Document Type : Research Paper

Authors

1 Associate Professor, faculty of Law. The University of Qom, Qom, Iran

2 PhD, candidate of Criminal Law and Criminology, The University of Qom, Qom, Iran

Abstract

In today's age, the Internet as a wide and important communication tool can be sanctioned based on Article 41 of the United Nations Charter and international laws under the guaranty of implementation. Despite this prediction, no clear action has been reported by the Security Council in this regard. Although in practice, these are the governments that apply this restriction against each other without any permission and legal order and accept such restrictions within the limits of their international treaties and legal principles, but this is only as long as the countries are within the scope of power. have not taken action. In this case, instead of being a guarantee of enforcement, the internet ban becomes criminal in nature and is condemned by another enforcement guarantee. With the studies carried out in this research, in a descriptive-analytical way, the internet embargo is expressed in two distinct concepts and examples, one time as a guarantee of implementation and another time as an international crime, and finally, this is expected from the Security Council with Such behavior that violates international security and peace on a macro level, such as war and internet terrorism, and the International criminal Court should apply the necessary procedures for judicial proceedings

Keywords

  • Ansari, Baqir, (2019). "The right to access the Internet; Basics and Content", Judiciary Legal Journal, Volume 84, Number 112, Winter. [in Persian]
  • Tenenbaum, Andrew S. (2003). Computer networks, translated by: Ehsan Malekan and Alireza Zarepour, Scientific and Cultural Institute (text), 22nd edition of Fall 2011. [in Persian]
  • Hekmati, Fatemeh, Ziyaei, Sidyaser (2016). Iranian media boycott from the perspective of international law, Khorsandi, Tehran. [in Persian]
  • Khaleghi, Abolfath (2019). International Crimes Procedural Regime, Majed Publications, Tehran. [in Persian]
  • Delkhosh, Alireza (1390). "Different Aspects of Responsibility in International Criminal Law", International Law, Center for International Legal Affairs of the Presidency, Year 28, Number 44. [in Persian]
  • Rouhani Rankohi, Seyyed Mohammad Taghi and Amiri Yusuf (2012). Glossary of Data Engineering, Jaloh Publishing House, Tehran. [in Persian]
  • Zamani, Seyyed Ghasem, Gharibabadi, Kazem (2014). "Examination of the legality and legitimacy of unilateral economic sanctions according to international law", Jurisprudence Perspectives, No. 72. [in Persian]
  • Sajjadi, Seyyed Kamal; Heydari, Mehtab (1400). "Methods of resolving domain name disputes", Law Studies, No. 23. [in Persian]
  • Soltanifar, Mohammad (1391). "International law, media, international peace and security", Encyclopedia of Law and Politics, No. 18. [in Persian]
  • Ziai Begdali, Mohammad Reza (2015). General International Law, twenty-fourth edition, Ganj Danesh. [in Persian]
  • Ziyai, Sidyaser, Shakibnejad, Ehsan (2015). "Legislation in the cyberspace approach of international law and Iranian law", International Law, No. 57. [in Persian]
  • Abedini, Abdullah (2014). International criminal law, theory and practice, Shahr Danesh, Tehran. (In Persian:)
  • Ameli, Saeedreza, Mohseni Ahoyi, Ibrahim (2017). Lack of legal-international legitimacy of sanctions and human rights violations, Islamic Human Rights Institute 2018, London. [in Persian]
  • Fayouzi, Reza (1386). International Criminal Law, Tehran University Publications. [in Persian]
  • Mousavi, Mohammad Reza et al. (2012). "Effects of security threats of cyber terrorism on the national security of the Islamic Republic of Iran and strategies to deal with it", International Police Studies, serial number 14. [in Persian]
  • Moin, Mohammad (1360). Farhang Farsi, Vol. 1, 4th edition, Amir Kabir, Tehran. [in Persian]
  • Harrison Dinis, Heater (2015). Cyber war and the laws of war, translated by: Saeed Hakimiha - Homan Shahrokh, Mizan, Tehran. [in Persian]
  • ب.  انگلیسی
  • Andrade, Norberto Nuno Gomes de .(2016). New Technologies and Human Rights: challenges to Regulation.
  • Castell, Wolfgang zu. Et Al. (2005). Inzell Lectures on Orthogonal Polynomials. Nova Publishers.
  • Schmitt, Michael N.(2013). Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge University press.
  • Casey, Rebecca E. (2008) ICANN or ICANN' t Represent Internet User. Faculty of the Virginia polytechnic Institute and State University.
  • Deibert, Ronald & etc (2008) Access Denied: The Practice and Policy of Global Internet Filtering. MIT Press.
  • Eeckhout Piet .(2011(EU External Relations Law. Oxford University Press.
  • Frosio, Giancarlo F. (2020) Oxford Handbook of Online Intermediary Liability. Oxford University Press.
  • Government Printing Office. (2011) Country Reports on Human Rights Practices for 2011.
  • Hlubik Schell, Bernadette. (2007). The Internet and Society: AReference Handbook. ABC-CLIO.
  • Ibp. (2015). CUBA Information Strategy. Internet and E-Commerce Development Handbook. International Business Publications. USA.
  • Kung, Lucy . Et Al .(2008). The Internet and The Mass Media, Sange.
  • Müller, Joachim. (2006). Reforming the United Nations [electronic resource]: the struggle for legitimacy and effectiveness. Martinus Nijhoff Publishers.
  • Nakahira, Katsuko T. et al. (2006). Geographic Locations of web servers. Proceedings of 15th international conference on worldwide.
  • National Research Council, Division on Engineering and Physical Sciences. Committee on offensive Information Warfare. (2009). Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities. National Academies Press.
  • Patricia Moloney Figliola .(2010). S. Initiatives to Promote Global Internet Freedom: Issues, Policy, and Technology. DIANE Publishing.
  • Yong Wang, Dawn Gu. Et al. (2012). Stuxnet Vulnerabilities Analysis of SCADA Systems. International Conference on Network Computing and Information Security. NCIS: Network Computing and Information Security pp 640–646.
  • Schmitt, Michael N. .(2016).Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge University Press.
  • United States. Congress. Senate. Committee on Commerce, Science and Transportation. (2015). Internet Corporation for Assigned Names and Numbers (ICANN).S. Government Printing Office.
  • researchgate.net/publication/
  • nytimes.com/2011/01/16/world/middleeast) Israeli Test on worm called crucial in Iran nuclear delay, William J. Broad, John Markoff and David E. Sanger Jan. 15, 2011