Penegakan Hukum Nasional dan Hukum Internasional Terhadap Kejahatan Cyber Espionage Pada Era Society 5.0

  • Hamdan Mustameer Universitas Pembangunan Nasional "Veteran" Jawa Timur
Abstract Views: 2262 times
PDF Downloads: 2300 times
Keywords: Cyber Espionage, Society 5.0, National Law, International Law

Abstract

The era of Society 5.0 is a condition of society that is required to solve various challenges and social problems by utilizing various innovations that were born in the era of the Industrial Revolution 4.0 such as the Internet on Things, Big Data, Artificial Intelligence, and robots to improve the quality of human life. The new things in Era Society 5.0 should not change law enforcement based on decision-making, the freedom of legal institutions in deciding cases, the professionalism of the apparatus, and public transparency. The rapidity of this era in entering the country during the Covid-19 pandemic, triggering cybercrimes that use new tools such as virus spread, and cracking. One of the crimes that the state is vulnerable to is Cyber Espionage. This crime is an act of espionage that takes advantage of advances in technology and information. As a state of law, Indonesia is required to have policies that regulate Cyber Espionage actions while still paying attention to aspects of international law so that law enforcement in Indonesia can run smoothly. To find out the readiness of Indonesian law in facing the threat of Cyber Espionage, we write this article with a normative juridical research with three approaches, conceptual approach, statutory approach, and comparative approach. The results of our research show that the national legal instruments in Indonesia are still limited to the Electronic Information and Transaction Law (ITE), Government Regulations regarding its implementation, Presidential Regulations on National Defense (Perpreshanneg), and the absence of policies that specifically regulate cyber crimes.

Downloads

Download data is not yet available.

References

Buku
Delerue, F. (2020). Cambridge Studies in International and Comparative Law. In Cyber Operations and International Law. Cambridge University Press.
Dikdik, & Gultom, E. (2005). Cyber Law: Aspek Hukum Teknologi Informasi. Refika Aditama.
Friedman, L. (2001). Hukum Amerika: Sebuah Pengantar (diterjemahkan W. Basuki). Tatanusa.
Haqqi, H., & Wijayati, H. (2019). Revolusi Industri 4.0 di Tengah Society 5.0: Sebuah Integrasi Ruang, Terobosan Teknologi, dan Transformasi Kehidupan di Era Disruptif. Anak Hebat Indonesia.
Machiavelli, N. (2015). The Art of war (diterjemahkan E. S. Alkhatab & T. Setiawan). Narasi.
Mertokusumo, S. (1991). Mengenal Hukum. Liberty.
Michael, S. (2013). Tallin Manual 2.0 International Applicable to Cyberwarfare. Cambridge University Press.
Muladi. (2002). Hak Asasi Manusia, Politik dan Sistem Peradilan Pidana. Badan Penerbit Universitas Diponegoro.
Schwarzenberger, G. (1967). A Manual of International Law (Fifth Edition). Stevens and Sons Limited.
Sudiro, A., & Marton. (2017). The Suppression of Hijacking and Other Crimes Involving Indonesian Aviation Activities. In Indonesia, Aviation Laws and Regulations Applicable in (p. 360). Rajagrafindo.
Sudiro, A., & Marton. (2017). The Suppression of Hijacking and Other Crimes Involving Indonesian Aviation Activities. In Indonesia, Aviation Laws and Regulations Applicable in (p. 360). Rajagrafindo.
Terry, G. (1968). Principles of Management. Richar D Erwin.
Wahid, A. (2005). Kejahatan Mayantara (Cyber Crime). Refika Aditama.
Wall, D. (2007). Cybercrime: The Transformation of Crime in the Information Age. Polity Press.
Wallace, D. (2019). Peeling Back the Onion of Cyber Espionage after Tallin 2.0. Maryland Review, 78(2), 17.
Wallace, R. (1993). Hukum Internasional (B. Arumanadi (ed.)). IKIP Semarang Press.

Artikel Jurnal
Baezner, M. (2018). Hotspot Analysis: Use of cybertools in regional tensions in Southeast Asia. 11, 1–28.
Baker, C. (2003). Tolerance of International Espionage: A Functional Approach. American University International Law Review, 12.
Baumgartner, K. (2015). The CozyDuke APT. Securelist.
Green, L. (1952). The Anglo-Norwegian Fisheries Case, 1951 (I. C. J. Reports 1951, p. 116). The Modern Law Review, 15(3), 373–377.
Jamnejad, M. (2009). The Principle of Non-Intervention. Leiden Journal of International Law, 2.
Kulesza, J. (2009). State Responsibility For Cyber-Attacks On International Peace and Security. Polish Yearbook of International Law, XXIX, 9.
Pratiwi, L. Y. E., & Correia, Z. F. M. (2020). HUKUM SIBER : PRAKTIK SPIONASE DALAM KEDAULATAN NEGARA DAN HUBUNGAN DIPLOMASI BERDASARKAN KETENTUAN HUKUM INTERNASIONAL. Jurnal Pendidikan Kewarganegaraan Undiksha, 8(3), 206–218.
Purna Nugraha, A. (2017). Dukungan Indonesia Terhadap Resolusi Anti Spionase Perserikatan Bangsa-Bangsa. Jurnal Hubungan Internasional, 935.
Sinaga, O. (2010). Penanggulangan Kejahatan Internasional Cyber Crime di Indonesia. Makalah Institut Pertanian Bogor, 10.
Sudiarta, I. K. (2014). Pelanggaran Kedaulatan Negara Terkait Tindakan Spionase dalam Hubungan Diplomasi Internasional. Kerthanegara, 2.
Haqqi, H., & Wijayati, H. (2019). Revolusi Industri 4.0 di Tengah Society 5.0: Sebuah Integrasi Ruang, Terobosan Teknologi, dan Transformasi Kehidupan di Era Disruptif. Anak Hebat Indonesia.
HSToday. (2020). NSA Teams with NCSC, CSE, DHS CISA to Expose Russian Intelligence Services Targeting COVID-19 Researchers. Homeland Security Today.
Jamnejad, M. (2009). The Principle of Non-Intervention. Leiden Journal of International Law, 2.
Kulesza, J. (2009). State Responsibility For Cyber-Attacks On International Peace and Security. Polish Yearbook of International Law, XXIX, 9.
Machiavelli, N. (2015). The Art of war (E. S. Alkhatab & T. Setiawan (eds.); 1st ed.). Narasi.
Mertokusumo, S. (1991). Mengenal Hukum. Liberty.
Michael, S. (2013). Tallin Manual 2.0 International Applicable to Cyberwarfare. Cambridge University Press.
Muladi. (2002). Hak Asasi Manusia, Politik dan Sistem Peradilan Pidana. Badan Penerbit Universitas Diponegoro.
Pratiwi, L. Y. E., & Correia, Z. F. M. (2020). HUKUM SIBER : PRAKTIK SPIONASE DALAM KEDAULATAN NEGARA DAN HUBUNGAN DIPLOMASI BERDASARKAN KETENTUAN HUKUM INTERNASIONAL. Jurnal Pendidikan Kewarganegaraan Undiksha, 8(3), 206–218.
Purna Nugraha, A. (2017). Dukungan Indonesia Terhadap Resolusi Anti Spionase Perserikatan Bangsa-Bangsa. Jurnal Hubungan Internasional, 935.
Schwarzenberger, G. (1967). A Manual of International Law (Fifth Edit). Stevens and Sons Limited.
Sinaga, O. (2010). Penanggulangan Kejahatan Internasional Cyber Crime di Indonesia. Makalah Institut Pertanian Bogor, 10.
Sudiarta, I. K. (2014). Pelanggaran Kedaulatan Negara Terkait Tindakan Spionase dalam Hubungan Diplomasi Internasional. Kerthanegara, 2.
Haqqi, H., & Wijayati, H. (2019). Revolusi Industri 4.0 di Tengah Society 5.0: Sebuah Integrasi Ruang, Terobosan Teknologi, dan Transformasi Kehidupan di Era Disruptif. Anak Hebat Indonesia.
HSToday. (2020). NSA Teams with NCSC, CSE, DHS CISA to Expose Russian Intelligence Services Targeting COVID-19 Researchers. Homeland Security Today.
Jamnejad, M. (2009). The Principle of Non-Intervention. Leiden Journal of International Law, 2.
Kulesza, J. (2009). State Responsibility For Cyber-Attacks On International Peace and Security. Polish Yearbook of International Law, XXIX, 9.
Machiavelli, N. (2015). The Art of war (E. S. Alkhatab & T. Setiawan (eds.); 1st ed.). Narasi.
Mertokusumo, S. (1991). Mengenal Hukum. Liberty.
Michael, S. (2013). Tallin Manual 2.0 International Applicable to Cyberwarfare. Cambridge University Press.
Muladi. (2002). Hak Asasi Manusia, Politik dan Sistem Peradilan Pidana. Badan Penerbit Universitas Diponegoro.
Pratiwi, L. Y. E., & Correia, Z. F. M. (2020). HUKUM SIBER : PRAKTIK SPIONASE DALAM KEDAULATAN NEGARA DAN HUBUNGAN DIPLOMASI BERDASARKAN KETENTUAN HUKUM INTERNASIONAL. Jurnal Pendidikan Kewarganegaraan Undiksha, 8(3), 206–218.
Purna Nugraha, A. (2017). Dukungan Indonesia Terhadap Resolusi Anti Spionase Perserikatan Bangsa-Bangsa. Jurnal Hubungan Internasional, 935.
Schwarzenberger, G. (1967). A Manual of International Law (Fifth Edit). Stevens and Sons Limited.
Sinaga, O. (2010). Penanggulangan Kejahatan Internasional Cyber Crime di Indonesia. Makalah Institut Pertanian Bogor, 10.
Sudiarta, I. K. (2014). Pelanggaran Kedaulatan Negara Terkait Tindakan Spionase dalam Hubungan Diplomasi Internasional. Kerthanegara, 2.

Artikel Internet
Baezner, M. (2018). Hotspot Analysis: Use of cybertools in regional tensions in Southeast Asia. 11, 1–28.
Baker, C. (2003). Tolerance of International Espionage: A Functional Approach. American University International Law Review, 12.
Baumgartner, K. (2015). The CozyDuke APT. Securelist.
Christiawan, R. (2021). Tantangan Hukum Era GoTo. Kontan. https://analisis.kontan.co.id/news/tantangan-hukum-era-goto-1
Delerue, F. (2020). Cambridge Studies in International and Comparative Law. In Cyber Operations and International Law. Cambridge University Press.
Dikdik, & Gultom, E. (2005). Cyber Law: Aspek Hukum Teknologi Informasi. Refika Aditama.
Friedman, L. (2001). Hukum Amerika: Sebuah Pengantar (W. Basuki (ed.); 2nd ed.). Tatanusa.
Green, L. (1952). The Anglo-Norwegian Fisheries Case, 1951 (I. C. J. Reports 1951, p. 116). The Modern Law Review, 15(3), 373–377. https://www.jstor.org/stable/1091592
International Telecomunication Union (ITU). (2015). Statistics confirm ICT revolution of the past 15 years. ITU Releases 2015 ICT Figures. https://www.itu.int/net/pressoffice/press_releases/2015/17.aspx
Michael, S. (2017). Respect for Sovereignty in Cyberspace. Texas Law Review. https://texaslawreview.org/respect-sovereignty-cyberspace/
Syahputra, R. (2021). Adaptasi Teknologi : Kunci Kemajuan Diri di Era Society 5.0. Universitas Indonesia. https://www.ui.ac.id/adaptasi-teknologi-kunci-kemajuan-diri-di-era-society-5-0/
Published
2022-08-01