The Criminal Policy against Cyber Terrorism Crimes

Wakit Maulana, Andri Winjaya Laksana

Abstract


The aim of this research is to determine and analyze the relevance of the criminal policies of the ITE Law and the Terrorism Law on cyber terrorism offenses.The approach method used in this writing is normative juridical. This writing specification is analytical descriptive. Another aspect that needs to be paid attention to is the tendency of experts to consider cyber terrorism as an ordinary cyber crime. This kind of assumption not only traps us into simplifying the problem but also results in the quality of our anticipatory response being slow and not seeming serious. In fact, if we look closely, the use of internet networks is positively correlated with the transformation of terror networks whose membership was initially limited to certain areas, becoming mass and global in scale. The qualifications for offenses regulated in the ITE Law are regulated in Article 52 which qualify as crimes. The articles in Chapter breaking into, breaking into other people's Computer Systems or Electronic Systems illegally. (Related to the crime of Cyberterrorism in the form of unauthorized access to computer systems and services).

Keywords


Criminal; Crime; Cyber; Policy; Terrorism.

Full Text:

PDF

References


Abdul Agis. The Role of the Police in Investigating Misuse of Information and Electronic Transactions (ITE). Makassar: Indonesian Muslim University, Vol 1 No 2. (2017)

Alfendo Yefta Argastya, and Supanto. Application of Criminal Law in Police Investigations to Overcome Cyberterrorism Crimes. Recidivate. Volume 11 Issue 1, (2022)

Andrew Michael Colarik, 2006, Cyber Terrorism:Political and Economic Implications, USA, Idea Group Publishing

B. Widiyanto, The Impact of the ISIS Cyber Calipathe Virtual Attack on the United States. International & Diplomacy Journal: Paramadina University Jakarta, Vol.2 No.2. (2017)

James A. Lewis, 2002, Assessing the Risk of Cyber Terrorism, Cyber War and Other Cyber Threats, Center for Strategic and International Studies, Washington DC: Center for Strategic & International Studies

Kristin Finklea & Catherine A Theohary, January 2015, Cybercrime: Conceptual Issues for Congress and US Law Enforcement. Congressional Research Service Reports, Washington DC

Nur Khalimatus. Modus Operandi of Cracker Crimes According to the Information and Electronic Transactions Law. Perspective Journal, Surabaya: Wijaya Kusuma University, Volume XVII No. 2. (2012)

Rendy Adiwilaga & Agus Kurniawan, Regional Government Strategy Regarding Preventing Religious Radicalism in Bandung Regency, JISIPOL Journal of Government Science, Bale University Bandung, Volume 5, Number 1, (2021)

Rony Hanitijo Soemitro. 1990, Legal Research Methodology and Jurimetry, Ghalia Indonesia, Jakarta

Subkhan and Widayati. Politics of Law Handling of Criminal Acts of Terrorism (Case Study in the District of Kudus). Journal of Legal Sovereignty, Volume 1 Issue 4 (2018)

Susan W. Brenner, At Light Speed : Attribution and Response to Cybercrime/Terrorism/Warfare. Northwestern University Winter, Vol. 97 No. 2, (2007)

Vida M. Vilić, 2017, Cyber Terrorism on the Internet and Social Networking: a Threat to Global Security, Sinteza

Wenda Hartarto. Analysis of Crime Prevention of Terrorist Financing in the Asean Economic Community Era. Indonesian Legislation Journal. Vol. 13 No. 04. (2016)




DOI: http://dx.doi.org/10.30659/rlj.2.3.%25p

Refbacks

  • There are currently no refbacks.


Ratio Legis Journal has been indexed in: