Cyberterrorism: criminological characteristics and qualification

 
PIIS102694520024122-5-1
DOI10.31857/S102694520024122-5
Publication type Article
Status Published
Authors
Occupation: Deputy Head of the Department of Counteraction to Extremism and Terrorism
Affiliation: Main Department of Regional Security of the Moscow Region
Address: Russian Federation, Moscow Region, Krasnogorsk
Occupation: Associate Professor of the Department of International Security
Affiliation: Russian State University for the Humanities
Address: Russian Federation, Moscow
Journal nameGosudarstvo i pravo
EditionIssue 1
Pages79-91
Abstract

The article addresses the problem of the problem of cyberterrorist attacks on information resources and information infrastructure. The author gives a criminological description of various types of cyberterrorism and offers options for qualifying crimes of a cyberterrorist nature. Based on foreign experience, various models and main directions of countering cyberterrorism are substantiated.

Keywordscyberterrorism, types of cyberterrorism, information resources, information infrastructure, information technology, cyberspace, cyberattacks, cybersecurity, countering cyberterrorism, models of countering cyberterrorism
Received23.05.2022
Publication date20.02.2023
Number of characters47047
Cite  
100 rub.
When subscribing to an article or issue, the user can download PDF, evaluate the publication or contact the author. Need to register.

Number of purchasers: 0, views: 282

Readers community rating: votes 0

1. Vasenin V.A. Information security and computer terrorism [Electronic resource]. URL: www. crime-research.ru (in Russ.).

2. Gavrilov Yu. V., Smirnov L.V. Modern terrorism: essence, typology, problems of counteraction. M., 2003 (in Russ.).

3. Golubev V.A. Cyberterrorism – a threat to national security [Electronic resource]. URL: www.crime-research.ru (in Russ.).

4. Grishin S.E. The formation of a cybersecurity culture in society is an urgent task of our time // Herald of the Saratov State Socio-Economic University. 2011. No. 4. P. 170–173 (in Russ.).

5. Kapitonova E.A. Features of cyberterrorism as a new kind of terrorist act // News of higher educational institutions. Volga Region. Social sciences. 2015. No. 2. P. 29 - 44 (in Russ.).

6. Kashepov V.P. Retraining of criminal acts when changing the criminal law // Journal of Russian law. 2014. No. 4. P. 8 (in Russ.).

7. Kupriyanov A. India in the era of cyberwar. URL: http://russiancouncil.ru/analytics-and-comments/analytics/indiya-v-epokhu-kibervoyn (in Russ.).

8. Sarkisyan A.J. Criminological characteristics of crimes committed in the field of information and communication technologies // Russ. Investigator. 2019. No. 3. P. 54 - 59 (in Russ.).

9. Solomatina E.S. Prospects for the development of legislation in the field of combating cyberterrorism // Law and Law. 2009. No. 1. P. 47, 48 (in Russ.).

10. Chekunov I.G. Cybercrime: concept and classification // Russ. Investigator. 2012. No. 2. P. 37 - 44 (in Russ.).

11. Chikhachev A. France: Cyber Republic on the march. URL: http://russiancouncil.ru/analytics-and-comments/analytics/frantsiya-kiberrespublika-na-marshe (in Russ.).

12. Sharikov P.A. Evolution of American cybersecurity policy // World economy and international relations. 2019. Vol. 63. No. 10. P. 51–58 (in Russ.).

13. Canetti D., Gross M., Waismel-Manor I. et al. How Cyberattacks Terrorize: Cortisol and Personal Insecurity Jump in the Wake of Cyberattacks // Cyberpsychology, Behavior, and Social Networking. 2017. Vol. 20. No. 2. Р. 72 - 77.

14. Charlton C. Armchar warriors. Terrifying new generation of ‘cybernative’ ISIS terrorists could target ‘Facebook and West’s energy grids’ in a bid to cause mass panic and mayhem [Electronic resource]. - Access mode: URL: https://www.thesun.co.uk/news/2643688/cyber-terrorism-attacks-threat-level-isis-facebook-energy (accessed: 25.12.2021).

15. Choi J. 8 in 10 say cyberterrorism is top potential threat: Gallup [Electronic resource]. – Access mode: URL: https://thehill.com/policy/cybersecurity/544274-8-in-10-say-cyberterrorism-is-top-potential-threat-gallup (accessed: 25.12.2021).

16. Cyberterrorism / National Conference of State Legislatures [Electronic resource]. – Access mode: URL: http://www.ncsl.org/programs/lis/CIP/cyberterrorism.htm (accessed: 12.04.2022).

17. Fowler M. Cyber terrorism: Sci-Fi fantasy or legitimate threat? [Electronic resource]. - Access mode: URL: https://thehill.com/opinion/cybersecurity/578868-cyber-terrorism-sci-fi-fantasy-or-legitimate-threat (accessed: 24.12.2021).

18. Holt T.J., Bossler A.M., Seigfried-Spellar K.C. Cybercrime and digital forensics. NY, 2017.

19. Keren L.G. Snider, Ryan Shandler, Shay Zandani, Daphna Canetti. Cyberattacks, cyber threats, and attitudestoward cybersecurity policies // Journal of Cybersecurity. 2021. Vol. 7. Issue 1.

20. “Killing Lists” – The Evolution of Cyber Terrorism? [Electronic resource]. – Access mode: URL: https://www.ict.org.il/Article/1793/killing-lists-the-evolution-of-cyber-terrorism#gsc.tab=0 (accessed: 25.12.2021).

21. Ozeren S. Global Response to Cyberterrorism and Cybercrime: A Matrix for International Cooperation and Vulnerability Assessment: Dissertation Prepared for the Degree of Doctor of Philosophy. University of North Texas, 2005. P. 7.

22. Responses to Cyber Terrorism / NATO Science for Peace and Security Series / Centre of Excellence Defence Against Terrorism, Ankara, Turkey. 2008.

23. Taylor R.W., Caeti T.J., Loper D.K. et al. Digital Crime and Digital Terrorism. Pearson / Prentice Hall, 2006. P. 20.

24. Tesauro L. The Role Al Qaeda Plays in Cyberterrorism [Electronic resource]. – Access mode: URL: https://smallwarsjournal.com/jrnl/art/role-al-qaeda-plays-cyberterrorism (accessed: 25.12.2021).

25. Saurabh Ranjan Srivastava and Sachin Dube. Cyberattacks, Cybercrime and Cyberterrorism // Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications // Information Resources Management Association (USA). 2020. Р. 931 - 963.

26. Wilson C. Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress, CRS Report RJ32114 (Washington, D.C.: Library of Congress, Congressional Research Service, 17 October 2003). P. 4.

Система Orphus

Loading...
Up