Main Article Content



Despite the fact that most individuals would claim to understand what terrorism is, there is startling lack of a universally accepted definition. The use of violence or the threat of violence is the sole overarching thread among the literally hundreds of definitions currently in use. Only "Political" and "fear, terror emphasised" are the other components that are included in more than 50% of definitions. As a result, some governments view some terrorist organisations as having the right to fight. This hinders international collaboration. The motivation behind terrorism is different from those of other crimes; it is carried out with a specific goal and strategic objective in mind.

Article Details

Criminal Law
Author Biography


1Kamshad Mohsin, 2Prof. (Dr.) KB Asthana

1Research Scholar (Law)

2Prof. of Law and Dean, Maharishi Law School



Wilson Clay: Computer attack and Cyber Terrorism (2003).

Sastry P.K: Computer Science and Computer Forensis (2001).

Supervisory control and data acquisition system (SCADA) related to the nation’s critical infrastructure and are the industrial controls systems that are managed by computer system)

in the data mining the internet is a vast source of information on the topics and is utilized by terrorists ti gather any information that may be relevant to their causes or to future operations- such as the satellite images, maps and blueprints of future targets. Information from ).

Ross Anderson is a researcher, writer and industry consultant in security engineering at the University of Cambridge computer laboratory, where he is engaged in the Security Group.

Electronic warfare is defined as military action involving the use of electromagnetic and directed energy to control the electromagnetic spectrum or to attack the enemy. Electronic warfare consists of three divisions: electronic attack, electronic protection and electronic warfare support.

Paper presented by M.W David, K. Sakurai combating cyber terrorism: countering cyber terrorist advantages of surprise and anonymity”, cubic corporation, Kyushu University.

Inserted vide Information technology Amendment Act 2008.

Information and technology Amendment Act 2008.

Cyber security in India’s counter Terrorism strategy, available at:

B J Srinath “Cyber security : threat and concerns, Indian computer Emergency response team (CERT-In), Ministry if communications and Information technology Government of India, Source: Data breach Investigation report, 2014. Available at: Securing_Indian_cyber.

Cyber Law cases available at: data assessed on 15th May, 2023.

Crisis management Plan for cyber attacks, Ministry if communication and information technology, available at :

Notification no G.S.R. 315(E), New Delhi, the 11th April, 2014, available at:

Supra Note 47, p. 40

According to section 72 of the above mentioned Act.


The creation of a Cyber Intelligence (CYBERINT) Analysis Center to develop and evaluate methods to improve the ability to detect, identify and deter Cyberterrorist attack. It also proposes ways to implement responsible, accountable and identifiable use of the Internet, and deny anonymity to the attackers.