Authors

1 Prof., Department of Public and International Law, Faculty of Law and Political Science, University of Tehran, Tehran, Iran

2 MA. in International Law, Department of Public and International Law, Faculty of Law and Political Science, University of Tehran, Tehran, Iran

Abstract

Terrorism has begun with the emergence of human societies and according to the progress of societies has developed with increasing speed. The most modern forms of terrorism, which today has attracted a lot of attention is cyberterrorism. Cyberterrorism, which suffers from the vagueness of traditional terrorism and lack of definition and agreement on it, due to the unique context of the realization of it i.e. cyberspace, has further questions, which answers to these questions are necessary for further examinations. In this article, we have tried to use the available data to prove the existence of such a phenomenon and thus we examined its relationship with the self-defense principle set out in article 51 of the charter of the United Nations. Since the use of the term “armed attack” for cybercrimes is another major challenge for these actions, which may have many consequences.

Keywords

  1. فارسی
    الف) کتاب‌ها
    پاپ، دانیل و دیوید آلبرتس (1385). امنیت در عصر اطلاعات، الزامات امنیت ملی در عصر اطلاعات، ترجمۀ علی‌آبادی و رضا نخجوانی، چ اول، تهران: انتشارات پژوهشگاه مطالعات راهبردی.
    پاکزاد، بتول (1390). تروریسم سایبری تهدیدی نوین علیه امنیت ملی، تهران: انتشارات معاونت آموزشی دانشگاه آزاد.
    دیترفلک و دیگران (1387). حقوق بشردوستانه در مخاصمات مسلحانه، ترجمۀ قاسم زمانی، نادر ساعد و دیگران، چ اول، تهران: مؤسسۀ مطالعات و پژوهش‌های حقوقی شهر دانش.
    نیاورانی، صابر (1389). تحول مفهوم دفاع مشروع در حقوق بین‌الملل، رسالۀ دکتری، دانشگاه شهید بهشتی
    هیبلز گری، کریس (1381) جنگ پست‌مدرن، سیاست نوین درگیری، ترجمۀ احمدرضا تقاء، تهران: انتشارات دورۀ عالی جنگ.
     
    ب) مقالات
     
    ملکی‌زاده، امیرحسین (1391). «تحلیل مفهوم قابلیت انتساب مسئولیت بین‌المللی در رویۀ دیوان بین‌المللی دادگستری»، فصلنامۀ راهبرد، سال بیست‌ویکم، ش 64، ص 273.
     
     
    لاتین
    a)      Book
    7.       CCDCOE, International cyber  incidents: legal considerations, 2010.
    8.       Brownlie, Ian, (1963). International law and the use of force by states, Oxford University press.

    1. 9.       Denning, Dorothy, (2001). Activism, Hacktivism and Cyberterrorism: the Internet as a Tool for Influencing Foreign Policy, In: Aquila and Ronfeldt, Networks and Net wars: the Future of Terror, Crime, and Militancy, Santa Monica, RAND Corporation.
    2. 10.    Dinstein, Yoram, (2005). War, Aggression and self-defense, Cambridge University press, 4th ed.
    3. 11.    Flemming, Peter, (2000). Myths and Realities of Cyberterrorism, Office of International Programs and the Center for Education and Research in Information Assurance and Security, Purdue University.
      1. 12.    Oots, Kent, (1990). Bargaining with Terrorist: Organizational Consideration, Terrorism, vol.13.
      2. 13.    Rowe, A.J and S.A Davis. (1996). the Intelligent Information Systems: Meeting the Challenge in the Knowledge Era, Greenwood Publishing Group
      3. 14.    Sharp, Walter gray, (1999). cyber warfare and the use of force, Aegin research corporation.
        1. 15.    Wingfield, Thomas (2000). the Law of Information Conflict: National Security Law in Cyberspace
        2. 16.    Verton, Dan, (2002). The prospect of Iraq conflict raises new cyber-attack fears, computerworld.

     
    B) Article
    17.    Aaviksoo, Jaac, (2010). “Cyber-attacks against Estonia Raised Awareness of Cyber threats, Defenses against Terrorism Review, Vol.3, No2
    18.    Bogdanosky, Mitko, (2013). “Cyber Terrorism– Global Security Threat, International Scientific Defence, Security And Peace Journal, NO. 24(13)

    1. 19.    Brenner, Susan &Marc Goodman, (2002). “In Defense of Cyberterrorism: An Argument for Anticipating Cyber Attacks, Journal of Law, Technology and Policy.
    2. 20.    Brito, Jerry and Tate Watkins, (2011). Loving the Cyber Bomb? The Dangers of Threat Inflation in Cybersecurity Policy, Harvard National Security Journal, Vol.3
      1. 21.    Capaldo, Giuliani ziccardi, (2007). “providing a Self-Defense against large scale attacks by irregular forces: The Israeli- Hezbollah conflict, Harvard international law journal, vol. 48
      2. 22.    Clay, Wilson, (2003). “Information Warfare and Cyberwar: Capabilities and Related Policy Issues, CRS Report RL31787.
      3. 23.    Collin, Barry, (1997). The Future of Cyberterrorism: Where the Physical and Virtual Worlds Converge, 11th Annual International Symposium on Criminal Justice Issues.
      4. 24.    Cornish, Paul and et seq, (2010). “on cyber Warfare, A Chatham House Report”.
      5. 25.    Gorman, Siobhan, (2008). “Cyber Attacks on Georgian Websites are Re-igniting Washington Debate, The Wall Street Journal.
      6. 26.    Hansen, James and et seq, (2006). Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection, Decision Support System, Vol.43(4).
      7. 27.    Hessbrugge, Jan Arna, (2004). “The historical development of attribution and due diligence in international law, New York University journal of international law, Vol.36
        1. 28.    Roscini, Marco, (2010). “world wide warfare- jus ad bellum and use of cyber force, Max plunk yearbook of united nation law, Vol. 14.
        2. 29.    Schaap, A.J, (2009). “Cyber Warfare Operations: Development and Use under International law, Air Force law review, vol 64.
        3. 30.    Schmitt, Micheal N., (2012). “Attack as a Term of Art in International law: the Cyber Operations Context, 4th international conference on cyber conflict, Tallinn: NATO CCD COE Publications.
        4. 31.    Walker, Clave, (2006). “Cyberterrorism: Legal Principle and Law in the United Kingdom, Penn State Law Review, vol.110:3
        5. 32.    Weimann, Gabriel, (2005). “Cyberterrorism: The Sum of All Fear?” 28 Studies in Conflict and Terroris

     
    C)    Document
    33.    Council of Europe, (2005). Organized Crime in Europe: The Threat of Cybercrime, Situation Report 2004, Council of Europe Publishing
    34.    Defense Department Cyber Efforts: More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities, (2011)
    35.    Inter-American commission on human rights (Valesquez Rodrigues V Honduras), (1998). Series C, Decisions and Judgments, No. 04

    1. 36.    Sieber, Ulrich, Cyber terrorism: Use the Internet for Terrorism Purposes, UNODC Report, 2012.
    2. 37.    Trail Smelter Case (US V Canada), (1931). UN Reports of international arbitration awards
      1. 38.    Weimann, Gabriel, (2004). Cyberterrorism: How Real is the Threat? United States Institute for Peace, Special Report 119, 2004.

    Websites:
    39.    http://daccess-ods.un.org/TMP/4252361.05918884.html40.    http://itlaw.wikia.com/wiki/Estonia_cyberattack41.    http://www.cfr.org/terrorism-and-technology/cyberterrorism-hype-v-fact/p2143442.    http://www.cnet.com/news/cia-cyberattack-caused-multiple-city-blackout/43.    http://www.nytimes.com/2007/05/18/world/europe/18cnd-russia.html?_r=044.    http://www.theguardian.com/world/2007/may/17/topstories3.russia45.    http://www.merriam-webster.com/dictionary/cyberspace  
    46.    https://en.wikipedia.org/wiki/Cyberterrorism