CYBER TERRORISM: Terrorism Without Weapon: Team Members
CYBER TERRORISM: Terrorism Without Weapon: Team Members
CYBER TERRORISM: Terrorism Without Weapon: Team Members
TEAM MEMBERS:
1. ANJALI SINGH Contact No. : 9910802220 2. SUGANDHA Contact No. : 9873560716 3. KUNDAN KUMAR YADAV Contact No. : 9873213321 4. MOHIT GUPTA Contact No. : 9718983849 5. AJIT SINGH Contact No. : 9410278658 E-Mail ID : as085776@gmail.com E-Mail ID : mohitgupta1233@gmail.com E-Mail ID : kundanky@gmail.com E-Mail ID : sugandha2008.2008@rediffmail.com E-Mail ID : anjalisingh1609@rediffmail.com
Internet, through which these terrorist activities are carried out, recognises no boundaries. Thus, a cyber terrorist can collapse the economic structure of a country from a place with which India may not have any reciprocal arrangements, including an "extradition treaty". In an attempt to define cyber terrorism more logically, a study is made of definitions and attributes of terrorism developed this attribute list is then examined in detail with the addition of the computer and the Internet considered for each attribute. Using this methodology, the online world and terrorism is synthesized to produce a broader but more useful assessment of the potential impact of computer-savvy terrorists. Most importantly, the concept of traditional cyber terrorism, which features the computer as the target or the tool is determined to be only a limited part of the true risk. SOME EXAMPLES OF CYBERTERRORISM
Computer and internet played a key role in the execution of the 9/11 attacks. This concept is
critical in evaluating the true problem we face in the virtual world: the use of computers in terrorist acts. While there are possible technical solutions that would have made this particular scenario more difficult, this task does not currently fall under the auspices of any government agency tasked with fighting cyber terrorism. Furthermore, as each of the actions cited above was not necessarily illegal prior to the attack, detection and prevention is made all the more difficult. Recently terrorists used a computer in Delray Beach, Florida to make their travel plans and purchase tickets, as well as using public library computers in the same town (Holland, 2001). How large the role computers played in the organization and execution of the attacks is, at this point. Under Investigation of Mumbai attack this is get to know that the voiceover internet protocol phone are brought by a Spain terrorist, use them for together belongingness. Indian Muzahidin organization send an email to television channels just before 5 minutes of Ahmedabad bomb blasts.
Vigilant citizenry: The menace of cyber terrorism is not the sole responsibility of State and its instrumentalities. The citizens as well as the netizens are equally under a solemn obligation to fight against the cyber terrorism. Judicial response: The judiciary can play its role by adopting a stringent approach towards the menace of cyber terrorism. Legislative commitment: The legislature can provide its assistance to the benign objective of elimination of cyber terrorism by enacting appropriate statutes dealing with cyber terrorism. Executives concern: The Central Government and the State Governments can play their role effectively by making various rules and regulations dealing with cyber terrorism and its facets from time to time.
CONCLUSION
The problem of cyber terrorism is multilateral having varied facets and dimensions. Its solution requires rigorous application of energy and resources. It must be noted that law is always seven steps behind the technology. This is so because we have a tendency to make laws when the problem reaches at its zenith. We do not appreciate the need of the hour till the problem takes a precarious dimension. At that stage it is always very difficult, if not impossible, to deal with that problem. This is more so in case of offences and violations involving information technology. One of the argument, which is always advanced to justify this stand of non-enactment is that the measures suggested are not adequate to deal with the problem. It must be appreciated that something is better then nothing. The ultimate solution to any problem is not to enact a plethora of statutes but their rigorous and dedicated enforcement. The courts may apply the existing laws in a progressive, updating and purposive manner. It must be appreciated that it is not the enactment of a law but the desire, will and efforts to accept and enforce it in its true letter and spirit, which can confer the most strongest, secure and safest protection for any purpose. The enforcement of these rights requires a qualitative effort and not a quantitative effort.