آليات الكشف والمنع عن الأنشطة الإرهابية على الحدود

المؤلفون

ترتيل تركي الدرويش
مركز الخبرة الإقليمي لمكافحة المخدرات والجريمة، جامعة نايف العربية للعلوم الأمنية، المملكة العربية السعودية
سامح محمد السيد
جامعة نايف العربية للعلوم الأمنية، المملكة العربية السعودية
كريم محسن هلال
المركز العربي للتعاون الفني في إدارة الهجرة والحدود، جامعة نايف العربيَّة للعلوم الأمنيَّة، المملكة العربية السعودية

الكلمات المفتاحية:

الدراسات الأمنية، الإرهاب، أمن الحدود، التنظيمات الإرهابية، الأمن الوطني

موجز

تنطلق هذه الدراسة من فرضية تحول الإرهاب إلى ظاهرة عابرة للحدود، مما يضع أنظمة إدارة الحدود التقليدية أمام تحديات متعددة ومتغيرة، يستوجب التعامل معها بشكل مستمر، وبتطبيق منهجية تحليلية مقارنة، تشخص الدراسة أنماط التهديد المعاصرة كالتسلل عبر الحدود، والتمويل عبر تهريب الموارد، والإرهاب السيبراني، مؤكدة أن هذه المخاطر تعتمد على الفراغات التنظيمية والتباين التشريعي والتقني بين الدول؛ حيث رصدت خمسة تحديات محورية تعيق كفاءة المواجهة، تبدأ من غياب التعريف الموحد للإرهاب، وصولاً إلى تهميش المناطق الحدودية تنموياً ونقص تكنولوجيا المراقبة الذكية التي توازن بين مقتضيات الأمن وحقوق الإنسان.

وتخلص الدراسة إلى أن المواجهة الناجعة تتطلب مقاربة شاملة تتجاوز الردع العسكري إلى حوكمة الحدود، عبر مسارات تنفيذية تشمل تحديث القوانين لتجريم التمويل الرقمي، والاستثمار في الحدود الذكية المعتمدة على الذكاء الاصطناعي، وتفعيل مركز إقليمي للإنذار المبكر، وتؤكد التوصيات على ضرورة تحصين المجتمعات الحدودية تنموياً لقطع الطريق أمام الاستقطاب، معتبرة أن تأمين الحدود في الدول العربية لم يعد مجرد إجراء رقابي، بل هو منظومة متكاملة تدمج التشريع والأمن والتنمية، لضمان تحويل المناطق الحدودية من نقاط ضعف إلى دروع حصينة تحقق الأمن المستدام.

References

المراجع ● 2024 National Terrorist Financing Risk Assessment, Department of the Treasury

● Actioned terrorism content items on Facebook worldwide from 4th quarter 2017 to 3rd quarter 2024, Statista

● ALEXANDER MELEAGROU-HITCHENS, AUDREY ALEXANDER AND NICK KADERBHAI, The impact of digital communications technology on radicalization and recruitment

● Amal Kandeel, NATO countries should help Egypt mitigate security challenge near Libyan border, Atlantic Council

● Andy Forney, Drone Strikes Forever: The Problem with Over-The-Horizon Counter Terrorism and a Better Way Forward

● Ben Saul, Defining Terrorism in International Law

● Border Security and Management Programme, UNOCT, UNCCT

● Camille Jablonski, Delaney Soliday, and Ilana Winter, Key Takeaways from the Latest Country Reports on Terrorism

● CFR, Global Perspectives – The 9/11 Effect and the Transformation of Global Security

● Christian Kaunert and Ori Wertman, Counter-terrorism cooperation, NATO Defense College

● CIA Research Study on International and Transnational Terrorism, FOREIGN RELATIONS OF THE UNITED STATES

● Code Pénal de la République française

● Countering terrorism, NATO, July 2024

● Counter-Terrorism, INTERPOL, Future-oriented policing projects

● CPT JaKayla Hill, Combined Joint Task Force - Inherent Resolve Public Affairs, Historic conference aims to enhance coordination throughout Iraqi counter-terrorism enterprise, Operation Inherent Resolve Combined Joint Task Force,

● David B. Carter and Luwei Ying, The Gravity of Transnational Terrorism

● David Vergun, Austin Notes Success of Territorial Defeat of ISIS in Iraq

● Defining Terrorism, United Nations Office of Drugs and Crime UNODC

● Delphine Schantz, Briefing of the Counter-Terrorism Committee on “The nexus between international terrorism and transnational organized crime”

● European Union Agency for Criminal Justice Cooperation, Annual Report – Terrorism

● FATF Report, Virtual Assets Red Flag Indicators of Money Laundering and Terrorist Financing

● G7 Action Plan on Countering Terrorism and Violent Extremism

● Global Terrorism Index 2025, Key findings from the Global Terrorism Index 2024 report, Vision of Humanity

● Hamidreza Alvari, Soumajyoti Sarkar, Paulo Shakarian, Detection of Violent Extremists in Social Media, arxiv

● Handbook on Criminal Justice Responses to terrorism, UNODC, Criminal Justice Handbook Series

● Hani AL Basoos, Alanood Alfarisi, Explaining the Omani National Counterterrorism Strategy

● Hashmat Ullah Khan, An analytical investigation of consequences of terrorism in the Middle East

● Husham Al Hashimi, ISIS on the Iraqi-Syrian Border: Thriving Smuggling Networks, New Lines Institute

● Jennifer Cooke, Boris Toucas, and Katrin Heger, Understanding the G5 Sahel Joint Force: Fighting Terror, Building Regional Security?

● Jennifer Stisa Granick and Daniel Kahn Gillmor, The Vital Role of End-to-End Encryption, ACLU

● Julian Borger, Chris McGreal, and Tom Finn, Cargo plane bomb plot: Saudi double agent 'gave crucial alert', The Guardian

● Katherine E. Brown, Transnational Terrorism, 19 Jan 2017, E-International Relations

● Kathleen Deloughery, A Joint Examination of Country Policies and Transnational Terrorism

● Kathleen McKendrick, Artificial Intelligence Prediction and Counterterrorism, Chathman House

● Kheder Khaddour and Armenak Tokmajyan, Borders Without a Nation: Syria, Outside Powers, and Open-Ended Instability, Malcolm H. Kerr Carnegie Middle East Center

● Kshitij Prabha, Defining Terrorism, Strategic Analysis

● Lia, B. and Skjølberg, K., 2004, 'Causes of Terrorism: An Expanded and Updated Review of the Literature?'

● Lisa Watanabe, Sinai Peninsula – from Buffer Zone to Battlefield, CSS Analyses in Security Policy

● Matthew J. Costello, RENTIERISM AND POLITICAL INSURGENCY: A CROSS-NATIONAL ANALYSIS OF TRANSNATIONAL RENT DEPENDENCY ON TERRORISM AND GUERRILLA WARFARE

● Michael G. Roskin, "Political Science". Encyclopedia Britannica

● Michael J. Soules, Thinking Outside of the Box: Transnational Terrorism in Civil Wars

● New York Memorandum on Good Practices for Interdicting Terrorist Travel, Global Counter-Terrorism Forum GCTF

● NUR ÇAĞRI KONUR, CONCEPTUALIZING TRANSNATIONAL TERRORISM AND THE EMERGENCE OF NON-STATE SECURITY ACTOR: AL QAEDA

● OAU Convention on the Prevention and Combating of Terrorism

● Post-legislative scrutiny of the Counter-Terrorism and Border Security Act 2019, Memorandum to the Home Affairs Committee, HM Government

● Preventing Terrorists from Using Emerging Technologies, Vision of Humanity

● Project Sharaka: Tackling terrorism in the Middle East and North Africa, Interpol

● Roberto Cerina, Christopher Barrie, Neil Ketchley and Aaron Zelin, Explaining Recruitment to Extremism: A Bayesian Case-Control Approach,

● Sajjan M. Gohel, Prevention of Cross-Border Movements of Terrorists: Operational, Political, Institutional and Strategic Challenges for National and Regional Border Controls, Handbook of Terrorism Prevention and Preparedness

● SAUDI ARABIA AND COUNTERTERRORISM, The Embassy of Saudi Arabia, Washington D.C.

● Saudi Gazette, Presidency of State Security: A vision for development and prosperity

● Snapshot: Using Satellites and Data Analytics to Protect the Homeland, Homeland Security

● Statute of the African Union Mechanism for Police Cooperation (AFRIPOL)

● Steven Oluic, Iraq’s Border Security, Combating Terrorism Center, CTC Sentinel

● Terrorism international framework: General UNSC resolutions on terrorism, United Nations Office on Drugs and Crime, SHERLOC

● Terrorist Act 2000

● Terrorist Groups Remain Significant Threat in Conflict Zones, Neighbouring States, Senior Official Tells Security Council, Noting Force Alone Can Exacerbate Matters, UN Security Council, SC/15396

● Terrorist Groups Remain Significant Threat in Conflict Zones, Neighbouring States, Senior Official Tells Security Council, Noting Force Alone Can Exacerbate Matters, UN Security Council

● The EU’s Response to Terrorism – EU Definition of Terrorism, European Council – Council of the European Union

● United States Code

● UNODC, The Middle East and Gulf Region

● Using AI to Secure the Homeland, Homeland Security – US Government

● Wright, J., D’Amato, S. (2023). Transnational Terrorism as a Threat: Cross-Border Threats. In: Balomenos, K.P., Fytopoulos, A., Pardalos, P.M. (eds) Handbook for Management of Threats

● Yonah Alexader, Counter Terrorism Strategies Successes and Failures of Six Nations, Potomac Books

صورة الغلاف

منشور

2026-02-19

الإلكتروني ISSN

1658-8770

المطبوع ISSN

1658-8762

Details about this monograph

ISBN-13 (15)

978-603-8487-49-5

Publication date (01)

2026-02-19

الأبعاد

21cm x 28cm x 0.7cm