The Information Technology Act, 2000 is India’s main law to combat cybercrimes and regulate digital activities. It aims to provide legal recognition to electronic transactions and protect data online.
In today’s world, cyber terrorism poses a growing threat. Criminals exploit digital systems to attack national security, spread fear, or steal sensitive information. Section 66F of the IT Act directly addresses such cyber terrorism.
Code: Section 66F of the IT Act, 2000
Section 66F – Punishment for Cyber Terrorism
(1) Whoever, –
(A) with intent to threaten the unity, integrity, security or sovereignty of India or to strike terror in the people or any section of the people by –
(i) denying or causing the denial of access to any person authorized to access computer resource; or
(ii) attempting to penetrate or access a computer resource without authorization or exceeding authorized access; or
(iii) introducing or causing to introduce any computer contaminant,
and by means of such conduct causes or is likely to cause death or injuries to persons or damage to or destruction of property or disrupts or knowing that it is likely to cause damage or disruption of supplies or services essential to the life of the community or adversely affect the critical information infrastructure specified under Section 70,
shall be punishable with imprisonment which may extend to imprisonment for life.
(B) Whoever knowingly or intentionally penetrates or accesses a computer resource without authorization and by means of such conduct obtains access to information, data or computer database that is restricted for reasons of security of the State or foreign relations,
shall be punishable with imprisonment which may extend to imprisonment for life.
(2) Whoever commits or conspires to commit cyber terrorism shall be punishable with imprisonment which may extend to life imprisonment.
Explanation of Section 66F
Section 66F of the IT Act defines cyber terrorism. It criminalizes unauthorized access to critical computer systems that harm national interests. If a person hacks, damages, or spreads malware to threaten India’s security, they face life imprisonment.
It covers acts intended to:
- Attack government data.
- Access restricted information.
- Disrupt essential services like banking, power, or transport.
The law considers the intent to threaten or cause harm to national security as a major factor.
Illustration of Cyber Terrorism under Section 66F
Example:
A hacker gains unauthorized access to India’s defense servers. He steals confidential military data and plans to leak it online to create panic. This act qualifies as cyber terrorism under Section 66F. If caught, the hacker may face life imprisonment.
Another example:
Spreading ransomware in hospital systems to disrupt healthcare services during a crisis. If it affects national security or public life, the act falls under Section 66F.
Case Overview: Gujarat CCTV Footage Leak (February 2025)
A notable recent case involving cyber terrorism under Section 66F of the Information Technology Act, 2000, occurred in Gujarat in early 2025.
On February 17, 2025, the Ahmedabad City Social Media Monitoring Cell discovered that private videos of women undergoing gynecological examinations at a private maternity home in Rajkot had been uploaded to a Telegram group.
The videos were obtained by hacking into CCTV systems using Virtual Private Networks (VPNs) from various countries, including Atlanta, Romania, Georgia, and Japan.
The hackers operated 22 Telegram channels, distributing these videos and maintaining a “menu card” of obscene content.
The Ahmedabad City Cyber Crime Police Station registered a First Information Report (FIR) and invoked Section 66F(2) of the IT Act, which pertains to cyber terrorism.
This section addresses actions that threaten the country’s security, integrity, and sovereignty, punishable with imprisonment that may extend to life.
First State To Apply For Cyber Terrorism
Gujarat became the first state to apply the cyber terrorism section in a CCTV leakage case, marking a critical moment in the enforcement of Cyber Crime Laws in India.
Police teams were dispatched to Sangli and Latur in Maharashtra and Prayagraj in Uttar Pradesh, resulting in the arrest of three accused individuals within 48 hours.
Investigations revealed that over the past eight months, two of the accused had hacked into more than 50,000 CCTVs across 20 states, including installations in corporate offices, schools, colleges, movie theaters, and private homes.
The police froze the bank accounts of all the accused and issued notices to the Telegram channels involved.
The Gujarat government initiated the process of framing a Standard Operating Procedure (SoP) and rules for the installation of CCTV cameras in public places to prevent such incidents in the future.
A special public prosecutor was appointed, and proceedings were started to try the case in a fast-track court.
Conclusion
Section 66F of the IT Act plays a critical role in defending India from cyber attacks and digital warfare. It empowers law enforcement to take strict action against cyber terrorists.
As digital threats rise, understanding such laws becomes essential. Cybersecurity, awareness, and legal enforcement together protect our nation’s cyber infrastructure.