Exploring the role of encryption and the dark web in cyber terrorism: legal challenges and countermeasures in India

被引:0
作者
Sayyed, Hifajatali [1 ]
Paul, Sanu Rani [1 ]
机构
[1] Symbiosis Int Deemed Univ Pune, Symbiosis Law Sch Hyderabad, Pune, Maharashtra, India
关键词
Encryption; dark web; cyber terrorism; legal implications; countermeasures;
D O I
10.1080/23311886.2025.2479654
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
The rapid growth of digital technologies has provided new opportunities for cyber criminals, including terrorist organizations, to exploit encrypted communications and the Dark Web for illicit activities. Cyber terrorism, characterized by the use of cyber-attacks to cause fear, disrupt societies, or damage national security, has become a significant threat in the modern world. Encryption technology ensures privacy and security for legitimate users, but it is also increasingly used by terrorists to coordinate attacks and evade detection. Simultaneously, the Dark Web offers anonymity, facilitating illegal activities such as recruitment, fundraising, and the planning of cyber-attacks. This research explores the intersection of encryption, the Dark Web, and cyber terrorism, examining the Indian legal implications of these technologies in facilitating terrorist activities. Using a doctrinal research methodology, this study analyzes existing Indian legal frameworks such as the Unlawful Activities (Prevention) Act and the Information Technology Act along with international conventions addressing encryption and the Dark Web. It evaluates the challenges posed by these technologies to law enforcement and the balance between national security and individual privacy rights. It evaluates potential countermeasures, including international cooperation, advanced decryption techniques, and policy reforms aimed at striking a balance between privacy and national security. This study provides insights into the growing threat posed by cyber terrorism in India and the urgent need for comprehensive legal and technological responses.
引用
收藏
页数:11
相关论文
共 39 条
[1]   Advanced encryption schemes in multi-tier heterogeneous internet of things: taxonomy, capabilities, and objectives [J].
Alagheband, Mahdi R. ;
Mashatan, Atefeh .
JOURNAL OF SUPERCOMPUTING, 2022, 78 (17) :18777-18824
[2]  
Bentotahewa V, 2022, SN Computer Science, V3, DOI [10.1007/s42979-022-01079-z, 10.1007/s42979-022-01079-z, DOI 10.1007/S42979-022-01079-Z]
[3]  
Chen H, 2012, INTEGR SER INFORM SY, V30, P1, DOI 10.1007/978-1-4614-1557-2
[4]  
Choras M, 2016, STUD SYST DECIS CONT, V90, P139, DOI 10.1007/978-3-319-51043-9_7
[5]   COVID-19, Personal Data Protection and Privacy in India [J].
Dar, Mohamad Ayub ;
Wani, Shahnawaz Ahmad .
ASIAN BIOETHICS REVIEW, 2023, 15 (02) :125-140
[6]  
Denker K., 2019, Information Technology for Peace and Security: IT Applications and Infrastructures in Conflicts, Crises, War, and Peace, P107, DOI DOI 10.1007/978-3-658-25652-46
[7]   Multi-key and Multi-input Predicate Encryption (for Conjunctions) from Learning with Errors [J].
Francati, Danilo ;
Friolo, Daniele ;
Malavolta, Giulio ;
Venturi, Daniele .
JOURNAL OF CRYPTOLOGY, 2024, 37 (03)
[8]  
Hamilton R., 2024, Financial crime and the law. Ius Gentium: Comparative perspectives on law and justice, V115, DOI [10.1007/978-3-031-59543-12, DOI 10.1007/978-3-031-59543-12]
[9]  
Henschke A., 2021, Advanced Sciences and Technologies for Security Applications, P71, DOI [https://doi.org/10.1007/978-3-030-90221-65, DOI 10.1007/978-3-030-90221-65]
[10]  
Humphreys D, 2024, AI and Ethics, V4, P791, DOI [10.1007/s43681-024-00443-4, 10.1007/s43681-024-00443-4, DOI 10.1007/S43681-024-00443-4]