Menu Top



Cyber Terrorism (Section 66F)



Definition and Elements


Accessing computer resource with intent to threaten unity, integrity, security or sovereignty of India

Cyber Terrorism under Section 66F of the Information Technology Act, 2000 refers to intentional and unauthorized access to a computer resource with the aim to harm the nation’s unity, integrity, sovereignty, or security.

This includes actions that may:

For instance, if an individual hacks into the Ministry of Defence’s network to extract sensitive data with the intention to leak it to enemy states, this qualifies as cyber terrorism.


Causing denial of access to authorized persons

This element involves using cyber means to block access to legitimate users from their computer resources or systems. This is often done through methods such as:

If the targeted system is related to law enforcement, hospitals, emergency response, or national infrastructure, the threat level increases dramatically and thus is treated as cyber terrorism.


Causing damage to computer, computer system, network, data, etc.

This refers to acts such as:

Example: A malware attack on the IRCTC server that leads to loss of ticketing data and service failure across India is considered cyber terrorism when proven to be intentionally done to cause chaos.


Disrupting essential services

This includes acts targeting and disrupting services that are essential to public life and safety. Examples:

These acts create panic, disorder, and can lead to real-world terror, hence are categorized under cyber terrorism.


Affecting national security

Any cyber act that weakens national security or endangers strategic interests such as military operations, internal law and order, or foreign relations is covered under Section 66F.

Examples include:

Cyber terrorism aims not only to disrupt but to destabilize the nation itself.


Important Technical Terms under Section 66F

Computer Contaminant

Any set of computer instructions designed to:

Computer Virus

A program that can replicate itself and infect a computer system by modifying other programs and inserting its own code.

Computer Resource

Includes computer, computer system, network, data, and database.



Penalties for Cyber Terrorism


Punishment under Section 66F

Section 66F(2) clearly states:

“Whoever commits or conspires to commit cyber terrorism shall be punishable with imprisonment which may extend to imprisonment for life.”

Thus, cyber terrorism is a non-compoundable and grave offence, reflecting its potential to cause irreversible national damage.


No Bail Provision

Cyber terrorism is a cognizable and non-bailable offence, meaning:

This provision ensures that those accused of such acts are subject to strict investigation and cannot escape judicial scrutiny.


Trial in Sessions Court

Due to the seriousness of the offence, cyber terrorism cases are tried by the Sessions Court as per criminal law hierarchy in India.

The judge of the Sessions Court handles such cases, and procedural laws under the Criminal Procedure Code (CrPC) are applicable.


Application along with Other Statutes

Section 66F can be applied in conjunction with:

This makes prosecution more effective and covers both cyber and conventional aspects of terrorism.


Example

Example 1. A foreign hacker group breaks into the Indian Railways signaling system and alters train route commands, nearly causing a multi-train collision and injuring passengers.

Answer:

This act involves:

  • Unauthorized access to a critical infrastructure system
  • Endangering lives and public safety
  • Causing potential panic and national security disruption

Hence, this qualifies as cyber terrorism under Section 66F and is punishable with life imprisonment.



Related Offences and International Cooperation



Offences related to terrorism under IPC


Indian Penal Code (IPC) Provisions Complementing Cyber Terrorism

While cyber terrorism is specifically covered under Section 66F of the Information Technology Act, 2000, several provisions of the Indian Penal Code (IPC) also deal with acts of terrorism and can be invoked in related scenarios.


Section 121: Waging War Against the Government of India

This section penalizes acts of war or attempts to wage war against the Government of India. In cyber terrorism, if hacking or cyber sabotage is done with such intention, this section may be invoked.


Section 124A: Sedition

Whoever by words, signs, or visible representation excites or attempts to excite disaffection against the Government may be charged under this section. Cyber terrorists using digital platforms to spread anti-national sentiments can be prosecuted under this provision.


Section 153A: Promoting Enmity Between Groups

This covers cyber activities that incite hatred or enmity between different groups on grounds of religion, race, place of birth, residence, language, etc.


Section 505(1)(b): Statements Conducing to Public Mischief

Publishing or circulating any report or statement with the intent to cause fear or alarm to the public or disturb public tranquility is punishable under this section, including statements made digitally.


Application with Section 66F

These IPC sections can be applied in addition to Section 66F when the nature of cyber activity overlaps with criminal intentions defined under IPC. The combination of IT Act and IPC enhances the prosecution’s ability to secure convictions.



International Efforts to Combat Cyber Terrorism


Budapest Convention

The Convention on Cybercrime of the Council of Europe (2001), commonly known as the Budapest Convention, is the first international treaty that seeks to address cybercrime by harmonizing national laws, improving investigative techniques, and enhancing cooperation among nations.


Key Objectives of the Budapest Convention


Significance of the Convention

The Budapest Convention enables faster data sharing, mutual legal assistance, and cross-border investigations. It provides a structured legal framework to trace and prosecute cyber criminals beyond national boundaries.


India’s Position

India is not a signatory to the Budapest Convention. The primary concerns include:

However, India has been strengthening its bilateral cybercrime cooperation with several countries like the US, UK, Japan, and Australia.


Need for International Collaboration

Cyber terrorism often originates across borders, making it essential for nations to cooperate on:

Global threats require global solutions, especially in the cyberspace which has no physical boundaries.


Other International Initiatives