The Role of Modern Information Tools in Countering the Spread of Terrorist Threats

封面

如何引用文章

全文:

开放存取 开放存取
受限制的访问 ##reader.subscriptionAccessGranted##
受限制的访问 订阅存取

详细

The article discusses the current problems of countering terrorist threats, which in the process of globalization and informatization of society have moved into the network space and have become a consequence of such a phenomenon as cyberterrorism. The problem of computer terrorism in the global network is of concern to the entire world community, as this phenomenon threatens the security of many countries and their citizens more and more every year, bringing enormous political, economic and moral losses, exerting pronounced psychological pressure on large masses of people. By adopting modern information technologies, criminals become less vulnerable to law enforcement agencies. Many resources of the global network (websites, blogs, news feeds) aimed at the Russian target audience are physically and legally located outside the Russian Federation, which makes it difficult to block and delete illegal content. The global information space is actively used by terrorist organizations as a platform for promoting radical ideas, inciting ethnic and interreligious intolerance, recruiting new members, collecting information about the alleged goals and objects of blackmail, psychological terrorism. It can be said that terrorism in the global information space has become an alternative to traditional terrorist acts for many reasons. The author notes the need for international cooperation in the legal regulation of the global information space, as well as effective interaction and cooperation with law enforcement agencies and special services of foreign states, in the suppression of transnational computer crime. The analysis of the use of Internet resources for terrorist purposes and various psychological methods of influence used by terrorists aimed at inciting hatred and intolerance on the basis of national and religious affiliation or enmity was carried out. The methods of hacker attacks on the management systems of critical state infrastructures, including life support facilities, industry and defense, are considered. Descriptive and comparative methods, statistical and bibliometric methods were used to conduct the study. The results of the study can be used to prepare scientific papers, conduct further research in this area and practical application of the analysis in order to increase the effectiveness of countering terrorist threats in the Internet space.

全文:

受限制的访问

作者简介

Timur Shogenov

North Caucasus Institute for Advanced Studies (branch) of the Krasnodar University of the Ministry of Internal Affairs of Russia

Email: tima0301977@mail.ru
Cand.Sci. (Econ.), Deputy Head of Department Nalchik, Russia

参考

  1. Video message from Mikhail Mishustin to the participants of the international online cybersecurity training Cyber Polygon. [Electronic resource]. Access mode: URL http://government.ru/news/42723/ (date of access: 14.04.2022).
  2. More details in PG. [Electronic resource]. Access mode: URL: https://www.pnp.ru/politics/chislo-prestupleniy-v-internete-s-nachala-goda-vyroslo-na-50.html (date of access: 20.04.2022).
  3. Shogenov T.M. Terrorism in the context of globalization. Cyberterrorism // Socio-political sciences. 2018. No. 3. S. 181-182.
  4. Unified federal list of organizations, including foreign and international organizations, recognized as terrorist in accordance with the legislation of the Russian Federation. [Electronic resource]. Access mode: URL: http://www.fsb.ru/fsb/npd/terror.htm (date of access: 05/10/2022).
  5. Meta is recognized as an extremist organization. What risks are borne by its shareholders. [Electronic resource]. Access mode: URL: https://quote.rbc.ru/news/article/62397c759a7947b6993f9c7f (date of access: 05/15/2022).
  6. The attack on the gymnasium: a chronicle of events. [Electronic resource]. Access mode: URL: https://www.ntv.ru/cards/4761/ (date of access: 05.05.2022).
  7. The Prosecutor General's Office announced the prevention of 28 terrorist attacks in 2021. [Electronic resource]. Access mode: URL: https://www.interfax.ru/russia/837938 (date of access: 07.05.2022).
  8. The FSB reported on the blocking of more than 50,000 "terrorist" Internet pages. [Electronic resource]. Access mode: URL: https://roskomsvoboda.org/53288/ (date of access: 05/04/2022).
  9. Ministry of Justice of the Russian Federation https://minjust.gov.ru/ru/documents/7822/
  10. Alexander Bortnikov, FSB: anonymous cryptocurrencies are a tool of terrorists. [Electronic resource]. Access mode: URL: https://www.rbc.ru/crypto/news/5da712f69a79472653b7398a (date of access: 05/18/2022).
  11. Decree of the President of the Russian Federation No. 250 dated 01.05.2022 "On additional measures to ensure the information security of the Russian Federation" date of publication 01.05.2022. [Electronic resource]. Access mode: URL: / http://publication.pravo.gov.ru/Document/View/0001202205010023 (date of access: 05/11/2022).

补充文件

附件文件
动作
1. JATS XML
##common.cookie##