Specializations of Security Council in confrontation of Electronic International Terrorism
Keywords:
Specializations of security council, electronic international terrorism, terrorism, the role of security council, the terrorismAbstract
The issue of international terrorism is one of the important topics of concern to the international community. So that terrorist acts developed by virtue of the development of Man and the development of societies, and also developed by their methods, perceptions and concepts. In the last two decades, international terrorism has become one of the most prominent non – traditional sources of threat to international peace and security, and was one of the most important reasons that led to the emergence and development of terrorist acts because the world is witnessing a tremendous development in the means of communications and information technology, until it became called this era-the era of the information revolution. Despite the many advantages of the internet revolution and the information it contains easily accessible to millions of people at one time, and at a low cost, but at the same time it constitutes a wide field for terrorists to spread extremist ideas, which led to the emergence of what is known as international cyber terrorism. Therefore, this study dealt with the phenomenon of electronic international terrorism and the extent of its compatibility with the concept of traditional international terrorism, and then the extent of the application of the powers of the UN Security Council in the maintenance of international peace and security with terrorist acts performed through electronic programs.
Downloads
References
Galicki, Z. (2005). International law and Terrorism, American Behavioral Scientist, 48(6), p743 – 747. http://journals.sagepub.com/doi/abs/10.1177/0002764204272576.
Kaspersky. (2013). NetTraveler: a new cyber espionage campaign disclosed, https://www.kaspersky.com/.
lwan, F. (2001). General international Dictionary. (1st ed.). Lebanon: Dar Al- kotob Al- ilmiyah, p180.
Moftah, A., & Abbas, E. (2015). Terrorism in Islam and the West. Dirasat: Shari’a and Law Sciences, 42(2). Retrieved from https://archives.ju.edu.jo/index.php/law/article/view/6399.
Ostrower, J. (2017). U.S and U.K ban laptops and other devices on flights from Middle East. CNN Money. http://money.cnn.com/.
Robert, K. (2015). Commercial cyber Vulnerabilities challenge Transportation Command. Signal. http://www.afcea.org/site/.
Ruperez, J. (2006). The United Nations in the Fight Against Terrrism. United Nations: counter – terrorism committee executive directorat (cted). https://www.un.org/sc/ctc/wp-content/uploads/2017/01/2006_02_26_cted_usarmy.pdf.
Sanchez, R. (2015). ISIS exploits social media to make inroads in us, CNN. http://edition.cnn.com/.
Stalinsky, S. (2018). Terrorists have been using Bitcoin for four years, so whats the surprise. https://www.memri.org/.
Tray, T. (2016). The distinction between armed struggle and terrorism in the light of the principle of the prohibition of the use of force in international law. Dirasat: Shari’a and Law Sciences, 43(3). Retrieved from https://archives.ju.edu.jo/index.php/law/article/view/10516
WORLD DIGITAL LIBRARY, convention for the Prevention and Punishment of Terrorism, https://www.wdl.org/en/item/11579/ .
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.


