Law enforcement of cyber terrorism crimes in strengthening national data security from the perspective of Indonesian positive law

Authors

  • Karina Frity Rahmasari Fakultas Hukum Universitas Komputer Indonesia
  • Al Pink Saputra Napitupulu Fakultas Hukum Universitas Komputer Indonesia
  • Anida Nadyana Novauzyah Fakultas Hukum Universitas Komputer Indonesia
  • Sahat Maruli Tua Situmeang Fakultas Hukum Universitas Komputer Indonesia https://orcid.org/0009-0003-6893-3958

DOI:

https://doi.org/10.35295/sz.iisl.2409

Keywords:

Cyber Terrorism, Indonesian Positive Law, Law Enforcement, National Data Security, Regulations

Abstract

Cyberterrorism is a contemporary form of crime that exploits information technology to threaten national data security and public welfare. This study aims to assess the effectiveness of Indonesian positive law in addressing cyber terrorism and to evaluate its Impact on critical national infrastructure, such as transportation, energy, and public services, which may result in substantial financial losses and operational disruptions. This study was conducted descriptively and analytically, systematically describing existing facts through a normative legal approach, utilizing laws and regulations as primary data. The study reveals the absence of specific laws that explicitly regulate cyberterrorism crimes, resulting in legal uncertainty and enforcement challenges. Accordingly, it is imperative to reinforce the legal framework and enhance international collaboration to address this threat effectively.

Downloads

Download data is not yet available.

Global Statistics ℹ️

Cumulative totals since publication
92
Views
23
Downloads
115
Total

References

Al Zaidy, A., 2024. Digital Crimes and Digital Terrorism: The New Frontier of Threats in Cyberspace. Journal of Information Technology, Cybersecurity, and Artificial Intelligence [online], 1(1). Available at: https://doi.org/10.70715/jitcai.2024.v1.i1.00 DOI: https://doi.org/10.70715/jitcai.2024.v1.i1.003

Aly, A., Macdonald, S., and Jarvis, L., 2017. Introduction to the Special Issue: Terrorist Online Propaganda and Radicalization. Studies in Conflict & Terrorism [online], 40(1), 1–9. Available at: https://doi.org/10.1080/1057610X.2016.1157402 DOI: https://doi.org/10.1080/1057610X.2016.1157402

Argastya, A.Y., 2024. Penanggulangan Terhadap Kejahatan Cyber-Terrorism Melalui Politik Hukum Pidana. Jurist-Diction [online], 7(2). Available at: https://doi.org/10.20473/jd.v7i2.44633 DOI: https://doi.org/10.20473/jd.v7i2.44633

Argastya, A.Y., and Supano, 2022. Penerapan Hukum Pidana Pada Penyidikan Kepolisian Untuk Menanggulangi Kejahatan Cyber Terrorism. Recidive [online], 11(1), 14. Available at: https://doi.org/10.20961/recidive.v11i1.67425 DOI: https://doi.org/10.20961/recidive.v11i1.67425

Asasfeh, A., et al., 2023. Exploring Cyber Investigators: An In-Depth Examination of the Field of Digital Forensics. 2023 IEEE DASC/PiCom/CBDCom/CyberSciTech Conference [online], pp. 0084–0088. IEEE. Available at: https://doi.org/10.1109/DASC/PiCom/CBDCom/Cy59711.2023.10361449 DOI: https://doi.org/10.1109/DASC/PiCom/CBDCom/Cy59711.2023.10361449

Asri, A., et al., 2024. ANTI TERORISME SIBER: Upaya Antisipatif Penanggulangan Terorisme Siber di Indonesia. Jurnal Ilmiah Hukum Dirgantara [online], 15(1), 1–13. Available at: https://journal.universitassuryadarma.ac.id/index.php/jihd/article/view/1369

Astuti, S.A., 2015. Law Enforcement of Cyber Terrorism in Indonesia. Rechtsidee [online], 2(2), 157–178. Available at: https://doi.org/10.21070/jihr.v2i2.82 DOI: https://doi.org/10.21070/jihr.v2i2.82

Bakry, M., et al., 2021. Strengthening the Cyber Terrorism Law Enforcement in Indonesia: Assimilation from Islamic Jurisdiction. International Journal of Criminology and Sociology [online], 10, 1267–1276. Available at: https://doi.org/10.6000/1929-4409.2021.10.146 DOI: https://doi.org/10.6000/1929-4409.2021.10.146

Billow, J., 2024. No Country Is an Island: Embracing International Law Enforcement Cooperation to Reduce the Impact of Cybercrime. Journal of Cyber Policy [online], 9(2), 149–158. Available at: https://doi.org/10.1080/23738871.2023.2245417 DOI: https://doi.org/10.1080/23738871.2023.2245417

Buana, G., 2024. Kronologi Serangan Ransomware ke PDNS. Media Indonesia [online]. Available at: https://mediaindonesia.com/teknologi/682359/kronologi-serangan-ransomware-ke-pdns

Carthy, S.L., et al., 2020. Counter-Narratives for the Prevention of Violent Radicalisation: A Systematic Review. Campbell Systematic Reviews [online], 16(3), e1106. Available at: https://doi.org/10.1002/cl2.1106 DOI: https://doi.org/10.1002/cl2.1106

Chun, Y.H., and Cho, M.K., 2022. An Empirical Study of Intelligent Security Analysis Methods Utilizing Big Data. Journal of Logistics, Informatics and Service Science [online], 9(1), 26–35. Available at: https://doi.org/10.33168/liss.2022.0103 DOI: https://doi.org/10.33168/LISS.2022.0103

Clough, J., 2014. A World of Difference: The Budapest Convention on Cybercrime and the Challenges of Harmonisation. Monash University Law Review, 40(3), 698–736.

Conway, M., 2017. Determining the Role of the Internet in Violent Extremism and Terrorism: Six Suggestions for Progressing Research. Studies in Conflict & Terrorism [online], 40(1), 77–98. Available at: https://doi.org/10.1080/1057610X.2016.1157408 DOI: https://doi.org/10.1080/1057610X.2016.1157408

Dunsin, D., et al., 2024. A comprehensive analysis of the role of artificial intelligence and machine learning in modern digital forensics and incident response. Forensic Science International: Digital Investigation [online], 48, 301675. Available at: https://doi.org/10.1016/j.fsidi.2023.301675 DOI: https://doi.org/10.1016/j.fsidi.2023.301675

Fahriza, W., Sahlepi, M.A., and Rahmayanti, R., 2024. Effectiveness of Law Enforcement Against Cybercrime in Indonesia. Law Sinergy Conference, 1(1), 179–185.

Gill, P., Horgan, J., and Deckert, P., 2014. Bombing Alone: Tracing the Motivations and Antecedent Behaviors of Lone-Actor Terrorists. Journal of Forensic Sciences [online], 59(2), 425–435. Available at: https://doi.org/10.1111/1556-4029.12312 DOI: https://doi.org/10.1111/1556-4029.12312

Goni, O., et al., 2022. The basic concept of cybercrime. Journal of Technology Innovations and Energy [online], 1(2), 16-24. Available at: https://doi.org/10.56556/jtie.v1i2.113 DOI: https://doi.org/10.56556/jtie.v1i2.113

Hartati, C.S., and Muhammad, A., 2023. Combating Cybercrime and Cyberterrorism in Indonesia. Jurnal Hubungan Internasional, 11(2). DOI: https://doi.org/10.18196/jhi.v11i2.15647

Hoffman, B., Ware, J., and Shapiro, E., 2020. Assessing the Threat of Incel Violence. Studies in Conflict & Terrorism [online], 43(7), 565–587. Available at: https://doi.org/10.1080/1057610x.2020.1751459 DOI: https://doi.org/10.1080/1057610X.2020.1751459

Holt, T.J., and Bossler, A.M., 2022. Cybercrime and Digital Forensics: An Introduction. 3rd ed. London: Routledge. DOI: https://doi.org/10.4324/9780429343223

Horgan, J., 2014. The Psychology of Terrorism. 2nd ed. London: Routledge. DOI: https://doi.org/10.4324/9781315882246

Iswardhana, M.R., 2021. Cyber Diplomacy and Protection Measures Against ICT Threats in Indonesia. Journal of Islamic World and Politics [online], 5(2). Available at: https://doi.org/10.18196/jiwp.v5i2.12242 DOI: https://doi.org/10.18196/jiwp.v5i2.12242

Khoirunnisa, K., and Jubaidi, D., 2024. Indonesia’s Digital Security Strategy: Countering the Threats of Cybercrime and Cyberterrorism. Journal of Public Administration and Political Science and International Relations [online], 2(2). Available at: https://doi.org/10.61978/politeia.v2i2.211 DOI: https://doi.org/10.61978/politeia.v2i2.211

Kitab Undang-Undang Hukum Pidana (KUHP).

Le Nguyen, C., and Golman, W., 2021. Diffusion of the Budapest Convention on Cybercrime. Computer Law & Security Review [online], 40, 105521. Available at: https://doi.org/10.1016/j.clsr.2020.105521 DOI: https://doi.org/10.1016/j.clsr.2020.105521

Lesmana, S.J., Latif, I.S., and Felina, F., 2023. Law Enforcement in Efforts to Combat Cyber Crime in Indonesia. The International Journal of Law Review and State Administration [online], 1, 120–128. Available at: https://www.ijems.id/index.php/ijlrsa/article/view/90

Lewis, J.A., 2024. Economic Impact of Cybercrime. Center for Strategic and International Studies [online]. Available at: https://www.csis.org/analysis/economic-impact-cybercrime

Mansur, D.M.A., and Gultom, E., 2005. Cyber Law: Aspek Hukum Teknologi Informasi. PT Refika Aditama.

Muhammad Sukardi, 2024. 239 Data Instansi Pemerintah Terdampak Serangan Ransomware. SindoNews [online], 27 June. https://nasional.sindonews.com/read/1404713/15/239-data-instansi-pemerintah-terdampak-serangan-ransomware-1719489981

Mumtaaz, G.M., Wardhana, T.R., and Diastuti, F.H., 2021. Anti Cyber Terrorism sebagai Upaya Penanggulangan di Indonesia. Al-Hakam Islamic Law & Contemporary Issues, 2(2).

Myers, N., 2020. Cyber Security: Cyber Crime, Attacks and Terrorism. ODU UN Day Issue [online], 1–13. Available at: https://www.odu.edu/sites/default/files/documents/1st-cyber-attacks.pdf

Nayak, M., 2024. AI-Enhanced Digital Forensics. Journal of Electrical Systems [online], 20(1s), 211–229. Available at: https://doi.org/10.52783/jes.766 DOI: https://doi.org/10.52783/jes.766

Pala, A., and Zhuang, J., 2019. Information Sharing in Cybersecurity: A Review. Decision Analysis [online], 16(3), 172–196. Available at: https://doi.org/10.1287/deca.2018.0387 DOI: https://doi.org/10.1287/deca.2018.0387

Paminto, S.R., 2022. Cyber Terrorism Countermeasures in Indonesia. Jurnal Wawasan Yuridika [online], 6(2). Available at: https://doi.org/10.25072/jwy.v6i2.464 DOI: https://doi.org/10.25072/jwy.v6i2.464

Pati, N. V., Senewe, E. V., Kalalo, M. E., Waha, C. J., and Lumunon, T. H. et al., 2023. The Implementation of Law Enforcement in Combating Terrorist Financing in Indonesia. Indonesian Journal of International Law [online], 21(2), 5. Available at: https://doi.org/10.17304/ijil.vol21.2.6

Peters, A., and Jordan, A., 2019. Countering the Cyber Enforcement Gap. Journal of National Security Law & Policy [online], 10, 487. Available at: https://jnslp.com/2020/02/13/countering-the-cyber-enforcement-gap-strengthening-global-capacity-on-cybercrime/

Phillips, K., et al., 2022. Conceptualizing Cybercrime. Forensic Sciences [online], 2(2), 379–398. Available at: https://doi.org/10.3390/forensicsci2020028 DOI: https://doi.org/10.3390/forensicsci2020028

Pradnyana, I.P.H., and Rofii, M.S., 2020. Ancaman Cyberterrorism di Indonesia dan Respons Negara. Literatus [online], 2(2), 185. Available at: https://doi.org/10.37010/lit.v2i2.92 DOI: https://doi.org/10.37010/lit.v2i2.92

Riskiyadi, M., 2020. Investigasi forensik terhadap bukti digital dalam mengungkap cybercrime. Cyber Security dan Forensik Digital [online], 3(2), 12–21. https://doi.org/10.14421/csecurity.2020.3.2.2144 DOI: https://doi.org/10.14421/csecurity.2020.3.2.2144

Spaaij, R., 2012. Understanding Lone Wolf Terrorism: Global Patterns, Motivations and Prevention. Dordrecht: Springer. DOI: https://doi.org/10.1007/978-94-007-2981-0

Thatcher, M., 1985. Speech to American Bar Association (“We must try to find ways to starve the terrorist and the hijacker of the oxygen of publicity on which they depend”). 15 July. American Bar Association, London.

Undang-Undang Dasar Negara Republik Indonesia Tahun 1945.

Undang-Undang Nomor 1 Tahun 2024 tentang Perubahan Kedua atas UU ITE.

Undang-Undang Nomor 19 Tahun 2016 tentang Perubahan atas UU ITE.

Undang-Undang Nomor 5 Tahun 2018 tentang Pemberantasan Tindak Pidana Terorisme.

Weimann, G., 2015. Terrorism in Cyberspace: The Next Generation. Woodrow Wilson Center Press/Columbia University Press.

Published

04/20/2026

How to Cite

Rahmasari, K. F. (2026) “Law enforcement of cyber terrorism crimes in strengthening national data security from the perspective of Indonesian positive law ”, Sortuz: Oñati Journal of Emergent Socio-Legal Studies, 16(1), pp. 5–24. doi: 10.35295/sz.iisl.2409.