This perentation has been created to address multidisciplinary purpose. Therefore, people from Legal, Shariah, Engineering and of different professions can get benefit from this presentation.
The document describes a system for secure data transmission through RF technology. It discusses encoding and transmitting data securely by encrypting it using an algorithm and wireless RF modules. The system uses a PIC microcontroller, MAX232 chip, and RF transmitter and receiver modules operating at 433.92MHz to encrypt data on a PC, transmit it wirelessly, and decrypt it on receipt. The system provides a basic level of security for data transmission through wireless communication.
Amortized analysis allows analyzing the average performance of a sequence of operations on a data structure, even if some operations are expensive. There are three main methods for amortized analysis: aggregate analysis, accounting method, and potential method.
The accounting method assigns differing amortized costs to operations. When the amortized cost is higher than actual cost, the difference is stored as credit. Later operations may use accumulated credits when their amortized cost is lower than actual cost.
The potential method associates potential energy with the data structure as a whole. The amortized cost of an operation is the actual cost plus the change in potential. If potential never decreases, the total amortized cost bounds the total
This document provides examples of forward chaining and backward chaining for a knowledge base about animals. The forward chaining example starts with the fact that Fritz croaks and eats flies, and uses rules in the knowledge base to infer that Fritz is a frog and is colored green. The backward chaining example starts with the goal of determining Fritz's color, and works backwards from rules in the knowledge base to reach the same conclusion.
Electronic Surveillance of Communications 100225Klamberg
The document discusses electronic surveillance of communications and legislation around signal intelligence. It provides context on changes in technology and threats that created demands for new legislation. It describes how signal intelligence works, including intercepting messages and metadata, as well as traffic analysis and social network analysis. Legislation in Sweden and other countries regulates agencies conducting signal intelligence and their mandates, clients, and oversight. Key aspects of Swedish law include the Defence Radio Establishment's mandate for surveillance, its clients and review mechanisms, methods like traffic analysis, and the scope of interception and data collection.
This document discusses electronic surveillance and privacy concerns in Malaysia. It provides definitions of electronic surveillance and perspectives on privacy from various scholars. National security is discussed as providing assurance. Primary Malaysian legislation related to domestic security and electronic surveillance is outlined, including powers of arrest, interception of communications, and electronic monitoring of suspects. The legislation is analyzed in relation to potential violations of constitutional rights to privacy, noting Malaysia initially did not recognize privacy rights but has since 2006. The document concludes by proposing areas of consensus between electronic surveillance and privacy rights for the future, including limiting unnecessary information collection, ensuring health and monitoring of electronic devices, providing guidelines for device monitoring, ensuring confidentiality of reports, and allowing appeals of electronic monitoring rulings.
Abstract: Malaysia is a multi-ethnic and multi-cultural country where heterogeneous groups of people follow different religions peacefully. This land was previously ruled by Dutch, Portuguese and English colonisers who left huge influences in framing its plural legal systems. The objective of this study is to analyze the influences of ancestral customs and norms that have been practiced along with the introduction of Islamic principles and the recognition of English laws in Malay and Borneo-islands and their impact on framing the current legal system of Malaysia. It will investigate if different cultures have influenced the adoption and development of legal systems in Malaysia. This study will also look at the changes in Malay culture because of the adoption of different legal systems and will analyse the factors that may have encouraged the Malay Sultans to accept different laws into their own states. This article will also identify the reasons why orthodox people willingly abide by this plural legal system in settling their daily disputes in different courts. Data from journals and books have been taken into consideration in undertaking this study. It has also sifted through some prominent decisions of the judges. After considering all materials, this study advocates that, the federal laws of Malaysia are the combination of three principles: the common laws (applicable to all citizens in civil and criminal matters), the Shariah (applicable for Muslims especially in matrimonial matters) and the Native laws (for the indigenous people of Sabah and Sarawak). This study will look into how the state authority as well as the federal government manages and controls these plural court systems within a federal territory.
Key Words: Legal Pluralism, Legal System, Civil Courts, Shariah Courts & Native Courts.
The document describes a system for secure data transmission through RF technology. It discusses encoding and transmitting data securely by encrypting it using an algorithm and wireless RF modules. The system uses a PIC microcontroller, MAX232 chip, and RF transmitter and receiver modules operating at 433.92MHz to encrypt data on a PC, transmit it wirelessly, and decrypt it on receipt. The system provides a basic level of security for data transmission through wireless communication.
Amortized analysis allows analyzing the average performance of a sequence of operations on a data structure, even if some operations are expensive. There are three main methods for amortized analysis: aggregate analysis, accounting method, and potential method.
The accounting method assigns differing amortized costs to operations. When the amortized cost is higher than actual cost, the difference is stored as credit. Later operations may use accumulated credits when their amortized cost is lower than actual cost.
The potential method associates potential energy with the data structure as a whole. The amortized cost of an operation is the actual cost plus the change in potential. If potential never decreases, the total amortized cost bounds the total
This document provides examples of forward chaining and backward chaining for a knowledge base about animals. The forward chaining example starts with the fact that Fritz croaks and eats flies, and uses rules in the knowledge base to infer that Fritz is a frog and is colored green. The backward chaining example starts with the goal of determining Fritz's color, and works backwards from rules in the knowledge base to reach the same conclusion.
Electronic Surveillance of Communications 100225Klamberg
The document discusses electronic surveillance of communications and legislation around signal intelligence. It provides context on changes in technology and threats that created demands for new legislation. It describes how signal intelligence works, including intercepting messages and metadata, as well as traffic analysis and social network analysis. Legislation in Sweden and other countries regulates agencies conducting signal intelligence and their mandates, clients, and oversight. Key aspects of Swedish law include the Defence Radio Establishment's mandate for surveillance, its clients and review mechanisms, methods like traffic analysis, and the scope of interception and data collection.
This document discusses electronic surveillance and privacy concerns in Malaysia. It provides definitions of electronic surveillance and perspectives on privacy from various scholars. National security is discussed as providing assurance. Primary Malaysian legislation related to domestic security and electronic surveillance is outlined, including powers of arrest, interception of communications, and electronic monitoring of suspects. The legislation is analyzed in relation to potential violations of constitutional rights to privacy, noting Malaysia initially did not recognize privacy rights but has since 2006. The document concludes by proposing areas of consensus between electronic surveillance and privacy rights for the future, including limiting unnecessary information collection, ensuring health and monitoring of electronic devices, providing guidelines for device monitoring, ensuring confidentiality of reports, and allowing appeals of electronic monitoring rulings.
Abstract: Malaysia is a multi-ethnic and multi-cultural country where heterogeneous groups of people follow different religions peacefully. This land was previously ruled by Dutch, Portuguese and English colonisers who left huge influences in framing its plural legal systems. The objective of this study is to analyze the influences of ancestral customs and norms that have been practiced along with the introduction of Islamic principles and the recognition of English laws in Malay and Borneo-islands and their impact on framing the current legal system of Malaysia. It will investigate if different cultures have influenced the adoption and development of legal systems in Malaysia. This study will also look at the changes in Malay culture because of the adoption of different legal systems and will analyse the factors that may have encouraged the Malay Sultans to accept different laws into their own states. This article will also identify the reasons why orthodox people willingly abide by this plural legal system in settling their daily disputes in different courts. Data from journals and books have been taken into consideration in undertaking this study. It has also sifted through some prominent decisions of the judges. After considering all materials, this study advocates that, the federal laws of Malaysia are the combination of three principles: the common laws (applicable to all citizens in civil and criminal matters), the Shariah (applicable for Muslims especially in matrimonial matters) and the Native laws (for the indigenous people of Sabah and Sarawak). This study will look into how the state authority as well as the federal government manages and controls these plural court systems within a federal territory.
Key Words: Legal Pluralism, Legal System, Civil Courts, Shariah Courts & Native Courts.
Social Media in Defence & Military 2012Dale Butler
This document provides information about the 2nd Annual Conference on Social Media within the Military and Defence Sector, which was held on November 14-15, 2012 in London. The conference covered topics such as how various militaries are using social media for recruitment, communication, and operations. Speakers included representatives from the UK Ministry of Defence, US Army, NATO, and other military organizations. The agenda outlined sessions on social media strategy, engagement, security concerns, and applications in contexts like healthcare and recruitment.
12 faces bi business intelligence ~Abdoulaye Mouke YansaneAbdoulaye M Yansane
Business intelligence (BI) tools have traditionally been used by only a small number of analysts, but a new era is emerging where BI can be used by more people across more business functions. This e-book highlights 12 examples of how different business roles are using BI tools like dashboards, charts, and maps to gain insights from data and make better decisions. The examples range from sales and marketing managers to supply chain operators and financial advisors.
Browsing Large Collections of Geo-Tagged PicturesDavide Carboni
This document summarizes and compares three apps for visualizing geo-tagged images: Panoramio, Flickr Maps, and Fractal View. It finds that geo-tagged images are growing exponentially but summarizing large collections remains a challenge. An experiment with 10 testers found that Panoramio involved continuous gaze shifting between maps and thumbnails while Flickr required selecting clusters and losing geographical details. Fractal View allowed selecting bounding boxes while maintaining geographical constraints and image order. The document concludes that mobile devices are important for testing new interaction designs for geo-tagged image visualization and summarization.
Cell Police is a mobile tracking and monitoring system that allows users to track the location of phones, listen to surroundings remotely, take stealth photos with the camera, and set geo-fences to monitor movement. It provides information about calls and allows emergency calling. Customers report that it helped address issues like bullying of a child, reducing anxiety for parents on vacations by tracking children's locations, and finding a lost pet. The software can be purchased from their website.
This document summarizes a presentation about improving business intelligence (BI) systems with geospatial visualization techniques using SharePoint. The presentation discusses visualizing geographic data through SharePoint fields, Reporting Services, Excel apps, Power View, Power BI sites, and Power Map. It provides examples of visualizing data on maps and with geographic heat maps. The document concludes with a demo of using Power Map to identify the best location for a new restaurant.
The document reports on field testing of an enhanced geo-targeting algorithm for Wireless Emergency Alerts (WEA) that uses cell radio frequency (RF) propagation footprints. The testing was conducted in Yuma, Arizona using a live cellular network and involved sending test WEA messages to targeted areas and collecting results from mobile devices. The results showed that the enhanced algorithm using RF footprints was more accurate than existing methods in targeting small areas, with successes in areas as small as one square mile. Some issues remained around devices tuning to non-targeted cell sectors. The findings provide valuable real-world validation of the enhanced algorithm and lessons for further improvements.
Prism break: Minimize surveillance and protect your privacydjtennant
A presentation that points out many issues around privacy, proprietary software, and how to use applications such as encryption to protect your voice online and one your smart or cell phone.
Location based targeting technologies for mobile advertisement pptYiwei Chen
This deck summarizes at high level the commonly used location based targeting technologies for mobile advertisement. It categorizes those technologies into behavioral, geospatial, and geo-temporal types for advertisers, agencies, and publishers to reference.
Mobile Advertising 2014 - Targeting Your AudiencePurplegator
There is so much going on in the world of mobile advertising in 2014, Certainly targeting an audience and controlling ad spend are critical for marketers, and with so many different directions to look at, now is the perfect time to learn and capitalize on the technology available.
A tongue-in-cheek look at UFO data collected by the British government in 2009, demonstrating the awesome capabilities of the Palantir Government analysis platform...
The IB Geography syllabus specifies several skills that should be mastered during the course. The skills are not assessed explicitly in external exams but they are assessed implicitly via data response questions and the expectations of quality essays. The internal assessment based on geographic fieldwork and geography extended essays are the main ways that students have opportunity to demonstrate their geographic skills.
More than Communication Surveillance: Data Protection in the Age of Big Data.
Discussing about re-identification issues, with focus on database for development/aid/public services.
Presented at "Next Generation Technologies for Empowering People" workshop (Frontiers Learning Series) — 14 November 2016, Asia Regional Training Center (ARTC) Bangkok, USAID Regional Development Mission for Asia (RDMA)
https://sites.google.com/site/frontierslearningseries2016/
India electronic security market report 2020 |India CCTV Market |India Video...Ken Research Pvt ltd.
India Electronic Security Industry Potential to 2020 - Growing System Integrators Market with Real Estate Development in Upcoming Smart Cities" provides a comprehensive analysis of electronic security market in India. The report focuses on the electronic security products sales and solutions revenue by system integrators separately in detail. The report covers market size and segmentation of overall electronic security market by verticals (i.e. Video Surveillance - CCTV, Fire Detection, Access Control, Intrusion Alarm and Speciality devices), by end users (residential and non residential - commercial, government, hospitality, transportation, education and others), by organized and unorganized and by domestic and foreign companies operating in the sector.
Crime Pattern Detection using K-Means ClusteringReuben George
Crime pattern detection uses data mining techniques like clustering to analyze crime data and identify patterns. This involves plotting past crimes geographically, clustering similar crimes to detect sprees, and analyzing the results to draw conclusions. It helps improve crime solving by learning from history and preempting future crimes. The method augments detectives' work but has limitations like relying on data quality. Overall, crime pattern detection aids operational efficiency and enhancing resolution rates by optimizing resource deployment based on observed crime trends.
This document discusses the Islamic law of apostasy and how it relates to concepts of human rights. It notes that Islamic texts prescribe the death penalty for apostasy, while international human rights laws protect freedom of religion. The document aims to examine the issue from an Islamic perspective, arguing that Muslims have rational reasons to believe their faith and laws are from God, so there needs to be strong evidence presented before Muslims change their beliefs. It questions whether Western nations uphold human rights fully themselves and suggests their criticism of other cultures on this issue needs further examination.
The “Broader” PathThe Role of Shari’ah in Protecting Women’s Rights. See complete paper here: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1526868
Social Media in Defence & Military 2012Dale Butler
This document provides information about the 2nd Annual Conference on Social Media within the Military and Defence Sector, which was held on November 14-15, 2012 in London. The conference covered topics such as how various militaries are using social media for recruitment, communication, and operations. Speakers included representatives from the UK Ministry of Defence, US Army, NATO, and other military organizations. The agenda outlined sessions on social media strategy, engagement, security concerns, and applications in contexts like healthcare and recruitment.
12 faces bi business intelligence ~Abdoulaye Mouke YansaneAbdoulaye M Yansane
Business intelligence (BI) tools have traditionally been used by only a small number of analysts, but a new era is emerging where BI can be used by more people across more business functions. This e-book highlights 12 examples of how different business roles are using BI tools like dashboards, charts, and maps to gain insights from data and make better decisions. The examples range from sales and marketing managers to supply chain operators and financial advisors.
Browsing Large Collections of Geo-Tagged PicturesDavide Carboni
This document summarizes and compares three apps for visualizing geo-tagged images: Panoramio, Flickr Maps, and Fractal View. It finds that geo-tagged images are growing exponentially but summarizing large collections remains a challenge. An experiment with 10 testers found that Panoramio involved continuous gaze shifting between maps and thumbnails while Flickr required selecting clusters and losing geographical details. Fractal View allowed selecting bounding boxes while maintaining geographical constraints and image order. The document concludes that mobile devices are important for testing new interaction designs for geo-tagged image visualization and summarization.
Cell Police is a mobile tracking and monitoring system that allows users to track the location of phones, listen to surroundings remotely, take stealth photos with the camera, and set geo-fences to monitor movement. It provides information about calls and allows emergency calling. Customers report that it helped address issues like bullying of a child, reducing anxiety for parents on vacations by tracking children's locations, and finding a lost pet. The software can be purchased from their website.
This document summarizes a presentation about improving business intelligence (BI) systems with geospatial visualization techniques using SharePoint. The presentation discusses visualizing geographic data through SharePoint fields, Reporting Services, Excel apps, Power View, Power BI sites, and Power Map. It provides examples of visualizing data on maps and with geographic heat maps. The document concludes with a demo of using Power Map to identify the best location for a new restaurant.
The document reports on field testing of an enhanced geo-targeting algorithm for Wireless Emergency Alerts (WEA) that uses cell radio frequency (RF) propagation footprints. The testing was conducted in Yuma, Arizona using a live cellular network and involved sending test WEA messages to targeted areas and collecting results from mobile devices. The results showed that the enhanced algorithm using RF footprints was more accurate than existing methods in targeting small areas, with successes in areas as small as one square mile. Some issues remained around devices tuning to non-targeted cell sectors. The findings provide valuable real-world validation of the enhanced algorithm and lessons for further improvements.
Prism break: Minimize surveillance and protect your privacydjtennant
A presentation that points out many issues around privacy, proprietary software, and how to use applications such as encryption to protect your voice online and one your smart or cell phone.
Location based targeting technologies for mobile advertisement pptYiwei Chen
This deck summarizes at high level the commonly used location based targeting technologies for mobile advertisement. It categorizes those technologies into behavioral, geospatial, and geo-temporal types for advertisers, agencies, and publishers to reference.
Mobile Advertising 2014 - Targeting Your AudiencePurplegator
There is so much going on in the world of mobile advertising in 2014, Certainly targeting an audience and controlling ad spend are critical for marketers, and with so many different directions to look at, now is the perfect time to learn and capitalize on the technology available.
A tongue-in-cheek look at UFO data collected by the British government in 2009, demonstrating the awesome capabilities of the Palantir Government analysis platform...
The IB Geography syllabus specifies several skills that should be mastered during the course. The skills are not assessed explicitly in external exams but they are assessed implicitly via data response questions and the expectations of quality essays. The internal assessment based on geographic fieldwork and geography extended essays are the main ways that students have opportunity to demonstrate their geographic skills.
More than Communication Surveillance: Data Protection in the Age of Big Data.
Discussing about re-identification issues, with focus on database for development/aid/public services.
Presented at "Next Generation Technologies for Empowering People" workshop (Frontiers Learning Series) — 14 November 2016, Asia Regional Training Center (ARTC) Bangkok, USAID Regional Development Mission for Asia (RDMA)
https://sites.google.com/site/frontierslearningseries2016/
India electronic security market report 2020 |India CCTV Market |India Video...Ken Research Pvt ltd.
India Electronic Security Industry Potential to 2020 - Growing System Integrators Market with Real Estate Development in Upcoming Smart Cities" provides a comprehensive analysis of electronic security market in India. The report focuses on the electronic security products sales and solutions revenue by system integrators separately in detail. The report covers market size and segmentation of overall electronic security market by verticals (i.e. Video Surveillance - CCTV, Fire Detection, Access Control, Intrusion Alarm and Speciality devices), by end users (residential and non residential - commercial, government, hospitality, transportation, education and others), by organized and unorganized and by domestic and foreign companies operating in the sector.
Crime Pattern Detection using K-Means ClusteringReuben George
Crime pattern detection uses data mining techniques like clustering to analyze crime data and identify patterns. This involves plotting past crimes geographically, clustering similar crimes to detect sprees, and analyzing the results to draw conclusions. It helps improve crime solving by learning from history and preempting future crimes. The method augments detectives' work but has limitations like relying on data quality. Overall, crime pattern detection aids operational efficiency and enhancing resolution rates by optimizing resource deployment based on observed crime trends.
This document discusses the Islamic law of apostasy and how it relates to concepts of human rights. It notes that Islamic texts prescribe the death penalty for apostasy, while international human rights laws protect freedom of religion. The document aims to examine the issue from an Islamic perspective, arguing that Muslims have rational reasons to believe their faith and laws are from God, so there needs to be strong evidence presented before Muslims change their beliefs. It questions whether Western nations uphold human rights fully themselves and suggests their criticism of other cultures on this issue needs further examination.
The “Broader” PathThe Role of Shari’ah in Protecting Women’s Rights. See complete paper here: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1526868
This document discusses Shariah law and its sources and applicability in modern times. It outlines four main elements/sources of Shariah law: the Quran, hadiths, ijma (consensus of Islamic scholars), and qiyas (analogical reasoning). It also describes three categories of crimes under Shariah law - hadd (fixed punishments for offenses against God), qisas (equivalence law for intentional injuries), and tazir (discretionary punishments). The document aims to explain the concept of hudud (hadd crimes/punishments) and its suitability today given criticisms of its implementation.
The document discusses freedom of speech from both an Islamic and human rights perspective. It defines human rights and freedom according to Islam and notes that Islam recognizes several basic human rights, including freedom of thought and expression. However, Islam also teaches that freedom of speech must be exercised responsibly and without spreading harm. The document also examines freedom of speech as outlined in international agreements like the Universal Declaration of Human Rights, noting it is not an absolute right and may be subject to restrictions to protect national security or public order.
With the profound sophistication of technologies throughout the globe, the nature of crimes has also been changed tremendously which redound to shifting from physical to virtual paradigm. Furthermore, this high-tech has also surplus the sphere of crimes to economic, social, political, even cultural arenas, mostly through the internet. In consequence, to cope up with such cyber threats, the efficacy of electronic surveillance has been intensifying ostentatiously over the last two decades, predominantly in the west. Malaysia too has introduced such modern technology of e-surveillance owing to ensure security in both national and transnational levels by the adoptions of Security Offences (Special Measures) Act (SOSMA) 2012 and the Prevention of Crime Act (PCA) 2014. However, such enactments have raised a new controversy by allowing police to impose electronic monitoring devices as well as other types of technologically-aided surveillance over the arrested or suspected crime offender’s body. All these maneuvers undoubtedly intersect the very basic notion of individuals’ data privacy and freedom of liberty which are shielded by the Federal Constitution of Malaysia to some extent. With latest legislative and judicial supports on the right to data privacy of the citizens of Malaysia, the question now emerge on whether this trend will be short-lived by the newly passed security laws such as the SOSMA 2012 and PCA 2014 which empower electronic surveillance to the law enforcements? The purpose of the author is to delineate the application of e-surveillance in Malaysia under these security related enactments and find the loopholes in implementing such legislations. Data from journals and books have taken into consideration to dissect these conceptions. It also have cogitated some prominent decisions of the judges throughout the world to enlighten this literature.
Islam grants freedom of expression as long as it does not infringe on the rights and dignity of others. While people have the right to their own opinions, offensive or abusive language is not permitted. Some Western scholars have criticized the Islamic concept of freedom of expression, but Islam promotes logical discussion of ideas and prevents social disorder. Freedom of thought and expression are emphasized in the Quran, but it does not allow coercion in religious matters or the propagation of evil. Overall, Islam supports intellectual discussion and establishing courts to protect human rights in accordance with Islamic law and principles.
Islam grants universal human rights that are derived from God, not governments. These inalienable rights include:
1) The right to life and security of person - no one can kill or harm others without justification.
2) The right to dignity and honor - women, children, and all people must be respected and protected from oppression.
3) The right to private life and property - personal freedom and possessions are inviolable without due process.
Islamic law upholds civil rights and limits governmental authority, requiring leaders to respect the people and only exercise power with consent.
The document discusses human rights according to the Quran based on the perspective of Professor Riffat Hassan. It outlines numerous rights that are affirmed in the Quran, including the right to life, respect, justice, freedom, knowledge, sustenance, work, privacy, and protection from slander. The Quran upholds these rights as being eternal and immutable, granted by God, and necessary for human potential and dignity to be actualized. It emphasizes justice, freedom of belief, mutual consultation, and creating a society where people can enjoy basic rights and "the good life."
This document is a law student's paper analyzing the right to privacy in Ireland and Europe. It discusses how privacy is a qualified right that can be limited by other rights like freedom of expression. It examines definitions of privacy from court cases and scholars. While Article 8 of the ECHR and the Irish Constitution protect privacy, the right lacks substance and can be easily overcome by conflicting rights. The document also analyzes privacy legislation attempts in Ireland and the establishment of the independent Press Council to regulate media intrusions on privacy.
Does islam need_a_reformation_i_era_dont_hate_debategoffaree
The document discusses differences between liberal and Islamic conceptions of human rights and ethics. It argues that the liberal view of individualism and universal human rights is flawed and not absolute. While there are some commonalities, such as respecting other religions, Islam's view is based on preventing oppression and maintaining social order and status quo. The document also critiques the idea that Islam must conform to rational ethics, saying there is no single standard and ethics are influenced by culture and open to interpretation. Overall it rejects that Islam needs reform and asserts that rights and ethics derive from Islamic teachings and tradition.
AUTHENTICITY AND SCOPE OF CIRCUMSTANTIAL EVIDENCES IN THE PERSPECTIVE OF ISLA...surrenderyourthrone
This document discusses the authenticity and scope of circumstantial evidence in Islamic law. It defines circumstantial evidence and explains that while testimony, confession, and oath are direct means of proof, circumstantial evidence is an indirect means of proof that is based on inferences drawn from circumstances. The document outlines different views among Islamic jurists on the validity of circumstantial evidence in civil disputes, criminal cases involving discretionary punishments (ta'zirat), and more serious criminal cases involving mandatory punishments (hudud) and retribution (qisas). Most jurists agree that circumstantial evidence is valid in civil cases. There are differing opinions on its validity in criminal cases, with most holding that circumstantial evidence can only be used
پاکستان کا انگریزوں کا چھوڑا ہوا کفریہ عدالتی نظام بمقابلہ اسلامی عدالتی نظام۔
یہ پریزینٹیشن آپ کی آنکھیں کھول دے گا کہ کس طرح یہ عدالتی نظام انصاف تو دور کروڑوں لوگوں کی زندگیاں برباد کر چکا ہے۔
اسلامی عدالتی نظام کے شرعی دلائل ساتھ موجود ہیں۔
1. Islam defines what constitutes a crime based on the Quran and Sunnah, such as defining theft, murder, etc. as crimes. Capitalist systems allow parliaments and commissions to determine what is legal or illegal.
2. In Islam, punishment can only be implemented if the person is proven guilty without any doubt, and confessions obtained through torture are invalid. Capitalism may allow practices like indefinite detention and torture.
3. Privacy of individuals is protected under Islam and spying on people or entering private spaces without permission is considered a serious crime. Capitalist legal systems have more flexibility in these matters.
The document discusses freedom of access to information and privacy in Pakistan, outlining key definitions, the historical background and laws around FOAI and privacy both internationally and in Pakistan. It also examines benefits and limitations of FOAI, how to make FOAI requests, and the role of libraries in promoting access to information while maintaining privacy.
The document discusses the characteristics of an Islamic welfare state. It states that the concept of a welfare state first appeared in the Rashidun Caliphate in the 8th century, where taxes were used to provide income and food supplies for those in need. The purpose of a welfare state is to create economic and social equality through ensuring standards of living, access to justice, freedom of religion, and more. An Islamic welfare state would provide education, healthcare, pensions, social services, and more funded through government programs and taxes. It would also uphold principles of equality, democracy, religious pluralism, and human dignity.
The Muslim Concept of Sovereignty: Islamicjerusalem during the First Muslim C...islamicjerusalem
1) The document examines the Muslim concept of sovereignty through an analysis of early Muslim scholars like Al-Mawardi, Ibn Taymiyyah, and Ibn Khaldun and their interpretation of sovereignty based on the Quran and hadith.
2) It also explores how modern Muslim thinkers have discussed concepts like popular sovereignty and the sovereignty of the nation in relation to the ruler and community.
3) The analysis finds that early Muslim scholars viewed sovereignty as universal and absolute with Allah as the primary law-giver, while human rulers and states enjoyed limited autonomy to implement divine law.
Similar to Electronic surveillance and privacy issues in shariah (20)
This document provides guidelines for conducting legal research and citing sources according to proper legal citation style. It outlines how to cite primary sources like statutes and cases, secondary sources like books, journals, websites and blogs. It also provides instructions for citing sources that have been previously cited through use of "ibid" and making clear references in footnotes. Finally, it explains how to format a bibliography by listing all cited sources without page numbers at the end of a document.
The document discusses plagiarism and proper citation. It defines plagiarism as stealing another's work, words, or ideas and presenting them as one's own. Plagiarism can be intentional or unintentional. The document outlines what needs to be cited according to copyright law and provides examples of proper paraphrasing, summarizing, and quoting techniques. It also discusses reasons why students may plagiarize and emphasizes the importance of proper citation to avoid plagiarism.
Defamation & Online Defamation; Why Internet for Defamation; Legislations related to defamatory; Freedom of Speech; Freedom of Speech under International Conventions and its limitation; Freedom of Speech under Federal Constitution of Malaysia and its limitation; Freedom of speech in Internet and Cyber Harassment; Instances of online defamation; Internet Content Regulation and Censorship.
Recommendation & Conclusion.
Convention On International Civil Aviation (Chicago Convention), 1944.
The Convention on Offences and Certain Other AcCommitted On Board Aircraft (commonly called the Tokyo Convention), 1963.
This document provides an overview of treaties under international law. It begins by defining treaties and outlining their importance as a source of international law and for establishing international organizations and resolving disputes. It then discusses different forms treaties can take, from heads of state to ministerial agreements. Terminology for different types of treaties is examined, including conventions, declarations, and protocols. The document concludes by explaining the process for concluding and bringing treaties into force, including negotiation, ratification, accession, and entry into force.
This document discusses diplomatic envoys and diplomatic immunity. It begins by defining a diplomat as a public officer who conducts official negotiations and maintains relations between governments. It then discusses the historical evolution of diplomatic immunity from ancient periods to modern diplomacy. Key points included are that diplomatic immunity first became established to allow for safe negotiations, and the Vienna Convention of 1961 codified current diplomatic law and classifications of envoys such as ambassadors, ministers, and charges d'affairs. The document concludes by outlining the immunities granted to diplomatic agents under the Vienna Convention, such as inviolability of person, premises, and communications.
This document discusses alternative dispute resolution (ADR). It defines ADR as resolving disputes without a trial through processes like arbitration, mediation, and neutral evaluation. The document outlines the philosophies and goals of ADR, including encouraging settlement, adopting a win-win approach, integrating parties' interests, and complying with social norms. It also discusses the success of ADR in Bangladesh, noting statistics that show high rates of cases being resolved through mediation and ADR mechanisms in family courts and other laws.
The document provides an overview of arbitration and the Permanent Court of Arbitration (PCA). It discusses that the PCA was established in 1899 to facilitate arbitration between states. It has 117 member states and provides dispute resolution services for various parties. The document outlines the historical background of the PCA, its composition including the Secretariat, Administrative Council, and panel of experts. It also discusses the PCA's jurisdiction and provides examples of some notable cases it has decided.
Bangladesh is one of the 49 countries in the list of Asian continent, which got independence in the year 1971 after having a bloody war of nine months. Since independence, a series of felony has been experienced by the populace of Bangladesh over times either by the internal rulers or by the external forces and thence continues to be wracked by human rights violations. Even though, Bangladesh became the member of United Nations in 1974 and have ratified a number of international human rights instruments such as: The Convention Against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment (United Nations Convention against Torture) 1984 and The International Convention for the Protection of All Persons from Enforced Disappearance (ICCPED) 2006, which are indispensable to prevent torture within the border, and forbids state to transport people to any country where there is reason to believe that they will be tortured, there remain perceived cases of serious abuse, including extra-judicial killings, custodial deaths, arbitrary arrest and detention, and harassment of populace over the recent past five years. Moreover, the failure to investigate fully extra-judicial killings by security forces (such as: police, RAB and BDR) including the deaths under custody, remained a matter of serious concern. Some members of the security forces acted with impunity and committed acts of physical and psychological torture. Violence against women and children remained a serious problem, as did trafficking in persons. This paper will pose a critical analysis on how provisions of such international conventions (for the protection of human rights) are being violating in Bangladesh and suggest some guidelines for implementing such human rights instruments contingenting upon the present impasse.
Dr. Zam owed a duty of care to his patient, Miss Lin, after she consulted with him and followed his recommended seaweed wrap program and drugs. However, Dr. Zam breached this duty by failing to warn Miss Lin of the material risk of developing a severe skin rash, which she then did. Under the reasonable prudent patient test, Dr. Zam would be liable for negligence for not informing Miss Lin of this inherent risk so she could make an informed choice. But under the reasonable prudent doctor test, Dr. Zam would not be liable as he acted in line with accepted medical practices.
This document discusses unitary forms of government and analyzes the structural characteristics of the United Kingdom as a unitary state. It defines a unitary government as one where power is concentrated in a central government and local governments are not autonomous. The UK is provided as an example and its characteristics are outlined, including it having an unwritten constitution, a parliamentary democracy with the monarch as head of state, and a bicameral legislative system. Key principles like parliamentary sovereignty, separation of powers, and the rule of law in the UK system are also summarized.
This document provides definitions of key concepts like constitution and constitutional supremacy. It discusses the objectives and purposes of constitutional supremacy, including limiting government power and protecting fundamental rights. The document also summarizes the historical background of Malaysia's Federal Constitution, developed based on previous constitutions with input from foreign legal experts. It examines the supremacy clause in Article 4 of the Federal Constitution, establishing it as the supreme law that invalidates any inconsistent laws. The courts have power to review laws for consistency with the Constitution.
The document discusses hudud offenses in Islam and their application in Malaysia. It defines the 7 categories of hudud offenses according to Islam which include theft, robbery, zina, qadhf, drinking intoxicants, apostasy, and rebellion. It then examines laws related to hudud offenses in the Malaysian states of Kelantan and Terengganu, including details on punishments for specific offenses like amputation for theft and stoning for married persons committing zina. The document also discusses debates around implementing hudud laws in Malaysia and rebuttals to criticisms of certain provisions.
More from International Islamic University Malaysia (13)
This document briefly explains the June compliance calendar 2024 with income tax returns, PF, ESI, and important due dates, forms to be filled out, periods, and who should file them?.
Lifting the Corporate Veil. Power Point Presentationseri bangash
"Lifting the Corporate Veil" is a legal concept that refers to the judicial act of disregarding the separate legal personality of a corporation or limited liability company (LLC). Normally, a corporation is considered a legal entity separate from its shareholders or members, meaning that the personal assets of shareholders or members are protected from the liabilities of the corporation. However, there are certain situations where courts may decide to "pierce" or "lift" the corporate veil, holding shareholders or members personally liable for the debts or actions of the corporation.
Here are some common scenarios in which courts might lift the corporate veil:
Fraud or Illegality: If shareholders or members use the corporate structure to perpetrate fraud, evade legal obligations, or engage in illegal activities, courts may disregard the corporate entity and hold those individuals personally liable.
Undercapitalization: If a corporation is formed with insufficient capital to conduct its intended business and meet its foreseeable liabilities, and this lack of capitalization results in harm to creditors or other parties, courts may lift the corporate veil to hold shareholders or members liable.
Failure to Observe Corporate Formalities: Corporations and LLCs are required to observe certain formalities, such as holding regular meetings, maintaining separate financial records, and avoiding commingling of personal and corporate assets. If these formalities are not observed and the corporate structure is used as a mere façade, courts may disregard the corporate entity.
Alter Ego: If there is such a unity of interest and ownership between the corporation and its shareholders or members that the separate personalities of the corporation and the individuals no longer exist, courts may treat the corporation as the alter ego of its owners and hold them personally liable.
Group Enterprises: In some cases, where multiple corporations are closely related or form part of a single economic unit, courts may pierce the corporate veil to achieve equity, particularly if one corporation's actions harm creditors or other stakeholders and the corporate structure is being used to shield culpable parties from liability.
Genocide in International Criminal Law.pptxMasoudZamani13
Excited to share insights from my recent presentation on genocide! 💡 In light of ongoing debates, it's crucial to delve into the nuances of this grave crime.
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersHarpreetSaini48
Discover how Mississauga criminal defence lawyers defend clients facing weapon offence charges with expert legal guidance and courtroom representation.
To know more visit: https://www.saini-law.com/
सुप्रीम कोर्ट ने यह भी माना था कि मजिस्ट्रेट का यह कर्तव्य है कि वह सुनिश्चित करे कि अधिकारी पीएमएलए के तहत निर्धारित प्रक्रिया के साथ-साथ संवैधानिक सुरक्षा उपायों का भी उचित रूप से पालन करें।
Matthew Professional CV experienced Government LiaisonMattGardner52
As an experienced Government Liaison, I have demonstrated expertise in Corporate Governance. My skill set includes senior-level management in Contract Management, Legal Support, and Diplomatic Relations. I have also gained proficiency as a Corporate Liaison, utilizing my strong background in accounting, finance, and legal, with a Bachelor's degree (B.A.) from California State University. My Administrative Skills further strengthen my ability to contribute to the growth and success of any organization.
What are the common challenges faced by women lawyers working in the legal pr...lawyersonia
The legal profession, which has historically been male-dominated, has experienced a significant increase in the number of women entering the field over the past few decades. Despite this progress, women lawyers continue to encounter various challenges as they strive for top positions.
Receivership and liquidation Accounts
Being a Paper Presented at Business Recovery and Insolvency Practitioners Association of Nigeria (BRIPAN) on Friday, August 18, 2023.
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordinary And Special Businesses And Ordinary And Special Resolutions with Companies (Postal Ballot) Regulations, 2018
Business law for the students of undergraduate level. The presentation contains the summary of all the chapters under the syllabus of State University, Contract Act, Sale of Goods Act, Negotiable Instrument Act, Partnership Act, Limited Liability Act, Consumer Protection Act.
The Future of Criminal Defense Lawyer in India.pdfveteranlegal
https://veteranlegal.in/defense-lawyer-in-india/ | Criminal defense Lawyer in India has always been a vital aspect of the country's legal system. As defenders of justice, criminal Defense Lawyer play a critical role in ensuring that individuals accused of crimes receive a fair trial and that their constitutional rights are protected. As India evolves socially, economically, and technologically, the role and future of criminal Defense Lawyer are also undergoing significant changes. This comprehensive blog explores the current landscape, challenges, technological advancements, and prospects for criminal Defense Lawyer in India.
The Future of Criminal Defense Lawyer in India.pdf
Electronic surveillance and privacy issues in shariah
1. Prepared By…
Md. Zubair Kasem Khan.
G1110969.
Master of Comparative Laws(MCL)
International Islamic University Malaysia.
Subject: Islamic Jurisprudence.
1
2. Introduction
Background of the Seminar
Issues of This Seminar
Privacy In General Point of Views
Privacy In SharīʿahPoint of Views
Dalīl From Qur’ān,
Dalīl From Sunnah,
Opinions of Different Scholars (Ijtihād)
Reconciliation Between Individual Privacy & National
Security in the Form of Electronic Surveillance.
Conclusion.
2
3. With the proliferation of digital technologies at the
hands of individuals and the state, the tension between
security and privacy today has further escalated. The
immense development of the information and
communications technologies is seen as important tool to
help ensure National Security by way of Electronic
surveillance.
The latest Edward Snowden vis a vis the US
Government saga can only confirm that: Electronic
Surveillance Conducted By The State Over Individuals Has
Entered A Truly Worrying Level Nowadays. 3
4. The newly adopted Security Offences (Special
Measures) Act 2012 (“SOSMA”) and the amended
Prevention of Crime Act 2013 (”PCA”) have raised new
controversies relating to constitutional and privacy issues in
Malaysia, by allowing the police to impose electronic
monitoring as well as other types of technologically-aided
surveillance over the suspected or arrested criminals. To
illustrate, Sec-4(6) of SOSMA states-
“. . .If the police Officer is of view that . . . an electronic
monitoring device may be attached on the person . . . For
the purpose of investigation. . .”
4
5. Sec- 6(1) of the same act says that-
“. . . Notwithstanding. . . the Public Prosecutor. . .may
authorize any police officer-
a. to intercept, detain and open any postal article;
b. to intercept any massage transmitted or received by
any communication;
c. to intercept or listen to any conversation by any
communication. . .”
This processing of personal data by the security
officers through surveillance intersects with a very basic
notion of individuals’ data privacy which is protected by the
Sharīʿah. 5
6. Today’s Seminar is a part of an ongoing fresh debate
between security measures of Electronic Surveillance and
the emergence of Right To Privacy In Malaysia.
Through analysis of recent legislation and case laws,
this outlines the emergence of two potentially conflicting
legal developments in Malaysia regarding data privacy.
However, today we will have a crucial scrutiny about
Legitimacy of the following questions in the Sharīʿah
Point Of Views….
6
7. The questions are-
(i) What is the Stand Of Sharīʿah in the issue of
Individual Privacy Rights?
(ii) To What Extent this Privacy Rights can be
Compromised on the ground of national security in
Sharīʿah Point Of View?
(iii) What would be the Suggested Roadmap for further
Reconciling the need to national security with the
Individual Right To Privacy?
7
8. The abstraction on “privacy” decidedly becomes tricky
for anyone simply to understand what it is meant by and how
far it covers.
The origin of the word ‘privacy’ is still vague to the
majority of the scholars, albeit some exponents think that,
its root is very similar with other words like ‘privation’ and
‘deprivation’, which denote ‘not to be involved in public
matters or episodes’.
According to Bloustein (1964 A.D.) & Khan (2003
A.D.)- privacy is linked with human personality in a way
that, ‘autonomy, dignity and integrity’ of an individual
are depended, influenced and protected by privacy.
8
9. Westin (1967 A.D.) highlighted privacy as - human
desire to expose themselves, their attitudes and believes
to others freely.
However, the most accepted connotation on privacy
had been expressed by Warren and Brandeis (1890 A.D.)
as- Right To Be Alone, wherein ‘rights’ is referred to an
individual’s right to decide the limits of communication of
his- “thoughts, sentiments, and emotions to others”.
There are some different leitmotifs or unifying ideas that
have raised in dissimilar scholarly writings while
conceptualizing privacy which are-
9
10. Privacy as the Form of Secrecy: by
Richard Posner.
Privacy as a Form of Control over
Personal Information: by Charles Fried
and Jerry Kang.
Privacy as an Aspect of Human Dignity:
by L. Prosser and E.J. Bloustein.
Privacy as the Form of Limited Access: by
Gavison.
Privacy as the Form of right to be alone:
by Warren and Brandeis. 10
11. 11
So….. What is the difference between Human Being &
Animal …..???
12. Forthrightly speaking, the appellation ‘Privacy’ is
neither ingrained directly in the Holy Qur’ān nor in the
Sunnah of the Prophet Muḥammad, nor even stated firmly in
the Islamic Jurisprudence (uṣūl al-ƒiqh).
Notwithstanding, it does not confer that, Islam does
not value individual privacy or there is no space for privacy
rights for a person, as a human being.
In Islam, the individual privacy is considered as the
part and parcel of his dignity in family, society or state levels
which has been shielded by the Sharīʿah. 12
13. This can be testified to the verse of the Holy Qur’ān
where Allah lifted human dignity over other brute creations
by affirming that-
“… We have bestowed dignity (blessings) on the
children of Adam… and conferred on them special
favours, above a great part of our Creation….” (al- Isrā’,
17:70).
In this verse of Qur’ān, bestowing dignity upon
mankind is inherent, intrinsic in nature and not conceded by
any sovereign political power or authority and thus cannot be
withdrawn by any authority for any lame excuse. 13
14. Allah, the supreme and true Law-Giver, strongly
prohibits this kind of bad deeds, that provokes someone for
downgrading other’s dignity of a man by the following āyah
of Sūra al-Ḥujurāt-
“… O you who believe! Let no man mock another man,
who may perhaps be better than himself. Let no
woman mock another woman, who may perhaps be
better than herself. Do not defame one another, nor
call one another by nicknames. It is an evil thing to
be called by a bad name after embracing the true
faith….” (al-Ḥujurāt, 49:11). 14
15. Furthermore, human dignity in Islam, is an attested,
confirmed and established right of every individual heedless of
any discriminations which a person succeeds during the time of
his/her birth as a human being.
Sayyid Quṭb also showed a similar view of importance of
human dignity of a person by saying that- “Dignity is therefore
the absolute right of everyone”.
Therefore the momentous face of Islam that distinguish
from other religions is, the assurance of human dignity given to all
human beings regardless of status (Muslim or non-Muslim),
quality (devout or impious) or condition (famous or notorious) of
a person in the reckon of the society. Even, as a criminal, a person
should not be undignified and thus the endeavor of executing
punishment to a criminal is for retribution or reformation and not
affrontation or humiliation. 15
16. This can also be evident from a Ḥadīth of the Prophet, quoted
by numerous scholars where Prophet Muḥammad (p.bu.h)
beheld a funeral of a deceased person passing by and He
started showing respect to that death person and remained
standing until a companion told Him that, this funeral was
not for a Muslim but for a Jew.
Upon auditioned the companion’s remark, the Prophet
rebuked a counter question saying that-
“Was he not a human being?”
16
17. In Islam, the notion of ‘Privacy’ and its sphere in our
life is very widespread which cover all aspects of privacy like-
sanctity at home, private correspondence, intimate
conversation, privacy in working affairs, individual financial
affairs and so on.
In fact, all kinds of fundamental rights what the
western jurists denoted and resoluted in the last century, had
already been enthusiastically cherished and guaranteed
fourteen-hundred years back through Prophet Muḥammad
(p.b.u.h) in the primary sources (the Qur’ān & the Sunnah) of
Sharīʿah.
17
18. Islam always gives high priority in conserving human
dignity by buttressing privacy in private dwellings. Allah
addresses the believers in the Qur’ān in this regards as-
“… O you who believe! Do not enter houses other than
your own, until you have asked permission and
saluted those in them: that is best for you, in order
that you may heed (what is seemly). If you find no one
in the house, enter not until permission is given to
you; if you are asked to go back, go back: that makes
for greeter purity for yourselves: and Allah knows well
all that you do….” (al-Nūr, 24:27-29). 18
19. Moreover, whenever a person has obtained permission
to embark on a house, it is indispensable to enter thereto
from the appropriate door. In other words, Islam does not
allow any person to enter into another house by crossing the
wall or in a way that is not legitimate for him to enter into
that dwelling. The Qur’ān asserts that-
“… Righteousness does not consist in entering your
dwellings from the back. The righteous man is he that
fears Allah. Enter your dwellings by their doors and
fear Allah, so that you may prosper….” (al- Baqarah, 2:
189). 19
20. Even in the Qur’ān, Allah Sub’hana Ta’ala secures household
privacy for every people within their family members and ordain
that three times are not allowed for anyone to enter their masters
private room without taking prior explicit permission. The Qur’ān
thus apostrophize to the believers-
“… O ye who believe! Let those whom your right hands
possess (that is: servants and captives), and the (children)
among you who have not come of age ask your permission
(before they come to your presence), on three occasions:
before morning prayer; the while ye doff your clothes for
the noonday heat; and after the late night prayer: these are
your three times of privacy: outside those times it is not
wrong for you or for them to move about attending to each
other: Thus does Allah make clear the Signs to you: for
Allah is full of knowledge and wisdom….” (al- Nūr, 24:58). 20
21. Furthermore, Prophet’s stand was very strict in assuring
this right to privacy more specifically in household matters.
Numerous Ḥadīth of the Propher narrated by different Islamic
jurists that articulate the importance of obtaining permission
from the dweller prior to enter the house.
This had been reflected in a Ḥadīth where Prophet
Muḥammad (p.b.u.h) advised to his believers that- “Asking
for permission (Isti’nās) is [allowed up to] three times. If
it is not granted to you, you must return”. In another
Ḥadīth, Prophet (p.b.u.h) stated that- “Greetings (taslīm)
precedes conversation”
(Muslim, Mukhtaṣar Ṣaḥīḥ Muslim, Ḥadīth No. 1421) 21
22. If we consider the former Ḥadīth en-masse with the later one,
we can see that, two cardinal requirements- Isti’nās
(seeking permission) and taslīm (greeting) of
familiarization can been seen, that also had been mentioned
earlier in the Sūṙa al-Nūr, āyah: 27-29, by expressing- “hatta
tasta’nis ” which has been expounded as- “unless you have
obtained permission” or “until you have made sure that your
presence is welcomed by the dweller” by different scholars.
The precepts of Sharīʿahconcerning individual privacy
rights, however, do not only confined to his/her house, but
also cater similar privacy in private cars, boats, caravans and
cubicle compartment of a public offices etc.
22
23. In Islamic point of view, personal or confidential information of
an individual should not be thrashed out or divulged by other
without obtaining deliberate consent of the person, regardless of
the authenticity of the information. This rule can also be applied
over a private correspondence of an institution where he/she is
holding some confidential information by designation. This is
outlined based on the injunction of the holy Qur’ān where Allah
enjoined His believers-
“… O ye who believe! Avoid suspicion as much (as possible):
for suspicion is some cases is a sin (crime). Do not spy on
each other, nor speak ill of each other behind their backs.
Would any of you like to eat the flesh of his dead brother?
Surely you would loathe it. Have fear of Allah. He is
forgiving and most Merciful….” (al-Ḥujurāt, 49:12). 23
24. Prophet Muḥammad (p.b.u.h.)also admonishes His followers
not to show unnecessary suspicion over a person. He further
advise people, which narrated by Abu Hurayrah that-
“… Avoid suspicion, for suspicion is the gravest lie in
talk and do not be inquisitive about one another and
do not spy upon one another and do not feel envy with
the other, and nurse no malice, and nurse no aversion
and hostility against one another. And be fellow-
brothers and servants of Allah….”
(Muslim, Ṣaḥīḥ Muslim, Kitāb al-Birr was-Ṣālat-I-wa'l-
Adab, Ḥadīth No. 6214.) 24
25. In Islam, the privacy in information is highly protected and it
is not permitted by a person or an authority to know others
personal information which he or they are not required to
know.
It is because, any means of information such as- by post, fax
or e-mail, are considered as deposits (wādī’aḥ) from the side
of sender as well as the legitimate receiver. The messenger of
Allah further warned the believer of Allah as-
“… One who looks into the letter of his brother
without his permission, is like looking into the fire of
the Hell….”
(Al-Suyūṭī, al-Jāmīʿal-Ṣaghir, at 165. See also: al-Maqdisī, al-
Âdāb al-Sharʿiyyah, Vol. II at 166.) 25
26. The term ‘Electronic Surveillance’ does not have any trace in
any of the Qur’ānic verse or Ḥadīth of the Prophet
Muḥammad (p.b.u.h.), nor any Sharīʿahprinciple that confer
rules exclusively of it. The ratiocination behind this is, during
Prophet Muḥammad (p.b.u.h), the technology did not reach
up to that à la mode and up to date level what today’s
generation are in.
Notwithstanding, it does not betoken that Sharīʿahwas
totally unaware or does not have any ruling about it when it
agitates a controversy for the violation of individual privacy
right. 26
27. In Sharīʿah, there is a term “tajassus” found in the Qur’ān
and Ḥadīth of the Prophet Muḥammad (p.b.u.h.) which
literally means- ‘curiosity’, ‘the state of being excited to
know someone’s private matters’ or ‘looking secretly
about others’ fault’.
This term is used in the primary sources of Sharīʿahto
convey the mischievous effects of spying against an
individual or a country, which is strongly forbidden.
“Tajassus” includes any kinds of conspiracy for the purpose
of listening or watching someone’s conversation or activities
without getting prior consent of that person which may
further degrade individual’s dignity. 27
28. According to Mohammad Hashim Kamali, by using
the words “wa lā tajassasū” in the Sura: al-Ḥujurāt, āyah- 12,
Allah Sub’hana Ta’ala absolutely and unfetteredly proscribed
all kinds of spying regardless of background aspiration of
conducting this.
This direction of prohibiting spying does not only
confined to the private premises, but also outlawed
government to do so by means of wiretapping, spying at
night secretly, eavesdropping, fitting CCTV in the public
places and introducing electronic monitoring devices and so
on . 28
29. Even the Muḥtasib, who is in charge of ensuring ḥisbah (i.e.
adherence of goodness and forbiddance of evil) in a Islamic State, is not
allowed to do spying with the intention of controlling crime.
Some ʿulamāopined that, Muḥtasib who act as an inspector in
the governmental agencies must take action against any undue exertions
based on what he has found on the spot by direct observations, and not
by applying any methods of surveillance such as- espionage, video-
footage or wiretapping for the intention of gathering evidence.
This was also reiterated from the second Caliph of Islam, ʿUmar
ibn al-Khaṭṭāb, who proclaimed that- ‘government’s action always on the
basis of evidence. One who demonstrate benevolence in character,
should not be mistrusted by others. Undoubtedly, Allah is the
omniscient about the inner secret of every human beings’.
(Al-Ṭabarī, Ta’rīkh, Vol. V at 26. See also: Kamali, “The Dignity of Man:
An Islamic Perspective” at 64.)
29
30. Therefore, spying committed against another person is trenchantly
forbidden in Islam, even if a person hit or injure another person owing to
defend peeping to his/her premises, shall not be liable for any
punishment for that attack.
This prohibition of spying also has prolonged meaning which includes-
listening to others conversation by way of wiretapping, eavesdropping or
recording covertly by using tape-recorder while conducting electronic
surveillance in this modern era.
A similar warning is also erected in the Sunnah of the Prophet
Muḥammad (p.b.u.h.), narrated by Ibn-Abbāṣ, concerning prohibition of
these kind of surveillance which reads-
“… One who eavesdrops of others and hears what they would not
like him to hear, will have scorching lead poured into his ears on
the Day of Judgment….” (Al-Bukhārī, Ṣaḥīḥ al- Bukhārī, Ḥadīth No.
1159.) 30
31. The gravity of spying (tajassus) is so grievous that, according to
Prominent Imams, the punishment for those who spy against the
believers or engage in other forms of espionage, Shall-
IMAM NAWAWI: as far as the spy from the enemies of Muslim
is concerned, then he is to be killed.
IMAM MALIK & AUZAI: if the spy is a Dhimmi, then he has
breach the contract between the Muslims and himself. He may
be killed.
IMAM SHAFI’: the spy is not be killed. Such Dhimmi is only be
killed if it was stipulated in the Muslim contract between
Muslims and the Dhimmis that they will not spy on the
Muslims.
31
32. IBN AL-QAYYIM: the case of spy should be left to the
leader of Muslims, whether it is beneficial or not to kill or
just leave the spy.
IBN AL-QAIM: spy is to be killed and it is not known that
he is to be asked for repentance.
IBN TAYMIYYAH: Hanbali Scholars hold the opinion that
the spy is to be killed.
32
33. As we have seen that, the conduct of spying (Tajassus) is
trenchantly prohibited in Islam in conjunction with a
number of Qur’ānic and the Sunnahtic allusions, albeit it
cannot be professed firmly that, this privacy right of every
individual is absolute and out-and-out in nature.
There are some anomalous circumstances specified in the
Sharīʿah, where a muḥtasib or law enforcement agents are
allowed to intrude into another’s premises without securing
prior permission from the owner or spying for the purpose of
criminal investigation. This are-
Populace Interest at large,
Ensuring National Security,
Necessity (Ḍarūrah), 33
34. It has been reported that, due to the breach of Hudaibiah treaty
by Ka’fer’s of Macca, Prophet decided to attack and conquer
Macca.
Hatib bin Abi Balta’a, a spy on behalf of the Ka’fer’s of Macca,
covertly wrote a letter to inform the Macca people about the
impending attack to Macca by Prophet (p.b.u.h.).
A woman, Umma Jamil by named, was assigned to convey this
letter to the Macca people. After perceiving this incident, Prophet
Muḥammad dispatched Ali bin Abū Tālib and Zubāyr bin al-
Awam to intercept the letter. Even though, Umma Jamil initially
denied revealing the contexts of the letter, she disclosed
meanwhile due to turbulent threats by the companions.
Important to note that, all these happened with the implied
consent of the Prophet Muḥammad.
34
35. This above mentioned Ḥadīth advocates that, a latter that
belonging to a third party can be unfastened without prior
consent of the owner only in the ground of national security
or for the state interest.
This doctrine shall also be applied in electronic mails, faxes,
web-pages or any other means of social Medias and modern
technologies in the ground of public interest by way of
securing national security .
35
36. As we have seen that, Islam always upheld individual dignity
of every human being by prohibiting spying conducted
against any Muslim.
However, Sharīʿahalso allow a muḥtasib or any law
enforcement agent to conduct spying in some certain grounds
as stated earlier.
Therefore, the Government of Malaysia should think carefully
about the necessity of adopting and imposing Electronic
Surveillance in the suspected crime offenders body and
ensuring human dignity by establishing individual privacy
rights. 36