Abstract

To successfully counter extremist and terrorist crime in the virtual space, it is important to implement measures for improving legislation (clarification of extremism features, the introduction of a list of extremist crimes into the law, etc.), as well as measures to improve the training of law enforcement officials, wider involvement of specialists and experts in the investigation of cases, establishing cooperation with providers in order to timely identify extremist and terrorist crimes, a deeper study of the personality of criminals who specialize in committing extremist crimes using the field of telecommunications and computer information. The use of telecommunications and computer information in the commission of extremist crimes indicates a high intellectual level of the criminal, which helps him not only to commit high-tech crimes, but also to hinder the investigation of his actions using the same knowledge and experience. In this regard, the social danger of both the criminal and the offence committed by him increases, which should be taken into account when solving and investigating crimes. In addition, the professionalism of criminals makes increased demands on law enforcement officers investigating crimes of this type, which means that it is necessary to constantly improve their training in the field of computer information and telecommunication technologies. The paper discusses some issues of classification of extremism using computer and telecommunication networks, gives a definition of extremism, and suggests ways to solve problems in the qualification and organization of the investigation of the crimes in question.

Highlights

  • Экстремизм как политическая деятельность проявляется в России и во всем мире в виде насильственных действий, целью которых является запугивание общества, свержение действующей власти; уничтожение религиозных конфессий и установление единоверия; разжигание ненависти между народами и этносами; уничтожение оппозиции, инакомыслия, воспрепятствование осуществлению гражданами их демократических прав и свобод и др.[2]

  • To successfully counter extremist and terrorist crime in the virtual space, it is important to implement measures for improving legislation, as well as measures to improve the training of law enforcement officials, wider involvement of specialists and experts in the investigation of cases, establishing cooperation with providers in order to timely identify extremist and terrorist crimes, a deeper study of the personality of criminals who specialize in committing extremist crimes using the field of telecommunications and computer information

  • The social danger of both the criminal and the offence committed by him increases, which should be taken into account when solving and investigating crimes

Read more

Summary

Introduction

Экстремизм как политическая деятельность проявляется в России и во всем мире в виде насильственных действий, целью которых является запугивание общества, свержение действующей власти (государственный и международный экстремизм); уничтожение религиозных конфессий и установление единоверия (религиозный экстремизм); разжигание ненависти между народами и этносами (национальный экстремизм); уничтожение оппозиции, инакомыслия, воспрепятствование осуществлению гражданами их демократических прав и свобод (политический экстремизм) и др.[2]. Преступления экстремистской направленности, совершаемые с использованием сферы телекоммуникаций и компьютерной информации

Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.