Critical evedenciarcy analysis of 26/11 attacks with reference to cyber-terrorism

https://doi.org/10.53730/ijhs.v6nS2.7663

Authors

  • Abhijit Chanda Research Scholar, Sharda University
  • Muskaan Verma Legal Researcher

Keywords:

critical evedenciarcy, cyber-terrorism, Mumbai attacks case

Abstract

By thorough analysis of Mumbai terrorist attacks of 26/11, it was observed that the attacks were form of Cyber terrorism as it was done to convey particular destructive message to the government, sending of threatening emails, defacing of government websites, hacking and cracking of crucial government systems. 'Protected systems' were compromised and civil amenities were disrupted. Digital information systems computer networks which not only affected governing system but also the population of a target area was affected to create a panic or situation of threat. Computer and digital communication networks were main tools of extremists in this case. Also, Supreme Court judgement on Mumbai Attacks case, in para number 57 specifies about use of Google Earth, tampering with telecommunication networks and digital networking shows that the Attack was done by was done by Hi-Tech offenders. Although electronic eavesdropping often yields valuable data, even tantalizing clues can be missed if the technology is not closely monitored, the intelligence gleaned from it is not linked with other information, or analysis does not sift incriminating activity from the ocean of digital data as traced by Inteligence agencies of US, UK and India during investigation of attacks.

Downloads

Download data is not yet available.

References

Aneesh V Pillai, Admissibility Of Digital Evidences: An Overview Of The Legislative And Judicial Perspectives, 2016 (2) Elen. L R

Anikar M. Haseloff, Cybercafes and their Potential as Community Development Tools in India <http://ci-journal.net/index.php/ciej/article/view/226/181> accessed on 5th April,2020

Asawat, Vikas, Information Technology (Amendment) Act, 2008: A New Vision through a New Change, <https://ssrn.com/abstract=1680152> accessed on 4th April,2020

Carvell, A. (2008, 11 December), Indian lawyer has Google Earth in his sights, < http://www.geek.com/articles/news/indian-lawyer-has-google-earth-in-his-sights-20081211/> accessed on 3rd April,2020

Carvell, A. (2008, 11 December). Indian lawyer has Google Earth in his sights., <http://www.geek.com/articles/news/indian-lawyer-has-google-earth-in-his-sights-20081211/> accessed on 6th April,2020

Cereijo Cuba The threat II: Cyberterrorism and Cyberwar <http://www.lanuevacuba. com/archivo/manuel-cereijo-110.html> accessed on 12 February 2020

Chaudhary Shubham ‘Cyber Terrorism: World Wide Weaponisation’ 2019 3(2) International Journal of Law and Legal Jurisprudence and Studies 227

Cyber space played key role in 26/11 Mumbai attack: US commander <https://economictimes.indiatimes.com/news/politics-and-nation/cyber-space-played-key-role-in-26/11-mumbai-attack-us-commander/articleshow/13164308.cms> accessed on 30 January 2020

Denning, D. E. ‘Terror’s Web: How the Internet is transforming Terrorism’ 2006 Handbook of Internet Crimes 194

Dhaval D. Desai and Parjanya Bhatt, “Securing India’s Cities: Remembering 26/11, Learning its Lessons”, ORF Special Report No. 92, July 2019, Observer Research Foundation. <https://www.orfonline.org/research/securing-indias-cities-remembering-2611-learning-its-lessons-53066/> accessed on 5th April,2020

Digital Evidence and Forensics, <https://nij.ojp.gov/digital-evidence-and-forensics> accessed on 3rd April,2020

Dogrul Murat ‘Developing an International Cooperation on Cyber Defense and Deterrence against Cyber Terrorism’ 2011 International Conference on Cyber Conflict 29

Economic Times Report dated 26 November 2019 ‘Eleven Years since Mumbai Terrorist Attacks’ accessed on 10 April 2020

Elias Neocleous & Co LLC, Admissibility of digital evidence in court, <https://www.lexology.com/library/detail.aspx?g=29828d6d-8396-4070-9424-05ac2e0ecfae> accessed on 6th April,2020

F Cassim ‘Addressing the spectre of cyber terrorism: a comparative perspective’ 2012 15(2) PER 381

FBI hands over crucial evidence to Mumbai police. Retrieved , <http://www.dailytimes.com.pk/default.asp?page-2009%5C02%5C22%5Cstory_22-2-2009_pg7_8> accessed on 6th April,2020

Gulati, Rishi, The 26/11 Mumbai Terrorist Attacks: Assessing Pakistan’s Responsibility in International Law (July 12, 2011). Indian Journal of International Law, vol. 51, no. 3 (2011), pp.321-363. <https://ssrn.com/abstract=2046864> accessed on 6th April,2020

Halder, Debarati. (2011). Information Technology Act and Cyber Terrorism: A Critical Review. SSRN Electronic Journal. 10.2139/ssrn.1964261, <https://cis-india.org/internet-governance/resources/intermediary-guidelines-rules> accessed on 5th April,2020

Handling of digital evidence, < https://www.unodc.org/e4j/en/cybercrime/module-6/key-issues/handling-of-digital-evidence.html> accessed on 3rd April,2020

Harsh V. Pant and Maya Mirchandani, Eds., "26/11: A Decade After", ORF Special Report No. 77, December 2018, Observer Research Foundation., <https://www.orfonline.org/wp-content/uploads/2018/12/ORF_Special_Report_77.pdf> accessed on 5th April,2020

India Faces Serious Threads from Cyber Terrorism, says expert <https://www.firstpost.com/business/biztech/india-faces-serious-threat-from-cyber-terrorism-warns-expert-1869729.html> accessed on 21 January 2020

India sends 11th Mumbai attacks dossier to Pakistan, <http://www.dailytimes.com.pk/default.asp?page=2010%5C06%5C19%5Cstory_19-6-2010_pg1_3> accessed on 6th April,2020

Information Technology (Amendment) Act, 2008, <https://www.bcasonline.org/Referencer201516/Other%20Laws/information_technology_act_000.html> accessed on 7th April,2020

International Journal of Recent Technology and Engineering 159

Matiha Nehala and Awasthi Rajan ‘A Critical Study on Cyber Terrorism with Reference with 26/11 Mumbai Attack’ 2018 119(17) International Journal of Pure and Applied Mathematics 1617

Md. Ajmal Md. Amir Kasab @Abu vs State of Maharashtra, <https://indiankanoon.org/doc/193792759/> accessed on 4th April,2020

NDTV Correspondent (2010). Hacked by 'Pakistan cyber army', CBI website still not restored < http://www.ndtv.com/article/india/hacked-by-pakistan-cyber-army-cbi-website-still-not-restored-70568> accessed on 25 March 2020

Oh, O., Agrawal, M. & Rao, H.R. Information control and terrorism: Tracking the Mumbai terrorist attack through twitter. Inf Syst Front 13, 33–43 (2011). <https://doi.org/10.1007/s10796-010-9275-8> accessed on 5th April,2020

Pankaj Choudhary Upasna Singh, Ranking Terrorist Nodes of 26/11 Mumbai Attack using Analytical Hierarchy Process with Social Network Analysis <https://www.albany.edu/iasymposium/proceedings/2016/12_Choudhary_Singh_ASIA2016.pdf> accessed on 7th April,2020

Ponnusamy Suhannia ‘An International Study on the Risk of Cyber Terrorism’ 2019 7(5)

Prem Mahadevan, A Decade on from the 2008 Mumbai Attack: Reviewing the question of state-sponsorship, <https://icct.nl/publication/a-decade-on-from-the-2008-mumbai-attack-reviewing-the-question-of-state-sponsorship/> accessed on 8th April,2020

Raghavan, S. Digital forensic research: current state of the art. CSIT 1, 91–114 (2013), <https://doi.org/10.1007/s40012-012-0008-7> accessed on 8th April,2020

RATH, SAROJ KUMAR. "26/11 Mumbai Attacks: INDIA IS HAMSTRUNG." World Affairs: The Journal of International Issues14, no. 4 (2010): 36-71. Accessed April 17, 2020., accessed on 5th April,2020

Reich, Pauline C. "Case Study: India - Terrorism and Terrorist Use of the Internet/Technology." , Law, Policy, and Technology: Cyberterrorism, Information Warfare, and Internet Immobilization, ed. Pauline C. Reich and Eduardo Gelbstein, 377-408 (2012),

RITA MANCHANDA, Media-Mediated Public Discourse on 'Terrorism' and Suspect Communities, Economic and Political Weekly, Vol. 45, No. 15 (APRIL 10-16, 2010), pp. 43-50, <https://www.jstor.org/stable/25664331> accessed on 6th April,2020

Rules & Regulations Review, The Information Technology Rules, 2011, <https://www.prsindia.org/uploads/media/IT%20Rules/IT%20Rules%20and%20Regulations%20Brief%202011.pdf> accessed on 7th April,2020

Saxena, A. (August 4 2011). 117 ‘Indian Government Websites Defaced Till July. MEDIANAMA’ <http://www.medianama.com/2011/08/223-indian-government-websites-hacked/> accessed on 15 March 2020

Schjolberg, S. Terrorism in Cyberspace - Myth or reality? accessed on 15 January 2020

Shah, Nishant (2007) 'Subject to technology: internet pornography, cyber-terrorism and the Indian state ', Inter-Asia Cultural Studies, 8:3, 349 – 366, <http://dx.doi.org/10.1080/14649370701393725> accessed on 6th April,2020

Shashi Shukla, Emerging New Trends Of Terrorism : Challenges Before The United Nations, The Indian Journal of Political Science, Vol. 67, No. 1 (JAN. - MAR., 2006), pp. 165-176 <https://www.jstor.org/stable/41856202> accessed on 5th April,2020

Shukla Shashi ‘Emerging New Trends Of Terrorism : Challenges Before The United Nations’ 2006 67(1) The Indian Journal Of Political Science 165

Shweta, Tauseef Ahmad, Relevancy and Admissibility Of Digital Evidence: A Comparative Study International Journal of Law Management & Humanities Page , Volume 2, Issue 1 ISSN: 2581-5369

Soni Lavin Valecha, Sonika Bhardwaj, Admissibility of Electronic Evidence under the Indian Evidence Act, 1872, International Journal of Management and Humanities (IJMH) ISSN: 2394-0913, Volume-4 Issue-7, March 2020

Sriram Raghavan, Digital forensic research: current state of the art, < https://link.springer.com/article/10.1007/s40012-012-0008-7> accessed on 3rd April,2020

Tejas Karia, Akhil Anand and Bahaar Dhawan, The Supreme Court of India re-defines admissibility of electronic evidence in India, Digital Evidence and Electronic Signature Law Review, 12 (2015)

The Information Technology (Amendment) Act, 2008, <https://internetdemocracy.in/laws/the-information-technology-amendment-act-2008/> accessed on 7th April,2020

Vatis Michael ‘The Next Battlefield: The Reality of Virtual Threats’ 2006 28(3) Harvard International Review 56

Vivek Dubey, Admissibility of electronic evidence: an Indian perspective, Forensic Research & Criminology International Journal, Volume 4 Issue 2 – 2017

Published

22-05-2022

How to Cite

Chanda, A., & Verma, M. (2022). Critical evedenciarcy analysis of 26/11 attacks with reference to cyber-terrorism. International Journal of Health Sciences, 6(S2), 10011–10025. https://doi.org/10.53730/ijhs.v6nS2.7663

Issue

Section

Peer Review Articles