Technological Crimes, Actions in the Realm of Digital Platforms; From Criminalization to Response in International Law

Document Type : ISI

Author

Associate Professor of Criminal Law and Criminology, Faculty of Administrative Sciences and Economics, Arak University, Arak, Iran.

Abstract

 Introduction
In the current era, alongside the rapid expansion of modern technologies, technology-related crimes have also significantly increased, characterized by features such as the anonymity of perpetrators, high speed of execution, and the ability to transcend geographical borders. These crimes, especially in countries with weak information technology infrastructures, pose transnational and global threats. Therefore, effective countermeasures require the formulation of comprehensive laws, harmonized criminalization, and strengthened international cooperation. Technology-related crimes encompass a broad spectrum of criminal behaviors, including unauthorized access to computer systems, information theft, internet fraud, misuse of social networks, and violations of intellectual property rights. The technical complexity of these crimes, the lack of physical evidence, and their cross-border nature have made the identification and prosecution of offenders particularly challenging. Moreover, insufficient specialized knowledge among judges, the potential manipulation of digital evidence, and criminals’ use of emerging technologies have reduced the effectiveness of criminal justice measures. Thus, the existence of dedicated laws, clear jurisdictional provisions, adaptation of legal procedures to the digital environment, and enhanced cooperation among states are indispensable.
At the international level, the United Nations has taken steps since the 1990s to combat technology-related crimes, including holding global summits on the information society in Geneva (2003) and Tunis (2005), and adopting relevant policy documents. Despite these efforts, until 2024, no binding international treaty specifically addressing cybercrime had been adopted. However, in December 2024, all UN member states ratified the Comprehensive Convention on Cybercrime, a treaty comprising 68 articles aimed at promoting global cooperation, facilitating the exchange of digital evidence, protecting victims, and ensuring respect for human rights. Besides the UN, organizations such as the International Telecommunication Union (ITU), Interpol, and the Group of Eight (G8) have also played effective roles by drafting specialized regulations, training relevant personnel, and establishing technical committees. These developments reflect the global community’s movement toward establishing a coherent and effective legal framework for good governance in cyberspace.
Methodology
This study examines relevant legal texts and specialized literature through descriptive and analytical methods. By conducting detailed and systematic analyses of existing documents, it aims to achieve a comprehensive and deeper understanding of the nature of the agreements under investigation. The theoretical framework of the article is based on the principles of international criminal law, with a particular emphasis on transparency and the prevention of conflicts of interest.
Conclusion
The findings indicate that technology-related crimes, with their complex, transnational, and evolving nature, represent some of the most significant modern security threats. Given their cross-border nature, which weakens traditional sovereignty boundaries, effective responses require adopting coherent international legal strategies. Accordingly, it is recommended to prioritize the drafting of a binding international legal instrument focused on establishing a special criminal tribunal for technology-related crimes. Such a body could, based on recognized international norms, hold perpetrators of widespread cyberattacks and digital rights violations criminally accountable. Achieving this goal requires multilateral cooperation among states, harmonization of domestic laws with international standards, and the application of universal jurisdiction principles.
Furthermore, institutions such as the International Telecommunication Union, Interpol, and the Council of Europe can play effective roles in coordination, policy formulation, and experience exchange. Ultimately, achieving good governance in the digital realm necessitates comprehensive regulatory frameworks, capacity building, intergovernmental information sharing, and the promotion of a cybersecurity culture to effectively counter emerging technological threats.
 
 
 

Keywords


  1.  

    References

    Aaron, A. (2019). A legal Analysis of Cybercrime and Cyber Torts: Lessons for Nigeria. [LL. B Thesis, University of Lagos].

    Ayswariya, G. K & Aswathy, R. (2017). “A Comparative Study on the Difference Between Conventional Crime and Cybercrime”. International Journal of Pure and Applied Mathematics, 119(17), PP. 69-75. https://acadpubl.eu/hub/2018-119-17/2/120.pdf (Accessed 14 December 2024).

    Andini, O. P. (2021). “Cyber Terrorism Criminal Acts in the Perspective of Transnational Organized Crime”. Unnes Law Journal, 7(2), PP. 333-346. https://journal.unnes.ac.id/sju/ulj/article/view/38804

    Alex, G. (2014). “Coming Soon: Another Country to Ratify the Budapest Convention”. CFR blog. https://www.cfr.org/blog/coming-soon-another-country-ratify-budapest-convention (Accessed 21 December 2024).

    Alkharman, Jamal Awwad & Isyaku Hassan (2023). “Cyberterrorism and Self-Defense in the Framework of International Law”. Journal of Law and Sustainable Development, 11(8), PP. 1-21. DOI: https://doi.org/10.55908/sdgs.v11i8.1430

    De Silva De Alwis, R. (2025). Gendering the new international convention on cybercrimes and new norms on artificial intelligence and emerging technologies. Washington Journal of Law, Technology & Arts, 20(2), PP. 1-41. http://dx.doi.org/10.2139/ssrn.4945578

    Eoghan Casey (2011). Digital Evidence and Computer Crime (3rd Ed.). Elsevier Inc publisher, PP. 1-304.

    Crootof, R. (2018). “International Cyber Torts: Expanding State Accountability in Cyberspace”. Cornell Law Review, 103(1), PP. 565-644. https://scholarship.law.cornell.edu/cgi/viewcontent.cgi?article=4753&context=clr(Accessed 5 January 2025).

    Fidler, D. P. (2016). “Cyberspace, Terrorism and International Law”. Journal of Conflict and Security Law, 21(3), PP. 1-26. https://doi.org/10.1093/jcsl/krw013

    Gabey. G. (2013). “INTERPOL Global Complex for Innovation: Interpol lays out response blueprint for global cybercrime war”. Digital News Asia.https://www.digitalnewsasia.com/security/interpol-lays-outresponse-blueprint-for-global-cybercrime-war (Accessed 14 January 2025).

    Khokhlov, N., & Korotayev, A. (2022). “Internet, Political Regime and Terrorism:  A Quantitative Analysis”. CrossCultural Research, 56(4), PP. 385–418. DOI: 10.1177/10693971221085343

    Krannenbarg, M.W. (2018). “Cyber-Offending and Traditional Offending over the Life-Course: An Empirical Comparison”. Journal of Developmental and Life-Course Criminology, 4(3), PP. 343-364. DOI: 10.1007/s40865-018-0087-8.

    Khaeriah kadir, Nadiah & Judhariksawan, Maskun. (2019). “Terrorism and Cyber space; A Phenomenon of Cyber-Terrorism as Transnational Crimes”. Fiat Justicia Journal,13(4), PP. 147-162.

         DOI: 10.25041/fiatjustisia.v13no4.1735

    Mifitzgerald. (2004). “Nine Famous Hacks”. Extreme Tech. https://www.extremetech.com/extreme/55530nine-famous-hacks (Accessed 18 November 2024).

    1. Kovacich & Andy Jones (2006). “Investigating High-Technology”. in: Crimes High-Technology Crime Investigator's Handbook Gerald, (Second Edition) Establishing and Managing a High-Technology Crime Prevention Program, pp. 99-113.

    https://www.sciencedirect.com/science/article/abs/pii/B9780750679299500506(Accessed 16 November 2024).

    Juliana De Groot. (2020). “A History of RAnsomeware Attacks: The Biggest and Worst Ransomware Attacks of All Times”. Digital Guardian’s Blog. https://digitalguardian.com/blog/historyransomware-attacks-biggest-and-worst-ransomware-attacks-all-time (Accessed 8 November 2024).

    Shaweorcid, Robb, Ian R. McAndrew. (2023). “Cybersecurity and Domestic Terrorism: Purpose and Future”. Journal of Software Engineering and Applications, 16(10), PP. 548-560. DOI: 10.4236/jsea.2023.1610028

    Hadji-Janev, M., & Aleksoski, S. (2021). “Use of Force in Self-Defense Against Cyber-Attacks and the Shockwaves in the Legal Community: One more Reason for Holistic Legal Approach to Cyberspace”. Mediterranean Journal of Social Sciences, 4(14), PP. 115-126. https://connections-qj.org/article/use-force-self-defense-against-cyber-attacks-and-shockwaves-legal-community-one-more-reason (Accessed 27 February 2025).

    Rachmawati Madjid, Yasniar. (2021). “Cyberterrorism Challenges: The Need for Global Mutual Legal Assistance for Universal Criminal Jurisdiction”. Yustisia Jurnal Hukum,10(3), PP. 388-414. DOI: https://doi.org/10.20961/yustisia.v10i3.54953

    Reveron, Derek S. & John E. Savage. (2023). International Law and Norms in Cyberspace, in: Security in the Cyber Age an Introduction to Policy and Technology. Cambridge University Press.

    Stein, S. & Solange, G. (2009). A Global Protocol on Cybersecurity and Cybercrime. (Oslo: E-dit).

    Henkin, L. (1978). How Nations Behave. Columbia University Press, 2nd edn.

    Orji, U.J. (2012). Cybersecurity Law and Regulation. 1 Wolf Legal Publishers.

    Ramos, A. (2014). “United Nations’ Definition of Cybercrime”. Innovative Dynamic Networks. https://idnwi.com/united-nations-definition-cybercrime/ (Accessed 8 (Accessed 12 October 2024).

    Raven. (2002). “The History of Hacking and Phreaking”. HelpnetSecurity. www.helpnetsecruity.com/2002/04/04/the-history-of-hacking-and-phreaking/ (Accessed 8 November 2024).