•  
  •  
 

Abstract

These days, digital crime is one of the main challenges for law enforcement and the judicial system. Many of the laws which are used to protect the users of current technologies were derived from legislation and laws that are utilized in the control of crimes that are based in the physical realm. This applies not only in Western countries, but in countries that adopt Sharia law. There is a need to establish specific legislation and accepted best practice to deal with digital crimes that is compatible with Sharia law, which affects more than one billion Muslims. This paper presents a view of the approach to digital crime in Saudi Arabia under Sharia Law, demonstrating how this is founded on principles from the Qur'an and the Sunnah, which are the sayings and deeds of the Prophet Muhammad. We describe how Sharia law differs from Western law, and how evidence for digital forensics procedures can be obtained for use under Sharia law.

References

Akatyev, N., & James, J. I. (2015). Cyber Peacekeeping. In Lecture Notes of the Institute for Computer Sciences, SocialInformatics and Telecommunications Engineering, LNICST (Vol. 157, pp. 126- 139). http: //doi.org/ 10.1007 / 978-3-319- 25512-5 10

Albert, E. (2009, March). The Shanghai Cooperation Organization. Retrieved September 15, 2016, from http: //www.cfr.org/ china/ shanghaicooperation- organization/ p 10883

Amnesty International. (2016, March). Syrian and Russian forces targeting hospitals as a strategy of war. Retrieved September 15, 2016, from https: //www.amnesty.org/ en/ pressreleases / 2016 / 03 / syrian-and-russian-forcestargeting- hospitals-as-a-strategy-of-war /

Co-Chairs' Summary Report. (2012) (p. ASEAN Regional Forum). Hoi An, Quang Nam, Viet Nam: ASEAN Regional Forum. Retrieved from http: //aseanregionalforum.asean.org/ files / li brary / ARF Chairman%27s Statements and Reports/ The Nineteenth ASEAN Regional Forum, 2011-2012/ 10 Co-Chairs Summary Report - ARF Workshop on Proxy Actors m Cyberspace, Quang Nam.pdf Das,

S. K., Kant , K., & Zhang, N. (2012). Handbook on securing cyber-physical critical infrastructure. Elsevier. Retrieved from https: / / books.google.co.kr / books?hl= en&lr =&id=MftTeQivgA0C&oi=fnd&pg=PPl& dq=Handbook+ on+ Securing+ CyberPhysical +Critical+ Infrastructure&ots= btX

Co-Chairs' Summary Report. (2012) (p. ASEAN Regional Forum). Hoi An, Quang Nam, Viet Nam: ASEAN Regional Forum. Retrieved from http: //aseanregionalforum.asean.org/ files / li brary / ARF Chairman%27s Statements and Reports/ The Nineteenth ASEAN Regional Forum, 2011-2012/ 10 Co-Chairs Summary Report - ARF Workshop on Proxy Actors m Cyberspace, Quang Nam.pdf Das,

S. K., Kant , K., & Zhang, N. (2012). Handbook on securing cyber-physical critical infrastructure. Elsevier. Retrieved from https: / / books.google.co.kr / books?hl= en&lr =&id=MftTeQivgA0C&oi=fnd&pg=PPl& dq=Handbook+ on+ Securing+ CyberPhysical +Critical+ Infrastructure&ots= btX

Denning, D. E. (2008). The ethics of cyber conflict. In K. E. Himma & H. T. Tavani (Eds.), The handbook of information and computer ethics (pp. 407- 428). Wiley. Retrieved from https: / / books.google.co.kr / books?hl= en&lr = &id= ZC7SDy PZUMoC&oi= fnd&pg= P A 407 &dq=victims+ of + cyber+ conflict&ots= 1 cfZidx Y72&sig=Fw XaBLmr MCzxTwpKGa sbGhVli0k

Eom, J. H., Kim, N. U., Kim, S. H., & Chung, T. M. (2012). Cyber military strategy for cyberspace superiority in cyber warfare (pp. 295-299). http: //doi.org/ 10.1109 / CyberSec.2012.6246 114

Erskine, T., & Carr, M. (2016). Beyond "Quasi-Norms": The Challenges and Potential of Engaging with Norms in Cyberspace. In A.-M. Osula & H. Roigas (Eds.). Tallinn: NATO CCD COE Publications.

European Council. Convention on Cybercrime, Current (2001). Budapest. Retrieved from https: //www.coe.int / en/ web/ conventions/ f ull-list / -/ conventions/ treaty / 185

Farrell, H. (2015). Promoting Norms for Cyberspace. Cyber Brief. Council on Foreign Relations Press.

Farwell, J. P. (2014). The Media Strategy of ISIS. Survival, 56( 6), 49-55. http: //doi.org/ 10.1080/ 00396338.2014.9854 36

Gjelten, T. (2013). FIRST STRIKE: US Cyber Warriors Seize the Offensive. World

Affairs, 175(5), 33- 43. Retrieved from http: //www.jstor.org/ stable/ 43554737

Godwin III, J. B., Kulpin, A. , Rauscher, K. F ., & Yaschenko, V. (2014). Critical Terminology Foundations 2. EastWest Institute and the Information Security Institute at the Moscow State University. Retrieved from https: //www.eastwest.ngo/ idea/ criticalterminology- foundations-2

Goldman, D. (2016, February) . Twitter goes to war against ISIS. Retrieved September 16, 2016, from http: //money.cnn.com/ 2016/ 02/ 05/ technol ogy / twitter-terrorists-isis / index.html

Hua, X. (2016, May). China, U.S. discuss int'l norms of state behavior in cyberspace. Retrieved September 15, 2016, from http: / / news.xinhuanet.com/ english/ 2016- 05/ 12/ c _ 135354264.htm

IMPACT- International Multilateral Partnership Against Cyber Threats. (2016). Retrieved September 15, 2016, from http: //www.impactalliance. org/ home / index.html

Information Security Doctrine of the Russian Federation. ( 2000). Russian Federation. Retrieved from http: //archive.mid.ru//bdomp/ nsosndoc. nsf/ 1e5f0de28fe77fdcc32575d900298 676/ 2deaa9ee15ddd24bc32575d9002c442b!O penDocument

INTERPOL. (2016). Retrieved September 15, 2016, from http: / / www.interpol.int/

James, J. I. (2013). An Argument for Assumed Extra-territorial Consent During Cybercrime Investigations. VF AC Review, (25) , 7- 8. Retrieved from http: //citeseerx.ist .psu.edu/ viewdoc/ downl oad?doi= 10.l.l.711.6146&rep= repl&type= pdf

Kaljurand, M. (2015, December) . International Norms in Cyberspace: A Discussion with Minister Marina Kaljurand. Center for Strategic and International Studies 1616 Rhode Island A venue, NW Washington, DC 20036. Retrieved from https: / / www.csis.org/ events/ internationalnorms- cyberspace-discussion-ministermarina- kalj urand

Karatzogianni, A. (2013). A cyberconflict analysis of the 2011 Arab Spring. In G. Youngs (Ed.) , Digital world: Connectivity, creativity and rights (p. 159). Routledge. Retrieved from https: / / www.routledge.com/ Digital-WorldConnectivity- Creativity-andRights/ Youngs/ p/ book/ 9780415839082

Korzak, E. (2015, September). The 2015 GGE Report: What Next for Norms m Cyberspace? Retrieved September 15, 2016, from https: //www.lawfareblog.com/ 2015- gge-report-what-next-norms-cyberspace

Langner, R. (2011). Stuxnet: Dissecting a Cyberwarfare Weapon. IEEE Security Privacy, 9(3), 49- 51. http: //doi .org/ 10.1109/ MSP.2011.67

Lee, B. (2016). The Impact of Cyber Capabilities in the Syrian Civil War. Small Wars Journal.

Levin, A., Goodrick, P., & Ilkina, D. (2014). Securing cyberspace: a comparative review of strategies worldwide. Montreal, Canada: Canadian IT Law Association. Retrieved

from http: //www.it-can.ca/ wpcontent/ uploads/ conf2014/ Securing_ Cyber space-Levin. pdf

Norms of Behaviour for Cyberspace. (2014, June). Retrieved September 15, 2016, from https: //www.ccdcoe.org/ norms-behaviourcyberspace

O'Connell. (2016, January). Google Joins the Fight Against ISIS. Retrieved from https:/ / hacked.com/ google-joins-fight-isis/

OECD Guidelines for the Security of Information Systems and Networks: Towards a Culture of Security. (2002). Organization for Economic Co-Operation and Development. Retrieved from https:/ / www.oecd.org/ sti / ieconomy / 15582 260.pdf

Osula, A.-M., & Roigas, H. (2016). International cyber norms: legal, policy & industry perspectives. NATO Cooperative Cyber Defence Centre of Excellence. Retrieved from https: / / ccdcoe.org/ sites/ default/ files / multi media/ pdf/ InternationalCyberNorms _full_ book.pd£

Principles of UN peacekeeping. (2008). Retrieved September 15, 2016, from http: //www.un.org/ en/ peacekeeping/ opera tions / principles. shtml

Reed, T. (2007). At the Abyss: An Insider's History of the Cold War. Random House Publishing Group. Retrieved from https: / / books.google.co.kr / books?id=69Vv booxlJcC

Schmitt, M. N. (2013). Tallinn manual on the international law applicable to cyber warfare. Cambridge University Press. Retrieved from https: / / books.google.co.kr / books?hl= en&lr = &id= FujYDXdO MQgC&oi= fnd&pg=PR l&dq=Tallinn+ Manual+ on+ the+ Internati onal+ Law+ Applicable+ to+ Cyber+ Warfare&ots= Ml uSBsT3N u&sig=jw HY rfUIWFhl Cl3iZd-q09QzA w M

Schmitt, M. N., & Vihul, L. (2014). The Nature of International Law Cyber Norms. Rochester, NY. Retrieved from http:/ / papers.ssrn.com/ abstract=2543520

Segal, A. (2011 , March). Cyberspace Governance: The Next Step. Council on Foreign Relations Press. Retrieved from http:/ / www.cfr.org/ cybersecurity / cyberspa ce-governance-next-step / p24397

Solce, N. (2008). Battlefield of Cyberspace: The Inevitable New Military Branch-The Cyber Force, The. Alb. LJ Sci. & Tech., 18, 293. Retrieved from http:/ / heinonlinebackup.com/ hol-cgibin/ get _pdf.cgi?handle= hein.journals/ albn yst 18§ion = 11

United Nations. (2008). United Nations Peacekeeping Operations Principles and Guidelines. United Nations Department of Peacekeeping Operations. Retrieved from http: //www.un.org/ en/ peacekeeping/ docu men ts/ capstone_ eng. pdf

United Nations. (2015a). Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved from http: //www.un.org/ ga/ search/ view _ doc.as p?symbol= A/ 70/ 174

United Nations. (2015b, January). Letter dated 9 January 2015 from the Permanent Representatives of China, Kazakhstan, Kyrgyzstan, the Russian Federation, Tajikistan and Uzbekistan to the United Nations addressed to the SecretaryGeneral. Retrieved from https: / / ccdcoe.org/ sites/ default / files/ docu ments/ UN-150113-CodeOfConduct. pdf

United Nations. (2016). Digital Blue Helmets. Retrieved September 15, 2016, from https: / / unite.un.org/ digitalbluehelmets/

United States White House. (2011). International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World. White House. Retrieved from https: //www.whitehouse.gov/ sites/ default/ files / rss _viewer/ international_ strategy_ fo r _ cyberspace. pdf

Watts, S. (2015). Cyber Law Development and the United States Law of War Manual. NATO Cooperative Cyber Defence Centre of Excellence, International Cyber Norms Development (Anna-Maria Osula Ed., Forthcoming). Retrieved from http: //ssrn.com/abstract= 2650784

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.