International Journal of Cyber Criminology

 Vol 2 Issue 2

Copyright © 2008 International Journal of Cyber Criminology (IJCC) ISSN: 0974 – 2891 July-December 2008, Vol 2 (2): 337–345

This is an Open Access article distributed under the terms of the Creative Commons Attribution License , which permits unrestricted use, distribution, and reproduction in any medium, share alike, for non-commercial use, provided the original work is properly cited. This license does not permit commercial exploitation or the creation of derivative works without specific permission.

 

Shariah Law and Cyber-Sectarian Conflict: How can Islamic Criminal Law respond to cyber crime?

 

Alaeldin Maghaireh[1]

University of Wollongong, Australia

 

Abstract

The Islamic world has populated cyberspace and opened up websites propagating Islamic rhetoric and ideology. Some of these website established cyber-schools teach hacking techniques. Unfortunately, the growing Muslim presence in cyberspace has spawned an increasing amount of what can be termed as ‘cyber-sectarian conflict’. Thus, it is not uncommon to find that Islamic and non-Islamic websites have been hacked and sabotaged by Anti-Fitna Muslim Hackers or other hackers. Amazingly, Muslim scholars refrained from condemning ‘Hacktivism’ and even made it appear as if it were perpetrated to defend Islam. Shariah response to the problem is significant since Muslims hackers consider Shariah to be the ultimate law system.

 

Keywords: Shariah Law; Islamic world; cyber-sectarian conflict; Hackers;

 

Introduction

Islam, Shariah, and Islamic Criminal Law are concepts that have a common root but have developed individually and are quite distinct today. While, ‘Islam’ means submission to the will of Allah and obedience to His Law (Mukarram & Muzaffar, 2005), Shariah is the pathway to fulfil the will of Allah. It is a comprehensive collection of rules, principles, teachings and disciplines derived from the main sources of Islam, Qur’an[2] and Sunnah.[3] Shariah was formulated and developed by Muslim scholars using Fiqh knowledge[4] 200 years after the Prophet Muhammad’s era (610-632) (Islamic Culture Board, 1941). Islamic criminal law, on the other hand, is the most controversial segment of Shariah because it applies stringent corporal punishments, such as flogging, amputation, stoning, or beheading for certain crimes (al-Omari; al-Ani, 2003). These corporal punishments and their divine sources as well as Shariah laws have ignited a firestorm of controversy over their compatibility with international contemporary conceptions, such as human rights, freedom of religion, and capability to address new and emerging issues (Rudolph, 2005; Dalacoura, 2007). 

In a manner similar to the Western world, the Islamic world has embraced cyberspace[5] and opened up websites. There are hundreds, if not thousands, of Islamic websites floating in cyberspace. This is despite the fact that some Muslim clerics issued a Fatwa, (a religious verdict), prohibiting Muslim Internet users from using chatting rooms (http://www.syria-news.com). Conversely, cyberspace has become a common place for Muslims to interact, socialise and, most importantly, to propagate their own beliefs. It is not uncommon to find Islamic websites designed and optimised specifically to defend Islam from its enemies. For example, the website www.d-sunnah.net was established to defend Ahl al-Sunnah (the nation of Sunnah). Similarly, dozens of websites, such as http://www.islamtoday.net/pbuh.htm and many more were established to defend the Prophet of Islam, Mohammed, against European newspapers’ publication of cartoons lampooning the Prophet.

It is undoubtedly true that new aspects of crimes and criminals are being developed through the cyberspace. The term ‘cyber crime’[6] is used to describe a wide range of virtual illegal activities that take place in cyberspace, such as hacking and communications systems sabotage. Unfortunately, the growing Muslim presence in cyberspace has spawned an increasing amount of what can be termed ‘cyber-sectarian conflict’. For example, In September 2008, Sunni hackers attacked more than 300 Shia websites, including the main website of the Grand Ayatollah Ali al-Sistani[7] (http://news.bbc.co.uk/hi/arabic/news). A group of Shia hackers called ‘Shia Digital Security Team’ responded by attacking more than 77 Sunni websites (http://www.saudiyatnet.net). In the Islamic world, the issue of hacktivism has hardly ever bothered the religious consciences. Indeed, religious leaders refrained from condemning hacktivism and even made it appear as if it were perpetrated to defend Islam. Therefore, extremism, fanaticism, and violence of the Islamists have sprung up on the web.[8]

Cyber-sectarian conflict can take two forms: one is ‘Cyber-Islamist Advocacy’, and the other is ‘Islamist Hacktivism’. The first form consists of religious publications, debates, emails awareness, lectures, and videos. The latter is cyber attacks against other religious or non-religious websites.[9] However, the attacks take different forms of cyber crime, such as hacking, the distribution of viruses, Trojans and worms, cyber-vandalism, password thefts, and denial of service attack (DoS).[10]  

The first form has received most scholarly attention. For example, cyber Islamist environment, cyber-terrorism, cyber-Jihad, and many others cyber-Islamic related topics have been researched in great detail (Bunt, 2002, 2004). However, none of these studies examine the response of Shariah and Islamic criminal law to cyber crime. The importance of this article lies in its attempt to shed some light on two key issues, as outlined below.

First, Muslim hackers do not believe in secular cyber crime laws and, therefore, will not abide by them. This is simply because the majority of Muslims believe that Allah is the only legislator who can enact legislation and those who do not adhere to His Law are infidels.[11] Therefore, Shariah’s role in cyber crime is significant since Muslims hackers consider Shariah to be the ultimate law system. Secondly, while cyber crime is a new phenomenon, Shariah law is widely understood as a collection of ancient religious dogma that belongs to a time other than ours. Hence, how can Shariah respond to cyber crime?

This paper will first explore contemporary Muslim thoughts, traditionalists and reformists, and their role in shaping a modern criminal law. The next sub-sections, then, will examine whether Shariah law is inflexible or non-responsive to modern issues, and examine Islamic criminal law and its response to cyber crime. Finally, this paper will examine traditionalist and reformist approaches to the criminalisation of cyber crime.

 

Contemporary Muslim Scholars Standpoints

The Islamic world is not homogeneous in terms of religious perspective; rather it is heterogeneous, consisting typically of traditionalists, and reformists. The key difference between them is their understanding and interpretation of the Holy Scripture, and the Prophet’s traditions (Parrillo, 2008). Traditionalists view is held by those scholars who believe that Allah’s commands and the Prophet’s traditions (Sunnah) are infallible sources of law and, therefore, should be applied without modification or re-interpretation. Thus, they consider the Qura’n and Sunnah to be the ultimate sources of Shariah law. They argue that the four great Sunni scholars (Maliki, Hanbali, Hanafi, and Shafi) and their followers enlightened Shariah principles and purposes, and thereby the four Fiqh schools, which were established by the four Sunni scholars, are sufficient and that no further research in the jurisprudence is needed. They maintain and claim that the methods of Fiqh, such as Ijtihad (Reasoning), Maslahah Mursalah, (Considerations of public interest), Qiyas (Juristic analogy) and Fatwa (Religious decision) are sufficient to solve contemporary issues (al-Akhar, 2002).

In contrast to the traditionalists, the second group is recently formulated by a group of scholars known as ‘the Quranic people’.[12] They argue that God’s commands revealed in the sacred Qur’an are the only infallible source of Shariah because, as they argue, the Qur’an established unequivocal and comprehensive principles and, therefore, there is no need for any other sources other than the Qur’an to deduce the rules of Shariah. They reject the approaches formulated and applied by the four Sunni schools. Furthermore, they deny the Sunnah tradition as the second source of Shariah. They sustain their standpoint upon the following reasons (Mansour, 2008):

  • First, the Prophet Muhammad prohibited his followers from writing his traditions. 

  • Second, the Qur’an has completed the divine religion.

  • Third, the credibility of Sunnah tradition is weak, because Muslim started to collect it two centuries after the Prophet era when the Muslims began conjuring fake traditions for political reasons.

  • Fourth, the contradiction between the Qur’an (the first source) and the Sunnah tradition makes the latter unauthentic, because God promised to keep his words (the Qur’an) uncorrupted. 

Although, the Quranic people have been labelled by the Sunni scholars as apostates (Ismael, 2008), they were able to re-interpret the Quranic verses to come into harmony with contemporary international human rights, such as declaring freedom of religion and denying the punishment of stoning (Mansour, 1998).

 

Islamic Criminal Code

At the time of this writing, Islamic criminal law was not codified. None of the groups described above have formulated a criminal code parallel to the secular legal systems. Although Muslim clerics disparage secular legal systems that are applied in several Muslim countries, such as in Jordan, they have not produced an alternative perspective other than vague and general ideas.[13] Different types of crimes, including cyber crime, were overlooked. This, of course, poses a potential risk to cyberspace, because the Shariah’s principle of criminalisation states that there is no crime without law. The Almighty said: ‘And nor shall we punishing until we had sent them an Apostle’ (Qur’an 17:15). It can be understood from this that crimes and punishments should not be applied retroactively.[14] If there is no response from Shariah, then Muslim hackers and cyber criminals who have committed cyber crime can escape conviction. Therefore, the question that should be asked is why Muslim scholars, both traditionalists and reformists, have not formulated a criminal code? Is it because Shariah is inflexible or obsolete?

 

Shariah tends to be Inflexible and Non-Responsive to Modern Issues

There are two statements about Shariah inflexibility or rigidity. Contemporary Muslim scholars argue vehemently that Shariah’s principles are applicable in any place and at any time. This direction is adopted by the traditionalists and reformists. Conversely, secular Muslim scholars and some of the orientalists[15] describe it as being rigid, stagnant, and incapable of interacting with society developments (Al-Akhdar, 2007).

The author presumes that both of the above statements are inaccurate and misleading. This can be explained through the examination of two different statements issued by Imam Ibn Timia (1263-1328) and Imam Ibn Qayyim (1292-1350) respectively. The former statement centres on the spiritual meaning of the Shariah. He stated, ‘Shariah is full of benefits, full of purposes, and objectives, so anything unjust or harmful is not from Shariah’. Imam Bin al Qiym, on the other hand, stated that, ‘Fatwa[16] is changeable according to the benefits, conditions, times, places, and individuals’ intentions’ (Bin al Qiym, n.d.). Another scholar added that Shariah, in all its judgments, must bring benefits and prevent corruption (al-Shak, n.d.). Indeed, the Prophet’s companions had changed their Fatwas and, most importantly, suspended God’s commands on several occasions to meet the new situation they had encountered. For example, in two different incidents, Omar Bin Khattab, the second Caliph, applied the spiritual meaning of the Shariah through suspending a scripture command. In the first instance, he suspended the punishment theft during the famine year, and in the second incident, he terminated a Quranic command and a Prophetic tradition when he stopped paying alms to the non-believers who used to receive a share of assistance from the Prophet. In the first instance, his argument was that applying Shariah in such a case would result in unjust treatment. Meanwhile, in the second instance, he claimed the command became obsolete; it was applied when Islam was weak, but made it strong, hence there was no need to solicit their support (Foda, n.d.). This is, of course, contrary to one of the most important principles of Shariah which states ‘no Ijtihad[17] when an explicit text exists in the Holy Qur’an’ (Ramadan, 2005). In other words, the exercise of independent judgment is constrained by the commands laid down by Allah.

From the above statements and examples, it can be concluded that the spiritual meaning of Shariah, i.e. justice and full of benefits, is applicable in any place and at any time. Omar was able to apply Shariah and frame appropriate potential solution to problems and to exercise appropriate Ijtihad. On the other hand, Shariah scriptures that were formulated and developed by the four Sunni schools twelve centuries ago are quite rigid; in some cases, inflexible and incapable of responding to changing and emerging issues.

 

Islamic Criminal Panel and Cyber crime

In criminalisation and punishment, the Shariah law objective is to protect five important values: religion, human life, intellect, linage, and property. Muhammad Mohyi Aldeen (n.d.) indicated that the criminalisation process in the contemporary world is similar to that found in the Shariah; it is established to protect interests that are vital to human beings.

Criminalisation system in Shariah law is divided into three categories to protect these five vital values, Hudud,[18] Qisas and Ta’azir.[19] The Hudud category is rigid. It specifically addresses six forms of physical crimes: apostasy, drinking wine, adultery, theft, defamation, and high way robbery. It protects all the five pillars mentioned above through a narrow approach that focuses only on God’s rights (Quraishi, 2005).[20] In other words, these actions are criminalised to meet the five objectives of the Lawgiver (Allah). The Qisas category is also specific, and it protects human life against all forms of physical violence, such as murder and injury (Barak, 2000). Cyber crime cannot be criminalised under the Hudud or Qisas categories, because none of the cyber crimes can be portrayed as a physical action against anyone of the five elements. However, in case cyber-stalking gradually scales up from a remote threat to actual physical harm or injury and can be prosecuted under Qisas.

Lastly, the Ta’azir category deals with the least serious crimes (Vogel, 2000, p. 247). It is unspecific and flexible, and, therefore, all sorts of crimes that are not addressed under the above two categories can be punished under Ta’azir, including incomplete Hudud crimes (Rudolph, 2005, p. 65). For example, Hudud punishment for theft is amputation, but the punishment must be decreased to Ta’azir if the proscribed amount of money stolen was not attained. The Prophet said ‘The hand is not cut off for fruit or palm pith’ (Tarjumana & Johnson, n.d.). Unlike in Hudud and Qisas, in Ta’azir the Judge’s discretion is unrestricted and he can impose the appropriate punishment for offences committed against any of the five elements. Furthermore, in the Ta’azir category, Ijtihad (Reasoning), Maslahah Mursalah, (Considerations of public interest) and Qiyas (Juristic analogy) play critical roles in decision making. Nevertheless, cyber crime cannot be brought under this category unless the Shariah itself criminalises or otherwise prohibits such activities. Therefore, the main question addressed here is: Does Shariah prohibits cyber crime offences?

 

Shariah prohibits Cyber crime

Shariah does not explicitly criminalise any kind of cyber crime, but it does contain general rules of criminalisation. The earlier mentioned scholars, traditionalists and reformists approach criminalisation issues differently. According to the traditionalists, the second source of Shariah law, (the Prophet Tradition) provides significant support for the criminalisation of cyber crime. Scholars have quoted a number of Hadiths, for example, the Prophet said ‘No harm shall be inflicted [on anyone] nor reciprocated [against anyone]’ to criminalise emerging crimes. The Hadith provides a legal basis for criminalising cyber crime, because the latter causes harm, either directly to the computer systems, or indirectly to an individuals’ property – one of the important five values protected by Shariah. Nevertheless, Shariah traditional sources are not sufficient to address cyber crime in detail; therefore, a secular criminal code is important to criminalise all forms of cyber crime. The code aims at protecting the five values and, therefore, meets the spiritual meaning of Shariah. For example, Saudi Arabia[21] applies the traditional form of Shariah law, but it has also enacted the modern Cybercrimes Act, equivalent to that found in developed countries, to punish cyber criminals appropriately. It criminalises hacking acts, including cyber-sabotage (Kornakoy, 2007).

The second approach interprets the Quranic injunctions liberally. Quranic commands provide some support for the criminalisation of cyber crime. The Almighty said in Sourat Al-A'raf, ‘hence, do not spread corruption on earth after it has been so well ordered’ (Qur’an 7:56). Al-Baqara (The Cow) verse 60, states, ‘Eat and drink the sustenance provided by God, and do not act wickedly on earth by spreading corruption’. Another verse states, (206) ‘God does not love corruption’. According to the classical interpretations, the word ‘corruption’ has two meanings. One is religious disobedience, such as non-believing in God (Kuffar), and the other is sins or committing sins. In Webster’s Dictionary the word ‘sin’ means an offense against God, religion or good morals.

In Shariah, sin is divided into two categories: Kubra, which is a supreme, mortal sin, such as ‘Shirk’, that is, associating someone else with God, and Sugkra, which is inferior, venial sin and shortcoming (Abd-UL-Massih, n.d.). The former sin incurs serious punishment, which falls under the Hudud or Qisas, but the latter category may incur Ta’azir punishment. Thus, it can be seen that both sins are associated with breaking God’s will and nothing to do with cyber crime, such as denial service of attack (DoS). Consequently, it should be reinterpreted beyond the literal meaning of the scripture to include any mischievous corruption, including hacking and cyber–sectarian conflict. This objective could be attained by stretching the meaning of corruption to make it more appropriate to address digital corruption and hacktivism.

 

Conclusion

Information and communications technology has the potential to offer unprecedented opportunities for criminals to commit new illegal activities because of the unique environment in which users interact with each other and with virtual objects. Shariah and Islamic criminal law were built and developed many years before the arrival of information technology. Muslim scholars, traditional and reformists face the toughest question of all: How to bring Shariah law into line with contemporary technological development and criminalisation? While traditionalists always defend the capability of Shariah law to address contemporary issues, they appear unable to move one step forward and present a comprehensive legal response to these issues. Conversely, reformists reshaped significant parts of Shariah to come into harmony with contemporary issues. However, none of the groups approached cyber crime, or even shaped a criminal code parallel to modern legal systems. This situation will give Muslim hackers and cyber-terrorists justification to attack cyberspace. Shariah law is rich with general principles as well as its objective urge its followers to develop efficient response to cyber crime.

 

References

Abd-UL-Massih. (n.d). Understanding Islam. Retrieved Sep. 27, 2007, from http://www.arabicbible.com/christian/q_about_islam_practices.htm.

Al-Akhdar, A. (2002). المثقفون والعمليات الانتحارية:هستيريا جماعية. Retrieved Jan. 23, 2008, from http://www.yassar.freesurf.fr/stoa/bal418.html.

Al-Akhdar, A. (2007). الميثاق العقلاني Retrieved Feb. 18, 2008, from http://www.elaph.com/ElaphWeb/ElaphWriter/2007/11/281513.htm.

Anas ibn Maalik, Maalik’s Muwatta, Aisha Tarjumana & Y’aqub Johnson Trans.

Barak, G. (2000). Crime and Crime Control: A global view. Greenwood Publishing Group.

Brenner, S. (2007). Cyber crime: Re-thinking crime control strategies. In Y. Jewkes (Ed.), Crime online (pp.12-29). UK: Cullompton. 

Bunt, R. G. (2004). ‘Rip. Burn. Pray.’, Islamic Expression Online. In L. L. Dawson, & D. E. Cowan (Eds). Religion Online: Finding Faith on the Internet (pp.123). New York: Routledge.

_____. (2002). Virtually Islamic: computer-mediated communication and cyber Islamic environment. London: University of Wales Press.  

Dalacoura, K. (2007). Islam, liberalism and human rights: Implications for international relations. I.B.Tauris

Foda, F. (n.d.)  الحقيقة الغائبة [T. The Absent Truth]

Holy Qur’an  

Imam Muhammad Bin al Quim, (n.d.). اعللام الموقعين عن رب العالمين [The Message of the Elite Informers about the God T.].

Islamic Culture Board (1941), Islamic Culture (pp. 132).

Ismael, F. (2008). يعقدون مؤتمرهم الأول بأمريكا لإلغاء السنة الكفار المسلمون. Retrieved Mar. 7, 2008, from http://www.alarabiya.net/articles/2008/03/11/46777.html.

Issa al-Omari & Muhammad al-Ani. (2003). فقة العقوبات في التشريعة الاسلامية, دراسة مقارنة, [Punishment Fiqh: Islamic Criminal Law: Comparative Study T.] (2nd Ed)

Knostantin, K. (2007). Saudi Arabia Tough Stance on Cyber crime. Retrieved Feb. 3, 2008, from http://www.viruslist.com/en/news?id=208274060. 

Maghaireh, A (2008). What is optimal cyber crime investigation practice for Jordan? A comparative analysis of search and seizure of digital evidence. Unpublished PhD Thesis, University of Wollongong, Australia

Maghaireh, A. (2005). Combating Cyberterrorism: The response from Australia and New Zealand. In J. Veitch (Ed.), International Terrorism: New Zealand perspective (pp.81-93), Institute of Policy Studies, Victoria University of Wellington

Mansour, A. (2008). Denying Sunnah on Saheh Muslim Introduction. Retrieved Mar. 7, 2008, from http://www.ahl-alquran.com/arabic/show_article.php?main_id=2899.

______. (2007). The Stoning Myth. Ahl AlQuran. Retrieved Jan. 15, 2008, from http://www.ahl-alquran.com/English/show_article.php?main_id=2687.

______. (1998). Penalty of Apostasy. Retrieved Apr. 13, 2008, from  http://www.ahl-alquran.com/English/show_article.php?main_id=523.

Mosco, V. (2004). The Digital Sublime: Myth, Power, and Cyberspace. Cambridge, MA: MIT Press .

Muhammad Mohyi al deen (n.d.), السياسة الجنائية ] The Arts of Islamic Criminology T.].

Mukarram A., & Muzaffar H. S. (Eds.). (2005). Encyclopaedia of Islam. New Delhi: Anmol Publications. 

Parrillo, V. N. (Ed). (2008). Encyclopaedia of Social Problems. Thousand Oaks, CA: Sage.

Quraishi, M. (2005). Muslims and Crime: A Comparative Study. Aldershot, UK: Ashgate.

Ramadan, T. (2005). Western Muslims and the future of Islam. US: Oxford University Press. 

Rudolph, P. (2005). Crime and punishment in Islamic law. Cambridge University Press.

Salah al shak, (n.d.) الشرعية  مدخل لدرسة علم المقاصد [Introduction to the Science of Shariah Objectives T.]

Shafer, P. (n.d). Freedom, Community and the Third Wave. Retrieved Mar. 9, 2008, from Website: http://www.eff.org/Misc/Publications/E-journals/CyRev/cyrev4.html#freedom.

Vogel F. (2000), Islamic law and legal system. Leiden: Brill.

Webster’s Online Dictionary, Definition Sin, Retrieved Apr. 4, 2008, from Website: http://www.websters-online.

من يملك حق الاجتهاد. [Who Can Make Ijtihad T.]

مفتي دبي يحرم غرف الدردشة والهواتف المرئية عبر الانترنت Retrieved October 1, Syria News from Website: http://www.syria-news.com/var/articlem.php?id=2559

 


______________________________________________________________________________________________________


[1] Doctoral Student, Centre for Transnational Crime Prevention (CTCP), Innovation Campus Squires Way, Fairy Meadow, University of Wollongong, Wollongong NSW 2522, Australia Email: alaeldin@uow.edu.au

[2] The Qur’an is the primary text of Islam, and the literal word of Allah, revealed to the Prophet, Muhammad over a period of 23 years. Allah means God in Arabic. It contains the commands of Allah, glimpses of the stories of previous Prophets, moral and legal injunctions.

[3] Sunnah is what the Prophet Muhammad did and said, known as Hadith. It was collected by different scholars nearly 200 years after the Prophet’s death.

[4] The Arabic term Fiqh means knowledge, understanding and comprehension of Shariah rules. Through Fiqh, Muslims scholars deduce rules of law from the Shariah (Mukarram & Muzaffar, 2005).

[5] The term ‘cyberspace’ was first coined by William Gibson in his novel Neuromancer (1984) to describe a fictional and visionary world experienced by millions of users in their every day lives.

[6] Cybercrime can be defined as ‘any illegal activities simultaneously associated with information technologies and cyberspaces, intentionally perpetrated for tangible or/ and intangible benefits and primarily motivated by self-interest’ (Maghaireh, 2008, p. 10).

[7] Grand Ayotallah Ali al-Sistani is the supreme religious authority for millions of Shia, the second biggest branch of Islam after Sunni.

[8] Muslims hackers continuously attack the Arabic atheist website www.ladeenyon.net. A member of the Arabic atheist ‘ladeenyon’ commented, ‘Al-Mujahedin cyber attacks against our website didn’t stop since it was built, killing and sabotage on the earth and Internet, they are not professional but to kill and corrupt, they believe themselves to be intellectually superior, but they are not because they use what they believe to be the tools of the infidels, hacking programs…the website will survive’. Translated from   http://www.forum.3almani.org/viewtopic.php?f=12&t=326.

[9] Denial of Service attack (DoS) is one of the most recent cyber-attacks committed by using hacking programs, such as SYN Flood Attack. It is temporarily preventing legitimate network from trafficking, or disrupting a connection between the client (Internet user) and the provider server (Internet provider). For more information about DoS attack see Jeremy Andrews, Understanding TCP Reset Attacks (2005) http://kerneltrap.org/node/3072 at 23 November 2007. See also, 'Teardrops and Land Bugs Denial of Service Attacks Exploit TCP/IP Vulnerabilities' (1998) Software Magazine.

[10] The Holy Qur’an contains several verses that can be referred to for guidance in this respect. For example, the Almighty said “ Let, then, the followers of the Gospel judge in accordance with what God has revealed therein: for they who do not judge in the light of what God has bestowed from on high-it is they, they who are truly iniquitous” (Al-Ma’idah 5: 47). 

[11] Sheik Ahmed Subhy Mansour is the founder and spiritual leader of the ‘Quranic Family’. The reformation movement started in Egypt in 1977 to revive the Egyptian society inspired by the Imam Sheik Muhammad Abdou in 1905. See http://www.alarabiya.net/articles/2008/03/11/46777.html. However, Quranic family view differs from other Muslim reformists, such as Jamal al-Din Afghani (1839-1897) and Egyptian scholar Muhammad A’bduh (1849-1905). For more information see, Suha Taji-Farouki, and Basheer, M, Nafi (2004), Islamic thought in the twentieth century, I.B.Tauris.

[12] For example, Sheik Muhammad Bin al Uthaymeen, a prominent Saudi cleric, condemned Islamic countries that do not apply Shariah law and labelled anyone who does not apply or accept it completely as a Kafir (non-believer).

[13] For example, the Prophet did not punish Muslims who got married according to the pre-Islamic system of marriage or had incestuous relationships before they became Muslims.

[14] Dr Faraj Foda was a secularist Egyptian university professor, who was assassinated by two members of Islamic Jihad on 8 June 1992 after a Fatwa was issued against him by clerics for apostasy.

[15] The most prominent orientalists’ scholars in the twentieth century are Bernard Lewis, Elie Kedourie, Ignaz Goldziher, and Joseph Schacht.

[16] Fatwa is a religious decision or Ijtihad concerning a contemporary matter issued by a religious council or scholar or cleric.

[17] Ijtidhad means ‘the exercise of independent judgment, whether on a specific case or on a rule of law, where the Qur’an and the tradition of the Prophet do not give explicit directions’ (Lewis Bernard 1991).   

[18] Hudud literally means borders or anything that God forbids us from doing, however, not all of the Hudud offences that are mentioned in the Qur’an require corporal punishments. Some Hudud offences impose religious punishment, such as fasting.

[19] Taizer is a punishment for the sake of Allah or for the sake of individuals for offences not considered Hudud.

[20] The Arab tribes that dwelled the Arabian Peninsula in the pre-Islamic era (Al-Jahellia) as well as the nations in different parts of the Middle East, had witnessed similar principles and practices. For example, the Hammurabi Code of Law, which was enacted around the eighteenth century BC, addressed the concept ‘An eye for an eye’. Article 196 stated, ‘If a man put out the eye of another man, his eye shall be put out’. Indeed, several Quranic principles and practices have been derived from the former monotheistic two religions, Christianity and Judaism which derived some beliefs and rituals from ancient religions and systems.

[21] Saudi Arabia applies a very rigid form of Shariah, known as Wahhabism.