Cyber Terrorism denotes unlawful attacks and threats of attack against computers, network and information stored therein to intimidate or coerce a government or its people for propagating hidden political or unlawful social and religious motives. These attacks could result in violence against persons or property or cause public unrest. Few examples could be explosions, plane crashes and severe economic losses. Terrorists are known to use internet to prepare schemes, raise funds and spread cyber terrorism. For instance Ramzi Yousef who was a key person behind World Trade Centre attack had detailed schemes to destroy United States airliners encrypted files in his laptop computer. A website known as ‘Muslim Hackers Club’ (www.ummah/net/mhc/hackers.html) shows tips for hacking the pentagon. Cyber warfare is another area of concern. Cyber espionage methods seek to gain information about the enemy and attacks by destroying his information system and safe guarding one’s own system from a counter attack. Several states in USA have addressed terrorism in state criminal codes, including statutes that address terroristic activities and threats. But at least three states- California, Georgia, and Pennsylvania – have laws specifically aimed at electronic terroristic threats or acts.
Cyberterrorism[10] can include direct attacks on networks, computer systems, computer programs, and data, which may result in potentially disastrous consequences like shutting down vital infrastructure facilities such as power stations. Nearly every state has statutes banning hacking and unauthorized access, and at least sixteen states ban unleashing harmful computer viruses and contaminants. In India, Cyberterrorism has a stringent punishment of imprisonment of ten years or life imprisonment as per the IT Act,2000.



___________________________________________________________
[10] Cyberterrorism: How Real Is the Threat?
December 2004,| Special Report No. 119 Gabriel Weimann