Cyber Weapons

You are here

  • Share
  • Tweet
  • Email
  • Whatsapp
  • Linkedin
  • Print
  • Lashkar-e-Cyber of Hafiz Saeed

    Terrorist groups like Lashkar-e-Taiba are increasingly taking to social media to further widen their outreach. By integrating social media with self-developed android apps, Lashkar is also turning from mere technology user into a product developer.

    March 21, 2016

    Dark Web and Encrypted Apps: ISIS Communicates in the Black

    Dark Web and Encrypted Apps: ISIS Communicates in the Black

    As ISIS strives to spread its tentacles in India, it would definitely build up a network of sympathisers and probable recruits, connected digitally with its operatives spread across the globe and available online round the clock.

    February 02, 2016

    Sunny Tomar asked: What is the difference between cyber-crime and cyber-terrorism? What is India’s position on both the issues?

    Cherian Samuel replies: From the technical angle, the difference between cyber-crime and cyber-terrorism is only nominal in that the means are the same, but the goals may be different. The same vulnerabilities in networks and systems can be used to attain a variety of goals, from crime to terrorism. As a hypothetical example, the systems of a high-value target such as a nuclear plant may be taken over by criminals and held to ransom or by terrorists for destructive purposes.

    The Invisible War in West Asia

    The two recent malware attacks on energy companies in West Asia are particularly worrisome since they represent a rapid escalation in capabilities and intent on the part of the perpetrators.

    September 07, 2012

    Pages

    Top