<p>The phenomenal growth of computer and communication technologies, or ICT, has brought great benefits attached with some risks. Some of the negative risks which have emerged include the cooption of technology by terrorist organisations for use in their nefarious activities. ICT has also greatly facilitated cultural invasions, resulting in real or imagined resentments and revulsions, which this paper argues is one of the many causes of international terrorism.</p><p>This paper argues that ICT is exploited by the terrorist organisations in two ways, both as a tool and as a target of attack. Used as a tool, communications are used in support of operations providing for command and control of activities. Terrorists can also operate in cyberspace to destroy or manipulate information for their own purpose. There are numerous known cases of exploitation of ICT by terrorist organizations, both, globally as well as in India.</p><p>This paper studies the past patterns of exploitation of ICT by domestic and international terrorists to predict the future eventualities so that they can adopt preventive measures in a pro-active manner.</p><p>Counter measures are suggested by the author, and these include the following initiatives:</p><ul><li>there is an urgent need to frame rules and regulations for technological governance of the cyber space</li><li>‘anti-technology’ can be defeated only with further innovations in technology through the development of more secure means of communications and more effective means of enabling tracing and tracking of crimes</li><li>cyber surveillance will have to be strengthened, even if it manifests itself to the detriment of individual privacy</li></ul><p>The paper concludes by suggesting that terrorists are usually a step ahead of the government agencies in making use of the latest technical gadgetry for their own purposes, be it for communications or information collection. However, the author argues that it must be recognised that the same science and technology which gives such a dreadful capability in the hands of terrorists, will also provide the means for defeating the terrorists’ designs, provided governments remain alert and learn the ‘new rules of the game’.</p>