The Concept of Electronic Terrorist Acts in International Criminal Law

  • Dr. Nibras Salim Khudhair Department of Law, Al-Kunooz University College Iraq, Basra
الكلمات المفتاحية: Electronic, Terrorist Acts, International Criminal Law

الملخص

The study aimed to identify the role of technology in spreading terrorism, Identify cybercrime sanctions in international public law, and Identify gaps in international public law in reducing cyber terrorism by identifying weaknesses. Of the most important findings of the study include: current global developments show that terrorism is unlikely to be terminated in the coming few years, despite the cooperative efforts by the United Nations, the international community and its Member States. Through the "war on terror", the United States has taken the lead in this regard.      The invasion of Afghanistan in 2001 was carried out as consequence of the terrorist strikes of September 11 in the United States America. Since then constant unrest continued in the Middle East. The case law on terrorist organizations in these three authorities, and particularly the legal values resulting from the proportion or jurisdiction of these provisions, indicates that, despite tariff variances, there seems to be a similarity of legitimate values arising from jurisprudence. A relative examination of the judicial principles arising from the proportions of each of the Supreme Court's rulings on terrorism discloses an extensive variety of principles of law which, in some cases, apply in particular to the legal system of their State. What is more clear is that these lawful principles are similar, and if they are considered as a whole, they are perfectly consistent. These legal values seem to show a similarity rather than a difference in this area of crucial importance to domestic criminal law. This supports both transnational and global counterterrorism policies, laws and strategies because it suggests that what seems to be developing is a public comprehending of what creates terrorism, at least through these three main jurisdictions of public law.   The Supreme Courts recognize the obligation to abide by legitimate principles and domestic and global rules when applied.

المراجع

1. Aksel, B. S. (2014), Global Citizen: Challenges and Responsibility, Sense Publishers: Netherland.
2. Al-Balawi, Salem Hamid Ali (2009) Modern Techniques in Criminal Investigation and its Role in Crime Control, Department of Police Sciences, Graduate School, Naif University for Security Sciences.
3. Blair, Michael J. (2006). Research Paper on Internet Deception Tactics, Master of Science in Computer Information Systems, School for Professional Studies, Regis University.
4. Choi, Hyunsang, Hanwoo Lee, Heejo Lee, Hyogon Kim (2007). Botnet Detection by Monitoring Group Activities in DNS Traffic, in Proc. 7th IEEE International Conference on Computer and Information Technology (CIT 2007).
5. CMN (2017). Crime against Human, International Law Research and Policy.
6. Conway, Maura (2003). Cyberterrorism: The Story So Far, Department of Political Science 1, College Green, Trinity College, Dublin 2, Ireland.
7. CRID – University of Namur (2005). First Analysis of the Personal Data protection Law in India, Report delivered in the framework of contract JLS/C4/2005/15 between CRID and the Directorate General Justice, Freedom and Security.
8. CTC WestPoint. (2014). Paper Cadet/Student Conference on terrorism,insurgency , cyber and asymmetric conflicts .
9. CTC WestPoint. (2014). Paper Cadet/Student Conference on terrorism,insurgency , cyber and asymmetric conflicts .
10. Dacey, Raymond, & Kenneth Gallant (1997). Crime control and harassment of the innocent, Journal of Criminal Justice, Elsevier, vol. 25(4)
11. Definition of Harm . (2016). In Merriam-Webster. Retrieved from http://www.merriam-webster.com/dictionary/harm
12. Dilipraj, E (2015). Challenges of Terrorism in Cyber Space, Defence and Diplomacy Journal, Vol. 4, No. 3.
13. Done at Rome (2002). on 17 July 1998, in force on 1 July 2002, United Nations, Treaty Series, vol. 2187, No. 38544, Depositary: Secretary-General of the United Nations, http://treaties.un.org
14. Dubey, V. (2017). Admissibility of Electronic Evidence: An Indian Perspective. Forensic Res Criminol Int J 4(2).
15. Dutton, W. (2011), Freedom of Connection – Freedom of Expression: The Changing Legal and Regulatory Ecology Shaping the Internet, UNESCO.
16. Eagles, Paul F.J., Angela M. Gilmore, Luis X. Huang, Denise A. Keltie, Kimberley Rae, Hong Sun, Amy K. Thede, Meagan L. Wilson, Jennifer A. Woronuk, Ge Yujin (2006). Tourism And Recreation System Planning in Alberta Provincial Parks, Proceedings of the 2006 Northeastern Recreation Research Symposium, GTR-NRS-P-14.
17. Hao, Jianlei and Bingbing Gao (2017). Advantages and Disadvantages for Nurses of Using Social Media, Journal of Primary Health Care and General Practice, Vol. 1, Issue 1.
18. Hardy, Keiran (2010). Operation Titstorm: Hacktivism or Cyberterrorism?, UNSW Law Journal, Vol. 33(2).
19. Hauben, Michael (2008). Net and netizen: the Impact the Net has on People's Lives, A netbook titled Netizens: On the History and Impact of Usenet and the Internet, columbia.edu and rh press: U.S.A.
20. Insa, Fredesvinda (2007). The Admissibility of Electronic Evidence in Court (A.E.E.C.): Fighting against High-Tech Crime—Results of a European Study, Journal of Digital Forensic Practice, 1:4, 285-289
21. Jain, Neelesh, & Vibhash Shrivastava (2014). Cyber Crime Changing Everything – an Empirical Study, International Journal of Computer Application, Vol.1, Issue 4.
22. Jamal, Brahimi (2018) Criminal Investigation of Cybercrime, PhD thesis, Department of Law, Faculty of Law and Political Science, Mouloud Mameri University, Tizi Ouzou
23. Jwaifell, Mustafa, Sami F. Aljazi , Al-Mothana Gasaymeh (2019). The Digital Citizenship and Its Role in Facing Electronic Terrorism among Secondary School Students in Middle East: Jordan as an Example, International Journal of Learning and Development , Vol. 9, No. 1.
24. K. Karski, Realizacja idei ustanowienia międzynaro. (1993). K. Karski, Realizacja idei ustanowienia międzynarodowego sądownictwa karnego, “Państwo i Prawo.
25. Kaczynski, H. (2015). The Accusation Model before the International Criminal Court. Study of Convergence of Criminal Justice System, Heidelberg– New York–Dordrecht–London.
26. Kaur, Navneet (2018). Introduction of Cyber Crime and Its Type, International Research Journal of Computer Science, Vol. 5, Issue 08.
27. Krieger, T., and D. Meierrieks (2017). How to Deal with International Terrorism. In: Eger, T., S. Oeter, and S. Voigt (Eds.): International Law and the Rule of Law under Extreme Conditions. Mohr Siebeck, Tübingen, pp. 223-247.
28. Kumar, Rajnish (2000). Data Protection and Liability, National Academy of Indian Railways, Vadodara.
29. Luban, David (2004). A Theory of Crimes Against Humanity, Yale Journal of International Law, Vol. 29, Issue 1.
30. Matusitz, J. (2007). Cyberterrorism: Postmodern state of chaos, Information Security Journal: A Global Perspective, vol. 17, no. 4.
31. Mossberger, k. Caroline J.T., and Ramona S. (2011), Digital Citizenship: The Internet, Society and Participation, MIT Press: U.K.
32. Naavi, N.V. (2004), Cyber Laws for Every Netizen in India, Ujvala Consultants Pvt Ltd: India
33. Ólafsson, Garðar Steinn (2012). Crimes Against Humanity Emergence of a law of humanity, School of Social Sciences, Faculty of Law.
34. Pope, Lcdr Lonnie (2008). Cyber-Terrorism And China, United States Marine Corps, Command and Staff College, Marine Corps University.
35. Qara, Laila (2012), "The Impact of Electronic Money on Monetary Policy", Unpublished Master Thesis, Al-Arabi Bin Muhaidi University, Umm Al-Bawaki, Faculty of Economic Sciences, Commercial Sciences and Management Sciences, Finance and Banking, Algeria.
36. Raj, S. Praveen and Aswathy Rajan (2018). Comparison between Information Technology Act, 2000 & 2008, International Journal of Pure and Applied Mathematics, Vol. 119, No. 17.
37. Rebecca.M.K. (2012). the Netizen, Development 55(2), 201–204.
38. Rusumanov, Vase (2016). The Use of The Internet By Terrorist Organizations, Information & Security: An International Journal, Vol. 34:2.
39. Ryngaert, Cedric (N.D.). The Concept of Jurisdiction in International Law, International Law, Utrecht University.
40. Ryngaert, Cedric (n.d.). The concept of Juridiction in international Law. Utrecht University.
41. Sank, Diane and David I. Caplan (1991). To Be a Victim Encounters with Crime and Injustice, Springer Science, Business Media, LLC.
42. SEissa, Israa G., Jamaludin Ibrahim, Nor-Zaiasron Yahaya (2017). Cyberterrorism Definition Patterns and Mitigation Strategies: A Literature Review, International Journal of Science and Research (IJSR), ISSN (Online): 2319-7064, Value (2015).
43. Soldovieri, Assunta (2015). The Evolution of Crimes against Humanity in International Criminal Law, Boletín mexicano de derecho comparado / Instituto de Investigaciones Jurídicas, UNAM 47(139):241-281.
44. Tal, Daniel Bar, Lily Chernyak-Hai, Noa Schori and Ayelet Gundar (2009). A sense of selfperceived collective victimhood in intractable conflicts, International review of the red cross, Vol. 91, No. 874.
45. US Electronic Communications Privacy Act,2013, s.2510.
46. Vavrenyuk, Sergey Anatolievich (2018). International terrorism and the basic ways to deal with it at the present stage, CES Working Papers – Vol. X, Issue 2.
47. Veerasamy, Namosha, Marthie Grobler (2011). Terrorist Use of the Internet: Exploitation and Support through ICT infrastructure, Council for Scientific and Industrial Research, Pretoria, South Africa.
48. Waidan, Ahmad Abdullah (2015) "Criminal Responsibility of the Individual in Islamic Law and International Criminal Law Comparative Study", Ph.D., Faculty of Sharia and Law, Malaysian Islamic University, Nielay.
49. Wellborn, J. (2013). Cyber citizenship: Helping Teenagers Be Good Netizens, International Journal of Human and Social Science, 30(1):171-197
50. Werle, G. (1997). Menschenrechtsschutz durch Völkerstrafrecht,,in Zeitschrift für die gesamte Strafrechtswissenschaft.
51. William Felstiner, Richard Abel & Austin Sarat (1981). The Emergence and Transformation of Disputes: Naming, Blaming, Claiming…, 15 LAW AND SOC. REV. 631, 635
52. Williams, Marie (2000). Ethical clearance – just a rubber stamp?, Australian Journal of Physiotherapy, Vol. 46.
53. Williams, Sarah (2009). Hybrid and Internationalized Criminal Tribunals: Jurisdictional Issues, A Doctoral Thesis, Durham University.
54. Williamson, Celia (2017). Definition of Victim, Survivor, and Thriver, PhD in conjunction with the Lucas County Human Trafficking Coalition.
منشور
2021-01-29
كيفية الاقتباس
Dr. Nibras Salim Khudhair. (2021). The Concept of Electronic Terrorist Acts in International Criminal Law. المجلة الدولية للعلوم الإنسانية والاجتماعية, (18), 263-283. https://doi.org/10.33193/IJoHSS.18.2021.189
القسم
المقالات