BNS Section 319 - Cyber Terrorism

Whoever uses computer resources or electronic communication to conduct terrorist activities, including cyber attacks on critical infrastructure, government systems, or public utilities.

Share:
Non-bailable, Cognizable

Official Text

Whoever uses computer resources or electronic communication to conduct terrorist activities, including cyber attacks on critical infrastructure, government systems, or public utilities.

Legal Analysis

Elements to Prove:

  • Using computer resources or electronic communication.
  • To conduct terrorist activities.
  • Including cyber attacks on critical systems.

Potential Defenses:

  • No terrorist activities.
  • Authorized cybersecurity testing.
  • Legitimate activities.

Practical Examples

What Constitutes the Offense:

Cyber attacks on critical infrastructure, digital terrorism, electronic terrorist activities.

What Doesn't Constitute:

Legitimate cybersecurity testing, authorized penetration testing, or lawful activities.

Punishment

Imprisonment for Life, or up to 10 years, and Fine