Features of recruiting extremists and terrorists through online games
- Autores: Zhukova A.L.1
-
Afiliações:
- Vladimir State University named after Alexander Grigorievich and Nikolai Grigorievich Stoletov
- Edição: Volume 9, Nº 3 (2025)
- Páginas: 47-69
- Seção: Статьи
- ##submission.datePublished##: 30.09.2025
- URL: https://journal-vniispk.ru/2576-9634/article/view/358060
- DOI: https://doi.org/10.12731/2576-9634-2025-9-3-243
- EDN: https://elibrary.ru/NTZICP
- ID: 358060
Citar
Texto integral
Resumo
Background. This article is devoted to a problematic issue – the specifics of the recruitment of young people by extremists and terrorists using online games, and some specific mechanisms for recruiting people to the ranks of terrorists using modern technologies over the Internet, which are often used by members of radical groups. The study focuses on the issues of psychological impact on players, the use of playful reality as manipulation tools, and highlights some of the problems of law enforcement agencies in identifying threats in the Internet space related to the active development of information technologies that allow recruiters to remain unpunished.
Purpose. The purpose of this study is to identify key factors contributing to the recruitment of extremists through online games, as well as to develop recommendations to reduce risks and prevent such cases.
Materials and methods. In the course of the scientific research, the following were used: scientific works on the problems of recruiting people through online gaming platforms, research by specialists on the problems of psychological methods of influencing players through online platforms, cases of influencing people's subconsciousness through gaming platforms were analyzed; regulatory legal acts of the Russian Federation regulating public relations related to countering the spread of terrorism and extremism; The international practice of methods of combating the spread of ideas of extremism and terrorism on the Internet was studied.
In the course of the research, general scientific, private scientific and special research methods were used. In particular, the formal-logical, comparative-legal, case-study method, as well as methods of analysis and synthesis, induction and deduction have found application.
Results. Some psychological ways of influencing recruiters on players through online platforms have been identified.
The author's recommendations are formulated in the field of monitoring the spread of extremist ideology on the Internet and improving the operation of online and playgrounds, gambling sites.
The scope of the results. The results of the study can be applied in standard-setting activities, in the course of further scientific research in the field of combating the spread of extremist ideology on the Internet and on playgrounds, as well as to improve and create gaming and streaming platforms.
Palavras-chave
Sobre autores
Anastasia Zhukova
Vladimir State University named after Alexander Grigorievich and Nikolai Grigorievich Stoletov
Autor responsável pela correspondência
Email: juconanactua.com@gmail.com
Master's Student at the M. M. Speransky Law Institute
Rússia, 8, Studencheskaya Str., Vladimir, Russian Federation
Bibliografia
- Avetisova, A. A. (2011). Psychological characteristics of computer game players. Psychology. Journal of the Higher School of Economics, 8(4), 35–58. EDN: https://elibrary.ru/QYXAAL
- Aristarkhova, T. A. (2014). Key traits and features of youth extremism. Proceedings of Tula State University. Economic and Legal Sciences, Issue 3, Part II. Legal Sciences. Tula: Tula State University Press. EDN: https://elibrary.ru/SBHEOF
- Vetchinnikova, A., & Moiseev, S. (2025). Video games and everyday life: A phenomenological analysis. Jete — Journal of Philosophy, Religious and Cultural Studies, 150(1), 156–184. https://doi.org/10.32523/3080-1281-2025-150-1-156-184. EDN: https://elibrary.ru/SBNOCU
- Efimova, N. V., Bogdan, E. I., & Zheshko, E. I. (2020). Computer games in the life of modern youth. In Social, Cultural, and International Communication of Youth: Collection of Scientific Articles (pp. 35–41).
- Klesova, K., & Belousova, A. Cybersecurity: Methods of information protection in the digital world. Novosibirsk: Siberian University of Consumer Cooperation (Autonomous NonProfit Educational Organization of Secondary Education of the Centrosoyuz of the Russian Federation). Retrieved from https://www.sibupk.su/gal/stend25/148.pdf
- Kondratenko, E. N., Grigoryan, D. K., & Delov, N. S. (2024). Formation of theoretical approaches to the analysis of extremism and terrorism in cyberspace. State and Municipal Administration. Scientific Notes, (1), 187–193. https://doi.org/10.22394/2079-1690-2024-1-1-187-193. EDN: https://elibrary.ru/ZATOBM
- Kostikhin, A. A. (2006). The Internet as a tool of terrorist and extremist organizations in psychological warfare. Retrieved from http://www.iimes.ru/?p=4737 (accessed: 28.07.2025).
- Lira, N. M. (2023). Theoretical and methodological foundations of sociological research of extremism as a socially destructive phenomenon. Vesnik Brestskogo Universiteta. Series 1. Philosophy. Political Science. Sociology, (2), 126. EDN: https://elibrary.ru/NDQQMM
- Litsuk, A. A. (Ed.). (2017). Countering the ideas of extremism and terrorism on the Internet: Interdisciplinary analysis: Collective monograph. Nizhnevartovsk: Nizhnevartovsk State University Press.
- Myradov, P. S. (2023). Cyberthreats of the new generation: Threats of the future and solutions. In XXIII International Scientific and Technical Conference «Technical Means of Information Protection» (pp. 257–258). Mary, Turkmenistan.
- Pshenichnaya, O. V. (2017). Extremism on the Internet. Modern Scientific Research and Development, 507–510. EDN: https://elibrary.ru/YUIUDT
- Rykov, Yu. G. (2013). Virtual community as a social field: Inequality and communicative capital. Journal of Sociology and Social Anthropology. Retrieved from https://publications.hse.ru/pubs/share/folder/cs1mnu3646/108605234.pdf
- Sokolov, A., & Povolotskiy, A. (2020). Cyberterrorism in Russia and Central Asian countries. RussianAsian Law Journal, (2), 75–79. https://doi.org/10.14258/ralj(2020)2.10. EDN: https://elibrary.ru/PMWZDI
- Tursunbaeva, N. S., & Munarbekova, A. N. (2022). Cyberextremism among youth: Issues of prevention. In State Youth Policy: Challenges and Modern Technologies of Working with Youth: Proceedings of the International Youth Research Conference, Yekaterinburg, April 1, 2022 (pp. 198–199). EDN: https://elibrary.ru/BTZBRR
- Cialdini, R. (2014). Psychology of influence (5th ed.). Saint Petersburg: Piter.
- Shesterin, N. O. (2024). Features of implementing communicative roles in the space of computer games. Sign: Problem Field of Media Education, (3(53)), 67–73. https://doi.org/10.47475/2070-0695-2024-53-3-67-73. EDN: https://elibrary.ru/FWNFJO
- Russian Federation. (2006). Federal Law No. 35FZ «On Countering Terrorism» dated March 6, 2006 (as amended on February 28, 2025, No. 16FZ). Retrieved from https://base.garant.ru/12145408/
- Shanghai Cooperation Organisation. (2001). Shanghai Convention on Combating Terrorism, Separatism and Extremism (signed in Shanghai on June 15, 2001). Collection of Legislation of the Russian Federation, October 13, 2003.
- Russian Federation. (2002). On countering extremist activities: Federal Law No. 114FZ dated July 25, 2002 (as amended on July 23, 2025, No. 215FZ). Collection of Legislation of the Russian Federation, (30), Art. 3031.
- Russian Federation. (2020). On approval of the Strategy for Countering Extremism in the Russian Federation until 2025: Presidential Decree No. 344 dated May 29, 2020. Collection of Legislation of the Russian Federation, (22), Art. 3475.
- Russian Federation. (2023). Comprehensive Plan for Countering the Ideology of Terrorism in the Russian Federation for 2024–2028 (approved by Presidential Decree No. Pr2610 dated December 30, 2023). ConsultantPlus Legal Reference System. Retrieved from https://www.consultant.ru/cons/cgi/online.cgi?BASENODE=11&req=doc&cacheid=15CA84ECBB5C514695AD042F35EFB9D6&mode=searchcard&rnd=Qjcj3g&base=LAW&n=469046#XwMlX4UIT1LRiXLn
- Council of Europe. (1977). European Convention on the Suppression of Terrorism (ETS No. 90) [Russian and English] (as amended on May 15, 2003) (signed in Strasbourg on January 27, 1977). Bulletin of International Treaties, (3), 3–13.
- Clayton, M. (2003). Reading into the mind of a terrorist. The Christian Science Monitor, October 30. Retrieved from https://www.csmonitor.com/2003/1030/p11s01legn.html
- United States Congress. (1978). Foreign Intelligence Surveillance Act of 1978. Retrieved from http://legcounsel.house.gov/Comps/Foreign Intelligence Surveillance Act Of 1978.pdf
- United States Congress. (n.d.). The Communications Assistance for Law Enforcement Act. Retrieved from https://legcounsel.house.gov/Comps/Communications Assistance For Law Enforcement Act.pdf
- United States Congress. (2015). Act on the «Reform of the Authorities of the Federal Government to Require the Production of Certain Business Records, Conduct Electronic Surveillance, Use Pen Registers and Trap and Trace Devices, and Use Other Forms of Information Gathering for Foreign Intelligence, Counterterrorism, and Criminal Purposes, and for Other Purposes». Retrieved from https://www.congress.gov/114/bills/hr2048/BILLS-114hr2048enr.pdf
Arquivos suplementares


