Рус Eng During last 365 days Approved articles: 2002,   Articles in work: 345 Declined articles: 795 
Library
Articles and journals | Tariffs | Payments | Your profile

Back to contents

Using Modern Information and Communication Technology by International Terrorist Organizations
Abazov Kasim Mukhamedovich

Student for Candidate Degree at Peoples' Friendship University of Russia

117198, Russia, g. Moscow, ul. Miklukho-Maklaya, 15, of. korpus 1

abazovkasim07@mail.ru

Abstract.

The subject of the research is information and communication technology that can be used by today's international terrorist organizations for their purposes. The author of the article focuses on the main means that are used by today's terrorist organizations on the Internet: propaganda (including radicalization, recruiting and terrorist instigation), financing (crowdfunding and others) and computer attacks. The authors also analyze the main documents (conventions and resolutions) of the Council of Europe and United Nations Security Council. To analyze the problem, the author has used the systems approach and comparative methods as well as analysis of international law documents. To make conclusions, the author has used the method of synthesis. The scientifiс novelty of the research is caused by the importance of fight against international terrorist organizations for many states and countries. This problem cannot be solved by each country individually, without cooperation and mutual efforts. To solve the problem, the author suggests to create legal mechanisms and sign an international treaty that would contribute to fighting against terrorist organizations in the cyber space. 

Keywords: confrontation, cyberterrorism, Internet, ISIS, Al-Qaida, International terrorist organizations, terrorism, financing, crowdfunding, propaganda

DOI:

10.25136/2409-7543.2018.3.26406

Article was received:

27-05-2018


Review date:

28-05-2018


Publish date:

29-05-2018


This article written in Russian. You can find full text of article in Russian here .

References
1.
Evropol. (Otchet «Terrorizm v ES – tekushchaya situatsiya i tendentsii razvitiya, 2013g.»), 2014g., Gaaga, Niderlandy. – [Elektronnyi resurs] / Rezhim dostupa: www.europol.europa.eu/content/european-union-terrorism-situation-and-trend-report-2015
2.
Konventsiya «O komp'yuternykh prestupleniyakh», Budapesht, Vengriya, 2001g. //Ofitsial'nyi sait Soveta Evropy. – [Elektronnyi resurs] / Rezhim dostupa : https://www.coe.int/ru/web/conventions/full-list/-/conventions/treaty/185
3.
Konventsiya Soveta Evropy «O preduprezhdenii terrorizma», Varshava, Pol'sha, 2005g. // Ofitsial'nyi sait Soveta Evropy. – [Elektronnyi resurs] / Rezhim dostupa: https://www.coe.int/ru/web/conventions/full-list/-/conventions/treaty/196
4.
Organizatsiya islamskoi konferentsii. Komp'yuternaya gruppa reagirovaniya na chrezvychainye situatsii (OIK-CERT). – [ Elektronnyi resurs] / Rezhim dostupa : https://www.oic-cert.org/en/
5.
Ordzhi U. D. Predotvrashchenie kiberterrorizma v global'nom informatsionnom obshchestve: vopros kollektivnoi otvetstvennosti gosudarstv // Zashchita ot terrorizma. – Ankara, 2014. – Izd. 6, № 1. – str. 31 – 46.
6.
Otchet FATF. Novye riski finansirovaniya terrorizma. Oktyabr' 2015. str. – 49.
7.
Rezolyutsiya 1624 (2005) prinyataya Sovetom Bezopasnosti na ego 5261 – m zasedanii14 sentyabrya 2005 goda. «Ugrozy mezhdunarodnomu miru i bezopasnosti». – [Elektronnyi resurs] / Rezhim dostupa: https://documents-dds-ny.un.org/doc/UNDOC/GEN/N05/510/54/PDF/N0551054.pdf?OpenElement
8.
Ruan K. A. Opravdanie terrorizma v Internete: Svoboda slova i zakony o material'noi podderzhke terrorizma. // Otchet issledovatel'skoi sluzhby Kongressa. – Vashington, 2013. – 8 sentyabrya. str. – 16.
9.
Carter, J.A., Maher, S., Neumann, P.R. (2014), Greenbirds: Measuring Importance and Influence in Syrian Foreign Fighter Networks // International Centre for the Study of Radicalisation. (ICSR), London, Great Britain. URL: http://icsr.info/category/publications/
10.
David P. Fidler, “Cyber War Crimes: Islamic State Atrocity Videos and the Laws of War,” Computer Law Review International (2015). URL : https://www.repository.law.indiana.edu/cgi/viewcontent.cgi?article=3608&context=facpub
11.
Earle, Geoff and Jamie Schram. “‘We are Coming’: ISIS Hacks Defense Department,” New York Post, Jan. 12, 2015. URL: http://nypost.com/2015/01/12/we-are-coming-isishacks-defense-department-twitter-account/.
12.
Gwen Ackerman, Facebook Accused in $1 Billion Suit of Being Hamas Tool, BLOOMBERG (Jul. 11, 2016) URL: http://www.bloomberg.com/news/articles/2016-07-11/facebook-sued-for-1b-for-alleged-hamas-use-of-medium-forterror
13.
Harry D. Raduege (Ret.) “Fighting Weapons of Mass Disruption: Why America Needs a ‘Cyber Triad’, in Global Cyber Deterrence: Views from China, U.S., Russia, India, and Norway (Andrew Nagorski, ed., East West Institute, 2010), p. 13.
14.
James A. Lewis, “Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats,” Center for Strategic and International Studies (December 2002). URL : http://csis.org/files/media/csis/pubs/021101_risks_of_cyberterror.pdf.
15.
Jim Garamone, “Panetta Spells Out DOD Roles in Cyberdefense,” U.S. Department of Defense News, October 11, 2012. URL: http://www.defense.gov/news/newsarticle.aspx?id=118187.
16.
Rick Gladstone and Vindu Goel, ISIS Adept on Twitter, Study Finds, N.Y. TIMES (Mar. 5, 2015). URL: http://www.nytimes.com/2015/03/06/world/middleeast/isis-is-skilled-on-twitter-using-thousands-of-accounts-studysays.html?_r=0.
17.
Ruthven, Malise (9 July 2015). "Inside the Islamic State. Review of Islamic State: The Digital Caliphate by Abdel Bari Atwan". URL: http://www.nybooks.com/articles/2015/07/09/inside-islamic-state/
18.
Scott Shane, The Lessons of Anwar al-Awlaki, N.Y. TIMES (Aug. 27, 2015) URL: http://www.nytimes.com/2015/08/30/ magazine/the-lessons-of-anwar-al-awlaki.html
19.
Scheuer, Michael (January 2008). "Bin Laden Identifies Saudi Arabia as the Enemy of Mujahideen Unity". Terrorism Focus. Jamestown Foundation. URL: https://web.archive.org/web/20080118190019/http://jamestown.org:80/terrorism/news/article.php?articleid=2373884