The Legal Nature of the Crime of Electronic Hacking That Harms State Security a

A Comparative Study

Authors

  • Fatma Yaqub Yousif
  • Dr. Mohammed Shalal Al-Ani

DOI:

https://doi.org/10.35246/6pewm537

Keywords:

Cyber Espionage, Cybercrime, Information Security, Hack, Digital Crime, State security

Abstract

Cyber-penetration is one of the most serious digital crimes threatening the stability and integrity of States' systems. For the purpose of espionage, sabotage or disruption of critical infrastructure, the research will show what the internal and external security of States is.

As for its legal nature, the cybercrime has two different natures, one of which is the material aspect, which is when the information is stored on an electronic supporter, and the latter is the moral aspect, which is when the information is in a state of transfer or is present in the memory of the information system. In order to clarify the concept of breach of diamonds by the security of States, and also for this crime to materialize, its main pillars must be found s intention to harm the security of the State.

Downloads

Download data is not yet available.

References

Sources and References:

Firstly: - Linguistic References:

I. Mohamed bin Makram bin Manzur, Lisan al-Arab, Dar Sader, Beirut, 1st Edition, (73/10).

II. Mohamed bin Abdulrazzaq Al-Husseini, known as Murtadha Al-Zabidi, Taj al-Arus Min Jawahir al-Qamus, Dar Al-Hidaya, (219/25).

Secondly: - Arabic Reference:

III. Ibrahim Shakir Mahmoud Al-Jubouri, Crimes Against National Security from Inside and Outside, National Center for Legal Publications, Cairo, 2011, p. 171.

IV. Ibrahim Mahmoud Al-Lubaydi, Criminal Protection of National Security, Dar Al-Kutub Al-Qanuniya, Egypt, 2010.

V. Ahmed Khalifa Al-Malta, Cyber Crimes, Dar Al-Fikr Al-Arabi, Alexandria, 2nd Edition, 2006.

VI. Ahmed Fathi Surour, Criminal Code: Special Part, Dar Al-Nahda Al-Arabiya, Cairo, 1992.

VII. Islam Hadeeb, Cybersecurity: Cyberattacks and Cybercrimes, Dar Misr for Publishing and Distribution, 1st Edition, 2024.

VIII. Bakar Youssef Bakar, Searching for Information in Modern Technology Tools, Dar Al-Fikr Al-Jami'i, Alexandria, 1st Edition, 2011.

IX. Jamal Sand Al-Suwaidi, The Security System in the Gulf Region: Internal and External Challenges, Emirates Center for Strategic Studies and Research, 1st Edition, 2008.

X. Hassan Rabea Mohamed, Explanation of the Federal Penal Code of the UAE (General Part) Part 1, Dubai Police Academy, 2nd Edition, 2004.

XI. Rami Metwally Al-Qadi, Combating Cyber Crimes in Comparative Legislation and in the Light of International Agreements and Treaties, Dar Al-Nahda Al-Arabiya, Cairo, 1st Edition, 2011.

XII. Raouf Obeid, Principles of the General Part in Penal Legislation, Dar Al-Fikr Al-Jami'i, Egypt, 1979.

XIII. Samir Alya, Concise Explanation of Crimes Against National Security: A Comparative Study, The University Foundation for Studies, Publishing, and Distribution, Beirut, 1999.

XIV. Samir Alya, Concise Explanation of Crimes Against National Security, The University Foundation for Studies, Publishing, and Distribution, Beirut, Lebanon, 2008.

XV. Abdulrahman Al-Dakheel, Description of Hacking Websites on the World Wide Web, Al-Rushd Library, Riyadh, 2005.

XVI. Abdul-Muhaymin Bakar Salem, Crimes Against National Security Abroad: A Comparative Study in Kuwaiti and Comparative Legislation, Kuwait University Publications, 1988.

XVII. Abdullah Muhammad Al-Nawaiseh, Information Technology Crimes: Explanation of the Substantive Provisions of the Cybercrime Law, Mutah University, Dar Wail for Publishing and Distribution, 1st Edition, 2017.

XVIII. Mohamed Al-Shanawi, Strategy for Combating Human Trafficking Crimes, National Center for Legal Publications, Cairo, 2014.

XIX. Mohamed Al-Qasim and Abdulrahman Bin Abdulaziz Al-Hamdan, Essentials of Information Security, Riyadh, 2008.

XX. Mohamed Shalal Al-Ani and Abdul-Ilah Muhammad Salem Al-Nawaiseh, Crimes Affecting National Security Both Domestic and Foreign in UAE Legislation: According to the Latest Amendments by Decree-Law No. (7) of 2016, No Publisher, 2018.

XXI. Mohamed Shalal Al-Ani, Provisions of the General Part in the UAE Federal Penal Code, Al-Afaq Al-Mushriqa Publishers, 2010.

XXII. Mahmoud Suleiman Mousa, Crimes Against National Security: A Comparative Study in Arab Legislations and French and Italian Law, Dar Al-Matboo'at Al-Jami'iya, Alexandria, 2009.

XXIII. Mahmoud Ouda Al-Jubour, Crimes Against National Security and Terrorism Crimes in Jordanian Law and Arab Laws, Dar Al-Thaqafa for Publishing and Distribution, Amman, 2nd Edition, 2010.

XXIV. Midhat Mohamed Abdulaziz Ibrahim, Cyber Crimes on Information Systems: A Comparative Study, 1st Edition, Dar Al-Nahda Al-Arabiya, Cairo, 2015.

XXV. Hani Shakir Hani, General Provisions of Informational Data Secrecy: A Comparative Study, Center for Arab Studies, Cairo, 2024.

XXVI. Wassim Al-Ahmad, Collection of Arab Laws Related to Combating Information Technology Crimes, Al-Dar Al-Manhajiya for Publishing and Distribution, Amman, 2020.

Thirdly: - Foreign References:

XXVII. MARWE VANDER, Computer Crimes and Other Crimes Against Information Technology in South Africa, R.I.D.P, 1993.

XXVIII. The Computer Misuse Act, Art 1-1: “He knows at the time when he causes the computer to perform the function that that is the case.”

Fourthly: - Academic Theses:

XXIX. Islam Mustafa Jumaa Mustafa, Cybersecurity Breaches and Protection of Data and Information Use in Egyptian Law, Doctoral Thesis, Legal Journal, Vol. 12, Issue 3, 2022.

XXX. Hamza Ben Aqoun, Criminal Behavior of Cybercriminals, Master's Thesis, Batna University, 2011.

XXXI. Sofiane Souir, Cybercrimes, Master's Thesis, Abou Bakr Belkaid Tlemcen University, Algeria, 2011.

XXXII. Sofiane Archouch, Crimes Affecting Internal National Security: A Comparative Study Between Sharia and Law, Doctoral Thesis, Faculty of Law and Political Science, Mohamed Khider University of Biskra, 2015-2016.

XXXIII. Abdulrazzaq Abdulrahim Al-Mazmi, Criminal Protection of Internal National Security from Organized Crime in UAE Penal Legislation, Doctoral Thesis, Dubai Police Academy, 2015.

XXXIV. Abdul Latif Bin Saleh Al-Suwaid, The Crime of Hacking and its Punishment: A Comparative Study, Master's Thesis, Imam Muhammad Bin Saud Islamic University, 1430 AH.

XXXV. Mohamed Amin Ben Hariga, Methods and Techniques of Investigation in Combating Cybercrime, Master's Thesis, Abdelhamid Ben Badis University, Mostaganem, Algeria, 2020.

XXXVI. Youssef Al-Afifi, Cybercrimes in Palestinian Legislation: An Analytical Study, Master's Thesis, Islamic University of Gaza, 2013.

Fifthly: - Scientific Journals and Articles:

XXXVII. Bakar Abdul Muhaymin, General Provisions on Crimes Affecting External National Security, Journal of Legal and Economic Sciences, Vol. 7, Issue 1, 1965.

XXXVIII. Samia Bouchoucha, Electronic Espionage and Methods of Combating It, Journal of Social and Human Sciences, Vol. 16, Issue 1, 2023.

XXXIX. Samira Beitam, Cybercrime and Emerging Criminal Technology, Article published on 3-10-2015, on the website Alukah.net.

XL. Abdullah Bin Saad Al-Qahtani, Internet Security from Hacking and Trojan Horses, Journal of Knowledge Affairs, King Abdulaziz Library, Riyadh, 2002.

XLI. Karim Ouragh, Electronic Hacking in Cyberspace and Best Methods of Protection Against It, Journal of Scientific Development in Studies and Research, Issue 4, 2021.

XLII. Mahrous Nassar Ghaib, Information Crime, Technician Magazine, Technical Institute - Anbar Province, Vol. 244, Issue 9, 2011.

XLIII. Mahmoud Abdullah Dheeb Abdullah, Hacking Crimes on Government Data and Websites: A Comparative Study, Al-Manara Journal for Legal and Administrative Studies, Special Issue, 2020.

XLIV. Nadia Salami, Electronic Espionage as a Consequence of the Illegal Use of Cyberspace on External National Security, Studies Journal of Ammar Thleiji University, Alghawat, Faculty of Law and Political Science, Khenchela University, Algeria, Issue 56, 2017.

XLV. Nermin Nabil Al-Azraq, Determinants of Criminal Responsibility for Hacking, Interception, and Impersonation Crimes and Mechanisms for Control and Deterrence in Arab Legislation in the Digital Age: A Comparative Analytical Study, Media Research Journal, Al-Azhar University, Issue 56, Part 3, January 2021.

Sixthly: - Websites:

XLVI. See Article (1) of the Computer Misuse Act in the UK, 1990 here.

Seventhly: - Laws:

XLVII. The Computer Misuse Act in the UK, 1990.

XLVIII. Saudi Cybercrime Control System, issued by the Communications and Information Technology Commission, 1428 AH.

XLIX. Federal Law No. (34) of 2021 on Combating Rumors and Cybercrimes.

L. Jordanian Cybercrime Law No. (17) of 2023.

LI. Criminal and Penal Code of the United Arab Emirates as per Federal Decree-Law No. (31) of 2021.

LII. Criminal and Penal Code of the United Arab Emirates according to the latest amendments by Federal Decree-Law No. (31) of 2021.

LIII. Egyptian Penal Code No. (95) of 2003.

LIV. Law No. (175) of 2018 on Combating Information Technology Crimes.

LV. Law No. (63) of 2015 on Combating Information Technology Crimes (Egypt).

LVI. Law No. (63) of 2015 on Combating Information Technology Crimes (Kuwait).

LVII. Federal Decree-Law No. (34) of 2021 on Combating Rumors and Cybercrimes.

LVIII. Combating Information Technology Crimes Law No. (175) of 2018.

Downloads

Published

2026-04-01

How to Cite

Yousif , Fatma, and Mohammed Al-Ani. 2026. “The Legal Nature of the Crime of Electronic Hacking That Harms State Security a : A Comparative Study”. Journal of Legal Sciences 40 (4): 481-524. https://doi.org/10.35246/6pewm537.

Similar Articles

1-10 of 226

You may also start an advanced similarity search for this article.