Forensic Sciences


Reformation in Legal System and Governance to Curb Cyber Terrorism

Article Number: NMF783711 Volume 05 | Issue 01 | April - 2022 ISSN: 2581-4273
23rd Aug, 2021
16th Nov, 2021
18th Feb, 2022
13th Apr, 2022

Authors

Dr. Neelkamal Ganesh, Dr. Dhwani Patel , Dr. Pankti Patel, Dr. Swati Kanojia

Abstract

Cyberterrorism is the future of terrorist activities, it is driven by the motive of destroying enemies’ operational capabilities. They inflict social hatred amongst the people of a community based on status, religion, nationality, etc. It is grouped into 3 main categories Simple – Unstructured, Advanced – Structured and Complex- Co-ordinated. The recent Boll on Cryptocurrency and Regulation of Official Digital Currency 2021 is also being discussed in Parliament. With the due progress of time various amendments are done in the legal system in the Information Technology Act and the Cyber laws. Improvement in governance to restrain terrorist activities have also brought about some changes which will be put forth in the following paper. Keywords: Cyber Terrorism, Cyber Crime, Money Laundering, Cryptocurrency.

Introduction

In advancements of technologies, the future wars in the world will not be like the conventional ones on land air, or water; but a Cyber War. In simple words, it is an unlawful act against society on grounds of partisan and communal disharmony through the medium of computers and the internet. The divulgence of Edward Joseph Snowden, an expert who worked in Central Intelligence. He disclosed documents of Global surveillance program run by NSA in co-operation with telecommunication agencies and European Government. These revelations specified that considerable of the NSA scrutiny aimed at India’s internal politics and its commercial and strategic interests, exhibiting India’s helplessness to cyber prying in all areas. India was 5th amongst the targeted countries.

The wars in the coming times would attack the distinguished sectors of

1. Defense

2. Finance sector

3. Documents of internal and external security

4. Rail and Air Traffic Control Management

5. Satellite and Communication Sector

6. Prime Institutions of Science and Research and Development. (Janczewski and Colarik, 2007)

Reasons for Spread of Terrorism

In times, terrorism spreads swiftly due to the subsequent factors:

1. More technology available to demeanor terror

2. Targets of terrorism are more widespread

3. Sophisticated medium of communication (electronic, print and media and internet) helped terrorists to quickly promote their ideology and hate campaign

4. Intolerance in society by virtue of rising population and declining resources.

5. Increasing globalization of the community International recognition and support to terrorist groups

6. Link in terrorism and systematized crime to earn money. (Kumar and Anekant, 2019)

References

Ahmad, Rabiah, et al. “Perception on Cyber Terrorism: A Focus Group Discussion Approach.” Journal of Information Security, vol. 03, no. 03, 2012, pp. 231–37. Crossref, https://doi.org/10.4236/jis.2012.33029.

Antonyan, Elena Aleksandrovna, et al. “Blockchain Technology in Countering Cyber Threats.” SHS Web of Conferences, edited by A.A. Pavlovna et al., vol. 108, 2021, p. 03008. Crossref, https://doi.org/10.1051/shsconf/202110803008.

Jalil, Shamsuddin Abdul. “Countering Cyber Terrorism Effectively: Are We Ready To Rumble?” GIAC Security Essentials Certification (GSEC), 2003.

Janczewski, Lech, and Andrew Colarik “Cyber Warfare and Cyber Terrorism.” Information Science Reference, 2007. Crossref, https://doi.org/10.4018/978-1-59140-991-5.

Kumar, Ashok, and Vipul Anekant. Challenges to Internal Security. Mc Graw Hill, 2019.

Wu, Chunying, and Juan Wang. “Analysis of Cyberterrorism and Online Social Media.” Advances in Social Science, Education and Humanities Research, vol. 351, 2019, pp. 925–27. Atlantis Press.

How to cite this article?

APA StyleKumar, R., & Midha, P. (2022). Resilience as Correlates of Posttraumatic Growth among Silent Victims: A Study on Widows. Academic Journal of Forensic Sciences, 5(1), 12–18.
Chicago Style
MLA Style
DOI
URL

Create Your Password

We've sent a link to create password on your registered email, Click the link in email to start using Xournal.

Sign In

Forgot Password?
Don't have an account? Create Account

Create Account

Already have an account? Sign In

Forgot Password

Do you want to try again? Sign In

Publication Tracking