Strategic communication studies

Strategic communication studies

Dealing with Terrorist Crimes in the Digital Age; Challenges and Strategies

Document Type : Original Article

Authors
1 Assistant Professor Department of Law Faculty of Administrative Sciences and Economics Arak University (Corresponding Author).
2 Assistant Professor Department of Law Payame Noor University Tehran, Iran.
Abstract
Background and purpose: Digital technologies have changed our lives drastically. Almost every area of social relations is now being digitized, both nationally and internationally. Information communication infrastructure as well as digital devices have now become an integral part of today's reality. Digitalization has a huge impact on the development and observance of human rights, as well as on the individual's own situation. With the growth of digital technologies, terrorist crimes spread in the cyber space and provided many opportunities for the perpetrators of terrorist crimes to take measures to cause serious damage to social, political and even security infrastructures.
Method: This research is descriptive-analytical. Therefore, the data has been collected and analyzed in a documentary way and measuring regulations based on written documents and sources, as well as studying and analyzing the views of legal experts with a phishing tool.
Findings: Due to the failure of control measures and effective monitoring of the Internet and cyberspace due to the lack of cooperation of governments, the use of cyberspace by terrorist groups is considered a new challenge for anti-terrorist mechanisms. At the same time, for the development of virtual space in the framework of the governments' strategy, especially the governments with advanced internet infrastructure, it should be done in order to prevent and suppress the terrorist use of the media. In addition, due to the lack of a comprehensive legal document governing the Internet and cyberspace due to the lack of global consensus, it is necessary to coordinate the implementation of a successful international response to the movements of terrorists in the cyberspace of governments by adopting appropriate and effective strategies.
Keywords

Subjects


منابع
 
Barrie, Sander, “International Law in the Age of Digital Media: Reflections on History, the Neoliberal Communication Sphere, and Race”, London Review of International Law, 2022, (10) 2, 295.
Barjalizadeh, Mohammad, Jafari, Ali and Kurdi, Nahid (2018), “Investigating the role of modern media in the spread of terrorism in the international arena”, Soft Power Studies, 1 (9). [In Persian]
Buresh, Donald L (2020), “Does Digital Terrorism Really Exist?”, Journal of Advanced Forensic Sciences, 1 (1): 18-29.
Casella, R, The False Allure of Security Technologies. Social Justice, 2003, 30 (3), p. 92.
Casey, Eoghan, Digital Evidence and Computer Crime (3rd Ed.). Elsevier Inc publisher, 2011.
Douhan, Alena, “The Changing Nature of Sanctions in the Digital Age”, in: Digital Transformations in Public International Law, Angelo Jr. Golia | Matthias C. Kettemann Raffaela Kunz [Eds.], Published by Nomos, 2022, p. 129.
Malkuti, Rasool and Khalilzadeh, Mona (2022), “Legal solutions to ensure cyber security”, Media, 33 (1). [In Persian]
M.E.Kabay, A Brief History of Computer Crime: An Introduction for Students. MSIA School of Graduate Studies, Norwich University, 2008.
Mousavi, Seyyed Jamal, Rouhani Moghadam, Mohammad and Aghaei Bejestani, Maryam (2022), “Measures to prevent cybercrimes with an emphasis on police measures with a jurisprudential approach”, Studies of Fiqh and Islamic Law, 14 (26). [In Persian]
Jalali, Mahmoud and Tousli-Ardakani, Saeedeh (2018), “The necessity of creating a coordinated international legal system in dealing with crimes in cyber space”, Public Law Studies, 49 (4). [In Persian]
Kettemann, Matthias C., The Normative Order of the Internet, A Theory of Online Rule and Regulation Oxford: Oxford University Press, 2020.
Kettemann, Matthias C. (ed.), Navigating Normative Orders. Interdisciplinary Perspectives, Frankfurt/New York: Campus, 2020.
Kristin, Archick, “U.S.-E.U. Cooperation Against Terrorism”, CRS (Dec. 1), 2014.
Kondo T, Katsenga NN, Zvidzayi T, Cybercrime and Human Rights: A case for the due process of internet criminals, Volume 6, Issue 2, 2018, p. 121.
Jarrett, Marshall and Michael W. Bailie, Prosecuting Computer Crimes; Computer Crime and Intellectual Property Section Criminal Division, Published by Office of Legal Education Executive Office for United States Attorneys, 2011, p. 21.
Odhiambo, N. A., Ochara, N. M., and Kadymatimba, A. (2018), “Structuring of the Terrorism Problem in the Digital Age: a Systems Perspective”, in Open Innovations Conference, OI 2018 (Johannesburg: IEEE), pp. 148-154.
Plotnek, Jordan J and Jill Slay (2021), “Cyber Terrorism: A Homogenized Taxonomy and Definition”, Computers & Security, 102: 102-145.
Weimann, Gabriel, “New Terrorism and New Media”, Wilson Center Commons Lab, 2014, 1, available at http: //www.wilsoncenter.org/publication/new-terrorism-and-new-media.
Segura-Serrano, Antonio, ‘Internet Regulation and the Role of International Law,’ Max Planck UNYB 10 (2006), 191–272 (192).
Ronkova, Nevenka, “International Legal Framework for Media”, Journal of Process Management New Technologies, 2016, 4 (2), p. 58.
Ziyai, Sidyaser (2016), “Protection of Human Rights in Cyber Space”, Legal Research, 16 (31). [In Persian]
Taylor, Robert W., Eric J. Fritsch, John Liederbach (2014), Digital Crime and Digital Terrorism, Prentice Hall Press.
Yüksel, Cüneyt, “Combating Terrorist Use of the Internet and Social Media: Recommended Solutions within the Scope of International Law”, Public and Private International Law Bulletin, 2020, 40 (2), p. 1092.
 
 

  • Receive Date 12 December 2023
  • Revise Date 28 December 2023
  • Accept Date 06 January 2024