Mohan, Veerendra2022-12-172022-12-172022-090976-3570https://ir.nbu.ac.in/handle/123456789/4776Conventional noisy cross-national and continental physical terror attacks have evolved dynamically in a contemporary form of terror power through borderless 5G cyberspace2, leveraging remotely the world web repository, satellites, drones, robots and instant data sharing etc. digital technology, capable of freezing critical native infrastructures including health, financial institutions, energy facilities, and disruption of social harmony and state governance etc. Cyberspace terrorists trained in pervasive vitriolic activities like arousing indignation, separatism, mass sympathy and mobilisation; and hiring, training terror agents, terror fund raising etc., under State agencies like ISI or non-state actors with unfailing synergy have been mercilessly overriding and frustrating the States’ anti-terror laws, endangering the ICT (Information and Technology) domain involving Computer Network exploitations (CNEs) and Computer Network Attacks (CNAs). The author, having experience of four decades, examined efficacy of extant laws to deal with this contemporary form of terror.enICT environmentcyberspace driven cross-border terrorismmultinational cyberspace jurisdictionsdual criminality requirementsresponsible state behaviour in cyberspacepervasive terrorismcyber sovereigntyself-defence doctrineCyberspace based cross-border terrorism: an overview of global and Indian legal regimeIndian Journal of Law and Justice, Vol. 13, No. 02, September-2022, pp. 273-293Article