Skip to main content

Mechanisms of Countering the Dissemination of Extremist Materials on the Internet

  • Chapter
  • First Online:
Big Data-driven World: Legislation Issues and Control Technologies

Part of the book series: Studies in Systems, Decision and Control ((SSDC,volume 181))

Abstract

The security of society in connection with the increasing global informatization is changing in different directions and ambiguously: increasing in some aspects, it is significantly reduced in others. In particular, since the 1990s the active use of the Internet information network by terrorist and extremist organizations represents a real threat for many countries of the world, including the Russian Federation. The main methods of using the capabilities of information networks in extremist and terrorist activities are the promotion of this activity, the recruitment of new participants, and the communication of participants in this activity. The actualization of the problems of countering the use of information networks in extremist and terrorist activities led to the adoption in 2013–2014 a number of federal laws that significantly improve state control over the use of the Internet and promptly suppress its use for extremist and terrorist activities. The main practical problems are lack of special information and analytical support and a shortage of police officers with special knowledge and skills in information networks. First of all, it is necessary to implement automated systems for searching and monitoring sites on the Internet, the development of which is actively engaged in Roskomnadzor.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Whine, M.: Cyberspace-a new medium for communication, command, and control by extremists. Stud. Confl. Terrorism 22(3), 231–246 (1999)

    Article  Google Scholar 

  2. Chen, H.: Exploring Extremism and Terrorism on the Web: The Dark Web Project Pacific-Asia Workshop on Intelligence and Security Informatics. Intelligence and Security Informatics, pp. 1–20 (2007)

    Google Scholar 

  3. Denning, D.: Terror’s web: how the internet is transforming terrorism In: M. Yar, & Y. Jewekes (Eds.), Handbook of Internet Crime, Willan Publishers, pp. 194–212 (2010)

    Google Scholar 

  4. Awan, I.: Debating the meaning of cyber terrorism: issues and problems Internet journal of criminology, pp. 1–10 (2013)

    Google Scholar 

  5. Klausen, J.: Tweeting the Jihad: social media networks of western foreign fighters in Syria and Iraq. Stud. Confl. Terrorism 38, 1–22 (2015)

    Article  Google Scholar 

  6. Awan, I.: Cyber-extremism: Isis and the power of social media society, April, 54(2), 138–149. https://link.springer.com/article/10.1007/s12115-017-0114-0 (2017). Accessed 1 Jul 2018

    Article  Google Scholar 

  7. Weimann, G.: How Modern Terrorism Uses the Internet. Special Report 116. http://www.usip.org/sites/default/files/sr116.pdf (2004). Accessed 1 Jul 2018

  8. Borisov, S.V., Vasnetsova, A.S., Zhafyarov, A.G.: On the issue of countering cyber terrorism and cyber extremism. Bulletin of the Academy of the General Prosecutor’s Office of the Russian Federation. 1, 52 https://elibrary.ru/download/elibrary_24902312_82681100.pdf (2015). Accessed 1 Jul 2018

  9. Myyrmanni bombing. https://fi.wikipedia.org/wiki/Myyrmannin_räjähdys (2018). Accessed 1 Jul 2018

  10. Scanlon, J.R., Gerber, M.S.: Automatic detection of cyber-recruitment by violent extremists. Security Informatics. https://link.springer.com/article/10.1186/s13388-014-0005-5 (2014). Accessed 1 Jul 2018

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vladimir Gaponenko .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Latov, Y., Grishchenko, L., Gaponenko, V., Vasiliev, F. (2019). Mechanisms of Countering the Dissemination of Extremist Materials on the Internet. In: Kravets, A. (eds) Big Data-driven World: Legislation Issues and Control Technologies. Studies in Systems, Decision and Control, vol 181. Springer, Cham. https://doi.org/10.1007/978-3-030-01358-5_14

Download citation

Publish with us

Policies and ethics