Cyberterrorism: criminological characteristics and qualification

Cover Page

Full Text

Open Access Open Access
Restricted Access Access granted
Restricted Access Subscription Access

Abstract

The article addresses the problem of the problem of cyberterrorist attacks on information resources and information infrastructure. The author gives a criminological description of various types of cyberterrorism and offers options for qualifying crimes of a cyberterrorist nature. Based on foreign experience, various models and main directions of countering cyberterrorism are substantiated.

Full Text

Restricted Access

About the authors

Vladislav V. Krasinsky

Main Department of Regional Security of the Moscow Region

Email: krasinskijvv@fedsfm.ru
Russian Federation, Moscow Region, Krasnogorsk

Vladislav Valer'evich Mashko

Russian State University for the Humanities

Author for correspondence.
Email: kmbiai@yandex.ru
Russian Federation, Moscow

References

  1. Vasenin V.A. Information security and computer terrorism [Electronic resource]. URL: www. crime-research.ru (in Russ.).
  2. Gavrilov Yu. V., Smirnov L.V. Modern terrorism: essence, typology, problems of counteraction. M., 2003 (in Russ.).
  3. Golubev V.A. Cyberterrorism – a threat to national security [Electronic resource]. URL: www.crime-research.ru (in Russ.).
  4. Grishin S.E. The formation of a cybersecurity culture in society is an urgent task of our time // Herald of the Saratov State Socio-Economic University. 2011. No. 4. P. 170–173 (in Russ.).
  5. Kapitonova E.A. Features of cyberterrorism as a new kind of terrorist act // News of higher educational institutions. Volga Region. Social sciences. 2015. No. 2. P. 29 - 44 (in Russ.).
  6. Kashepov V.P. Retraining of criminal acts when changing the criminal law // Journal of Russian law. 2014. No. 4. P. 8 (in Russ.).
  7. Kupriyanov A. India in the era of cyberwar. URL: http://russiancouncil.ru/analytics-and-comments/analytics/indiya-v-epokhu-kibervoyn (in Russ.).
  8. Sarkisyan A.J. Criminological characteristics of crimes committed in the field of information and communication technologies // Russ. Investigator. 2019. No. 3. P. 54 - 59 (in Russ.).
  9. Solomatina E.S. Prospects for the development of legislation in the field of combating cyberterrorism // Law and Law. 2009. No. 1. P. 47, 48 (in Russ.).
  10. Chekunov I.G. Cybercrime: concept and classification // Russ. Investigator. 2012. No. 2. P. 37 - 44 (in Russ.).
  11. Chikhachev A. France: Cyber Republic on the march. URL: http://russiancouncil.ru/analytics-and-comments/analytics/frantsiya-kiberrespublika-na-marshe (in Russ.).
  12. Sharikov P.A. Evolution of American cybersecurity policy // World economy and international relations. 2019. Vol. 63. No. 10. P. 51–58 (in Russ.).
  13. Canetti D., Gross M., Waismel-Manor I. et al. How Cyberattacks Terrorize: Cortisol and Personal Insecurity Jump in the Wake of Cyberattacks // Cyberpsychology, Behavior, and Social Networking. 2017. Vol. 20. No. 2. Р. 72 - 77.
  14. Charlton C. Armchar warriors. Terrifying new generation of ‘cybernative’ ISIS terrorists could target ‘Facebook and West’s energy grids’ in a bid to cause mass panic and mayhem [Electronic resource]. - Access mode: URL: https://www.thesun.co.uk/news/2643688/cyber-terrorism-attacks-threat-level-isis-facebook-energy (accessed: 25.12.2021).
  15. Choi J. 8 in 10 say cyberterrorism is top potential threat: Gallup [Electronic resource]. – Access mode: URL: https://thehill.com/policy/cybersecurity/544274-8-in-10-say-cyberterrorism-is-top-potential-threat-gallup (accessed: 25.12.2021).
  16. Cyberterrorism / National Conference of State Legislatures [Electronic resource]. – Access mode: URL: http://www.ncsl.org/programs/lis/CIP/cyberterrorism.htm (accessed: 12.04.2022).
  17. Fowler M. Cyber terrorism: Sci-Fi fantasy or legitimate threat? [Electronic resource]. - Access mode: URL: https://thehill.com/opinion/cybersecurity/578868-cyber-terrorism-sci-fi-fantasy-or-legitimate-threat (accessed: 24.12.2021).
  18. Holt T.J., Bossler A.M., Seigfried-Spellar K.C. Cybercrime and digital forensics. NY, 2017.
  19. Keren L.G. Snider, Ryan Shandler, Shay Zandani, Daphna Canetti. Cyberattacks, cyber threats, and attitudestoward cybersecurity policies // Journal of Cybersecurity. 2021. Vol. 7. Issue 1.
  20. “Killing Lists” – The Evolution of Cyber Terrorism? [Electronic resource]. – Access mode: URL: https://www.ict.org.il/Article/1793/killing-lists-the-evolution-of-cyber-terrorism#gsc.tab=0 (accessed: 25.12.2021).
  21. Ozeren S. Global Response to Cyberterrorism and Cybercrime: A Matrix for International Cooperation and Vulnerability Assessment: Dissertation Prepared for the Degree of Doctor of Philosophy. University of North Texas, 2005. P. 7.
  22. Responses to Cyber Terrorism / NATO Science for Peace and Security Series / Centre of Excellence Defence Against Terrorism, Ankara, Turkey. 2008.
  23. Taylor R.W., Caeti T.J., Loper D.K. et al. Digital Crime and Digital Terrorism. Pearson / Prentice Hall, 2006. P. 20.
  24. Tesauro L. The Role Al Qaeda Plays in Cyberterrorism [Electronic resource]. – Access mode: URL: https://smallwarsjournal.com/jrnl/art/role-al-qaeda-plays-cyberterrorism (accessed: 25.12.2021).
  25. Saurabh Ranjan Srivastava and Sachin Dube. Cyberattacks, Cybercrime and Cyberterrorism // Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications // Information Resources Management Association (USA). 2020. Р. 931 - 963.
  26. Wilson C. Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress, CRS Report RJ32114 (Washington, D.C.: Library of Congress, Congressional Research Service, 17 October 2003). P. 4.

Copyright (c) 2023 Russian Academy of Sciences

This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies