Document Type : Article
Authors
1 MA in International Law, Faculty of Law and Political Science, University of Tehran, Tehran, Iran
2 Prof., Department of Public Law, Faculty of Law and Political Science, University of Tehran, Tehran, Iran
Abstract
Today, with the advancement of technology and its close connection with people's lives, terrorism has also extended its scope of activity to the cyberspace to benefit from its special features in order to expand its activities. On the other hand, since the governments could not reach a consensus on a single deinition of terrorism and, accordingly, cyber terrorism; Therefore, we have a vacuum of effective and comprehensive criminal laws, especially at the international level; Therefore, in order to deal with these attacks, countries are currently developing laws with a protective and preventive nature. At the regional level, especially in Europe, many measures have been taken, which can be modeled on with attention in these measures and take a step towards its expansion and generalization at the international level. The analysis of measures indicates that the creation of special organizations and teams, the development of military and security capabilities, cooperation with other countries and interaction with the private sector, specialist training and advanced equipment, are among the measures that are in line with this confrontation and preventing Cyber terrorist attacks have been carried out with positive results.
Keywords
Main Subjects
English
- Books
- Christian , Alex MacKenzie, & Sarah Léonard, (2022). The European Union as a Global Counter-Terrorism Actor, Institutions in EU counter-terrorism, DOI: https://doi.org/10.4337/9781782548287.
- Evan, T., Leverett, E., Ruffle, S. J., Coburn, A. W., Boudreau, J., Gunaratna, R., & Ralph, D. (2017). Cyber Terrorism: Assessment of the Threat to Insurance; Cambridge Risk Framework series; Centre for Risk Studies, University of Cambridge.
- Renard, T. (2017). Terrorism and Counterterrorism in Continental Europe. in: Jacinta Carroll, Counterterrorism. The Australian Strategic Policy Institute.
- Sieber, U. (2012). Information Technology Crim Carl HeymannsVerlag KG,576.
- Spaaij, R. (2011). Understanding Lone Wolf Terrorism: Global Patterns, Motivations and Prevention. Springer Science & Business Media.
- Thomas C. Wingfield, The Law of Information Conflict: National Security Law in Cyberspace, Aegis Research Corp., Falls Church, VA (2000); ISBN: 0-9670326-I-X
- Walace, H., Pollack, M. A. & Young, A. R. (2021). Policy-Making in the European Union. Seventh Edition, Oxford University Press.
- Wingfield, T. (2000). The Law of Information Conflict: National Security Law in Cyberspace, Aegis Research Corporation, ISBN 096703261X, 9780967032610, Length
- Articles
- Aldalbeeh, A., & Alsharqawi, A. (2023). Cyber terrorism and its role in the outbreak of international crisis. International Journal of Electronic Security and Digital Forensics1 , 24-32.
- Chertoff, M. (2008), The cybersecurity challenge. Regulation & Governance, (2), 480-484. https://doi.org/10.1111/j.1748-5991.2008.00051.x
- Dedeke, A., Masterson, K., (2019). Contrasting cybersecurity implementation frameworks (CIF) from three countries. Information & Computer Security 27, (3), 373–392. https://doi.org/10.1108/ICS-10-2018- 0122.
- Dimitra Markopoulou, Vagelis Papakonstantinou, Paul de Hert (2019). The new EU cybersecurity framework: The NIS Directive, ENISA's role and the General Data Protection Regulation. Computer Law & Security Review, 35(6), 1-11/ https://doi.org/10.1016/j.clsr.2019.06.007
- DOI:10.1017/S1867299X00002944
- Dunn Cavelty, M. & Smeets, M. (2023). Regulatory cybersecurity governance in the making: The formation of ENISA and its struggle for epistemic authority. Journal of European Public Policy, 1-23.
- Elain, F. (2014). The EU Cybercrime & Cyber – Security Rule-Making: Maping the Internal & External Dimensions of EU Security. European Journal of Risk Regulation , 5(1), 46 – 60.
- Goldsmith, J. (2013). How Cyber Changes the Laws of War. European Journal of International Law, 24(1), 129-138.
- Katagiri, N. ( 2021). Why international law and norms do little in preventing non-state cyber-attacks. Journal of cybersecurity, 7(1-9).
- Lord, Kristin & Sharp, T. (2011). America’s Cyber Future Security and Prosperity in the Information Age, Center for a New American Security, (I), 12-19.
- Monshipouri, M., & Prompichai, T. (2018). Digital Activism in Perspective: Palestinian Resistance via social media, International Studies Journal (ISJ) 14(4), 37 – 57.
- Naqvi, A. A, Javaid, A., & Jalal, I.(2022) From Cyber Security to Cyber-terrorism: A New Emerging threat for Europe and the challenges for EU. Journal of Politics and International Studies, 8(2), 45–57.
- Odebade, A., & Elhadj, B. (2023). A Comparative Study of National Cyber Security Strategies of ten nations. Cornel University, 1-19 DOI: 10.48550/arXiv.2303.13938.
- Oleksiewicz, I. (2016). Dilemmas and challenges for EU anti-cyber-terrorism policy: The example of the United Kingdom. Politechnika Rzeszowska, 135-146.
- Osula, A.M., Kasper, A. & Kajander, A., (2022), EU Common Position on International Law and Cyberspace, Masaryk University Journal of Law and Technology, 16(1), pp.89-123.
- Schaap, A.J, (2009). Cyber Warfare Operations: Development and Use under International law. Air Force law review, (64), 123-142,
- Shafqat, N., & Masood, A., Z. (2016). Comparative Analysis of Various National Cyber Security Strategies. International Journal of Computer Science and Information Security, 129-136.
- Sliwinski, K. F. (2014). Moving beyond the European Union’s Weakness as a Cyber-Security Agent. In Contemporary Security Policy, 35(3), Taylor & Francis, 468-486.
- Spper, D. (2000). Redefining borders, The challenges of cyber-crime. Marquette university. Political science department. Crime. Law & Social change. 24- 34.
- Tabansky, (2011). Basic Concepts in Cyber Wafare. Military and Strategic Affairs, 3(1), 75-92.
- Zerzri, M. (2017). The Threat of Cyber Terrorism and Recommendations for Countermeasures. Center of Applied Perspective on Tunisia, (4), 1-6.
- Documents
- D'Agostino, D. M. (2011). Defense Department Cyberefforts: More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities. United States: DIANE Publishing Company
- Holloway, Michael. (2015). Stuxnet Worm Attack on Iranian Nuclear Facilities. California: Stanford University
- Joint statement by the EU home affairs ministers on the recent terrorist attacks in Europe/ Council of the EU Press release 13 November 2020
- Ozeren, Suleyman (2005)” Global Response to Cyber terrorism And Cybercrime: A Matrix for International Cooperation and Vulne ability Assessment”, University of North Texas
- Regulation (EC) No 460/2004 of the European Parliament and of the Council of 10 March 2004 establishing the European Network and Information Security Agency (Text with EEA relevance), as amended by Regulation (EC) No 1007/2008 and amended by Regulation (EC) No 580/2011.
- Regulation (EU) 2016/679 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation
- Regulation (EU) No 526/2013 of the European Parliament and of the Council of 21 May 2013 concerning the European Union Agency for Network and Information Security (ENISA) and repealing Regulation (EC) No 460/2004.
- Wesseling, M. (2016). An EU Terrorist Finance Tracking System. London: Royal United Services Institute for Defence and Security Studies
- Websites
- http://large.stanford.edu/courses/2015/ph241/holloway1
- http://www.eurica.ir/?p=26434
- https://data.consilium.europa.eu/doc/document/ST-6722-2021-INIT/en/pdf
- https://ec.europa.eu/homeaffairs/what-we-do/policies/organized-crime-and-humantrafficking/cybercrime_en
- https://ec.europa.eu/info/strategy/priorities-2019-2024/europe-fit-digital-age/europes-digital-decade-digital-targets-2030_fr
- https://www.consilium.europa.eu/en/policies/fight-against-terrorism/counter-terrorism-coordinator
- https://www.consilium.europa.eu/en/press/press-releases/2020/11/13/joint-statement-by-the-eu-home-affairs-ministers-on-the-recent-terrorist-attacks-in-europe/
- https://www.dragonflyintelligence.com/intelligence/terrorismtracker/
- com
- merriam-webster.com
References in Persian:
- A) Books
- Biabani, G. H., & Hadianfar, S. K. (2005). Descriptive Encyclopedia of Criminal Sciences, First Edition. Tehran: Publications of the Applied Research Center for Crime Detection and Security, NAJA Intelligence Office (In Persian).
- Kadkhodaei, A. A., & Saed, N. (2011). Terrorism and Countering It. World Peace Forum (In Persian).
- Malakouti, R. (2019). Studying the Legal Status of Government Sovereignty in Cyberspace, Collection of Articles of the Conference on Legal Aspects of Information and Communication Technology of Iran. Tehran: University of Science and Culture, Second Edition (In Persian).
- Najafi Abrandabadi, A. H., & Hashembeigi, H. (2014). Encyclopedia of Criminology. Tehran: Ganj Danesh (In Persian).
- Pakzad, B. (2011). Cyberterrorism: A New Threat to National Security. Tehran: Remarks of the Vice-Chancellor of Education, Azad University (In Persian).
- B) Articles
- Ahmadi, N. (1998). Legal Characteristics of Cyber Terrorism. Journal of Jurisprudence, Law and Criminal Sciences, (7), 48-58 (In Persian).
- Amin Zadeh, E. (1999). A Brief Look at the Legal-Political Dimensions of International Terrorism and Liberation Movements, Foreign Policy Journal, 13(4), 1263-1275 (In Persian).
- Aminzadeh, E. (2001). The Difference Between Terrorism and the Effort to Achieve the Right to Self-Determination. Zharfana, (21), 83-90 (In Persian).
- Azimi, F., & Khosnoudi, H. (2016). The Role of Cyber Terrorism in Threats to Iran's Security and Ways to Prevent It, Political Studies Quarterly, Year 9, Issue 34, 159-174 (In Persian).
- Bozorgmehri, M. (2011). Fighting Terrorism in the United Nations, An Analysis of the Definition of Terrorism and Ways to Counter It in Conventions Approved by the General Assembly. Journal of Political and International Approaches, (82), 181-204 (In Persian).
- Ghadir, M., & Kazemi-Furushani, H. (2019). A Comparative Study of Iranian Criminal Law with International Documents in the Field of Countering and Preventing Cyber-Terrorism. International Law Journal, (60), 237-267 (In Persian).
- Katanchi, E., & Pourgharemani, B. (2019), Symbolic Policies of the Council of Europe Cybercrime Convention. International Studies Quarterly, 16 (2) 62, 31-47 (In Persian).
- Khalilipour Roknabadi, A.; Noorali Vand, Y. (2012). Cyber Threats and Their Impact on National Security. Strategic Studies Quarterly, 15(2), Serial 56, 167-196 (In Persian).
- Malakooti, R., & Khalilzadeh, M. (2002). Legal Solution for Ensuring Cybersecurity. Mass Media Studies and Research Quarterly, (1), Series 126, 69-97 (In Persian).
- Pournaqdi, B., & Bakhtiari, A. (2013). Cyber-Terrorism and Its Importance in Disrupting International Security. International Police Studies, 4(14), Summer, 29-46 (In Persian).
- Sabbaghian, A., & Sarvestani, A. (2018). European Union Counter-Terrorism Policies: Trends, Effectiveness and Prospects, Strategic Studies Quarterly, 21(1), Serial No. 79, 139-164 (In Persian).
- Yazdani, E., Moradi, F., & Qanavati, T. (2014). Cyber Terrorism: A New Form of Terror Against National Interests. International Relations Research Quarterly, 1, (13), 9-36 (In Persian).
- Ziaei, S., & Ehsan, S, (2017). Legislation in Cyberspace: An International Law and Iranian Law Approach. International Law Journal, 34(57), 227-247 (In Persian).