"Cyber and communications crimes attained maturity as a result of two incidents. The first was the hacking of a wireless network by the so-called Deccan Mujaheedin terrorists (desperate Pakistani terrorists use such generic names for projecting it as an Indian outfit), which resulted in an e-mail threat that implicated a foreigner. The second incident was the Pakistani terrorists Lashkar-e-Taiba’s (Jamaat-ud-Dawa) use of a satellite phone and Russian server during the attack on Mumbai, which resulted in the deaths of more than 180 Indians and foreign citizens alike – women and children among them."
Unfortunately, the rest of the article mostly delves into spam, phishing and fraud issues.
Software for meeting India’s Cyber- and IP-related challenges
1 comment:
The wireless networks are increasingly used in India. On the one hand we have the convenience of using wireless networks whereas on the other hand they are prone to hacking and other cyber crimes making them the premier crime perpetuation platform. The Information Technology Act, 2000 (IT Act, 2000) is the exclusive cyber law of India and it is silent on this aspect. We are also witnessing an increased use of insecure wireless networks for sending mails either before or after the terrorist attacks in India.
Post a Comment