Electronic Blackmail in Iraq
The importance of addressing this topic from a scientific and scientific point of view lies in the fact that electronic extortion as a crime is one of the newly developed crimes that are linked to the methods of subterfuge practiced by individuals in society and are affected by the modern technological development in the field of communications, which was in conjunction with the development of human life, as it opened a new window for unknown types of crimes to be carried out. Using modern means, these crimes are hidden from view of the perpetrator, who carries out his crime from one place, targeting a person who may be located in another place, by means that are difficult to discover and not easy to deduce. A person initiates it at will Another person to compel him to commit a particular crime is that threat and intimidation to the victim by publishing pictures or film materials or leaking confidential information about the victim, provided that this is in return for payment of money or exploitation of the victim to carry out illegal acts for the benefit of extortionists such as disclosing confidential information about the business or other illegal business. Victims are usually trolled by e-mail or various social media such as Facebook, Twitter, Instagram, WhatsApp and other social media due to its wide spread and great use by all segments of society. Electronic extortion is increasing in light of the growing number of social media users and the remarkable acceleration in the number of different conversation programs and the human development in the use of these programs, so the legal position of it in Iraq compared to Arab countries has been clarified and how the legislative treatment of it has been done in the absence of explicit legal texts.
2. Hasser, O. S. (2015). Research published in the Journal of Police Thought, p. 28.
3. Al-Rasheed, M. R. (n.d.). "Criminal Protection and Criminal Protection of the Victim from Extortion. , Arab Journal of Security Studies,, p. 194.
4. Shadid, A. A. (n.d.). Extortion seminar research", concept, causes, treatment. preparation of the Center for Women Researchers for Saudi Women's Studies, p. 44.
5. Aladdin Zaki Morsi. (2013). Assault Crimes on Show. In A. Z. Morsi, Assault Crimes on Show (p. 136). Egypt: Publishing House.
6. Khalil Yusuf Jundi, H. A. (2021). Electronic Extortion and Cybercrime - Concept and Reasons. In H. A. Khalil Yusuf Jundi, Electronic Extortion and Cybercrime - Concept and Reasons (p. 65). House of Knowledge Competencies.
7. Noura bint Abdullah. Blackmail of girls, its rulings and punishment in Islamic
8. Blackmail of girls, its rulings and punishment in Islamic : https://unis.imamu.edu.sa
9. Abdullah, N. b. (n.d.). Blackmail of girls, its rulings and punishment in Islamic jurisprudence. Retrieved from Research submitted to the College of Sharia: https://unis.imamu.edu.sa
10. Al-Ajami, A. D. (2014). "Scientific and Legal Problems of Cybercrime". In A. D. Al-Ajami, "Scientific and Legal Problems of Cybercrime" (p. 33). Jordan: Middle East University, Amman.
11. al-Baghdadi", A. B. (n.d.). Means of research and investigation,. Retrieved from Najah.edu: Najah.edu
12. Ba'ayoi, S. S. (n.d.). Cyber Extortion Crime". Retrieved from researchgate.net: researchgate.net
13. Aleid, N. A. (2021). Nawal Abdulaziz Aleid. Retrieved from http://nawalaleid.com/cnt/lib/768: http://nawalaleid.com/cnt/lib/768
14. Badayna, D. M. (2014). (a scientific lecture entitled “Cybercrime – Concept – Reasons. (p. 7). Jordan: ), the Scientific Forum at the College of Strategic Sciences and Targeted Crimes in the Light of Regional and International Changes and Transformations).
15. Hamid Salih Ibn Abdullah Ibn Muhammad. (1432). Extortion Symposium Research, its concept, causes and treatment. Riyadh: Research Center for Women's Studies,.
16. Radi, A. M. (2022). (Principles of Criminal Investigation in Electronic and Information Crimes via the Internet and Ways to Address It. In (. o. It. Baghdad: Books and Documentation House.
17. Ghanem, Y. M. (2019). “Electronic extortion - a study from a legal point of view within the author of electronic extortion - the crime of the modern era. In “. e.-a.-t. era, “Electronic extortion - a study from a legal point of view within the author of electronic extortion - the crime of the modern era (p. 5). Baghdad,: House of Books and Documents.
18. Ibrahim, H. H. (2022, 6 30). The Supreme Judicial Council. Retrieved from The Supreme Judicial Council: https://www.hjc.iq/view.69769/
19. Hussein Abdul Karim Younis, D. K.-J. (2021). (electronic extortion and cybercrime, concept, reasons). In D. K.-J. Hussein Abdul Karim Younis, (electronic extortion and cybercrime, concept, reasons) (p. 55). Cairo: , Dar Al-Qafdat,.
20. Involved, E. e. (2021, 10 25). Electronic extortion Lack of awareness of the intervention of victims with the prohibited and the law deters those involved. Retrieved from Electronic extortion Lack of awareness of the intervention of victims with the prohibited and the law deters those involved: https://www.ina.iq/139500--.html
21. Al-Badayna, T. M. (2021). Created crimes in light of regional and international changes and transformations. Scientific Forum at the College of Strategic Sciences, (p. 51). Jordan: College of Strategic Sciences.
22. Marei, I. J. (2016, 8 9). Cybercrime “Aims – Causes – Methods of Crime and Processing”. Retrieved from Arab Democratic Center : https://democraticac.de/?p=35426
23. Ahmed, A. S. (2011). criminal responsibility for mobile phone abuse,. Iraq: research of graduation requirements from the Judicial Institute.
24. Hammadi, K. A. (2019). Electronic Fraud, The Art of Penetrating Minds (Social Engineering). In K. A. Hammadi, Electronic Fraud, The Art of Penetrating Minds (Social Engineering) (p. 85). Baghdad: Iraqi Ministry of Interior.
25. Al-Sanad, A. R. (1439). The Crime of Extortion. In A. R. Al-Sanad, Abdul Rahman Abdullah Al-Sanad (p. 49). Riyadh: Kingdom of Saudi Arabia, King Fahd National Library for Publishing.
26. Ahmed Fathi Sorou.. (Mediator in the Code of Criminal Procedure). Ahmed Fathi Sorour، (Mediator in the Code of Criminal Procedure) Cairo: Arab Renaissance House.Chalhoub, M. '.-M. (1432). (The crime of extortion, comparative study). In M. '.-M. Chalhoub, (The crime of extortion, comparative study) (p. 23). Saudi Arabia: Master's thesis, Imam Muhammad Ibn Saud Islamic University,.
27. Al-Shukry, A. Y. (2008, 7 6). Information Crime and the Crisis of Criminal Legitimacy. Journal of the Kufa Studies Center, pp. 117-120.
28. Al-Ghalbi, R. A. (2009). The crime of electronic extortion and the mechanism of combating it in the Republic of Iraq, . In R. A. Al-Ghalbi, The crime of electronic extortion and the mechanism of combating it in the Republic of Iraq, (pp. 14-18). Bahdad: House of Books and Documents.
29. Mamdouh Rashid Al-Anazi. (2017). Criminal Protection of the Victim of Extortion. The Arab Journal for Security Studies, 58-101.
30. Code, I. P. (1969, 7 1). https://www.rwi.uzh.ch/dam/jcr:00000000-0c03-6a0c-ffff-ffff96be3560/penalcode1969.pdf. iraq, Baghdad.
31. writer, L. t. (2009). https://al-ain.com/article/electronic-blackmail-iraq-victims-escalating-laws. Iraq, Bahdad, Bahdad.
الحقوق الفكرية (c) 2023 Asst. Lect. Mustafa Lutfi abdul jaleel ALdalle
هذا العمل مرخص حسب الرخصة Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.