<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE root>
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:ali="http://www.niso.org/schemas/ali/1.0/" article-type="research-article" dtd-version="1.2" xml:lang="en"><front><journal-meta><journal-id journal-id-type="publisher-id">RUDN Journal of Law</journal-id><journal-title-group><journal-title xml:lang="en">RUDN Journal of Law</journal-title><trans-title-group xml:lang="ru"><trans-title>Вестник Российского университета дружбы народов. Серия: Юридические науки</trans-title></trans-title-group></journal-title-group><issn publication-format="print">2313-2337</issn><issn publication-format="electronic">2408-9001</issn><publisher><publisher-name xml:lang="en">Peoples’ Friendship University of Russia named after Patrice Lumumba (RUDN University)</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">24569</article-id><article-id pub-id-type="doi">10.22363/2313-2337-2020-24-3-717-734</article-id><article-categories><subj-group subj-group-type="toc-heading" xml:lang="en"><subject>CRIMINAL LAW AND CRIMINOLOGY</subject></subj-group><subj-group subj-group-type="toc-heading" xml:lang="ru"><subject>УГОЛОВНОЕ ПРАВО И КРИМИНОЛОГИЯ</subject></subj-group><subj-group subj-group-type="article-type"><subject>Research Article</subject></subj-group></article-categories><title-group><article-title xml:lang="en">COMPUTER TECHNOLOGIES FOR COMMITTING SABOTAGE AND TERRORISM</article-title><trans-title-group xml:lang="ru"><trans-title>КОМПЬЮТЕРНЫЕ ТЕХНОЛОГИИ В СОВЕРШЕНИИ ПРЕСТУПЛЕНИЙ ДИВЕРСИОННОЙ И ТЕРРОРИСТИЧЕСКОЙ НАПРАВЛЕННОСТИ</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="en"><surname>Klebanov</surname><given-names>Lev R.</given-names></name><name xml:lang="ru"><surname>Клебанов</surname><given-names>Лев Романович</given-names></name></name-alternatives><bio xml:lang="en"><p>Doctor of Legal Sciences, Associate Professor, Professor of the Department of Criminal Law, Criminal Procedure and Criminalistics, Law Institute</p></bio><bio xml:lang="ru"><p>доктор юридических наук, доцент, профессор кафедры уголовного права, уголовного процесса и криминалистики, Юридический институт</p></bio><email>solomon70@bk.ru</email><xref ref-type="aff" rid="aff1"/></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="en"><surname>Polubinskaya</surname><given-names>Svetlana V.</given-names></name><name xml:lang="ru"><surname>Полубинская</surname><given-names>Светлана Вениаминовна</given-names></name></name-alternatives><bio xml:lang="en"><p>Candidate of Legal Sciences, Associate Professor, Leading Researcher in the Criminal Law, Criminal Procedure and Criminology Sector</p></bio><bio xml:lang="ru"><p>кандидат юридических наук, доцент, ведущий научный сотрудник сектора уголовного права, уголовного процесса и криминологии</p></bio><email>svepol@yandex.ru</email><xref ref-type="aff" rid="aff2"/></contrib></contrib-group><aff-alternatives id="aff1"><aff><institution xml:lang="en">Peoples' Friendship University of Russia (RUDN University)</institution></aff><aff><institution xml:lang="ru">Российский университет дружбы народов</institution></aff></aff-alternatives><aff-alternatives id="aff2"><aff><institution xml:lang="en">Institute of State and Law of Russian Academy of Sciences</institution></aff><aff><institution xml:lang="ru">Институт государства и права РАН (ИГП РАН)</institution></aff></aff-alternatives><pub-date date-type="pub" iso-8601-date="2020-12-15" publication-format="electronic"><day>15</day><month>12</month><year>2020</year></pub-date><volume>24</volume><issue>3</issue><issue-title xml:lang="en">VOL 24, NO3 (2020)</issue-title><issue-title xml:lang="ru">ТОМ 24, №3 (2020)</issue-title><fpage>717</fpage><lpage>734</lpage><history><date date-type="received" iso-8601-date="2020-09-14"><day>14</day><month>09</month><year>2020</year></date></history><permissions><copyright-statement xml:lang="en">Copyright ©; 2020, Klebanov L.R., Polubinskaya S.V.</copyright-statement><copyright-statement xml:lang="ru">Copyright ©; 2020, Клебанов Л.Р., Полубинская С.В.</copyright-statement><copyright-year>2020</copyright-year><copyright-holder xml:lang="en">Klebanov L.R., Polubinskaya S.V.</copyright-holder><copyright-holder xml:lang="ru">Клебанов Л.Р., Полубинская С.В.</copyright-holder><ali:free_to_read xmlns:ali="http://www.niso.org/schemas/ali/1.0/"/><license><ali:license_ref xmlns:ali="http://www.niso.org/schemas/ali/1.0/">http://creativecommons.org/licenses/by/4.0</ali:license_ref></license></permissions><self-uri xlink:href="https://journals.rudn.ru/law/article/view/24569">https://journals.rudn.ru/law/article/view/24569</self-uri><abstract xml:lang="en"><p>The article discusses the problems that arise in connection with the crimes against state and public security committed by use of computer and network technologies. This topic is becoming relevant because some states have already experienced the effects of “combat” computer viruses, which can be regarded as waging war using cyber weapons. The most famous example is the attack by the Stuxnet computer virus on an Iranian uranium enrichment plant. The virus was created specifically to disable industrial control systems. The use of unmanned ground and air vehicles to carry out terrorist acts is of particular danger. The Russian military in Syria is constantly confronted with terrorist attacks: the Khmeimim aerospace forces base is regularly attacked with unmanned air vehicles - drones. Terrorist acts with the use of computer and network technologies are no less dangerous. The destructive potential of cyberterrorism is determined by the widespread computerization of state and public life, the implementation of projects to create smart cities, including smart transportation, as well as the intensive development of the Internet of things. The purpose of the article is to analyze new criminal threats to state and public security, as well as to study high-tech ways of committing crimes such as sabotage, terrorist acts, and other crimes of a terrorist nature. The cost of their consequences for society is very high, and criminals do not always need to attack social objects directly - it is enough to spread panic among the population using online media, social networks and websites of authorities of various levels, after obtaining illegal access to them. The article describes some of the techniques already used to commit crimes of sabotage and terrorism. The authors draw attention to the priority of cybersecurity both for engineers of devices with elements of artificial intelligence, and for lawmakers who should pay attention to methods of technical forecasting when developing legal norms aimed at prevention of new ways of committing such crimes. When writing the article, the authors used a wide range of Russian and foreign sources of legal, statistical, sociological and other information. The authors used such research methods as analysis, synthesis, deduction, induction, formal legal method as well as comparative legal method.</p></abstract><trans-abstract xml:lang="ru"><p>В статье рассматриваются проблемы, возникающие в связи с совершением преступлений против государственной и общественной безопасности с использованием компьютерных и сетевых технологий. Эта тема приобретает актуальность в условиях, когда некоторые государства уже испытали на себя действие «боевых» компьютерных вирусов, что может расцениваться как ведение войны с использованием кибероружия. Наиболее известный пример - атака компьютерного вируса Stuxnet на иранский завод, осуществляющий обогащение урана. Вирус был создан специально для выведения из строя промышленных систем управления. Особую опасность представляет использование средств беспилотного наземного и воздушного транспорта для совершения террористических актов. С атаками террористов постоянно сталкиваются российские военные в Сирии: база Воздушно-космических сил в Хмеймим регулярно подвергается нападениям с использованием беспилотных летательных аппаратов - дронов. Не меньшие угрозы несет и совершение террористических актов с помощью компьютерных и сетевых технологий. Разрушительный потенциал кибертерроризма обусловливается повсеместной компьютеризацией государственной и общественной жизни, реализацией проектов по созданию «умных» городов, включая технологии «умного» транспорта, а также интенсивным развитием Интернета вещей. Целью статьи является анализ новых криминальных угроз государственной и общественной безопасности, а также изучение приобретающих актуальность высокотехнологичных способов совершения таких преступлений, как диверсии, террористические акты, иные преступления террористической направленности. Цена их последствий для общества очень высока, причем преступникам не всегда надо атаковать социально значимые объекты непосредственно - достаточно посеять панику среди населения, используя интернет-медиа, социальные сети и интернетсайты органов власти различных уровней, предварительно получив к ним незаконный доступ. В статье описываются некоторые уже использованные способы совершения преступлений диверсионной и террористической направленности. Авторы обращают внимание на приоритет кибербезопасности как для разработчиков технических устройств с элементами искусственного интеллекта, так и для законодателей, которым следует обратить внимание на методы технического прогнозирования при разработке правовых норм, направленных на предупреждение новых способов совершения подобных преступлений. При написании статьи авторы использовали широкий круг российских и зарубежных источников научно-правовой, статистической, социологической и иной информации. Авторы применяли такие методы исследования, как анализ, синтез, дедукция, индукция, логико-юридический и сравнительно-правовой.</p></trans-abstract><kwd-group xml:lang="en"><kwd>Cybercrimes</kwd><kwd>cyberattack</kwd><kwd>computer virus</kwd><kwd>cyberterrorism</kwd><kwd>cybersecurity</kwd><kwd>sabotage</kwd><kwd>unmanned transport</kwd><kwd>drones</kwd></kwd-group><kwd-group xml:lang="ru"><kwd>киберпреступность</kwd><kwd>кибератака</kwd><kwd>компьютерный вирус</kwd><kwd>кибертерроризм</kwd><kwd>кибербезопасность</kwd><kwd>диверсия</kwd><kwd>беспилотный транспорт</kwd><kwd>дроны</kwd></kwd-group><funding-group/></article-meta></front><body></body><back><ref-list><ref id="B1"><label>1.</label><citation-alternatives><mixed-citation xml:lang="en">Antonovich, P.I. (2011) O sovremennom ponimanii termina “kibervoina” [About modern concept of “cyberwar” term]. Vestnik Akademii voennych nauk. 2 (35), 89–96. (in Russian).</mixed-citation><mixed-citation xml:lang="ru">Антонович П.И. О современном понимании термина «кибервойна» // Вестник Академии военных наук. 2011. № 2(35). С. 89-96</mixed-citation></citation-alternatives></ref><ref id="B2"><label>2.</label><citation-alternatives><mixed-citation xml:lang="en">Brenner, S. (2007) “At Light Speed”: Attribution and Response to Cybercrime/Terrorism/Warfare. The Journal of Criminal Law and Criminology. 97(2), 379–386.</mixed-citation><mixed-citation xml:lang="ru">Brenner, S. (2007) “At Light Speed”: Attribution and Response to Cybercrime/Terrorism/Warfare. The Journal of Criminal Law and Criminology. 97(2), 379-386</mixed-citation></citation-alternatives></ref><ref id="B3"><label>3.</label><citation-alternatives><mixed-citation xml:lang="en">Charvat, J. (2018) Cyber Terrorism: A New Dimension in Battlespace. 5th October, available at:https://ccdcoe.org/uploads/2018/10/05_CHARVAT_Cyber-Terrorism.pdf (Accessed 14 November 2019).</mixed-citation><mixed-citation xml:lang="ru">Charvat, J. (2018) Cyber Terrorism: A New Dimension in Battlespace. 5th October, available at: https://ccdcoe.org/uploads/2018/10/05_CHARVAT_Cyber-Terrorism.pdf (Accessed 14 November 2019)</mixed-citation></citation-alternatives></ref><ref id="B4"><label>4.</label><citation-alternatives><mixed-citation xml:lang="en">Falliere, N., Murchu, L. O., Chien, E. (2011) W32.Stuxnet Dossier. Version 1.4 (February), 1, available at: https://www.wired.com/images_blogs/threatlevel/2011/02/Symantec-StuxnetUpdate-Feb-2011.pdf (Accessed 11 November 2019).</mixed-citation><mixed-citation xml:lang="ru">Falliere, N., Murchu, L. O., Chien, E. (2011) W32.Stuxnet Dossier. Version 1.4 (February), 1, available at: https://www.wired.com/images_blogs/threatlevel/2011/02/Symantec-StuxnetUpdate-Feb-2011.pdf (Accessed 11 November 2019)</mixed-citation></citation-alternatives></ref><ref id="B5"><label>5.</label><citation-alternatives><mixed-citation xml:lang="en">Giraldi, P. (2019) Revisiting Stuxnet: The Israeli-American Computer Virus that Started CyberWarfare. Global Research. September 9, available at: https://www.globalresearch.ca/ stuxnet-israeli-american-computer-virus-cyber-warfare/5688506 (Accessed 14 November 2019).</mixed-citation><mixed-citation xml:lang="ru">Giraldi, P. (2019) Revisiting Stuxnet: The Israeli-American Computer Virus that Started CyberWarfare. Global Research. September 9, available at: https://www.globalresearch.ca/ stuxnet-israeli-american-computer-virus-cyber-warfare/5688506 (Accessed 14 November 2019)</mixed-citation></citation-alternatives></ref><ref id="B6"><label>6.</label><citation-alternatives><mixed-citation xml:lang="en">Glancy, D.J. (2014) Sharing the Road: Smart Transportation Infrastructure. Fordham Urban Law Journal. 41 (5), 1617–1664.</mixed-citation><mixed-citation xml:lang="ru">Glancy, D.J. (2014) Sharing the Road: Smart Transportation Infrastructure. Fordham Urban Law Journal. 41 (5), 1617-1664</mixed-citation></citation-alternatives></ref><ref id="B7"><label>7.</label><citation-alternatives><mixed-citation xml:lang="en">Glebov, I.N. (2018) Mezhdunarodnoe gumanitarnoe pravo i kibervoina [International humanitarian law and cyberwar]. Rossiskoe gosudarstvovedenie. 2, 137–153. (in Russian).</mixed-citation><mixed-citation xml:lang="ru">Глебов И.Н. Международное гуманитарное право и кибервойна // Российское государствоведениe. 2018. № 2. С 137-153</mixed-citation></citation-alternatives></ref><ref id="B8"><label>8.</label><citation-alternatives><mixed-citation xml:lang="en">Glebov, I.N. (2018) Pravovoe regulirovanie avtonomnych robotizirovannych sredstv vedenia voiny [Legal regulation of autonomous robot war tools]. Rossiskoe gosudarstvovedenie. 3, 104–116. (in Russian).</mixed-citation><mixed-citation xml:lang="ru">Глебов И.Н. Правовое регулирование автономных роботизированных средств ведения войны // Российское государствоведение. 2018. № 3. С. 104-116</mixed-citation></citation-alternatives></ref><ref id="B9"><label>9.</label><citation-alternatives><mixed-citation xml:lang="en">Hathaway, O.A., Crootof, R., Levitz, P., Nix, H., Nowlan, A., Perdue, W., Spiegel, J. (2012) The Law of Cyber-Attack. California Law Review. 100 (4), 817–886.</mixed-citation><mixed-citation xml:lang="ru">Hathaway, O.A., Crootof, R., Levitz, P., Nix, H., Nowlan, A., Perdue, W., Spiegel, J. (2012) The Law of Cyber-Attack. California Law Review. 100 (4), 817-886</mixed-citation></citation-alternatives></ref><ref id="B10"><label>10.</label><citation-alternatives><mixed-citation xml:lang="en">Kushner, D. (2013) The Real Story of Stuxnet. IEEE Spectrum. February 26, available at: https://spectrum.ieee.org/telecom/security/the-real-story-of-stuxnet (Accessed 11 November 2019).</mixed-citation><mixed-citation xml:lang="ru">Kushner, D. (2013) The Real Story of Stuxnet. IEEE Spectrum. February 26, available at: https://spectrum.ieee.org/telecom/security/the-real-story-of-stuxnet (Accessed 11 November 2019)</mixed-citation></citation-alternatives></ref><ref id="B11"><label>11.</label><citation-alternatives><mixed-citation xml:lang="en">Langner, R. (2013) To Kill a Centrifuge. A Technical Analysis of What Stuxnet’s Creators Tried to Achive. The Langner Group. November, available at: https://www.langner.com/wpcontent/uploads/2017/03/to-kill-a-centrifuge.pdf (Accessed 11 November 2019).</mixed-citation><mixed-citation xml:lang="ru">Langner, R. (2013) To Kill a Centrifuge. A Technical Analysis of What Stuxnet’s Creators Tried to Achive. The Langner Group. November, available at: https://www.langner.com/wpcontent/uploads/2017/03/to-kill-a-centrifuge.pdf (Accessed 11 November 2019)</mixed-citation></citation-alternatives></ref><ref id="B12"><label>12.</label><citation-alternatives><mixed-citation xml:lang="en">Lee, C. (2017) Grabbing the Wheel Early: Moving Forward on Cybersecurity and Privacy Protections for Driverless Cars. Federal Communications Law Journal. 69(1), 25–52.</mixed-citation><mixed-citation xml:lang="ru">Lee, C. (2017) Grabbing the Wheel Early: Moving Forward on Cybersecurity and Privacy Protections for Driverless Cars. Federal Communications Law Journal. 69(1), 25-52</mixed-citation></citation-alternatives></ref><ref id="B13"><label>13.</label><citation-alternatives><mixed-citation xml:lang="en">Ovcharov, A.V., Kozlov, A.V. (2019) The use of lethal Autonomous systems weapons require criminal law regulations. Voennoe pravo [Military Law]. 5(57), 179–187. (in Russian).</mixed-citation><mixed-citation xml:lang="ru">Овчаров А.В., Козлов А.В. Применение смертоносных автономных систем вооружения требует уголовно-правовой регламентации // Военное право. 2019. № 5(57). С. 179-187</mixed-citation></citation-alternatives></ref><ref id="B14"><label>14.</label><citation-alternatives><mixed-citation xml:lang="en">Ovchinskii, V.S. (2017) Osnovy bor'by s kiberprestupnost'yu i kiberterrorizmom: khrestomatiya [Fundamentals of the fight against cybercrime and cyber terrorism: a reader]. Compiled by. V.S. Ovchinsky. Moscow, Norma Publ. (in Russian).</mixed-citation><mixed-citation xml:lang="ru">Основы борьбы с киберпреступностью и кибертерроризмом: хрестоматия. Сост. В.С. Овчинский. М.: Норма, 2017. 528 с</mixed-citation></citation-alternatives></ref><ref id="B15"><label>15.</label><citation-alternatives><mixed-citation xml:lang="en">Sheremet, I.B., Rudianov, N.A., Ryabov, A.V., Khruschev, V.S., (2016) About need of the concepts development of construction and application of military autonomous robotic systems. Extreme Robotics. 1(1), 35–39. (in Russian).</mixed-citation><mixed-citation xml:lang="ru">Шеремет И.Б., Рудианов Н.А., Рябов А.В., Хрущев В.С. О необходимости разработки концепции построения и применения робототехнических комплексов военного назначения // Extreme Robotics. 2016. Т. 1. № 1. С. 35-39</mixed-citation></citation-alternatives></ref><ref id="B16"><label>16.</label><citation-alternatives><mixed-citation xml:lang="en">Shinkaretskaya, G.G. (2013) Mezhdunarodno-pravovye problemy vrazhdebnogo vozdeistvia na informacionnye sistemy [International law problems of enemy influence on information systems]. Gosudarstvo i pravo [State and Law]. 9, 82–88. (in Russian).</mixed-citation><mixed-citation xml:lang="ru">Шинкарецкая Г.Г. Международно-правовые проблемы враждебного воздействия на информационные системы // Государство и право. 2013. № 9. С. 82-88</mixed-citation></citation-alternatives></ref><ref id="B17"><label>17.</label><citation-alternatives><mixed-citation xml:lang="en">Spencer, D. (2018) The Road to the Future: A Regulatory Regime for the Rise of the Robot Cars.William &amp; Mary Environmental Law and Policy Review. 42 (2), 647–671.</mixed-citation><mixed-citation xml:lang="ru">Spencer, D. (2018) The Road to the Future: A Regulatory Regime for the Rise of the Robot Cars. William &amp; Mary Environmental Law and Policy Review. 42 (2), 647-671</mixed-citation></citation-alternatives></ref><ref id="B18"><label>18.</label><citation-alternatives><mixed-citation xml:lang="en">Wing, C. (2016) Better Keep Your Hands on the Wheel in That Autonomous Car: Examining Society's Need to Navigate the Cybersecurity Roadblocks for Intelligent Vehicles. Hofstra Law Review. 45 (2), 707–742.</mixed-citation><mixed-citation xml:lang="ru">Wing, C. (2016) Better Keep Your Hands on the Wheel in That Autonomous Car: Examining Society's Need to Navigate the Cybersecurity Roadblocks for Intelligent Vehicles. Hofstra Law Review. 45 (2), 707-742</mixed-citation></citation-alternatives></ref></ref-list></back></article>
