Thursday, July, 25,2024

Latest News


The cybercrime has reached common man’s doorsteps and taking a shape of menace duly supported by the emergence of AI and new powerful technologies. The global dimensions of its spread and harm it can cause is alarming. Now is the time for organisations to invest in their security, as the developments of the past few years are just the beginning of an emerging future where cyber criminals will develop even more sophisticated methods to achieve their goals. Governments, banks, and global corporations now face a serious threat as a result of cyber security threats. Hackers use a lot of private and business data to their advantage, posing a serious threat to the online community. Cyber-crime taking shape of cyber terrorism is alarming as well as frightening and warrants immediate cyber terrorism counter measures.


Unauthorized Access is gaining access to systems or networks without the necessary permissions like digitally breaking into a house.

Phishing is craftily impersonating legitimate entities in deceptive attacks, with an aim to trick unsuspecting individuals into revealing sensitive data.

Malware is introducing various malicious software types including viruses, worms and ransomware with purpose to harm or exploit any device, network, service or program.

Distributed Denial of Service (DDoS) is by flooding systems, servers or networks with overwhelming traffic resulting in complete exhaustion of resources and bandwidth that renders the target system inoperable.

Identity Theft is an act of illicitly obtaining and using another person’s data in such scenarios, typically for financial gain. This can lead to online fraud, unauthorized purchases, loans or even fraudulent activities under someone else’s name.

Cyber stalking or bullying. Online harassment of individuals resulting in emotional distress as stalkers use digital means to intimidate, threaten or harass victims.

Cyber terrorism is the convergence of terrorism and cyberspace has given rise to the explicit notion of cyber terrorism. This phenomenon is anticipated to be the most alarming criminal development in the coming years, with the potential for terrorists to exploit the Internet for destructive purposes, resulting in more severe consequences compared to traditional methods. This makes cybercrime far more impacting and serious threat than what it is till now.

Process adopted by cyber criminals for unauthorised access to Systems and Networks. First, they often exploit software vulnerabilities, seeking out weak points in systems to breach, then, they craft phishing emails, aiming to deceive users into revealing their credentials. Next, they capitalize on weak passwords, which, surprisingly, many individuals still use outdated software can present security gaps, which cybercriminals are quick to exploit and lastly, through social engineering tactics, they can manipulate individuals into unknowingly granting them access.


Use strong and unique passwords and avoid the same password across multiple platforms. Regularly update all software to avoid it being exploited by cybercriminals. Avoid clicking on suspicious links on emails, text messages, or social media. Backup data regularly to obviate loss of vital information. Educate yourself and others about the latest cyber threats and possible countermeasures.


AI can help cyber criminals automate the process of targeting businesses to steal valuable intellectual property. AI algorithms can analyse high-volume of data and identify highvalue trade secrets or sensitive information, facilitating their theft for competitive advantage or financial gain. Cyber criminals may use AI for malicious purposes like, enhancing existing attacks, creating new attacks and automating and scaling attacks. The AI enabled cybercrimes include- Deepfakes technology to craft non-consensual pornography of celebrities or spread political misinformation, employing machine learning (ML) for guessing users’ passwords, hacking, vulnerability scanning, intelligent system weaknesses detection and exploitation, adaptive malware development, etc.

AI can also be used to compromise the software or hardware supply chain of an organization, targeting businesses, phishing attack targeting organisations to steal money/critical information, enhance the scale of intensity of DDoS attacks against business websites and online services overwhelming servers and disrupting business operations. Artificial intelligence can be used to make predictions about terrorism by analysing communications metadata, information about financial transactions, travel patterns, and web browsing activities.


AI-driven cyber attacks may seem unstoppable, but they’re not completely unbeatable. The trick is to fight fire with fire and cyber security is evolving with AI as well. To stay ahead of cyber criminals in this new frontier, businesses should adopt a comprehensive strategy combining AI and human expertise. Businesses should also adopt robust security measures, including implementing advanced AI-driven cybersecurity solutions for real-time threat detection and response. AI has been effectively applied to combat cybercrimes in a number of nations, including the detection and prevention of cyberattacks, the identification of prospective risks and the prediction of future assaults.


Need to standardise the cybercrime counter processes by integrating solutions from several stakeholders. Establish a standardised regulatory framework and strengthen existing set ups to guarantee that AI is created and applied responsibly and ethically.

Need to remove bias in data to obviate discriminating consequences for AIbased solutions. Identify and ensure correct investments in people, infrastructure, and legal frameworks for a better management of AI to counter rising cybercrimes in the country.

The role of AI in combating cyber terrorism constitutes a critical and evolving field with considerable scope for future research. One promising avenue for exploration involves advancing the capabilities of AI-driven predictive models for early detection and prevention of cyber threats associated with terrorism.


Col Rajesh Bhukar The writer is a Post Graduate in International Studies, Alumni of Defence Services Staff College, Wellington and College of Combat, Mhow [email protected]

  Share on

Related News