Ways to combat cybersecurity crimes
Keywords:
Cyber attacks, cyber security, cyber crimes, electronic systemsAbstract
Cyberspace is a digital environment reliant on information technology, dealing with elements of informational networks and data processing at an extraordinary speed. Cyber power can be used to launch cyberattacks against critical infrastructure, whether civilian or military. Cyberwarfare represents a modern means and method of armed conflict, embodied in cyber operations whose effects mirror those of traditional armed conflicts or accompany hostile actions within the context of armed conflicts. A notable example is the recent cyberattack in Lebanon, which involved disabling paging devices ("pagers") in accordance with the objectives of international humanitarian law. Cyberwarfare is intrinsically linked to the nature of cybersecurity, which aims to protect information and electronic systems from various cyber threats. This protection includes implementing a set of measures and techniques to prevent such threats and manage them when they occur, involving international system actors in today’s world—not only states and international organizations but also non-state actors. Thus, examining the extent to which domestic laws and international humanitarian law principles can be applied to cyberwarfare becomes essential. The increasing reliance of states on cyberattacks in their conflicts has subjected the rules of international humanitarian law to a real and complex test. This challenge revolves around whether these long-established international rules, codified decades ago, can apply to cyberattacks, which have emerged within the past decade. The difficulty of applying international rules to cyberattacks and subjecting them to the authority of these principles intersects with another issue: the lack of clarity surrounding the concept of direct participation in hostilities under international humanitarian law. The involvement of a significant number of individuals—both combatants and civilians—in modern hostilities has blurred the boundaries of the concept of direct participation to the extent that it has become difficult to clearly distinguish between direct and indirect participants in such operations. The convergence of cyberattacks with direct participation has exacerbated and complicated the challenges related to the application of international humanitarian rules. This is particularly true when direct participants in cyberattacks belong to the category of civilians. In such cases, international humanitarian rules protecting civilians overlap with those related to combatants who directly engage in hostilities, along with the principles concerning their targeting. Direct participation in this context represents the core challenge to the proper application of international humanitarian law and its principles.
References
First: Legal Books
1. Ahmed Abis Neama Al-Fatlawi, Cyber Attacks: A Legal Analytical Study on the Challenges of Contemporary Regulation, Zain Legal Publications, Beirut, Lebanon, 2018.
2. Amir Faraj Youssef, Combating Cyber Terrorism: Digital Terrorism under the Gulf Cooperation Council Convention on Combating Terrorism, 1st edition, Dar Al-Kutub and Arab Studies, Alexandria, 2015.
3. Baha Shaheen, The Internet Network, 2nd edition, Arab Computer Sciences, Cairo, 2001.
4. Jamal Ibrahim Al-Haidari, Cyber Crimes and Ways to Address Them, Al-Sanhouri Library, Baghdad, 2012.
5. Jamil Abdel Baqi Al-Saghir, Internet and Criminal Law, Dar Al-Nahda Al-Arabiya for Publishing and Distribution, Cairo, 2002.
6. Gil Baram, The Impact of Technological Development and Cyber Warfare on Power Building in Israel, Palestinian Studies Foundation, Palestine, 2013.
7. Hussein Mohammed Al-Ghoul, Internet Crimes and the Criminal Liability Arising Therefrom, 1st edition, Badran Legal Library for Publishing and Distribution, Beirut, Lebanon, 2017.
8. Rami Metwally Al-Qadi, Combating Cyber Crimes in Comparative Legislation and in Light of International Conventions and Charters, 1st edition, Dar Al-Nahda Al-Arabiya, Cairo, 2011.
9. Richard Clarke, Cyber War, 1st edition, Emirates Center for Strategic Studies and Research, Abu Dhabi, 2012.
10. Zabeekha Zidan, Cyber Crime in Algerian and International Legislation, Dar Al-Huda, Ain M'lila, Algeria.
11. Salim Abdullah Al-Jubouri, Legal Protection of Internet Information, Al-Halabi Legal Publications, Beirut, 2011.
12. Suleiman Ahmed Fadel, Legislative and Security Confrontation of Crimes Arising from the Use of the International Information Network, Dar Al-Nahda Al-Arabiya, Cairo, 2013.
13. Sayed Shorbaji Abdel-Moula, Confronting Economic Crimes in Arab Countries, 1st edition, Naif Arab University for Security Sciences, Riyadh, 2006.
14. Adel Abdel Sadiq, Cyber Weapons in Light of International Humanitarian Law, Bibliotheca Alexandrina, Alexandria, 2016.
15. Abdel Fattah Bayoumi Hegazy, Combating Computer and Internet Crimes in the Model Arab Law, 1st edition, Dar Al-Fikr Al-Jamii, Alexandria, 2006.
16. Abdullah Abdul Karim Abdullah, Cyber and Internet Crimes, 1st edition, Al-Halabi Legal Publications, Beirut, 2007.
17. Alaa Eldin Shehata, International Cooperation in Crime Combatting, Etrak for Publishing and Distribution, Cairo, 2015.
18. Ali Mohammed Ali Kazem Al-Mousawi, Direct Participation in Cyber Attacks, Modern Institution for Books, Beirut, Lebanon, 2019.
19. Omar Mohammed Abu Bakr bin Younis, Crimes Arising from the Use of the Internet, Dar Al-Nahda Al-Arabiya, Cairo, 2004.
20. Farouq Saad, Space Law, 3rd edition, Sader Legal Printing, Beirut, 2004.
21. Kamiran Aziz Hassan, International Efforts in Confronting Cyber Crimes, 1st edition, Al-Halabi Legal Publications for Publishing and Distribution, Beirut, Lebanon, 2021.
22. Laurence Oliva, Information Technology Security, Arab Organization for Translation, translated by Mohammed Marayati, Beirut, 2011.
23. Mohammed Ali Al-Arian, Cyber Crimes, New University House, Alexandria, 2011.
24. Mahmoud Medin Abdel Rahman, Cyber Crime and National Security Challenges, Egyptian Publishing and Distribution, Cairo, 2017.
25. Mamdouh Abdel Hamid Abdel Muttalib, Digital Criminal Investigation in Computer and Internet Crimes, Legal Books House, Cairo, 2006.
26. Munir Mohammed Al-Janabihi & Mamdouh Mohammed Al-Janabihi, Electronic Information Security, Dar Al-Fikr Al-Jamii, Alexandria, 2005.
27. Naeila Adel Mohammed Farid Qoura, Economic Computer Crimes, Al-Halabi Legal Publications, Beirut, 2005.
28. Nahla Abdel Qader Al-Moumani, Cyber Crimes, 2nd edition, Dar Al-Thaqafa for Publishing and Distribution, Amman, 2010.
29. Nouran Shafiq, The Impact of Cyber Threats on International Relations, 1st edition, Arab Knowledge Office, Cairo, 2016.
30. Huda Hamed Qashqoush, Computer Crimes in Comparative Legislation, Dar Al-Nahda Al-Arabiya, Cairo, 2000.
31. Youssef Hassan Youssef, International Internet Crimes, 1st edition, National Center for Legal Publications, Cairo, 2011.
Second: United Nations Resolutions
1. United Nations General Assembly Resolution No. 45/121, see document A/RES/121/45 on the official UN website: http://www.un.com/.
2. United Nations General Assembly Resolution No. 56/121, see document A/RES/121/56 on the official UN website: http://www.un.com/.
3. United Nations General Assembly Resolution No. 57/239, see document A/RES/239/57 on the official UN website: http://www.un.com/.
4. United Nations General Assembly Resolution No. 58/199, see document A/RES/199/58 on the official UN website: http://www.un.com/.
5. United Nations General Assembly Resolution No. 60/177, see document A/RES/177/60 on the official UN website: http://www.un.com/.
6. United Nations General Assembly Resolution No. 64/211, see document A/RES/211/64 on the official UN website: http://www.un.com/.
7. United Nations General Assembly Resolution No. 70/170, see document A/RES/170/70 on the official UN website: http://www.un.com/.