تأثير التقنيات الحديثة في الجريمة المنظَّمة العابرة للحدود

المؤلفون

محمد الجندي ، ، باتريك لابرش ، ، ألكسندر ماليشو ، ، مريم عمي ، ، إيمان رجب

الكلمات المفتاحية:

الدراسات الأمنية، الجريمة المنظمة، التقنيات الحديثة، أمن الحدود

موجز

على الرغم من هذه الأهمية المتزايدة للتطبيقات التقنية الحديثة، فإنها ليست العامل الوحيد المؤثر في الجريمة العابرة للحدود، فهناك عوامل غير تقنية تحدد بشكل كبير كيفية استخدام الشبكات الإجرامية للتقنيات في أنشطتها، وتؤثر في نطاق أنشطتها عبر الحدود والتوسع فيها، وهناك أيضًا عوامل غير تقنية تؤثر في قدرة أجهزة إنفاذ القانون على تفكيك تلك الشبكات وإضعافها.

وفي ضوء ذلك، قدمت الدراسة تحليلًا موضوعيًّا لفاعلية أجهزة إنفاذ القانون في الدول العربية فيما يتصل بهذه القضية التي تشغل العالم اليوم دون تضخيم لأهمية التقنيات الحديثة في عمل الشبكات الإجراميَّة، أو تقليل من تلك الأهمية، وذلك من خلال تحليل شامل لتأثير التقنيات الحديثة في شبكات الجريمة العابرة للحدود خلال المرحلة الراهنة من واقع الممارسات العالمية والإقليمية التي جرى تحليلها بشكل تقني مقارن لتوضيح كيفية تعزيز الابتكارات الرقمية للقدرات الإجرامية ودورها في إعادة تشكيل الإستراتيجيات اللازمة لأجهزة إنفاذ القانون.

وقدمت الدراسة عددًا من التوصيات لأجهزة إنفاذ القانون في الدول العربية بهدف تعزيز قدرتها على التصدي للأنشطة الخاصة بالشبكات الإجرامية بفاعليَّة، وإضعاف القدرات غير التقنية لتلك الشبكات التي تُسهم إسهامًا حيويًّا في استمرارها وبقائها.

Alejandro SANTOS SID, « Drones, explosives, impunity : a mexican drug cartel flexes its muscle in Michoacan », EL PAIS, 17 janvier 2022.

Al-Rawi, A. K. (2020). Digital policing in the Arab Gulf countries. International Journal of Electronic Security and Digital Forensics, 12(3), 254-270.

Anderson, R., & Barton, C. (2013). Rethinking law enforcement for the cyber age. Harvard Journal of Law & Technology, 27(1), 1-22.

Bayoumi, A. (2021). Smart policing and public security technologies in the GCC. Journal of Policing and Security Studies, 5(2), 34-49.

Bellanova, R., & Duez, D. (2016). Making sense of security data: Categorization and visualization in OSINT practices. European Journal of Security Research, 1(2), 159-176.

Benjamin Chekroun, Sophie Deleuze, Quentin Stevenart,”Fascial Recognition and Human Rights: A Guide for the Investor”, CANDRIAM,.

Brynjolfsson, E., & McAfee, A. (2014). The second machine age: Work, progress, and prosperity in a time of brilliant technologies. W.W. Norton & Company.

CAPITAL, “Sky ECC: the Canadian private messaging service that housed the exchanges of hundreds of thousands of criminals”, , March 8, 2023.

Casey, E. (2011). Digital evidence and computer crime: Forensic science, computers, and the internet (3rd ed.). Academic Press.

Chainalysis. (2023). Crypto Crime Report 2023. Chainalysis.

Civil liberties and ethics: “Facial recognition: upholding the values of Europe”. June 2020.

Clark, G., & Osler, C. (2015). Money Laundering and Terrorist Financing: A Risk-Based Approach. Routledge.

Claude Castelluccia, Daniel Le Matayer,”Analysis of the impacts of facial recognition, some elements of method”, Hal Open Science.

Convention on Psychotropic Substances of 1971 (United Nations Conference of 1971).

Davis, J. H., & Clark, J. (2017). The dark web: A study in technology, security, and legal issues. Journal of Law, Technology & the Internet, 8(2), 99-115.

Edvardas Sileri, head of the European Cybercrime Centre at EUROPOL,”Crime on the internet: the dark web is no longer as hermetic a place as it used to be”, Le Monde, interview by Sophy Caulier, 15 November 2020.

Edwards, P., & Gill, J. (2002). Transnational Organized Crime: An Introduction. Routledge.

El-Guindy, M. (2008). Cybercrime in the Middle East. ISSA Journal.

El-Guindy, M. (2021). Applying Digital Forensics Methodology to Open Source Investigations in Counterterrorism. Journal of Law and Emerging Technologies, 1(1), 11–64. https://doi.org/10.54873/jolets.v1i1.32

Elodie MESSEAN, “Cryptocurrencies, the money of criminals?”, La Tribune, November 17, 2020.

EU Innovation Hub (2024), First Report on Encryption by EU Innovation Hub for Internal Security, Publication Office of the European Union, Luxembourg.

EUROPOL (2021), The use of violence by organised criminal groups, Spotligt Europol report series, Publications Office of the European Union, Luxembourg.

EUROPOL (2024), « decoding the EU’s most threatening criminal networks ». Publication office of the European Union Luxembourg.

Europol. (2023). European Cybercrime Report 2023. Europol.

Financial Action Task Force (FATF). (2019). Guidance for a Risk-Based Approach to Virtual Assets and Virtual Asset Service Providers. FATF.

France-Monde, November 28, 2022.

Gandomi, A., & Haider, M. (2015). Beyond the hype: Big data concepts, methods, and analytics. International Journal of Information Management, 35(2), 137-144.

Gelgi, M., Guan, Y., Arunachala, S., Samba Siva Rao, M., & Dragoni, N. (2024). Systematic Literature Review of IoT Botnet DDOS Attacks and Evaluation of Detection Techniques. Sensors, 24(11), 3571.

International Monetary Fund (IMF). (2018, September 11). Fintech, Inclusive Growth, and Cyber Risks: Focus on the MENAP and CCA Regions.

Interpol. (2020). I-24/7: Connecting police for a safer world. https://www.interpol.int

Joint report of EUROPOL and the security steering committee of the ports of Antwerp, Hamburg/Bremerhaven and Rotterdam, 30 March 2023.

Joint report of EUROPOL and the security steering committee of the ports of Antwerp, Hamburg/Bremerhaven and Rotterdam, 30 March 2023.

Julien Constant, “Nullities of procedure for drug traffickers: AI at the service of organized crime lawyers?”, , Le Parisien, June 6, 2024.

Jupp, S., & Garrod, J. (2019). Money Laundering: The Criminal Mind and Methods. Routledge.

Kassab, G., & Rosen, D. (2019). The Digital Silk Road: How the Internet is Transforming Global Drug Trafficking. Crime, Law and Social Change, 72(2), 157-178.

Kim, S., & Lee, J. (2019). Social media analysis in cyber investigation. International Journal of Law, Crime and Justice, 44(3), 251-264.

Kruisbergen, J., et al. (2019). The Darknet and Drug Markets: A Review of the Literature. International Journal of Drug Policy, 69, 101-111.

Kruse, W. G., & Heiser, J. G. (2002). Computer forensics: Incident response essentials. Addison-Wesley.

Laufs, J., & Borrion, H. (2021). Technological innovation in policing and crime prevention: Practitioner perspectives from London.

Levitt, K. (2020). AI and Crime: Understanding the Risks and Opportunities. Oxford University Press.

McDonald, A. (2021). Encryption: A Double-Edged Sword. Journal of Cybersecurity, 7(2), 115-132.

Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. https://bitcoin.org/bitcoin.pdf

O’Hara, K., & Hall, W. (2018). Four internets: The geopolitics of digital governance. Communications of the ACM, 61(6), 36-40.

Pomerleau, M. (2018). The role of web scraping in open source intelligence. Journal of Digital Investigation, 12(4), 102-113.

Professor Florence G’sell, “Is encryption a fundamental right?” Case study on the regulation of CSAM in the EU (Stravoula Chousou, Julia Magaud, Ludovica Pavoni and Morgan Williams). SciencesPo, Digital Chair, Governance and Sovereignty, Comparative Approaches to the Regulation of Big Technologies (Spring 2023),

Report 2022 of the European Monitoring Centre for Drugs and Drug Addiction (EMCDDA): the production of fake medicines such as oxycodone tablets which were also found to contain opioids with a high benzimidazole content, and fake Xanax and diazepam tablets containing new benzodiazepines was noted.

Saito, M. (2021). The Sky is Not the Limit: How Encrypted Communication Apps Facilitate International Drug Trafficking. Trends in Organized Crime, 24(1), 7-25.

Schär, F. (2018). Cryptocurrencies, Crypto-assets and Anti-Money Laundering: A Challenge for Financial Regulation. Palgrave Macmillan.

Smith, M. L. (2021). The rise of encrypted communications in the Middle East. Middle Eastern Studies, 57(4), 557-575.

The controversies of Mines 2022: “Facial recognition in the public space”.

Tuazon, O. M., Wickenheiser, R. A., Ansell, R., Guerrini, C. J., Zwenne, G., & Custers, B. (2024). Law enforcement use of genetic genealogy databases in criminal investigations: Nomenclature, definition and scope. Forensic Science International: Synergy, 8, 100460. https://doi.org/10.1016/j.fsisyn.2024.100460

United Nations Convention against Illicit Traffic in Narcotic Drugs and Psychotropic Substances of 1988.

United Nations Convention on Narcotic Drugs.

United Nations Office on Drugs and Crime (UNODC). (2020). Global Report on Crime Trends and Developments. UNODC.

UNODC, « Physical and chemical concealment of cocaine, maritime narcotrafficking », STAND PROJECT, UNODC Laboratory and scientific service.

Wagdi Sabète-Gobrial, Les annales de droit, “The constitutionality review of measures limiting individual freedoms within the framework of Law No. 2017, strengthening internal security and the fight against terrorism”, (2020).

Weimann, G. (2016). Terrorist migration to social media. Georgetown Journal of International Affairs, 17(3), 180-188.

World Drug Report 2022, UNODC.

Yermack, D. (2018). Blockchain and the Future of Financial Markets. Pearson Education.

صورة الغلاف

منشور

2025-03-19

الإلكتروني ISSN

1658-8770

المطبوع ISSN

1658-8762

Details about this monograph

ISBN-13 (15)

978-603-8487-13-6

Publication date (01)

2025-03-19

الأبعاد

21cm x 28cm x 1.5cm