Cyber Terrorism: International Legal Regulations And Efforts
Description
Cyberterrorism, a transnational issue, requires effective international and regional laws. Initiatives like the Budapest Convention on Cybercrime, UNODC Global Program on Cybercrime, and UNSC Resolutions (1373, 57/239, 1624, and 2462) aim to address this global problem. However, challenges persist due to divergent national laws, jurisdictional complexities, and time-sensitive digital evidence. Effective cooperation requires accelerated data preservation, 24/7 points of contact, and specialized tools. As AI and quantum technologies evolve, so do threats, necessitating concerted responses, multilateral coordination, and technological resilience investments to counteract cyber threats to critical information infrastructure all while balancing law enforcement with human rights and sovereignty concerns.
Files
Cyber Terrorism.pdf
Files
(403.6 kB)
| Name | Size | Download all |
|---|---|---|
|
md5:cc20581077c596d465625caebf8fa086
|
403.6 kB | Preview Download |
Additional details
Dates
- Submitted
-
2026-01-03
- Accepted
-
2026-01-11
Software
References
- [1] Stuart Macdonald Thomas M. Chen, Lee Jarvis, Cyberterrorism Understanding, Assessment, and Response, 1st ed. (Springer, 2014). [2] Ben Brewster Babak Akhgar, Combatting Cybercrime and Cyberterrorism, 1st ed. (Springer Cham, 2016). [3] Saman Iftikhar, "Cyberterrorism as a global threat: a review on repercussions and countermeasures," 15 pub med central 1–8 (2024). [4] Durga.K, "CYBER SECURITY CHALLENGES TO GLOBAL PEACE AND JUSTICE," 3 Svadhyaya - International Journal of Transdisciplinary Research and Development (SIJTRD) 11–9 (2024). [5] Michael L Gross, Daphna Canetti and Dana Vashdi, "Cyber Terrorism: Its Effects on Psychological Well Being, Public Confidence and Political Attitudes," 4 reseach gate 1–6 (2016). [6] Jeferson Martinez Lozano and Javier M. Durán, "Software Supply Chain Attacks, a Threat to Global Cybersecurity: SolarWinds' Case Study," 11 International Journal of Safety and Security Engineering 537–45 (2021). [7] Haekal Al Asyari, "The Evolution Of Cyberterrorism: Perspectives And Progress From The European Union And Association of Southeast Asian Nation," 29 Jurnal Hukum IUS QUIA IUSTUM 1–23 (2022). [8] Hayden Coupland, "Investigating Cybercrime: The Key Jurisdictional and Technical Challenges Faced by Law Enforcement," 6 1–27 (2022). [9] Salaheddin J. Juneidi, "Council of Europe Convention on Cyber Crime" Fifth European Intensive Programme on Information and Communication Technologies Security 1–12 (2002). [10] Jonathan Clough, "The Budapest Convention on Cybercrime and the Challenges of Harmonisation," 40 SSRN 698–736 (2015). [11] David Wicki-Birchler, "The Budapest Convention and the General Data Protection Regulation: acting in concert to curb cybercrime?," 1 International Cybersecurity Law Review 63–72 (2020). [12] Council of Europe, "First Additional Protocol to the Convention on Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through computer systems," 2020.available at- https://www.coe.int/en/web/cybercrime/first-additional-protocol [13] Nadine Strossen, "United Nations Free Speech Standards as the Global Benchmark for Online Platforms' Hate Speech Policies," 29 Michigan State International Law Review 1–64 (2021). [14] C O'Regan, "Hate speech regulation on social media: An intractable contemporary challenge," 71 Journal of Media Law 403–29 (2018). [15] Paul Arnell &Bukola Faturoti, "The prosecution of cybercrime – why transnational and extraterritorial jurisdiction should be resisted," 37 International Review of Law, Computers & Technology 29–51 (2023). [16] Gargi Sarkar and Sandeep K. Shukla, "A framework for distinguishing cybercrime, cyberattacks, and cyberterrorism," 4 Journal of Economic Criminology 1–15 (2024). [17] United Nations Security Council., "COUNTER-TERRORISM IN CYBERSPACE."available at- https://www.un.org/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/ctc_cted_factsheet_ct_in_cyberspace_oct_2021.pdf [18] United Nations Security Council, "Open briefing of the UN Counter-Terrorism Committee on Denying Safe Haven."available at- https://www.un.org/securitycouncil/ctc/news/open-briefing-un-counter-terrorism-committee-denyingsafehaven-0 [19] UN Security Council, "Security Council resolution 1624 (2005) on threats to international peace and security."available at- https://www.refworld.org/legal/resolution/unsc/2005/en/55500 [20] United Nations Office on Drugs and Crime., "United Nations Global Counter-Terrorism Strategy," 2018.available at- https://www.unodc.org/e4j/en/terrorism/module-3/key-issues/un-global-ct-strategy.html [21] United Nations Security Council Counter-Terrorism Committee Executive Directorate., "COUNTER-TERRORISM IN CYBERSPACE," 2021 .available at- https://www.un.org/securitycouncil/ctc/sites/www.un.org securitycouncil.ctc/files/ctc cted factsheet ct in cyberspace oct [22] United Nation Of Council, "Maintain International Peace and Security."available at- https://www.un.org/en/our-work/maintain-international-peace-and-security [23] United General Assembly Nations, Resolution Adopted by the General Assembly 57/239. Creation of a Global Culture of Cybersecurity, 2003. [24] United Nations, "Convention on the Prevention and Punishment of Crimes against Internationally Protected Persons, including Diplomatic Agents 1973," 1035 167 (2005). [25] Reto A Dürler, "The Suppression of Unlawful Acts Against the Safety of Maritime Navigation," 3 Oxford Law Pro 428–441 (2016). [26] Murat Kagan KOZANHAN, "UNLAWFUL ACTS THREATENING MARITIME SECURITY AND SUA CONVENTION," 17 Journal of Naval Sciences and Engineering 181–203 (2021). [27] The Law Library, Protocols of 2005 to the Convention Concerning Safety of Maritime Navigation and to the Protocol Concerning Safety of Fixed Platforms on the Continental Shelf (United States Treaty), 19th ed. (The Law Library, 2019). [28] Grzegorz Zajac, "International Law Regulations Related to Combating Terrorism in Civil Aviation," 6 SSRN 1–10 (2025). [29] Gaurav Dave A et al., "Cyber security challenges in aviation communication, navigation, and surveillance," 112 Computers & Security 1–12 (2022). [30] Georgia Lykou, George Iakovakis and Dimitris Gritzalis, "Aviation Cybersecurity and Cyber-Resilience: Assessing Risk in Air Traffic Management: Theories, Methods, Tools and Technologies," 5 reseach gate 245–60 (2019). [31] Pardis Moslemzadeh Tehrani, Nazura Abdul Manap and Hossein Taji, "Cyber terrorism challenges: The need for a global response to a multi-jurisdictional crime," 29 Computer Law & Security Review :207–215 (2013). [32] Mohammad Owais Farooqui, Adnan Sarhan and Faizan Mustafa, "Aviation Cyber Security in India: Legal Gaps, International Frameworks, and Policy Reforms," 14 Yustisia Jurnal Hukum 186 (2025). [33] Calvin NOBLES, Darrell BURRELL and Tyrone WALLER, "THE NEED FOR A GLOBAL AVIATION CYBERSECURITY DEFENSE POLICY," 27 Land Forces Academy Review 1–8 (2022). [34] United Nations, International Telecommunication Union (ITU) (UN - I-Library, 1995). [35] Alexander, "Global Cybersecurity Agenda (GCA) A framework for international cooperation" UNODC, 2011.available at- https://www.unodc.org/documents/treaties/organized crime EGM cybercrime 2011 Presentations ITU Cybercrime EGMJan2011.pdf [36] Maryam Roshanaei and Qiang Duan, "International Telecommunication Union Standardization for Trust Provisioning in Information, Communication and Technology Infrastructure toward Achieving United Nation's Sustainable Development Goals," 9 Journal of Computer and Communications 44–59 (2019). [37] Todor Tagarev and George Sharkov, "Multi-stakeholder Approach to Cybersecurity and Resilience," 34 Information & Security An International Journal 59–68 (2016). [38] Allison Pytlak and Shreya Lad, "The International Telecommunications Union (ITU) and Cyber Accountability" Stimson, 2024.available at- https://www.stimson.org/2024/the-international-telecommunications-union-itu-and-cyber-accountability/ [39] John Kirton, "The G20's Growing Security Governance Success" G20 Information Centre, 2017. [40] Fandom, "G8 Subgroup on High-Tech Crime," 1997.available at- https://itlaw.fandom.com/wiki/G8 Subgroup on High-Tech Crime [41] Roderic G. Broadhurst, "Developments in the global law enforcement of cyber-crime," 29 Policing An International Journal 408–33 (2006). [42] Hasan Cifci and Esma Ergüner Ozkoc, "Analysis of National Cybersecurity Strategies of G20: objectives, latent themes, latest trends and comparisons," 7 Data & Policy 1–15 (2024). [43] Tuba Eldem, "Global Cyberspace Security and Critical Information Infrastructure Protection" Springer 1–11 (2021). [44] A Andrianova, "Countering the Financing of Terrorism in the Conditions of Digital Economy," 908 Springer, Cham 20–31 (2020). [45] Sean Paul Ashley, "The Future of Terrorist Financing: Fighting Terrorist Financing in the Digital Age" Penn State Journal of International Affairs 1–118 (2018). [46] Marina Larionova and John Kirton, "The G8–G20 relationship in global governance," 4 RESEARC GATE 1–8 (2015).