereof,
against cotnputers and/or networks, with the intention to cause harm or further social, ideological religious, political or similar objectives or
to intimidate any person in furtherance of such objectives".
Cyber terrorism is the use of internet based attacks in terrorist activities, including acts of deliberate, large - scale disruption of computer
networks, especially ofpcrsonal computers attached to the internet, by the means oftools such as computer viruses.
A combination of these definitions constructs the following definitions:
"Cyber terrorism is the politically motivated use ofcomputers as weapons or as targets, by sub-national groups or clandestine agents with
internet on violence, to influence an audience or cause a government to change its policies".
Terrorists have used IRC servers and channels in the past as a recruiting group and meeting place. While also being used as a
communications tool, IRC has been and is still being used for attacking systems through what can be referred to as cyber terrorism. The
most popular form of this is the botnet, a collection of computers that are connected together and used most often for malacious purposes. In
the early 2000' s, a large number of these bonets were run through IRC network. The infected computer will connect to an IRC network and
suit in a channel, waiting for the controller ofthe botnet to issue commands. The storm botnet which plagued the internet in 2007 had an
extremely large number ofcomputers under its command. These botnets serve many goals for their masters.
Some of the contents found in terrorists computers are: (i) hits on websites diat contains 'sabotage handbook" (i) handbooks containing
internet tools, planning a list, anti-surveillance methods, 'cracking' tools and (iii) Al-Qaeda
Indian Legal Provision
National Law relating to Cyber Terrorism
Section 66F(ii) of IT Act, 2000, which deals with the offence of Cyber terrorism provides that:
Whoever,—
(A)with intent to threaten the unity, integrity, security or sovereignty of India or to strike terror in the people or any section of the people
by—
(i) Denying or cause the denial of access to any person authorized to access computer resource; or
(i) Attempting to penetrate or access a computer resource without authorisation or exceeding authorised access; or
(iii) introducing or causing to introduce any computer contaminant;
and by means of such conduct causes or is likely to cause death or injuries to persons or damage to or destruction of property or disrupts or
knowing that it is likely to cause damage or disruption of supplies or services essential to the life of the community or adversely affect the
critical information infrastructure specified under Section 70; or
(B)knowingly or intentionally penetrates or accesses a computer resource without authorisation or exceeding authorised access, and by
means of such conduct obtains access to information, data or computer database that is restricted for reasons of the security of the State or
foreign relations; or any restricted information data or computer database, with reasons to believe that such information, data or computer
database so obtained may be used to cause or likely to cause injury to the interests of the sovereignty and integrity of India, the security of
the State, friendly relations with foreign States, public order, decency or morality, or in relation to contempt of coutt, defamation or
incitement to an offence, or to the advantage of any foreign nation, group of individuals or otherwise, commits the offence of cyber
terrorism."
It means use of Cyber tools to shut down critical national infrastructure such as energy, transportation, and communication and coerce
governments into submission. Internet bomb threats, internet harassment and technology driven crimes such as focused virus strikes are the
next wave of crime that the world has to encounter in the days to come.
A strategic plan of a combat operation includes characterisation Of the enemy's goals operational techniques, resources, and agents. Prior to
taking combative actions on the legislative and operational front, one has to precisely define the enemy. That is, it is imperative to expand
the definition ofterrorism to include cyber terrorism.
Under the IT Act 2000, as amended by IT (Amcndmcnt) Act, 2008, Section 66-F(2) which provides that "Whoever commits or conspires to
commit cyber terrorism shall be punishable with imprisonment which may extend to imprisonment for life" is applicable. Section 153 A of
IPC, 1860 and UAPA Section 15-20 is also applicable. The victim can file a complaint in the nearest police Station where the above crime
has been committed or where he comes to know about the said crime.