Law enforcement of cyber terrorism crimes in strengthening national data security from the perspective of Indonesian positive law
DOI:
https://doi.org/10.35295/sz.iisl.2409Keywords:
Cyber Terrorism, Indonesian Positive Law, Law Enforcement, National Data Security, RegulationsAbstract
Cyberterrorism is a contemporary form of crime that exploits information technology to threaten national data security and public welfare. This study aims to assess the effectiveness of Indonesian positive law in addressing cyber terrorism and to evaluate its Impact on critical national infrastructure, such as transportation, energy, and public services, which may result in substantial financial losses and operational disruptions. This study was conducted descriptively and analytically, systematically describing existing facts through a normative legal approach, utilizing laws and regulations as primary data. The study reveals the absence of specific laws that explicitly regulate cyberterrorism crimes, resulting in legal uncertainty and enforcement challenges. Accordingly, it is imperative to reinforce the legal framework and enhance international collaboration to address this threat effectively.
Downloads
Global Statistics ℹ️
|
92
Views
|
23
Downloads
|
|
115
Total
|
|
References
Al Zaidy, A., 2024. Digital Crimes and Digital Terrorism: The New Frontier of Threats in Cyberspace. Journal of Information Technology, Cybersecurity, and Artificial Intelligence [online], 1(1). Available at: https://doi.org/10.70715/jitcai.2024.v1.i1.00 DOI: https://doi.org/10.70715/jitcai.2024.v1.i1.003
Aly, A., Macdonald, S., and Jarvis, L., 2017. Introduction to the Special Issue: Terrorist Online Propaganda and Radicalization. Studies in Conflict & Terrorism [online], 40(1), 1–9. Available at: https://doi.org/10.1080/1057610X.2016.1157402 DOI: https://doi.org/10.1080/1057610X.2016.1157402
Argastya, A.Y., 2024. Penanggulangan Terhadap Kejahatan Cyber-Terrorism Melalui Politik Hukum Pidana. Jurist-Diction [online], 7(2). Available at: https://doi.org/10.20473/jd.v7i2.44633 DOI: https://doi.org/10.20473/jd.v7i2.44633
Argastya, A.Y., and Supano, 2022. Penerapan Hukum Pidana Pada Penyidikan Kepolisian Untuk Menanggulangi Kejahatan Cyber Terrorism. Recidive [online], 11(1), 14. Available at: https://doi.org/10.20961/recidive.v11i1.67425 DOI: https://doi.org/10.20961/recidive.v11i1.67425
Asasfeh, A., et al., 2023. Exploring Cyber Investigators: An In-Depth Examination of the Field of Digital Forensics. 2023 IEEE DASC/PiCom/CBDCom/CyberSciTech Conference [online], pp. 0084–0088. IEEE. Available at: https://doi.org/10.1109/DASC/PiCom/CBDCom/Cy59711.2023.10361449 DOI: https://doi.org/10.1109/DASC/PiCom/CBDCom/Cy59711.2023.10361449
Asri, A., et al., 2024. ANTI TERORISME SIBER: Upaya Antisipatif Penanggulangan Terorisme Siber di Indonesia. Jurnal Ilmiah Hukum Dirgantara [online], 15(1), 1–13. Available at: https://journal.universitassuryadarma.ac.id/index.php/jihd/article/view/1369
Astuti, S.A., 2015. Law Enforcement of Cyber Terrorism in Indonesia. Rechtsidee [online], 2(2), 157–178. Available at: https://doi.org/10.21070/jihr.v2i2.82 DOI: https://doi.org/10.21070/jihr.v2i2.82
Bakry, M., et al., 2021. Strengthening the Cyber Terrorism Law Enforcement in Indonesia: Assimilation from Islamic Jurisdiction. International Journal of Criminology and Sociology [online], 10, 1267–1276. Available at: https://doi.org/10.6000/1929-4409.2021.10.146 DOI: https://doi.org/10.6000/1929-4409.2021.10.146
Billow, J., 2024. No Country Is an Island: Embracing International Law Enforcement Cooperation to Reduce the Impact of Cybercrime. Journal of Cyber Policy [online], 9(2), 149–158. Available at: https://doi.org/10.1080/23738871.2023.2245417 DOI: https://doi.org/10.1080/23738871.2023.2245417
Buana, G., 2024. Kronologi Serangan Ransomware ke PDNS. Media Indonesia [online]. Available at: https://mediaindonesia.com/teknologi/682359/kronologi-serangan-ransomware-ke-pdns
Carthy, S.L., et al., 2020. Counter-Narratives for the Prevention of Violent Radicalisation: A Systematic Review. Campbell Systematic Reviews [online], 16(3), e1106. Available at: https://doi.org/10.1002/cl2.1106 DOI: https://doi.org/10.1002/cl2.1106
Chun, Y.H., and Cho, M.K., 2022. An Empirical Study of Intelligent Security Analysis Methods Utilizing Big Data. Journal of Logistics, Informatics and Service Science [online], 9(1), 26–35. Available at: https://doi.org/10.33168/liss.2022.0103 DOI: https://doi.org/10.33168/LISS.2022.0103
Clough, J., 2014. A World of Difference: The Budapest Convention on Cybercrime and the Challenges of Harmonisation. Monash University Law Review, 40(3), 698–736.
Conway, M., 2017. Determining the Role of the Internet in Violent Extremism and Terrorism: Six Suggestions for Progressing Research. Studies in Conflict & Terrorism [online], 40(1), 77–98. Available at: https://doi.org/10.1080/1057610X.2016.1157408 DOI: https://doi.org/10.1080/1057610X.2016.1157408
Dunsin, D., et al., 2024. A comprehensive analysis of the role of artificial intelligence and machine learning in modern digital forensics and incident response. Forensic Science International: Digital Investigation [online], 48, 301675. Available at: https://doi.org/10.1016/j.fsidi.2023.301675 DOI: https://doi.org/10.1016/j.fsidi.2023.301675
Fahriza, W., Sahlepi, M.A., and Rahmayanti, R., 2024. Effectiveness of Law Enforcement Against Cybercrime in Indonesia. Law Sinergy Conference, 1(1), 179–185.
Gill, P., Horgan, J., and Deckert, P., 2014. Bombing Alone: Tracing the Motivations and Antecedent Behaviors of Lone-Actor Terrorists. Journal of Forensic Sciences [online], 59(2), 425–435. Available at: https://doi.org/10.1111/1556-4029.12312 DOI: https://doi.org/10.1111/1556-4029.12312
Goni, O., et al., 2022. The basic concept of cybercrime. Journal of Technology Innovations and Energy [online], 1(2), 16-24. Available at: https://doi.org/10.56556/jtie.v1i2.113 DOI: https://doi.org/10.56556/jtie.v1i2.113
Hartati, C.S., and Muhammad, A., 2023. Combating Cybercrime and Cyberterrorism in Indonesia. Jurnal Hubungan Internasional, 11(2). DOI: https://doi.org/10.18196/jhi.v11i2.15647
Hoffman, B., Ware, J., and Shapiro, E., 2020. Assessing the Threat of Incel Violence. Studies in Conflict & Terrorism [online], 43(7), 565–587. Available at: https://doi.org/10.1080/1057610x.2020.1751459 DOI: https://doi.org/10.1080/1057610X.2020.1751459
Holt, T.J., and Bossler, A.M., 2022. Cybercrime and Digital Forensics: An Introduction. 3rd ed. London: Routledge. DOI: https://doi.org/10.4324/9780429343223
Horgan, J., 2014. The Psychology of Terrorism. 2nd ed. London: Routledge. DOI: https://doi.org/10.4324/9781315882246
Iswardhana, M.R., 2021. Cyber Diplomacy and Protection Measures Against ICT Threats in Indonesia. Journal of Islamic World and Politics [online], 5(2). Available at: https://doi.org/10.18196/jiwp.v5i2.12242 DOI: https://doi.org/10.18196/jiwp.v5i2.12242
Khoirunnisa, K., and Jubaidi, D., 2024. Indonesia’s Digital Security Strategy: Countering the Threats of Cybercrime and Cyberterrorism. Journal of Public Administration and Political Science and International Relations [online], 2(2). Available at: https://doi.org/10.61978/politeia.v2i2.211 DOI: https://doi.org/10.61978/politeia.v2i2.211
Kitab Undang-Undang Hukum Pidana (KUHP).
Le Nguyen, C., and Golman, W., 2021. Diffusion of the Budapest Convention on Cybercrime. Computer Law & Security Review [online], 40, 105521. Available at: https://doi.org/10.1016/j.clsr.2020.105521 DOI: https://doi.org/10.1016/j.clsr.2020.105521
Lesmana, S.J., Latif, I.S., and Felina, F., 2023. Law Enforcement in Efforts to Combat Cyber Crime in Indonesia. The International Journal of Law Review and State Administration [online], 1, 120–128. Available at: https://www.ijems.id/index.php/ijlrsa/article/view/90
Lewis, J.A., 2024. Economic Impact of Cybercrime. Center for Strategic and International Studies [online]. Available at: https://www.csis.org/analysis/economic-impact-cybercrime
Mansur, D.M.A., and Gultom, E., 2005. Cyber Law: Aspek Hukum Teknologi Informasi. PT Refika Aditama.
Muhammad Sukardi, 2024. 239 Data Instansi Pemerintah Terdampak Serangan Ransomware. SindoNews [online], 27 June. https://nasional.sindonews.com/read/1404713/15/239-data-instansi-pemerintah-terdampak-serangan-ransomware-1719489981
Mumtaaz, G.M., Wardhana, T.R., and Diastuti, F.H., 2021. Anti Cyber Terrorism sebagai Upaya Penanggulangan di Indonesia. Al-Hakam Islamic Law & Contemporary Issues, 2(2).
Myers, N., 2020. Cyber Security: Cyber Crime, Attacks and Terrorism. ODU UN Day Issue [online], 1–13. Available at: https://www.odu.edu/sites/default/files/documents/1st-cyber-attacks.pdf
Nayak, M., 2024. AI-Enhanced Digital Forensics. Journal of Electrical Systems [online], 20(1s), 211–229. Available at: https://doi.org/10.52783/jes.766 DOI: https://doi.org/10.52783/jes.766
Pala, A., and Zhuang, J., 2019. Information Sharing in Cybersecurity: A Review. Decision Analysis [online], 16(3), 172–196. Available at: https://doi.org/10.1287/deca.2018.0387 DOI: https://doi.org/10.1287/deca.2018.0387
Paminto, S.R., 2022. Cyber Terrorism Countermeasures in Indonesia. Jurnal Wawasan Yuridika [online], 6(2). Available at: https://doi.org/10.25072/jwy.v6i2.464 DOI: https://doi.org/10.25072/jwy.v6i2.464
Pati, N. V., Senewe, E. V., Kalalo, M. E., Waha, C. J., and Lumunon, T. H. et al., 2023. The Implementation of Law Enforcement in Combating Terrorist Financing in Indonesia. Indonesian Journal of International Law [online], 21(2), 5. Available at: https://doi.org/10.17304/ijil.vol21.2.6
Peters, A., and Jordan, A., 2019. Countering the Cyber Enforcement Gap. Journal of National Security Law & Policy [online], 10, 487. Available at: https://jnslp.com/2020/02/13/countering-the-cyber-enforcement-gap-strengthening-global-capacity-on-cybercrime/
Phillips, K., et al., 2022. Conceptualizing Cybercrime. Forensic Sciences [online], 2(2), 379–398. Available at: https://doi.org/10.3390/forensicsci2020028 DOI: https://doi.org/10.3390/forensicsci2020028
Pradnyana, I.P.H., and Rofii, M.S., 2020. Ancaman Cyberterrorism di Indonesia dan Respons Negara. Literatus [online], 2(2), 185. Available at: https://doi.org/10.37010/lit.v2i2.92 DOI: https://doi.org/10.37010/lit.v2i2.92
Riskiyadi, M., 2020. Investigasi forensik terhadap bukti digital dalam mengungkap cybercrime. Cyber Security dan Forensik Digital [online], 3(2), 12–21. https://doi.org/10.14421/csecurity.2020.3.2.2144 DOI: https://doi.org/10.14421/csecurity.2020.3.2.2144
Spaaij, R., 2012. Understanding Lone Wolf Terrorism: Global Patterns, Motivations and Prevention. Dordrecht: Springer. DOI: https://doi.org/10.1007/978-94-007-2981-0
Thatcher, M., 1985. Speech to American Bar Association (“We must try to find ways to starve the terrorist and the hijacker of the oxygen of publicity on which they depend”). 15 July. American Bar Association, London.
Undang-Undang Dasar Negara Republik Indonesia Tahun 1945.
Undang-Undang Nomor 1 Tahun 2024 tentang Perubahan Kedua atas UU ITE.
Undang-Undang Nomor 19 Tahun 2016 tentang Perubahan atas UU ITE.
Undang-Undang Nomor 5 Tahun 2018 tentang Pemberantasan Tindak Pidana Terorisme.
Weimann, G., 2015. Terrorism in Cyberspace: The Next Generation. Woodrow Wilson Center Press/Columbia University Press.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Karina Frity Rahmasari, Al Pink Saputra Napitupulu, Anida Nadyana Novauzyah, Sahat Maruli Tua Situmeang

This work is licensed under a Creative Commons Attribution 4.0 International License.
Sortuz: Oñati Journal of Emergent Socio-Legal Studies provides immediate open access to all its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.
All articles are published under a Creative Commons Attribution 4.0 International License.
Copyright and publishing rights are held by the authors of the articles. We do, however, kindly ask for later publications to indicate Sortuz as the original source.









