Abstract

Effective provision of anti-terrorist security of modern Russian society is impossible without knowledge of the legal regulation ensuring such security in other states, especially neighboring "friendly" ones - this hinders the effectiveness of interaction within the framework of international cooperation. It should be noted that this issue is particularly relevant today due to the active military confrontation of the Russian Federation with "unfriendly" states on the territory of Ukraine. In our opinion, the legislative and practical activities of the Chinese authorities can be useful for extrapolating to Russian security problems, especially due to the fact that China is classified as a country with a low level of terrorism, while the Russian Federation is among the countries with an average level of terrorist activity. The article makes a legal analysis of the state regulation of anti-terrorist security of the People's Republic of China. The object of the study is social relations arising in the process of state regulation of counter-terrorism in China. The subject of the study is the legal acts of the People's Republic of China of anti-terrorist orientation. The purpose of the study is identification of useful and effective practices of countering the ideology of terrorism in China for the possibility of subsequent implementation into the legal framework of Russian legislation. The method of comparative law, the method of analysis and synthesis are employed by the author. The author studied China's legislation on countering terrorism and came to conclusion about the need to adopt its positive experience in Russia. It is necessary to consider the possibility of creating your own social networks, analogues of foreign ones, it is also worth adopting the experience of creating educational centers for people affected by extremism and terrorism. In order to ensure the rights of citizens in cyberspace and the fight against terrorism, it is possible to use China's experience with user verification when logging on to the Internet.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call