IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Case Study: India - Terrorism and Terrorist Use of the Internet/Technology

Case Study: India - Terrorism and Terrorist Use of the Internet/Technology
View Sample PDF
Author(s): Pauline C. Reich (Waseda University, Japan)
Copyright: 2012
Pages: 32
Source title: Law, Policy, and Technology: Cyberterrorism, Information Warfare, and Internet Immobilization
Source Author(s)/Editor(s): Pauline C. Reich (Waseda University, Japan)and Eduardo Gelbstein (Webster University, Switzerland)
DOI: 10.4018/978-1-61520-831-9.ch014

Purchase

View Case Study: India - Terrorism and Terrorist Use of the Internet/Technology on the publisher's website for pricing and purchasing information.

Abstract

The purpose of this chapter is to analyze terrorist use of technology in the Mumbai attacks of November 2008 and the use of law to prosecute terrorists availing themselves of technological measures to plan and carry out attacks. The Mumbai attacks are also placed in the context of terrorism in India, by looking at identified terrorist groups and incidents. It should be noted that India adopted amendments to its 2000 IT Act in December 2008, following the attacks, and these amendments include provisions related to cyber terrorism, which might be applied going forward if necessary. It should also be noted that Pakistan adopted similar legislation in 2007 and in 2008, and Bangladesh states that it is in the process of adopting such legislation. Both India and Pakistan have made cyber terrorism punishable by death penalties. The definitions of cyber terrorism in their legislation are provided in this chapter. The chapter also analyzes the level of technological know-how exhibited by the alleged terrorists currently on trial in India, Pakistan, and the United States for planning and executing the Mumbai attacks. Recent measures taken by the Indian government to avoid future use of technology by terrorists are also discussed in the context of a democracy needing to balance security with the privacy and liberty of its citizens.

Related Content

Siva Raja Sindiramutty, Noor Zaman Jhanjhi, Chong Eng Tan, Navid Ali Khan, Bhavin Shah, Amaranadha Reddy Manchuri. © 2024. 58 pages.
Imdad Ali Shah, Raja Kumar Murugesan, Samina Rajper. © 2024. 31 pages.
Rana Muhammad Amir Latif, Muhammad Farhan, Navid Ali Khan, R. Sujatha. © 2024. 33 pages.
Imdad Ali Shah, Areesha Sial, Sarfraz Nawaz Brohi. © 2024. 25 pages.
Kassim Kalinaki, Wasswa Shafik, Sarah Namuwaya, Sumaya Namuwaya. © 2024. 24 pages.
Imdad Ali Shah, N. Z. Jhanjhi, Humaira Ashraf. © 2024. 24 pages.
Rida Zehra. © 2024. 18 pages.
Body Bottom