Please use this identifier to cite or link to this item: https://repository.iimb.ac.in/handle/123456789/9298
Title: Proactive and reactive measures to combat cyber terrorism and misuse of internet by terrorists
Authors: Pendyala, Krishna Sastry 
Keywords: Cyber terrorism
Issue Date: 2010
Publisher: Indian Institute of Management Bangalore
Series/Report no.: CPP_PGPPM_P10_21
Abstract: Terrorism is one of the complex issues faced by Governments, analysts, and public-policy makers. Tighter border controls, visa restrictions and physical security controls forced terrorists to look for other types of tools and weapons to attack the enemy country. Terrorist organizations of different categories, ethnic, ideological or religious have found in the internet an ideal tool for facilitating their objectives. Terrorists are using the internet and cyberspace for two purposes: to support their activities and to attack the critical information infrastructure. Currently terrorists are using internet for cyber attacks,communication, fund raising, recruiting, training, coordination, planning attacks etc., Almost all terrorist organizations are active today on internet and established their presence by successfully running more than 8000 websites serving their members, supporters and sympathizers to achieve their goals . As India increasingly going online, the dangers posed by internet terrorism are beginning to escalate. Lashkar-e-taiba (LeT), Harkat-ul-Jihad-al Islami (HuJI), Indian Mujahideen s terrorists who are behind the recent blasts in Delhi, Mumbai, Varanasi, Hyderabad, Ahmedabad, and Jaipur demonstrated the internet and communication technology use by the terrorists. Almost all the terrorist attacks on the Indian soil in recent past have established an e-connection, a dangerous nexus between the virtual world and the real terrorists. The threat of Cyber terrorism will grow, as the leadership positions in terrorist organizations are increasingly filled with younger, computer skilled and "Internet-savvy" individuals. Hackers from China and Pakistan are continuously attacking the critical information infrastructure of Defence, Bhabha Atomic Research Centre, Ministry of External Affairs etc., Most worrisome is politically motivated coordinated attacks, with Government support on national critical infrastructures. Our dependence on information systems that are inherently insecure, the broad diversity of potential sources of attack, and the international dimension of cyber terrorism raised a host of complicated policy questions for governmental security institutions. The use of e-mail messenger Services, social networking, real time communications over chatt Rooms by the terrorists to discuss their plans and to convey instructions posed difficulties to the Indian Law enforcement agencies in their collection of Technical Intelligence (TECHINT). To fight against terrorism in general and cyber terrorism in particular, requires the law-enforcement agencies to find new methods and techniques for intelligence gathering and analysis. The main objectives of this study are to identify, how terrorists are using internet to achieve their goals and the various proactive and reactive measures (technological and counter terrorism approaches) the Law enforcement agencies in India should adopt to combat cyber terrorism. In this study, initially I reviewed the topic of cyber terrorism with reported incidents of cyber attacks, the possible threats brought about by the misuse of cyber space by terrorists and also the international measures and best practices initiated in this area by governments in general and Law enforcement agencies in particular. This study concludes with certain recommendations for securing the Indian critical information infrastructure from cyber attacks and to stop terrorist use of cyber space.
URI: http://repository.iimb.ac.in/handle/123456789/9298
Appears in Collections:2010

Files in This Item:
File SizeFormat 
DIS_PGPPM_P10_21_E34512.pdf2.85 MBAdobe PDFView/Open    Request a copy
Show full item record

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.