التعاون الدولي في ملاحقة مرتكبي الجرائم السيبرانية وفقًا لاتفاقية الأمم المتحدة لمكافحة الجريمة السيبرانية
Corresponding Author(s) : د. إسلام سرور
مجلة القانون والتكنولوجيا ,
مجلد 5 عدد 2 (2025)
الملخص
تتناول هذه الدراسة اتفاقية الأمم المتحدة لمكافحة الجرائم الإلكترونية وانعكاساتها على تعزيز التعاون الدولي في مواجهة الجرائم المرتكبة عبر تقنيات المعلومات والاتصالات. ومع تزايد الاعتماد على هذه التقنيات، أصبحت الجرائم الإلكترونية أكثر تعقيداً وطابعاً عابراً للحدود، وغالباً ما تنفذها شبكات إجرامية منظمة تتوزع عبر عدة ولايات قضائية. ويبرز ذلك الحاجة الملحّة إلى أطر قانونية منسقة وآليات إنفاذ مشتركة على المستوى الدولي.
وتبيّن الدراسة الدور المحوري للاتفاقية في تعزيز قدرة الدول على مكافحة هذه الجرائم من خلال وضع معايير موحدة للتحقيق والملاحقة القضائية وتسليم المجرمين. كما تركز على مبدأ "ازدواجية التجريم" الذي يُسهم في تفعيل المساعدة القانونية المتبادلة، ويعزز فعالية معاهدات التسليم الثنائية. وتؤكد الاتفاقية كذلك على أهمية التعاون العابر للحدود بين أجهزة إنفاذ القانون لضمان ملاحقة الجناة وتقديمهم للعدالة.
وتخلص النتائج إلى أن الاتفاقية تشكل إطاراً دولياً مهماً للحد من آثار الجرائم الإلكترونية عبر تعزيز الاتساق القانوني، وبناء الثقة بين الدول، وتيسير التعاون القضائي. غير أن فعاليتها تظل رهناً بالتزام الدول بتبني أحكامها وتنفيذها بصورة شاملة. وبناءً على ذلك، توصي الدراسة بضرورة قيام الحكومات بتقوية تشريعاتها الوطنية، والاستثمار في بناء القدرات، والمشاركة النشطة في الشراكات الدولية. ومن شأن ذلك أن يمكّن الدول من مواجهة التهديدات المتنامية للجرائم الإلكترونية، وحماية الضحايا، وصون أمن الفضاء الرقمي.
تنزيل الاقتباسات
Endnote/Zotero/Mendeley (RIS)BibTeX
- International Conventions and Treaties:
- Arab Convention (1952) on Persons Subject to Extradition. Available at:
- https://www.acerislaw.com/wp-content/uploads/2022/01/Arab-League-Convention-on-the-Enforcement-of-Judgments-1952.pdf
- Council of Europe Convention on Cybercrime (CETS No. 185). Available at:
- http://conventions.coe.int
- Hague Convention on the Unlawful Seizure of Aircraft (1970). United Nations Treaty Collection. Available at:
- https://treaties.un.org
- International Convention for the Suppression of the Financing of Terrorism (1999). United Nations Treaty Collection. Available at:
- https://treaties.un.org/doc/db/Terrorism/english-18-11.pdf
- Model Treaty on Extradition. United Nations Office on Drugs and Crime (UNODC). Available at:
- https://www.unodc.org/pdf/model_treaty_extradition.pdf
- Riyadh Arab Convention on Judicial Cooperation (1983). Available at:
- https://treaties.un.org/Pages/showDetails.aspx?objid=0800000280527ea2
- United Nations Convention against Cybercrime. United Nations General Assembly, Seventy-ninth Session, Report of the Third Committee. Available at:
- https://digitallibrary.un.org/record/4068812?ln=en&v=pdf
- Stanford Draft International Convention on Cybercrime (1999). Stanford University. Available at:
- https://web.stanford.edu/~gwilson/Transnatl.Dimension.Cyber.Crime.2001.p.249.pdf
- Books and Academic Theses:
- Al-Arousi, Mahmoud Hassan. A Study on the Extradition of Criminals in the Egyptian System and Comparative Legislation. Costatsoumas Press, Lebanon, 1951.
- Al-Basha, Faiza Younis. Organized Crime in Light of International Agreements and National Laws. Dar Al-Nahda Al-Arabiya, Cairo, 2001.
- Al-Ghathbar, Khalid bin Suleiman & Al-Qahtani, Muhammad bin Abdullah. Information Security in a Simplified Language. Center of Excellence for Information Security, King Saud University, 1429 AH.
- Al-Masry, Mazhar Gebran Ghaleb. International Cooperation in Combating Organized Crime. Master’s Thesis, Faculty of Law, Assiut University, Egypt, 2008.
- Boister, Neil. An Introduction to Transnational Criminal Law. 2nd ed., Oxford University Press, 2018. DOI: https://doi.org/10.1093/law/9780198795995.001.0001
- Hosni, Mahmoud Naguib. Explanation of the Penal Code – General Section: The General Theory of Crime and Punishment. 4th ed., Dar Al-Nahda Al-Arabiya, Cairo, 1983.
- Ibrahim, Mohamed Abu Al-Fath. Combating Organized Crime in Light of International Treaties. PhD Thesis, Menoufia University, Egypt, 2010.
- Samhan, Abdul Rahman Fathi. Extradition of Criminals under the Rules of International Law. Dar Al-Nahda Al-Arabiya, Egypt, 2011.
- Serour, Islam. Extradition of Foreigners in Terrorism Cases: A Comparative Study in Light of International Conventions. Dar al-Fath for Printing and Publishing, Alexandria, 2024.
- Siraj, Abdel Fattah Mohamed. The General Theory of Extradition. Dar Al-Nahda Al-Arabiya, Cairo, 1998.
- Sorour, Ahmed Fathi. Constitutional Legitimacy and Human Rights in Criminal Procedures. Dar Al-Nahda Al-Arabiya, Cairo, 1993.
- Youssef, Ihab Mohamed. Extradition Treaties and Their Role in Achieving International Cooperation to Combat Terrorism. PhD Thesis, Police Academy, Cairo, 2003.
- Journal Articles and Research Papers:
- Allahrakha, N. (2024). Cybercrime and the Legal and Ethical Challenges of Emerging Technologies. International Journal of Law and Policy, 2(5), 28–36. DOI: https://doi.org/10.59022/ijlp.191
- Brenner, S. (2004). Cybercrime Metrics: Old Wine, New Bottles? Virginia Journal of Law and Technology, 9.
- Broadhurst, R. (2006). Development in the Global Law Enforcement of Cybercrime. Policing: An International Journal, 29(2). DOI: https://doi.org/10.1108/13639510610684674
- Brown, I., Edwards, L., & Marsden, C. (2009). Information Security and Cybercrime. DOI: https://doi.org/10.5040/9781509955589.ch-021
- Carter, D. (1995). Computer Crime Categories. FBI Law Enforcement Bulletin.
- Chawki, M. (2005). Cybercrime in France: An Overview.
- Dugard, J. & Van den Wyngaert, C. (1998). Reconciling Extradition with Human Rights. American Journal of International Law, 92(2). DOI: https://doi.org/10.2307/2998029
- Gercke, M. (2006). The Slow Wake of a Global Approach Against Cybercrime. Computer Law Review International. DOI: https://doi.org/10.9785/ovs-cri-2006-140
- Gercke, M. (2008). National, Regional and International Legal Approaches in the Fight Against Cybercrime. Computer Law Review International. DOI: https://doi.org/10.9785/ovs-cri-2008-7
- Gercke, M. (2012). Understanding Cybercrime: Phenomena, Challenges and Legal Response. ITU.
- Goodman, M. & Brenner, S. (2002). The Emerging Consensus on Criminal Conduct in Cyberspace. International Journal of Law and Information Technology, 10(2). DOI: https://doi.org/10.1093/ijlit/10.2.139
- Lusthaus, J. (2013). How Organised Is Organised Cybercrime? Global Crime, 14(1).Phillips, K. et al. (2022). Conceptualizing Cybercrime. Forensic Sciences, 2(2). DOI: https://doi.org/10.1080/17440572.2012.759508
- Priyandita, G. (2024). The UN Cybercrime Convention: A Victory for State Sovereignty. ASPI.
- Online Platforms and Websites:
- Wafeer Knowledge and Medicine, “The Concept of Cybercrimes, Their Types, Methods of Commitment, and Ways to Combat Them.” Available at: [Wafeer Platform] (https://doafeer.net/concept_cybercrimes_types_committing_combating/)
- Reports, Resolutions, and Official Documents:
- Crimes related to computer networks, Background paper for the workshop on crimes related to the computer network, 10th UN Congress on the Prevention of Crime and the Treatment of Offenders, 2000, A/CONF.187/10, page 5; available at: https://digitallibrary.un.org/record/432653?v=pdf.
- Cybercrime, Report of the Parliamentary Joint Committee on the Australian Crime Commission, 2004, page 5, available at: Reports on Annual Reports – Parliament of Australia
- Explanatory Report to the Council of Europe Convention on Cybercrime, No. 8 available at: https://docslib.org/doc/2964322/explanatory-report-to-the-convention-on-cybercrime
- Recommendations of the Tenth International Congress of Criminal Law, published in the National Criminal Journal, National Center for Social and Criminal Research, Vol. 13, Issue 1, March 1970, and available on the Egyptian Knowledge Bank (http://www.ekb.eg)
- Sieber in Organised Crime in Europe: The Threat of Cybercrime, Situation Report 2004, page 86 https://doi.org/10.1007/s12117-005-1036-6 DOI: https://doi.org/10.1007/s12117-005-1036-6
- The Demise of Anonymity: A Constitutional Challenge to the Convention on Cybercrime, Entertainment Law Review, 2002, No. 1, available at: https://digitalcommons.lmu.edu/do/search/?q=cybercrime&start=0&context=2236248&facet=
- United Nations resolution on combating the use of information and communications technologies for criminal purposes: Report of the Third Committee: General Assembly, seventy-ninth session. Available at: [UN Digital Library] (https://digitallibrary.un.org/record/4068812?ln=en&v=pdf)
- United Nations Regional Office on Drugs and Crime for the Middle East and North Africa: https://www.unodc.org/romena/en/cybercrime.html
- Voce, Isabella & Morgan, Anthony & Australian Institute of Criminology. (2023). Cybercrime in Australia 2023 / Isabella Voce, Anthony Morgan. Canberra, Australian Capital Territory: Australian Institute of Criminology, available at: https://doi.org/10.52922/sr77031 DOI: https://doi.org/10.52922/sr77031
- Wilson, Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress, CRS Report for Congress, 2007, Updated January 29, 2008, page 4, available at: www.fas.org/sgp/crs/terror/RL32114.pdf
- Legal Case Studies:
- Dotcom et al. v. United States (Case Study 5). UNODC. (https://www.unodc.org/e4j/en/organized-crime/module-11/exercises/case-studies.html)
المراجع
International Conventions and Treaties:
Arab Convention (1952) on Persons Subject to Extradition. Available at:
Council of Europe Convention on Cybercrime (CETS No. 185). Available at:
Hague Convention on the Unlawful Seizure of Aircraft (1970). United Nations Treaty Collection. Available at:
International Convention for the Suppression of the Financing of Terrorism (1999). United Nations Treaty Collection. Available at:
https://treaties.un.org/doc/db/Terrorism/english-18-11.pdf
Model Treaty on Extradition. United Nations Office on Drugs and Crime (UNODC). Available at:
https://www.unodc.org/pdf/model_treaty_extradition.pdf
Riyadh Arab Convention on Judicial Cooperation (1983). Available at:
https://treaties.un.org/Pages/showDetails.aspx?objid=0800000280527ea2
United Nations Convention against Cybercrime. United Nations General Assembly, Seventy-ninth Session, Report of the Third Committee. Available at:
https://digitallibrary.un.org/record/4068812?ln=en&v=pdf
Stanford Draft International Convention on Cybercrime (1999). Stanford University. Available at:
https://web.stanford.edu/~gwilson/Transnatl.Dimension.Cyber.Crime.2001.p.249.pdf
Books and Academic Theses:
Al-Arousi, Mahmoud Hassan. A Study on the Extradition of Criminals in the Egyptian System and Comparative Legislation. Costatsoumas Press, Lebanon, 1951.
Al-Basha, Faiza Younis. Organized Crime in Light of International Agreements and National Laws. Dar Al-Nahda Al-Arabiya, Cairo, 2001.
Al-Ghathbar, Khalid bin Suleiman & Al-Qahtani, Muhammad bin Abdullah. Information Security in a Simplified Language. Center of Excellence for Information Security, King Saud University, 1429 AH.
Al-Masry, Mazhar Gebran Ghaleb. International Cooperation in Combating Organized Crime. Master’s Thesis, Faculty of Law, Assiut University, Egypt, 2008.
Boister, Neil. An Introduction to Transnational Criminal Law. 2nd ed., Oxford University Press, 2018. DOI: https://doi.org/10.1093/law/9780198795995.001.0001
Hosni, Mahmoud Naguib. Explanation of the Penal Code – General Section: The General Theory of Crime and Punishment. 4th ed., Dar Al-Nahda Al-Arabiya, Cairo, 1983.
Ibrahim, Mohamed Abu Al-Fath. Combating Organized Crime in Light of International Treaties. PhD Thesis, Menoufia University, Egypt, 2010.
Samhan, Abdul Rahman Fathi. Extradition of Criminals under the Rules of International Law. Dar Al-Nahda Al-Arabiya, Egypt, 2011.
Serour, Islam. Extradition of Foreigners in Terrorism Cases: A Comparative Study in Light of International Conventions. Dar al-Fath for Printing and Publishing, Alexandria, 2024.
Siraj, Abdel Fattah Mohamed. The General Theory of Extradition. Dar Al-Nahda Al-Arabiya, Cairo, 1998.
Sorour, Ahmed Fathi. Constitutional Legitimacy and Human Rights in Criminal Procedures. Dar Al-Nahda Al-Arabiya, Cairo, 1993.
Youssef, Ihab Mohamed. Extradition Treaties and Their Role in Achieving International Cooperation to Combat Terrorism. PhD Thesis, Police Academy, Cairo, 2003.
Journal Articles and Research Papers:
Allahrakha, N. (2024). Cybercrime and the Legal and Ethical Challenges of Emerging Technologies. International Journal of Law and Policy, 2(5), 28–36. DOI: https://doi.org/10.59022/ijlp.191
Brenner, S. (2004). Cybercrime Metrics: Old Wine, New Bottles? Virginia Journal of Law and Technology, 9.
Broadhurst, R. (2006). Development in the Global Law Enforcement of Cybercrime. Policing: An International Journal, 29(2). DOI: https://doi.org/10.1108/13639510610684674
Brown, I., Edwards, L., & Marsden, C. (2009). Information Security and Cybercrime. DOI: https://doi.org/10.5040/9781509955589.ch-021
Carter, D. (1995). Computer Crime Categories. FBI Law Enforcement Bulletin.
Chawki, M. (2005). Cybercrime in France: An Overview.
Dugard, J. & Van den Wyngaert, C. (1998). Reconciling Extradition with Human Rights. American Journal of International Law, 92(2). DOI: https://doi.org/10.2307/2998029
Gercke, M. (2006). The Slow Wake of a Global Approach Against Cybercrime. Computer Law Review International. DOI: https://doi.org/10.9785/ovs-cri-2006-140
Gercke, M. (2008). National, Regional and International Legal Approaches in the Fight Against Cybercrime. Computer Law Review International. DOI: https://doi.org/10.9785/ovs-cri-2008-7
Gercke, M. (2012). Understanding Cybercrime: Phenomena, Challenges and Legal Response. ITU.
Goodman, M. & Brenner, S. (2002). The Emerging Consensus on Criminal Conduct in Cyberspace. International Journal of Law and Information Technology, 10(2). DOI: https://doi.org/10.1093/ijlit/10.2.139
Lusthaus, J. (2013). How Organised Is Organised Cybercrime? Global Crime, 14(1).Phillips, K. et al. (2022). Conceptualizing Cybercrime. Forensic Sciences, 2(2). DOI: https://doi.org/10.1080/17440572.2012.759508
Priyandita, G. (2024). The UN Cybercrime Convention: A Victory for State Sovereignty. ASPI.
Online Platforms and Websites:
Wafeer Knowledge and Medicine, “The Concept of Cybercrimes, Their Types, Methods of Commitment, and Ways to Combat Them.” Available at: [Wafeer Platform] (https://doafeer.net/concept_cybercrimes_types_committing_combating/)
Reports, Resolutions, and Official Documents:
Crimes related to computer networks, Background paper for the workshop on crimes related to the computer network, 10th UN Congress on the Prevention of Crime and the Treatment of Offenders, 2000, A/CONF.187/10, page 5; available at: https://digitallibrary.un.org/record/432653?v=pdf.
Cybercrime, Report of the Parliamentary Joint Committee on the Australian Crime Commission, 2004, page 5, available at: Reports on Annual Reports – Parliament of Australia
Explanatory Report to the Council of Europe Convention on Cybercrime, No. 8 available at: https://docslib.org/doc/2964322/explanatory-report-to-the-convention-on-cybercrime
Recommendations of the Tenth International Congress of Criminal Law, published in the National Criminal Journal, National Center for Social and Criminal Research, Vol. 13, Issue 1, March 1970, and available on the Egyptian Knowledge Bank (http://www.ekb.eg)
Sieber in Organised Crime in Europe: The Threat of Cybercrime, Situation Report 2004, page 86 https://doi.org/10.1007/s12117-005-1036-6 DOI: https://doi.org/10.1007/s12117-005-1036-6
The Demise of Anonymity: A Constitutional Challenge to the Convention on Cybercrime, Entertainment Law Review, 2002, No. 1, available at: https://digitalcommons.lmu.edu/do/search/?q=cybercrime&start=0&context=2236248&facet=
United Nations resolution on combating the use of information and communications technologies for criminal purposes: Report of the Third Committee: General Assembly, seventy-ninth session. Available at: [UN Digital Library] (https://digitallibrary.un.org/record/4068812?ln=en&v=pdf)
United Nations Regional Office on Drugs and Crime for the Middle East and North Africa: https://www.unodc.org/romena/en/cybercrime.html
Voce, Isabella & Morgan, Anthony & Australian Institute of Criminology. (2023). Cybercrime in Australia 2023 / Isabella Voce, Anthony Morgan. Canberra, Australian Capital Territory: Australian Institute of Criminology, available at: https://doi.org/10.52922/sr77031 DOI: https://doi.org/10.52922/sr77031
Wilson, Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress, CRS Report for Congress, 2007, Updated January 29, 2008, page 4, available at: www.fas.org/sgp/crs/terror/RL32114.pdf
Legal Case Studies:
Dotcom et al. v. United States (Case Study 5). UNODC. (https://www.unodc.org/e4j/en/organized-crime/module-11/exercises/case-studies.html)