Abstract
The security of society in connection with the increasing global informatization is changing in different directions and ambiguously: increasing in some aspects, it is significantly reduced in others. In particular, since the 1990s the active use of the Internet information network by terrorist and extremist organizations represents a real threat for many countries of the world, including the Russian Federation. The main methods of using the capabilities of information networks in extremist and terrorist activities are the promotion of this activity, the recruitment of new participants, and the communication of participants in this activity. The actualization of the problems of countering the use of information networks in extremist and terrorist activities led to the adoption in 2013–2014 a number of federal laws that significantly improve state control over the use of the Internet and promptly suppress its use for extremist and terrorist activities. The main practical problems are lack of special information and analytical support and a shortage of police officers with special knowledge and skills in information networks. First of all, it is necessary to implement automated systems for searching and monitoring sites on the Internet, the development of which is actively engaged in Roskomnadzor.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Whine, M.: Cyberspace-a new medium for communication, command, and control by extremists. Stud. Confl. Terrorism 22(3), 231–246 (1999)
Chen, H.: Exploring Extremism and Terrorism on the Web: The Dark Web Project Pacific-Asia Workshop on Intelligence and Security Informatics. Intelligence and Security Informatics, pp. 1–20 (2007)
Denning, D.: Terror’s web: how the internet is transforming terrorism In: M. Yar, & Y. Jewekes (Eds.), Handbook of Internet Crime, Willan Publishers, pp. 194–212 (2010)
Awan, I.: Debating the meaning of cyber terrorism: issues and problems Internet journal of criminology, pp. 1–10 (2013)
Klausen, J.: Tweeting the Jihad: social media networks of western foreign fighters in Syria and Iraq. Stud. Confl. Terrorism 38, 1–22 (2015)
Awan, I.: Cyber-extremism: Isis and the power of social media society, April, 54(2), 138–149. https://link.springer.com/article/10.1007/s12115-017-0114-0 (2017). Accessed 1 Jul 2018
Weimann, G.: How Modern Terrorism Uses the Internet. Special Report 116. http://www.usip.org/sites/default/files/sr116.pdf (2004). Accessed 1 Jul 2018
Borisov, S.V., Vasnetsova, A.S., Zhafyarov, A.G.: On the issue of countering cyber terrorism and cyber extremism. Bulletin of the Academy of the General Prosecutor’s Office of the Russian Federation. 1, 52 https://elibrary.ru/download/elibrary_24902312_82681100.pdf (2015). Accessed 1 Jul 2018
Myyrmanni bombing. https://fi.wikipedia.org/wiki/Myyrmannin_räjähdys (2018). Accessed 1 Jul 2018
Scanlon, J.R., Gerber, M.S.: Automatic detection of cyber-recruitment by violent extremists. Security Informatics. https://link.springer.com/article/10.1186/s13388-014-0005-5 (2014). Accessed 1 Jul 2018
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Latov, Y., Grishchenko, L., Gaponenko, V., Vasiliev, F. (2019). Mechanisms of Countering the Dissemination of Extremist Materials on the Internet. In: Kravets, A. (eds) Big Data-driven World: Legislation Issues and Control Technologies. Studies in Systems, Decision and Control, vol 181. Springer, Cham. https://doi.org/10.1007/978-3-030-01358-5_14
Download citation
DOI: https://doi.org/10.1007/978-3-030-01358-5_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-01357-8
Online ISBN: 978-3-030-01358-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)