по
Journal Menu
> Issues > Rubrics > About journal > Authors > About the Journal > Requirements for publication > Editorial collegium > List of peer reviewers > Review procedure > Policy of publication. Aims & Scope. > Article retraction > Ethics > Legal information
Journals in science databases
About the Journal

Публикация за 72 часа - теперь это реальность!
При необходимости издательство предоставляет авторам услугу сверхсрочной полноценной публикации. Уже через 72 часа статья появляется в числе опубликованных на сайте издательства с DOI и номерами страниц.
По первому требованию предоставляем все подтверждающие публикацию документы!
MAIN PAGE > Back to contents
Using Modern Information and Communication Technology by International Terrorist Organizations
Abazov Kasim Mukhamedovich

Student for Candidate Degree at Peoples' Friendship University of Russia

117198, Russia, g. Moscow, ul. Miklukho-Maklaya, 15, of. korpus 1

abazovkasim07@mail.ru

Abstract.

The subject of the research is information and communication technology that can be used by today's international terrorist organizations for their purposes. The author of the article focuses on the main means that are used by today's terrorist organizations on the Internet: propaganda (including radicalization, recruiting and terrorist instigation), financing (crowdfunding and others) and computer attacks. The authors also analyze the main documents (conventions and resolutions) of the Council of Europe and United Nations Security Council. To analyze the problem, the author has used the systems approach and comparative methods as well as analysis of international law documents. To make conclusions, the author has used the method of synthesis. The scientifiс novelty of the research is caused by the importance of fight against international terrorist organizations for many states and countries. This problem cannot be solved by each country individually, without cooperation and mutual efforts. To solve the problem, the author suggests to create legal mechanisms and sign an international treaty that would contribute to fighting against terrorist organizations in the cyber space. 

Keywords: confrontation, cyberterrorism, Internet, ISIS, Al-Qaida, International terrorist organizations, terrorism, financing, crowdfunding, propaganda

DOI:

10.25136/2409-7543.2018.3.26406

Article was received:

27-05-2018


Review date:

28-05-2018


Publish date:

29-05-2018


This article written in Russian. You can find full text of article in Russian here .

References
1.
Evropol. (Otchet «Terrorizm v ES – tekushchaya situatsiya i tendentsii razvitiya, 2013g.»), 2014g., Gaaga, Niderlandy. – [Elektronnyi resurs] / Rezhim dostupa: www.europol.europa.eu/content/european-union-terrorism-situation-and-trend-report-2015
2.
Konventsiya «O komp'yuternykh prestupleniyakh», Budapesht, Vengriya, 2001g. //Ofitsial'nyi sait Soveta Evropy. – [Elektronnyi resurs] / Rezhim dostupa : https://www.coe.int/ru/web/conventions/full-list/-/conventions/treaty/185
3.
Konventsiya Soveta Evropy «O preduprezhdenii terrorizma», Varshava, Pol'sha, 2005g. // Ofitsial'nyi sait Soveta Evropy. – [Elektronnyi resurs] / Rezhim dostupa: https://www.coe.int/ru/web/conventions/full-list/-/conventions/treaty/196
4.
Organizatsiya islamskoi konferentsii. Komp'yuternaya gruppa reagirovaniya na chrezvychainye situatsii (OIK-CERT). – [ Elektronnyi resurs] / Rezhim dostupa : https://www.oic-cert.org/en/
5.
Ordzhi U. D. Predotvrashchenie kiberterrorizma v global'nom informatsionnom obshchestve: vopros kollektivnoi otvetstvennosti gosudarstv // Zashchita ot terrorizma. – Ankara, 2014. – Izd. 6, № 1. – str. 31 – 46.
6.
Otchet FATF. Novye riski finansirovaniya terrorizma. Oktyabr' 2015. str. – 49.
7.
Rezolyutsiya 1624 (2005) prinyataya Sovetom Bezopasnosti na ego 5261 – m zasedanii14 sentyabrya 2005 goda. «Ugrozy mezhdunarodnomu miru i bezopasnosti». – [Elektronnyi resurs] / Rezhim dostupa: https://documents-dds-ny.un.org/doc/UNDOC/GEN/N05/510/54/PDF/N0551054.pdf?OpenElement
8.
Ruan K. A. Opravdanie terrorizma v Internete: Svoboda slova i zakony o material'noi podderzhke terrorizma. // Otchet issledovatel'skoi sluzhby Kongressa. – Vashington, 2013. – 8 sentyabrya. str. – 16.
9.
Carter, J.A., Maher, S., Neumann, P.R. (2014), Greenbirds: Measuring Importance and Influence in Syrian Foreign Fighter Networks // International Centre for the Study of Radicalisation. (ICSR), London, Great Britain. URL: http://icsr.info/category/publications/
10.
David P. Fidler, “Cyber War Crimes: Islamic State Atrocity Videos and the Laws of War,” Computer Law Review International (2015). URL : https://www.repository.law.indiana.edu/cgi/viewcontent.cgi?article=3608&context=facpub
11.
Earle, Geoff and Jamie Schram. “‘We are Coming’: ISIS Hacks Defense Department,” New York Post, Jan. 12, 2015. URL: http://nypost.com/2015/01/12/we-are-coming-isishacks-defense-department-twitter-account/.
12.
Gwen Ackerman, Facebook Accused in $1 Billion Suit of Being Hamas Tool, BLOOMBERG (Jul. 11, 2016) URL: http://www.bloomberg.com/news/articles/2016-07-11/facebook-sued-for-1b-for-alleged-hamas-use-of-medium-forterror
13.
Harry D. Raduege (Ret.) “Fighting Weapons of Mass Disruption: Why America Needs a ‘Cyber Triad’, in Global Cyber Deterrence: Views from China, U.S., Russia, India, and Norway (Andrew Nagorski, ed., East West Institute, 2010), p. 13.
14.
James A. Lewis, “Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats,” Center for Strategic and International Studies (December 2002). URL : http://csis.org/files/media/csis/pubs/021101_risks_of_cyberterror.pdf.
15.
Jim Garamone, “Panetta Spells Out DOD Roles in Cyberdefense,” U.S. Department of Defense News, October 11, 2012. URL: http://www.defense.gov/news/newsarticle.aspx?id=118187.
16.
Rick Gladstone and Vindu Goel, ISIS Adept on Twitter, Study Finds, N.Y. TIMES (Mar. 5, 2015). URL: http://www.nytimes.com/2015/03/06/world/middleeast/isis-is-skilled-on-twitter-using-thousands-of-accounts-studysays.html?_r=0.
17.
Ruthven, Malise (9 July 2015). "Inside the Islamic State. Review of Islamic State: The Digital Caliphate by Abdel Bari Atwan". URL: http://www.nybooks.com/articles/2015/07/09/inside-islamic-state/
18.
Scott Shane, The Lessons of Anwar al-Awlaki, N.Y. TIMES (Aug. 27, 2015) URL: http://www.nytimes.com/2015/08/30/ magazine/the-lessons-of-anwar-al-awlaki.html
19.
Scheuer, Michael (January 2008). "Bin Laden Identifies Saudi Arabia as the Enemy of Mujahideen Unity". Terrorism Focus. Jamestown Foundation. URL: https://web.archive.org/web/20080118190019/http://jamestown.org:80/terrorism/news/article.php?articleid=2373884
Link to this article

You can simply select and copy link from below text field.


Other our sites:
Official Website of NOTA BENE / Aurora Group s.r.o.
"History Illustrated" Website