While the Internet has brought convenience to human life,due to its fragility and vulnerability,it has also spawned a new form of terrorism-cyber terrorism.The cyber terrorism crime refers to the terrorist crimes that use the internet as the target of attack or the internet as a tool and platform.It has become a new form of terrorism crime.Cyber terrorist criminals take advantage of the anonymity,intelligence,and universal participation of this emerging tool to conduct cyber terrorism crimes by recruiting people on the network,propagating ideas,and capital exchanges.Compared with traditional terrorist crimes,cyber terrorism has its own particularities,and its detection and defense dilemmas and corresponding detection and defense countermeasures are different.This article takes the particularity of cyber terrorism crimes as the starting point,combines the characteristics of big data detection and prevention,and specifically analyzes its detection and prevention dilemmas to find corresponding countermeasures.The main text consists of three chapters:The first chapter of this article systematically introduces the cyber terrorism crimes in China.In essence,cyber terrorism crimes are a type of terrorist crime.In our country’s current legislative system,there are no specific charges against cyber terrorism crimes.Therefore,the relevant provisions of terrorist crimes still apply in the investigation.On the basis of responding to academic controversy,this article defines cyber-terrorism as: criminal acts with a political purpose that use the Internet as a target or tool and have both terrorist and cyber-crime characteristics.Based on a clear definition of cyber terrorism crimes,this chapter introduces the manifestations of cyber terrorism crimes: launching attacks on cyber systems,promoting terrorist ideas on the Internet,recruiting terrorists on the network,and using the network for terrorist financing.At the same time,this chapter discusses the characteristics of the concealment,specialization,decentralization and cross-region of cyber terrorism crimes.A correct understanding of the above is the basis for studying the predicament and detection of cyber terrorism crimes.The second chapter of this article introduces the dilemma of detection and prevention of cyber terrorism crimes.The first problem encountered was the incompatibility of laws and regulations.The specific manifestation is that it is difficult to correctly evaluate the "lone wolf" and targeted cyber terrorism crimes,and it is difficult to detect and prevent some acts that actually belong to cyber terrorism crimes.The legal positioning and obscure operating procedures of big data investigations have also led to frequent constraints on the use of investigative agencies.Cyberterrorism crimes are difficult to detect and prevent because of their rapid spread.This is mainly because of the large number,multiple versions,and increasingly intelligent violent terrorist audio and video that are difficult to prevent and control.In addition,in today’s highly-developed Internet media,how to carry out network censorship and public opinion monitoring is also a problem that must be solved in the detection and prevention work.When it comes to the investigation,the dilemma is mainly reflected in the following aspects: First,how the investigating agency looks for clues left by criminal suspects and conducts electronic data extraction and analysis from the vast network of data;Second,due to cyber terror The concealment and decentralization of crime,the frequent occurrence of "lone wolf" cyber terrorism crimes,coupled with the natural concealment of cyber crimes and the difference between the actual identity of cyber realities,how investigative agencies can investigate and arrest suspects Arrest;third,how investigating agencies conduct interrogation in the context of a large number of multilingual criminal suspects and stubborn "lone wolf" criminal suspects;fourth,investigating when investigation cooperation channels are not smooth How to carry out efficient investigation cooperation.The third chapter of this paper puts forward corresponding countermeasures based on the predicament of cyber terrorism crime detection and prevention.First,laws and regulations should be improved to provide protection for investigation and prevention.By establishing the "implementation of terrorist crimes" method to regulate "lone wolf" crimes and targeted cyber terrorism crimes,legislating "indirect incitement" can also increase the crackdown on cyber terrorism crimes.For big data investigations,their legal status and related procedures should be regulated.Second,anti-terrorism on the Internet is first of all prevention.In specific work,we should use big data thinking as a guide to strengthen the source governance of terrorism-related information,use big data collection and analysis technology to establish early warning evaluation systems,and detect and prevent cyber terrorism crimes at the budding and unimplemented stages.Third,in the specific investigation process,we should adhere to the principle of guiding investigations with big data thinking,focusing on the identification of criminal suspects,interrogation of criminal suspects,and criminal intelligence.Fourthly,the investigation of cyber terrorism crimes should strengthen cooperation among different police types,different regions,and transnational investigations and arrests. |