TY - JOUR ID - 173514 TI - Trends In The International Law Of Electronic Espionage Quoted JO - Journal of college of Law for Legal and Political Sciences JA - LLPS LA - en SN - 2226-4582 AU - Al Hadidi, Talaat Jiyad Legy AU - Al-Mafraji, Saad Ahmed Medan AD - Y1 - 2022 PY - 2022 VL - 11 IS - issue 40 part 1 SP - 578 EP - 620 KW - espionage KW - International law KW - electronic DO - N2 - الجوسسة فی زمن السلم قدیمة قدم البشریة, اما الجوسسة الالکترونیة فإنها تماماً مثل نظیرتها التقلیدیة, تنطوی على عملیات اقتحام غیر مصرح بها, ویتم استغلال على سبیل المثال نقاط الضعف الامنیة لکی تتجاوز الخوادم المشفرة والوصول الى البیانات التابعة للدول والشرکات والسفارات والوکالات الحکومیة وحتى الافراد, واحد الاختلافات الرئیسیة عن الجوسسة التقلیدیة هی الاستقلالیة الجغرافیة والمادیة العالیة التی تتمتع بها الجوسسة الالکترونیة, ذلک یعنی انه فی حالة الجوسسة على بیانات وکالة تابعة لدولة اخرى ؛ لیس هناک حاجة الى وجود شخص مادی او جهاز فی الحالة المستهدفة, ویستخدم بدلاً من ذلک الاوامر الصادرة من ای مکان وبالتالی یمکن ارتکاب اعمال الجوسسة الالکترونیة بغض النظر عن حدود الدولة . Espionage in peacetime is as old as humanity, and electronic espionage, just like its traditional counterpart, involves unauthorized intrusions, and security vulnerabilities are exploited, for example, to bypass encrypted servers and access data belonging to countries, companies, embassies, government agencies and even individuals, one The main differences from traditional espionage are the high geographical and physical independence that electronic espionage enjoys, which means that in the case of espionage on the data of an agency of another country; There is no need to have a physical person or device in the target state, and instead uses orders issued from anywhere and thus electronic espionage can be committed regardless of state borders.The emergence of electronic espionage has changed the picture and turned to espionage with economic motives as it is related to national security, and the current reality in which countries live has proven that information at times has a degree of confidentiality required, which results in its circulation, theft, tampering, transmission and spread of a kind There are risks, and the importance of this information varies, as not all of them are of equal importance, because if some of them are transmitted to others, they will result in severe damage. Computers backed by electronic infrastructure located within the territory of another state lead to a violation of the rule of territorial sovereignty, and it is also a violation of the principle of non-interference in the internal affairs of states, regardless of whether that electronic infrastructure is operated by state agencies or private actors, and therefore The rule of regional sovereignty provides an important and powerful source of legal protection against electronic espionage. UR - https://jclaps.uokirkuk.edu.iq/article_173514.html L1 - https://jclaps.uokirkuk.edu.iq/article_173514_c9d86635d2f02796517e3cd282472f95.pdf ER -