Blog : Use of Internet and Computers by Terrorists

Use of Internet and Computers by Terrorists

Written by Rohas Nagpal
Friday, 16 April 2010 12:57 - Last Updated Monday, 19 April 2010 09:00
Many terrorists are using virtual as well as physical storage media for hiding information and
records of their illicit business. They also use emails and chat rooms to communicate with their
counterparts around the globe.
Scenario: The suspects carry laptops wherein information relating to their activities is stored in
encrypted and password protected form. They also create email accounts using fictitious
details. In many cases, one email account is shared by many people. E.g. one terrorist
composes an email and saves it in the draft folder. Another terrorist logs into the same account
from another city / country and reads the saved email. He then composes his reply and saves it
in the draft folder. The emails are not actually sent. This makes email tracking and tracing
almost impossible.
Terrorists also use physical storage media for hiding the information e.g. hard drives, floppies,
USB drives, mobile phone memory cards, digital camera memory cards, CD ROMs, DVD
ROMs, iPods etc. They also use virtual storage media for hiding the information e.g. email
accounts, online briefcases, FTP sites, Gspace etc.
Modus Operandi: The terrorists purchase small storage devices with large data storage
capacities. They also purchase and use encryption software. The terrorists may also use free or
paid accounts with online storage providers.
Usual motives: Keeping terrorism related information confidential; securing communication
amongst terrorist group members.
Applicable law (Before 27 October, 2009): Apart from conventional terrorism laws, section 69
of the Information Technology Act may apply.
Applicable law (After 27 October, 2009): Apart from conventional terrorism laws, section 69 of
the Information Technology Act may apply.