COMPUTER TECHNOLOGIES FOR COMMITTING SABOTAGE AND TERRORISM

Cover Page

Abstract


The article discusses the problems that arise in connection with the crimes against state and public security committed by use of computer and network technologies. This topic is becoming relevant because some states have already experienced the effects of “combat” computer viruses, which can be regarded as waging war using cyber weapons. The most famous example is the attack by the Stuxnet computer virus on an Iranian uranium enrichment plant. The virus was created specifically to disable industrial control systems. The use of unmanned ground and air vehicles to carry out terrorist acts is of particular danger. The Russian military in Syria is constantly confronted with terrorist attacks: the Khmeimim aerospace forces base is regularly attacked with unmanned air vehicles - drones. Terrorist acts with the use of computer and network technologies are no less dangerous. The destructive potential of cyberterrorism is determined by the widespread computerization of state and public life, the implementation of projects to create smart cities, including smart transportation, as well as the intensive development of the Internet of things. The purpose of the article is to analyze new criminal threats to state and public security, as well as to study high-tech ways of committing crimes such as sabotage, terrorist acts, and other crimes of a terrorist nature. The cost of their consequences for society is very high, and criminals do not always need to attack social objects directly - it is enough to spread panic among the population using online media, social networks and websites of authorities of various levels, after obtaining illegal access to them. The article describes some of the techniques already used to commit crimes of sabotage and terrorism. The authors draw attention to the priority of cybersecurity both for engineers of devices with elements of artificial intelligence, and for lawmakers who should pay attention to methods of technical forecasting when developing legal norms aimed at prevention of new ways of committing such crimes. When writing the article, the authors used a wide range of Russian and foreign sources of legal, statistical, sociological and other information. The authors used such research methods as analysis, synthesis, deduction, induction, formal legal method as well as comparative legal method.


About the authors

Lev R. Klebanov

Peoples' Friendship University of Russia (RUDN University)

Author for correspondence.
Email: solomon70@bk.ru
6 Miklukho-Maklaya str., 117198, Moscow, Russian Federation

Doctor of Legal Sciences, Associate Professor, Professor of the Department of Criminal Law, Criminal Procedure and Criminalistics, Law Institute

Svetlana V. Polubinskaya

Institute of State and Law of Russian Academy of Sciences

Email: svepol@yandex.ru
10 Znamenka str., 119019, Moscow, Russian Federation

Candidate of Legal Sciences, Associate Professor, Leading Researcher in the Criminal Law, Criminal Procedure and Criminology Sector

References

  1. Antonovich, P.I. (2011) O sovremennom ponimanii termina “kibervoina” [About modern concept of “cyberwar” term]. Vestnik Akademii voennych nauk. 2 (35), 89–96. (in Russian).
  2. Brenner, S. (2007) “At Light Speed”: Attribution and Response to Cybercrime/Terrorism/Warfare. The Journal of Criminal Law and Criminology. 97(2), 379–386.
  3. Charvat, J. (2018) Cyber Terrorism: A New Dimension in Battlespace. 5th October, available at:https://ccdcoe.org/uploads/2018/10/05_CHARVAT_Cyber-Terrorism.pdf (Accessed 14 November 2019).
  4. Falliere, N., Murchu, L. O., Chien, E. (2011) W32.Stuxnet Dossier. Version 1.4 (February), 1, available at: https://www.wired.com/images_blogs/threatlevel/2011/02/Symantec-StuxnetUpdate-Feb-2011.pdf (Accessed 11 November 2019).
  5. Giraldi, P. (2019) Revisiting Stuxnet: The Israeli-American Computer Virus that Started CyberWarfare. Global Research. September 9, available at: https://www.globalresearch.ca/ stuxnet-israeli-american-computer-virus-cyber-warfare/5688506 (Accessed 14 November 2019).
  6. Glancy, D.J. (2014) Sharing the Road: Smart Transportation Infrastructure. Fordham Urban Law Journal. 41 (5), 1617–1664.
  7. Glebov, I.N. (2018) Mezhdunarodnoe gumanitarnoe pravo i kibervoina [International humanitarian law and cyberwar]. Rossiskoe gosudarstvovedenie. 2, 137–153. (in Russian).
  8. Glebov, I.N. (2018) Pravovoe regulirovanie avtonomnych robotizirovannych sredstv vedenia voiny [Legal regulation of autonomous robot war tools]. Rossiskoe gosudarstvovedenie. 3, 104–116. (in Russian).
  9. Hathaway, O.A., Crootof, R., Levitz, P., Nix, H., Nowlan, A., Perdue, W., Spiegel, J. (2012) The Law of Cyber-Attack. California Law Review. 100 (4), 817–886.
  10. Kushner, D. (2013) The Real Story of Stuxnet. IEEE Spectrum. February 26, available at: https://spectrum.ieee.org/telecom/security/the-real-story-of-stuxnet (Accessed 11 November 2019).
  11. Langner, R. (2013) To Kill a Centrifuge. A Technical Analysis of What Stuxnet’s Creators Tried to Achive. The Langner Group. November, available at: https://www.langner.com/wpcontent/uploads/2017/03/to-kill-a-centrifuge.pdf (Accessed 11 November 2019).
  12. Lee, C. (2017) Grabbing the Wheel Early: Moving Forward on Cybersecurity and Privacy Protections for Driverless Cars. Federal Communications Law Journal. 69(1), 25–52.
  13. Ovcharov, A.V., Kozlov, A.V. (2019) The use of lethal Autonomous systems weapons require criminal law regulations. Voennoe pravo [Military Law]. 5(57), 179–187. (in Russian).
  14. Ovchinskii, V.S. (2017) Osnovy bor'by s kiberprestupnost'yu i kiberterrorizmom: khrestomatiya [Fundamentals of the fight against cybercrime and cyber terrorism: a reader]. Compiled by. V.S. Ovchinsky. Moscow, Norma Publ. (in Russian).
  15. Sheremet, I.B., Rudianov, N.A., Ryabov, A.V., Khruschev, V.S., (2016) About need of the concepts development of construction and application of military autonomous robotic systems. Extreme Robotics. 1(1), 35–39. (in Russian).
  16. Shinkaretskaya, G.G. (2013) Mezhdunarodno-pravovye problemy vrazhdebnogo vozdeistvia na informacionnye sistemy [International law problems of enemy influence on information systems]. Gosudarstvo i pravo [State and Law]. 9, 82–88. (in Russian).
  17. Spencer, D. (2018) The Road to the Future: A Regulatory Regime for the Rise of the Robot Cars.William & Mary Environmental Law and Policy Review. 42 (2), 647–671.
  18. Wing, C. (2016) Better Keep Your Hands on the Wheel in That Autonomous Car: Examining Society's Need to Navigate the Cybersecurity Roadblocks for Intelligent Vehicles. Hofstra Law Review. 45 (2), 707–742.

Statistics

Views

Abstract - 216

PDF (Russian) - 94

Cited-By


PlumX

Dimensions

Refbacks

  • There are currently no refbacks.

Copyright (c) 2020 Klebanov L.R., Polubinskaya S.V.

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies