Penegakan Hukum Nasional dan Hukum Internasional Terhadap Kejahatan Cyber Espionage Pada Era Society 5.0
Abstract
The era of Society 5.0 is a condition of society that is required to solve various challenges and social problems by utilizing various innovations that were born in the era of the Industrial Revolution 4.0 such as the Internet on Things, Big Data, Artificial Intelligence, and robots to improve the quality of human life. The new things in Era Society 5.0 should not change law enforcement based on decision-making, the freedom of legal institutions in deciding cases, the professionalism of the apparatus, and public transparency. The rapidity of this era in entering the country during the Covid-19 pandemic, triggering cybercrimes that use new tools such as virus spread, and cracking. One of the crimes that the state is vulnerable to is Cyber Espionage. This crime is an act of espionage that takes advantage of advances in technology and information. As a state of law, Indonesia is required to have policies that regulate Cyber Espionage actions while still paying attention to aspects of international law so that law enforcement in Indonesia can run smoothly. To find out the readiness of Indonesian law in facing the threat of Cyber Espionage, we write this article with a normative juridical research with three approaches, conceptual approach, statutory approach, and comparative approach. The results of our research show that the national legal instruments in Indonesia are still limited to the Electronic Information and Transaction Law (ITE), Government Regulations regarding its implementation, Presidential Regulations on National Defense (Perpreshanneg), and the absence of policies that specifically regulate cyber crimes.
Downloads
References
Delerue, F. (2020). Cambridge Studies in International and Comparative Law. In Cyber Operations and International Law. Cambridge University Press.
Dikdik, & Gultom, E. (2005). Cyber Law: Aspek Hukum Teknologi Informasi. Refika Aditama.
Friedman, L. (2001). Hukum Amerika: Sebuah Pengantar (diterjemahkan W. Basuki). Tatanusa.
Haqqi, H., & Wijayati, H. (2019). Revolusi Industri 4.0 di Tengah Society 5.0: Sebuah Integrasi Ruang, Terobosan Teknologi, dan Transformasi Kehidupan di Era Disruptif. Anak Hebat Indonesia.
Machiavelli, N. (2015). The Art of war (diterjemahkan E. S. Alkhatab & T. Setiawan). Narasi.
Mertokusumo, S. (1991). Mengenal Hukum. Liberty.
Michael, S. (2013). Tallin Manual 2.0 International Applicable to Cyberwarfare. Cambridge University Press.
Muladi. (2002). Hak Asasi Manusia, Politik dan Sistem Peradilan Pidana. Badan Penerbit Universitas Diponegoro.
Schwarzenberger, G. (1967). A Manual of International Law (Fifth Edition). Stevens and Sons Limited.
Sudiro, A., & Marton. (2017). The Suppression of Hijacking and Other Crimes Involving Indonesian Aviation Activities. In Indonesia, Aviation Laws and Regulations Applicable in (p. 360). Rajagrafindo.
Sudiro, A., & Marton. (2017). The Suppression of Hijacking and Other Crimes Involving Indonesian Aviation Activities. In Indonesia, Aviation Laws and Regulations Applicable in (p. 360). Rajagrafindo.
Terry, G. (1968). Principles of Management. Richar D Erwin.
Wahid, A. (2005). Kejahatan Mayantara (Cyber Crime). Refika Aditama.
Wall, D. (2007). Cybercrime: The Transformation of Crime in the Information Age. Polity Press.
Wallace, D. (2019). Peeling Back the Onion of Cyber Espionage after Tallin 2.0. Maryland Review, 78(2), 17.
Wallace, R. (1993). Hukum Internasional (B. Arumanadi (ed.)). IKIP Semarang Press.
Artikel Jurnal
Baezner, M. (2018). Hotspot Analysis: Use of cybertools in regional tensions in Southeast Asia. 11, 1–28.
Baker, C. (2003). Tolerance of International Espionage: A Functional Approach. American University International Law Review, 12.
Baumgartner, K. (2015). The CozyDuke APT. Securelist.
Green, L. (1952). The Anglo-Norwegian Fisheries Case, 1951 (I. C. J. Reports 1951, p. 116). The Modern Law Review, 15(3), 373–377.
Jamnejad, M. (2009). The Principle of Non-Intervention. Leiden Journal of International Law, 2.
Kulesza, J. (2009). State Responsibility For Cyber-Attacks On International Peace and Security. Polish Yearbook of International Law, XXIX, 9.
Pratiwi, L. Y. E., & Correia, Z. F. M. (2020). HUKUM SIBER : PRAKTIK SPIONASE DALAM KEDAULATAN NEGARA DAN HUBUNGAN DIPLOMASI BERDASARKAN KETENTUAN HUKUM INTERNASIONAL. Jurnal Pendidikan Kewarganegaraan Undiksha, 8(3), 206–218.
Purna Nugraha, A. (2017). Dukungan Indonesia Terhadap Resolusi Anti Spionase Perserikatan Bangsa-Bangsa. Jurnal Hubungan Internasional, 935.
Sinaga, O. (2010). Penanggulangan Kejahatan Internasional Cyber Crime di Indonesia. Makalah Institut Pertanian Bogor, 10.
Sudiarta, I. K. (2014). Pelanggaran Kedaulatan Negara Terkait Tindakan Spionase dalam Hubungan Diplomasi Internasional. Kerthanegara, 2.
Haqqi, H., & Wijayati, H. (2019). Revolusi Industri 4.0 di Tengah Society 5.0: Sebuah Integrasi Ruang, Terobosan Teknologi, dan Transformasi Kehidupan di Era Disruptif. Anak Hebat Indonesia.
HSToday. (2020). NSA Teams with NCSC, CSE, DHS CISA to Expose Russian Intelligence Services Targeting COVID-19 Researchers. Homeland Security Today.
Jamnejad, M. (2009). The Principle of Non-Intervention. Leiden Journal of International Law, 2.
Kulesza, J. (2009). State Responsibility For Cyber-Attacks On International Peace and Security. Polish Yearbook of International Law, XXIX, 9.
Machiavelli, N. (2015). The Art of war (E. S. Alkhatab & T. Setiawan (eds.); 1st ed.). Narasi.
Mertokusumo, S. (1991). Mengenal Hukum. Liberty.
Michael, S. (2013). Tallin Manual 2.0 International Applicable to Cyberwarfare. Cambridge University Press.
Muladi. (2002). Hak Asasi Manusia, Politik dan Sistem Peradilan Pidana. Badan Penerbit Universitas Diponegoro.
Pratiwi, L. Y. E., & Correia, Z. F. M. (2020). HUKUM SIBER : PRAKTIK SPIONASE DALAM KEDAULATAN NEGARA DAN HUBUNGAN DIPLOMASI BERDASARKAN KETENTUAN HUKUM INTERNASIONAL. Jurnal Pendidikan Kewarganegaraan Undiksha, 8(3), 206–218.
Purna Nugraha, A. (2017). Dukungan Indonesia Terhadap Resolusi Anti Spionase Perserikatan Bangsa-Bangsa. Jurnal Hubungan Internasional, 935.
Schwarzenberger, G. (1967). A Manual of International Law (Fifth Edit). Stevens and Sons Limited.
Sinaga, O. (2010). Penanggulangan Kejahatan Internasional Cyber Crime di Indonesia. Makalah Institut Pertanian Bogor, 10.
Sudiarta, I. K. (2014). Pelanggaran Kedaulatan Negara Terkait Tindakan Spionase dalam Hubungan Diplomasi Internasional. Kerthanegara, 2.
Haqqi, H., & Wijayati, H. (2019). Revolusi Industri 4.0 di Tengah Society 5.0: Sebuah Integrasi Ruang, Terobosan Teknologi, dan Transformasi Kehidupan di Era Disruptif. Anak Hebat Indonesia.
HSToday. (2020). NSA Teams with NCSC, CSE, DHS CISA to Expose Russian Intelligence Services Targeting COVID-19 Researchers. Homeland Security Today.
Jamnejad, M. (2009). The Principle of Non-Intervention. Leiden Journal of International Law, 2.
Kulesza, J. (2009). State Responsibility For Cyber-Attacks On International Peace and Security. Polish Yearbook of International Law, XXIX, 9.
Machiavelli, N. (2015). The Art of war (E. S. Alkhatab & T. Setiawan (eds.); 1st ed.). Narasi.
Mertokusumo, S. (1991). Mengenal Hukum. Liberty.
Michael, S. (2013). Tallin Manual 2.0 International Applicable to Cyberwarfare. Cambridge University Press.
Muladi. (2002). Hak Asasi Manusia, Politik dan Sistem Peradilan Pidana. Badan Penerbit Universitas Diponegoro.
Pratiwi, L. Y. E., & Correia, Z. F. M. (2020). HUKUM SIBER : PRAKTIK SPIONASE DALAM KEDAULATAN NEGARA DAN HUBUNGAN DIPLOMASI BERDASARKAN KETENTUAN HUKUM INTERNASIONAL. Jurnal Pendidikan Kewarganegaraan Undiksha, 8(3), 206–218.
Purna Nugraha, A. (2017). Dukungan Indonesia Terhadap Resolusi Anti Spionase Perserikatan Bangsa-Bangsa. Jurnal Hubungan Internasional, 935.
Schwarzenberger, G. (1967). A Manual of International Law (Fifth Edit). Stevens and Sons Limited.
Sinaga, O. (2010). Penanggulangan Kejahatan Internasional Cyber Crime di Indonesia. Makalah Institut Pertanian Bogor, 10.
Sudiarta, I. K. (2014). Pelanggaran Kedaulatan Negara Terkait Tindakan Spionase dalam Hubungan Diplomasi Internasional. Kerthanegara, 2.
Artikel Internet
Baezner, M. (2018). Hotspot Analysis: Use of cybertools in regional tensions in Southeast Asia. 11, 1–28.
Baker, C. (2003). Tolerance of International Espionage: A Functional Approach. American University International Law Review, 12.
Baumgartner, K. (2015). The CozyDuke APT. Securelist.
Christiawan, R. (2021). Tantangan Hukum Era GoTo. Kontan. https://analisis.kontan.co.id/news/tantangan-hukum-era-goto-1
Delerue, F. (2020). Cambridge Studies in International and Comparative Law. In Cyber Operations and International Law. Cambridge University Press.
Dikdik, & Gultom, E. (2005). Cyber Law: Aspek Hukum Teknologi Informasi. Refika Aditama.
Friedman, L. (2001). Hukum Amerika: Sebuah Pengantar (W. Basuki (ed.); 2nd ed.). Tatanusa.
Green, L. (1952). The Anglo-Norwegian Fisheries Case, 1951 (I. C. J. Reports 1951, p. 116). The Modern Law Review, 15(3), 373–377. https://www.jstor.org/stable/1091592
International Telecomunication Union (ITU). (2015). Statistics confirm ICT revolution of the past 15 years. ITU Releases 2015 ICT Figures. https://www.itu.int/net/pressoffice/press_releases/2015/17.aspx
Michael, S. (2017). Respect for Sovereignty in Cyberspace. Texas Law Review. https://texaslawreview.org/respect-sovereignty-cyberspace/
Syahputra, R. (2021). Adaptasi Teknologi : Kunci Kemajuan Diri di Era Society 5.0. Universitas Indonesia. https://www.ui.ac.id/adaptasi-teknologi-kunci-kemajuan-diri-di-era-society-5-0/
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All articles published in YUSTIKA are licensed under a Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA) license. This means anyone is free to copy, transform, or redistribute articles for any lawful purpose in any medium, provided they give appropriate attribution to the original author(s) and YUSTIKA, link to the license, indicate if changes were made, and redistribute any derivative work under the same license.
Copyright on articles is retained by the respective author(s), without restrictions. A non-exclusive license is granted to YUSTIKA to publish the article and identify itself as its original publisher, along with the commercial right to include the article in a hardcopy issue for sale to libraries and individuals.
Although the conditions of the CC BY-SA license don't apply to authors (as the copyright holder of your article, you have no restrictions on your rights), by submitting to YUSTIKA, authors recognize the rights of readers, and must grant any third party the right to use their article to the extent provided by the license.