Section 66F – Cyber Terrorism

Section 66F of the Information Technology Act, 2000, cyber law. This section deals with cyber terrorism, the gravest cyber offence.

Statutory Provision

A person commits cyber terrorism if he:

Uses computer resources with intent to:

threaten unity, integrity, security or sovereignty of India, or strike terror in people OR Accesses protected systems and causes:

death/injury

destruction of property

disruption of essential services

damage to critical infrastructure

theft of sensitive defence or security data


Punishment

Imprisonment for life

(One of the most severe punishments under the IT Act)

Ingredients of Offence

Two routes:

Route 1 – Terror Intent + Computer Use


Computer resource use

        +

Intent to threaten national security OR create terror


Route 2 – Attack on Critical Systems


Unauthorized access to protected system

        +

Damage/disruption/stealing sensitive information

        +

Risk to national security


Key Concepts

Protected System (Section 70) Government can declare: defence networks, nuclear plants, banking systems, power grids, telecom, critical infrastructure as “protected systems”

Unauthorized access → serious offence → may attract 66F


Terror Intent Includes:

causing fear among people, destabilizing government, threatening sovereignty, aiding enemy nations.

Examples

✔ Hacking power grid to cause blackout

✔ Attacking defence database

✔ Disrupting railway/airport systems

✔ Ransomware on hospitals

✔ Stealing military secrets

✔ Cyber attack by terror organisations


Relationship with Other Law Provision

IT Act Section 66F

UAPA Terrorism offences

IPC/BNS Waging war, sedition-type offences

Official Secrets Act Leakage of defence info

Often 66F + UAPA charged together


Judicial Approach

Although limited direct SC rulings on 66F:

Courts treat it as: aggravated form of hacking, threat to national security, comparable to terrorism offences.

Shreya Singhal (2015)

While striking down 66A, the Court clarified:

Serious offences like 66F remain valid and necessary for national security.

Difference: 66 vs 66F

Section Nature

66 Simple hacking/damage

66F Terror-linked hacking (national security threat)

66F = aggravated + terror intention

Practical Challenges

Attribution of attacks

Cross-border cyber warfare

State-sponsored hackers

Digital evidence complexity

Overlap with UAPA jurisdiction


Section 66F addresses cyber terrorism by criminalising attacks on critical infrastructure and national security, reflecting the shift of terrorism from physical spaces to digital networks.

F = Fear + Federal security



Comments

Popular posts from this blog

📘 Bharatiya Sakshya Adhiniyam, 2023 (BSA)

🏛️ Court Fee Refund after Settlement: Rajasthan High Court Clears the Air

Bombay Court Ruling: Sending Obscene WhatsApp Messages Is a Serious Criminal Offence