Electronic Terrorism is Legal Challenges and Illegal Practices
DOI:
https://doi.org/10.35246/wvhxsz06Keywords:
Electronic Terrorism, Terrorist Organizations, Challenges, Electronic Prosecution, SanctionsAbstract
This study investigates the modern threat of cross-border electronic terrorism, which significantly impacts state security and is linked to various factors. It highlights the challenges in controlling and prosecuting electronic terrorism due to differing international criminal procedures for terrorist activities like inspection, investigation, and evidence collection. The study also finds that electronic terrorism, reliant on computers and the internet, differs significantly from traditional methods, making it harder to regulate and prosecute. This challenge is worsened by inadequate cybersecurity and inconsistent laws globally.
Downloads
References
First: Legislation and constitutions:
i. Federal Law No. 7, United Arab Emirates, on Combating Terrorist Crimes of 2014.
ii. Federal Decree-Law No. 34, United Arab Emirates, on Combating Rumours and Cybercrimes, for the year 2021.
iii. Federal Decree-Law No. 20, United Arab Emirates, on Anti-Money Laundering and Combating the Financing of Terrorism and Financing of Illegal Organizations of 2018.
iv. Federal Decree-Law No. 55, United Arab Emirates, regarding the regulation of the media, for the year 2023.
v. Federal Decree-Law No. 45, United Arab Emirates, on the Protection of Personal Data for the year 2021.
vi. Federal Decree-Law No. 38, United Arab Emirates, promulgating the Code of Criminal Procedure of 2022.
vii. Decree of the President of the Arab Republic of Egypt, Law No. 94 of 2015, promulgating the Anti-Terrorism Law, available in the Official Gazette, Issue 33, August 15, 2015.
viii. The legal decision of the House of Representatives, Arab Republic of Egypt, by Law No. 175 of 2018, regarding combating information technology crimes, is present in the running.
Second: Magazines:
i. Al-Sir Al-Jilani Al-Amin Hammad and Muhammad Nasr Abdullah Nasr, The Concept of Electronic Terrorism and Ways to Combat It, Journal of Extremism and Armed Groups Issues, Volume 04, Issue 11, 2023.
ii. Engy Al-Mahdi, Electronic Terrorism: The Phenomenon and Repercussions of Use by Jihadist Organizations, National Social Journal, Volume Fifty-Eight, Issue One, January 2021.
iii. Hossam Fayez Abdel Hay, Electronic terrorism as a means of psychological warfare, a theoretical study, Journal of Research in the Fields of Specific Education, Issue Thirteen, 2017.
iv. Khaled Juma Sabit Ahmed Al-Makhmari, The Security Confrontation of Cyber Terrorism, Journal of Legal and Economic Research, Volume 58, Issue 2, October 2023.
v. Soleimani Mubarakeh, Electronic Terrorism and Ways to Combat It, Journal of Law and Political Science, No. 08, Vol. 01, 2017.
vi. Lalousofriadi bin Mujib, New Media in the Face of the Challenges of Electronic Terrorism, Al-Zahra, a semi-annual refereed magazine, seventeenth year, Issue 1, 2020.
vii. Lamia Mohamed Abdel Salam Judeh, The Role of the International Criminal Police Organization in Combating the Crime of International Terrorism, Journal of Jurisprudence and Legal Research, Forty-second Issue, 2023.
viii. Mohamed Khalifa Mohamed Suleiman Al-Hinai and Nizar Mohamed Ahmed, The Role of Artificial Intelligence in Combating the Crime of Financing Cyberterrorism, Perdana, International Journal of Academic Research, Social Sciences and Humanities, Volume 19, Issue 1, 2024.
ix. Mohamed Hamdi Abdel Alim Allam, Criminal Evidence in Electronic Terrorism Crimes, Journal of Extremism and Armed Groups Issues, Vol. 04, No. 11, 2023.
x. Muhammad Al-Tayeb Abdullah Khaled, Electronic Terrorism, Journal of the College of Sharia and Law, Volume 13, 2020.
xi. Mustafa Khalil Kamel Khalil, Cyberterrorism Crimes from the Perspective of International Law, Journal of the Faculty of Law, Volume V, Issue Two, December 2022.
xii. Nasser Al-Ali, International Efforts in Combating Cyberterrorism, Al-Researcher Journal for Academic Studies, Vol. 08, No. 01, Year 2021.
Third: International Organizations:
i. United Nations UNODC, New York, United Nations Office on Drugs and Crime, Vienna, The use of the Internet for terrorist purposes, June 2013.
ii. United Nations Office on Drugs and Crime, Study on Counter-Terrorism Legislation in the Arab Gulf States and Yemen, Vienna, 2009.
Fourth: Websites
i. The Official Portal of the UAE Government, Cyber Safety and Digital Security, available on the website, https://u.ae/ar-ae/information-and-services/justice-safety-and-the-law/cyber-safety-and-digital-security/cyber-safety .
ii. Penetrating, available on the website, https://ar.m.wikipedia.org/wiki/%D9%85%D8%AE%D8%AA%D8%B1%D9%82 .
iii. Mahmoud Salameh, International and Regional Organizations in Combating Cyberterrorism, article in International Politics, January 2022, available on the official website of https://www.researchgate.net/publication/357578485 .
iv. Features of the global transition to the "post-information" phase, available on the website, https://futureuae.com/ar/Mainpage/ltem/4267.
v. Hisham Bashir, Opinions on the Gulf, Electronic Terrorism in the Light of the Information Revolution, Issue 92, May 2012, available on the website
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Copyright and Licensing:
For all articles published in Journal of Legal Sciences, copyright is retained by the authors. Articles are licensed under an open access Creative Commons CC BY 4.0 license, meaning that anyone may download and read the paper for free. In addition, the article may be reused and quoted provided that the original published version is cited. These conditions allow for maximum use and exposure of the work.
Reproducing Published Material from other Publishers: It is absolutely essential that authors obtain permission to reproduce any published material (figures, schemes, tables or any extract of a text) which does not fall into the public domain, or for which they do not hold the copyright. Permission should be requested by the authors from the copyrightholder (usually the Publisher, please refer to the imprint of the individual publications to identify the copyrightholder).
Permission is required for: Your own works published by other Publishers and for which you did not retain copyright.
Substantial extracts from anyones' works or a series of works.
Use of Tables, Graphs, Charts, Schemes and Artworks if they are unaltered or slightly modified.
Photographs for which you do not hold copyright.
Permission is not required for: Reconstruction of your own table with data already published elsewhere. Please notice that in this case you must cite the source of the data in the form of either "Data from..." or "Adapted from...".
Reasonably short quotes are considered fair use and therefore do not require permission.
Graphs, Charts, Schemes and Artworks that are completely redrawn by the authors and significantly changed beyond recognition do not require permission.
Obtaining Permission
In order to avoid unnecessary delays in the publication process, you should start obtaining permissions as early as possible. If in any doubt about the copyright, apply for permission. Journal of Legal Sciences cannot publish material from other publications without permission.
The copyright holder may give you instructions on the form of acknowledgement to be followed; otherwise follow the style: "Reproduced with permission from [author], [book/journal title]; published by [publisher], [year].' at the end of the caption of the Table, Figure or Scheme.






