The Legal Nature of the Crime of Electronic Hacking That Harms State Security a
A Comparative Study
DOI:
https://doi.org/10.35246/6pewm537Keywords:
Cyber Espionage, Cybercrime, Information Security, Hack, Digital Crime, State securityAbstract
Cyber-penetration is one of the most serious digital crimes threatening the stability and integrity of States' systems. For the purpose of espionage, sabotage or disruption of critical infrastructure, the research will show what the internal and external security of States is.
As for its legal nature, the cybercrime has two different natures, one of which is the material aspect, which is when the information is stored on an electronic supporter, and the latter is the moral aspect, which is when the information is in a state of transfer or is present in the memory of the information system. In order to clarify the concept of breach of diamonds by the security of States, and also for this crime to materialize, its main pillars must be found s intention to harm the security of the State.
Downloads
References
Sources and References:
Firstly: - Linguistic References:
I. Mohamed bin Makram bin Manzur, Lisan al-Arab, Dar Sader, Beirut, 1st Edition, (73/10).
II. Mohamed bin Abdulrazzaq Al-Husseini, known as Murtadha Al-Zabidi, Taj al-Arus Min Jawahir al-Qamus, Dar Al-Hidaya, (219/25).
Secondly: - Arabic Reference:
III. Ibrahim Shakir Mahmoud Al-Jubouri, Crimes Against National Security from Inside and Outside, National Center for Legal Publications, Cairo, 2011, p. 171.
IV. Ibrahim Mahmoud Al-Lubaydi, Criminal Protection of National Security, Dar Al-Kutub Al-Qanuniya, Egypt, 2010.
V. Ahmed Khalifa Al-Malta, Cyber Crimes, Dar Al-Fikr Al-Arabi, Alexandria, 2nd Edition, 2006.
VI. Ahmed Fathi Surour, Criminal Code: Special Part, Dar Al-Nahda Al-Arabiya, Cairo, 1992.
VII. Islam Hadeeb, Cybersecurity: Cyberattacks and Cybercrimes, Dar Misr for Publishing and Distribution, 1st Edition, 2024.
VIII. Bakar Youssef Bakar, Searching for Information in Modern Technology Tools, Dar Al-Fikr Al-Jami'i, Alexandria, 1st Edition, 2011.
IX. Jamal Sand Al-Suwaidi, The Security System in the Gulf Region: Internal and External Challenges, Emirates Center for Strategic Studies and Research, 1st Edition, 2008.
X. Hassan Rabea Mohamed, Explanation of the Federal Penal Code of the UAE (General Part) Part 1, Dubai Police Academy, 2nd Edition, 2004.
XI. Rami Metwally Al-Qadi, Combating Cyber Crimes in Comparative Legislation and in the Light of International Agreements and Treaties, Dar Al-Nahda Al-Arabiya, Cairo, 1st Edition, 2011.
XII. Raouf Obeid, Principles of the General Part in Penal Legislation, Dar Al-Fikr Al-Jami'i, Egypt, 1979.
XIII. Samir Alya, Concise Explanation of Crimes Against National Security: A Comparative Study, The University Foundation for Studies, Publishing, and Distribution, Beirut, 1999.
XIV. Samir Alya, Concise Explanation of Crimes Against National Security, The University Foundation for Studies, Publishing, and Distribution, Beirut, Lebanon, 2008.
XV. Abdulrahman Al-Dakheel, Description of Hacking Websites on the World Wide Web, Al-Rushd Library, Riyadh, 2005.
XVI. Abdul-Muhaymin Bakar Salem, Crimes Against National Security Abroad: A Comparative Study in Kuwaiti and Comparative Legislation, Kuwait University Publications, 1988.
XVII. Abdullah Muhammad Al-Nawaiseh, Information Technology Crimes: Explanation of the Substantive Provisions of the Cybercrime Law, Mutah University, Dar Wail for Publishing and Distribution, 1st Edition, 2017.
XVIII. Mohamed Al-Shanawi, Strategy for Combating Human Trafficking Crimes, National Center for Legal Publications, Cairo, 2014.
XIX. Mohamed Al-Qasim and Abdulrahman Bin Abdulaziz Al-Hamdan, Essentials of Information Security, Riyadh, 2008.
XX. Mohamed Shalal Al-Ani and Abdul-Ilah Muhammad Salem Al-Nawaiseh, Crimes Affecting National Security Both Domestic and Foreign in UAE Legislation: According to the Latest Amendments by Decree-Law No. (7) of 2016, No Publisher, 2018.
XXI. Mohamed Shalal Al-Ani, Provisions of the General Part in the UAE Federal Penal Code, Al-Afaq Al-Mushriqa Publishers, 2010.
XXII. Mahmoud Suleiman Mousa, Crimes Against National Security: A Comparative Study in Arab Legislations and French and Italian Law, Dar Al-Matboo'at Al-Jami'iya, Alexandria, 2009.
XXIII. Mahmoud Ouda Al-Jubour, Crimes Against National Security and Terrorism Crimes in Jordanian Law and Arab Laws, Dar Al-Thaqafa for Publishing and Distribution, Amman, 2nd Edition, 2010.
XXIV. Midhat Mohamed Abdulaziz Ibrahim, Cyber Crimes on Information Systems: A Comparative Study, 1st Edition, Dar Al-Nahda Al-Arabiya, Cairo, 2015.
XXV. Hani Shakir Hani, General Provisions of Informational Data Secrecy: A Comparative Study, Center for Arab Studies, Cairo, 2024.
XXVI. Wassim Al-Ahmad, Collection of Arab Laws Related to Combating Information Technology Crimes, Al-Dar Al-Manhajiya for Publishing and Distribution, Amman, 2020.
Thirdly: - Foreign References:
XXVII. MARWE VANDER, Computer Crimes and Other Crimes Against Information Technology in South Africa, R.I.D.P, 1993.
XXVIII. The Computer Misuse Act, Art 1-1: “He knows at the time when he causes the computer to perform the function that that is the case.”
Fourthly: - Academic Theses:
XXIX. Islam Mustafa Jumaa Mustafa, Cybersecurity Breaches and Protection of Data and Information Use in Egyptian Law, Doctoral Thesis, Legal Journal, Vol. 12, Issue 3, 2022.
XXX. Hamza Ben Aqoun, Criminal Behavior of Cybercriminals, Master's Thesis, Batna University, 2011.
XXXI. Sofiane Souir, Cybercrimes, Master's Thesis, Abou Bakr Belkaid Tlemcen University, Algeria, 2011.
XXXII. Sofiane Archouch, Crimes Affecting Internal National Security: A Comparative Study Between Sharia and Law, Doctoral Thesis, Faculty of Law and Political Science, Mohamed Khider University of Biskra, 2015-2016.
XXXIII. Abdulrazzaq Abdulrahim Al-Mazmi, Criminal Protection of Internal National Security from Organized Crime in UAE Penal Legislation, Doctoral Thesis, Dubai Police Academy, 2015.
XXXIV. Abdul Latif Bin Saleh Al-Suwaid, The Crime of Hacking and its Punishment: A Comparative Study, Master's Thesis, Imam Muhammad Bin Saud Islamic University, 1430 AH.
XXXV. Mohamed Amin Ben Hariga, Methods and Techniques of Investigation in Combating Cybercrime, Master's Thesis, Abdelhamid Ben Badis University, Mostaganem, Algeria, 2020.
XXXVI. Youssef Al-Afifi, Cybercrimes in Palestinian Legislation: An Analytical Study, Master's Thesis, Islamic University of Gaza, 2013.
Fifthly: - Scientific Journals and Articles:
XXXVII. Bakar Abdul Muhaymin, General Provisions on Crimes Affecting External National Security, Journal of Legal and Economic Sciences, Vol. 7, Issue 1, 1965.
XXXVIII. Samia Bouchoucha, Electronic Espionage and Methods of Combating It, Journal of Social and Human Sciences, Vol. 16, Issue 1, 2023.
XXXIX. Samira Beitam, Cybercrime and Emerging Criminal Technology, Article published on 3-10-2015, on the website Alukah.net.
XL. Abdullah Bin Saad Al-Qahtani, Internet Security from Hacking and Trojan Horses, Journal of Knowledge Affairs, King Abdulaziz Library, Riyadh, 2002.
XLI. Karim Ouragh, Electronic Hacking in Cyberspace and Best Methods of Protection Against It, Journal of Scientific Development in Studies and Research, Issue 4, 2021.
XLII. Mahrous Nassar Ghaib, Information Crime, Technician Magazine, Technical Institute - Anbar Province, Vol. 244, Issue 9, 2011.
XLIII. Mahmoud Abdullah Dheeb Abdullah, Hacking Crimes on Government Data and Websites: A Comparative Study, Al-Manara Journal for Legal and Administrative Studies, Special Issue, 2020.
XLIV. Nadia Salami, Electronic Espionage as a Consequence of the Illegal Use of Cyberspace on External National Security, Studies Journal of Ammar Thleiji University, Alghawat, Faculty of Law and Political Science, Khenchela University, Algeria, Issue 56, 2017.
XLV. Nermin Nabil Al-Azraq, Determinants of Criminal Responsibility for Hacking, Interception, and Impersonation Crimes and Mechanisms for Control and Deterrence in Arab Legislation in the Digital Age: A Comparative Analytical Study, Media Research Journal, Al-Azhar University, Issue 56, Part 3, January 2021.
Sixthly: - Websites:
XLVI. See Article (1) of the Computer Misuse Act in the UK, 1990 here.
Seventhly: - Laws:
XLVII. The Computer Misuse Act in the UK, 1990.
XLVIII. Saudi Cybercrime Control System, issued by the Communications and Information Technology Commission, 1428 AH.
XLIX. Federal Law No. (34) of 2021 on Combating Rumors and Cybercrimes.
L. Jordanian Cybercrime Law No. (17) of 2023.
LI. Criminal and Penal Code of the United Arab Emirates as per Federal Decree-Law No. (31) of 2021.
LII. Criminal and Penal Code of the United Arab Emirates according to the latest amendments by Federal Decree-Law No. (31) of 2021.
LIII. Egyptian Penal Code No. (95) of 2003.
LIV. Law No. (175) of 2018 on Combating Information Technology Crimes.
LV. Law No. (63) of 2015 on Combating Information Technology Crimes (Egypt).
LVI. Law No. (63) of 2015 on Combating Information Technology Crimes (Kuwait).
LVII. Federal Decree-Law No. (34) of 2021 on Combating Rumors and Cybercrimes.
LVIII. Combating Information Technology Crimes Law No. (175) of 2018.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Copyright and Licensing:
For all articles published in Journal of Legal Sciences, copyright is retained by the authors. Articles are licensed under an open access Creative Commons CC BY 4.0 license, meaning that anyone may download and read the paper for free. In addition, the article may be reused and quoted provided that the original published version is cited. These conditions allow for maximum use and exposure of the work.
Reproducing Published Material from other Publishers: It is absolutely essential that authors obtain permission to reproduce any published material (figures, schemes, tables or any extract of a text) which does not fall into the public domain, or for which they do not hold the copyright. Permission should be requested by the authors from the copyrightholder (usually the Publisher, please refer to the imprint of the individual publications to identify the copyrightholder).
Permission is required for: Your own works published by other Publishers and for which you did not retain copyright.
Substantial extracts from anyones' works or a series of works.
Use of Tables, Graphs, Charts, Schemes and Artworks if they are unaltered or slightly modified.
Photographs for which you do not hold copyright.
Permission is not required for: Reconstruction of your own table with data already published elsewhere. Please notice that in this case you must cite the source of the data in the form of either "Data from..." or "Adapted from...".
Reasonably short quotes are considered fair use and therefore do not require permission.
Graphs, Charts, Schemes and Artworks that are completely redrawn by the authors and significantly changed beyond recognition do not require permission.
Obtaining Permission
In order to avoid unnecessary delays in the publication process, you should start obtaining permissions as early as possible. If in any doubt about the copyright, apply for permission. Journal of Legal Sciences cannot publish material from other publications without permission.
The copyright holder may give you instructions on the form of acknowledgement to be followed; otherwise follow the style: "Reproduced with permission from [author], [book/journal title]; published by [publisher], [year].' at the end of the caption of the Table, Figure or Scheme.






