1 PB
1 PB
Abstrak
Fenomena kejahatan siber merupakan ancaman keamanan yang semakin nyata bagi Indonesia. Kejahatan siber yang sangat meruyak
mengindikasikan bahwa perlunya pengefektifan dari implikasi regulasi dalam menangani cybercrime. Representasi dari tujuan penelitian yang
akan dieaborasi oleh peneliti yaitu bagaimana Pihak pemerintah mengefektifkan regulasi yang merujuk kepada problematika terkait dengan
menjaga sekuritisasi di bidang siber. Penulis menggunakan metode penelitian deskriptif kualitatif untuk menelaah signifikasi dari peraturan
perundang-undangan yang memiliki interkorelasi yang sangat tinggi terhadap dampak dari kejahatan siber yang ada di Indonesia. Fenomena
aksi teror baik yang dilakukan secara teritorial maupun yang bermaharajalela di dunia digital meningkat sangat pesat. Dampak dari kemudahan
akses atas seluruh data-data yang esensial dalam berbagai lini kehidupan mempunyai berbagai macam motif seperti penyebarluasan
propaganda untuk meynyebarluaskan jaringan kejahatan siber.Perlunya tingkat disrupsi yang tinggi untuk menanggulangi fenomena terorisme
siber untuk menciptakan kondisi keamanan Indonesia yang kondusif. Adanya kontribusi yang tinggi dan sinergitas dari berbagai lini
kenegaraan yaitu pemerintah serta masyarakat akan mempengaruhi keefektifan dari regulasi yang diterapkan di indonesia.
Kata Kunci: Pemerintahan, Penaggulangan, Kejahatan Siber, Indonesia
Abstract
Cybercrime poses a serious risk to national security in Indonesia. The pervasive nature of cybercrime calls into question the efficacy of current
regulatory measures. The study objective reflects how the government addresses sustaining securitization in cyberspace. This study employed
a descriptive qualitative method to analyze the impact of cybercrime in Indonesia and the regulations with an extremely high intercorrelation.
Terrorism, both on the ground and digitally, has been on the rise at an alarming rate in recent years. The influence of universal access to all
relevant information has several implications, including the propagation of misinformation and the growth of cybercrime networks. There must
be significant disruption to the cyberterrorism industry to foster safe circumstances in Indonesia. The success of Indonesia’s regulatory efforts
depends on the contribution and synergy between the government and the public.
Keywords: Governance, policy, cybercrime, Indonesia
Society’s reliance on the digital world entails several cybercrime. Close to 13,000,000 users’ private
actions in uploading personal data at a more macro level, information is stored on this network. In addition,
such as formulating regulations, and large-scale 40,000,000 users enrolled in 2021, specifically in August.
businesses are fundamentally crucial for the efficacy of This service has been the target of a string of four separate
regulations on cybercrime (Harkin & Whelan, 2019). cyber attacks. More than 2,500,000 users had their
Cybercrime, of course, is not only an issue of the unseen information compromised in a single year in 2018. Then,
world but a perfectly reasonable argument (Horgan et al., in 2020, there were two other cyber attacks of a similar
2020). The perpetrators of cybercrime have adopted the nature.
moral gradation that the regulations covering immoral The threat of cybercrime evolving into cyberterrorism
acts are only pseudo-regulations. Thus, the accumulation is a major issue nowadays (Abdullah, 2019). Terrorism in
of cybercrime cannot be terminated simply by updating cyberspace and terror in actions such as raising public
regulations; rather, they are more concerned with opinion riots become the forerunner of the outbreak of
affirming the follow-up of cybercrime (Millman et al., cyberterrorism in regional domains like the Unitary State
2017). of the Republic of Indonesia (NKRI), possessing cultural
Policymakers should not continue a conservative diversification and political interests. Information on
culture to eradicate cases if cybercrime has happened, official government sites and personal data are both
and this contradictory aspect of society that cannot be susceptible to hackers because of cybersecurity flaws
avoided from online activities should be taken into (Hovorushchenko et al., 2020). When the economic
account. Non-optimal execution of cybercrime rules foundation of a state is breached, it can have far-reaching
possesses macro-destructive effects in many different consequences (Williams et al., 2013).
areas, including state security, health, finance, education, The purpose of implementing articles 33 and 34 of
and even immoral activities (Hull et al., 2018). Explicit the 1945 Constitution is to ensure national security
narratives cannot halt the negative effects of cyber growth based on the security of territory, food and shelter, and
to continue altering regulations without keeping up with the economic system. People should be less likely to give
the advancement in the digital world and cyber loopholes in to provocation and join the offenders if they believe
(Moubayed et al., 2017). Policymakers, as change the economy is secure. Cybercrime is motivated by
catalysts, are at the forefront of efforts to eliminate all discontent with the effectiveness of official initiatives to
forms of crime, including those committed online. address problems of many types. When criminals have
A priori, cybercriminals view pseudo-regulation that easy access to mobilization for the growth of issues with
fails to quickly eradicate cybercrime as encouraging the the goal of destroying the unity of a nation, they are more
formation of more extensive crime patterns and the likely to commit acts of cybercrime that lead to a chain
involvement of an increasing number of parties, reaction of other criminal cases, such as cyberterrorism
including those from outside the traditional spheres of (Sakban et al., 2019).
politics and business, in pursuit of financial gain The increasing reliance of modern society on digital
(Romanosky et al., 2019). However, it is not solely the resources leaves all digital world activities open to
role of policymakers to raise public awareness of hacking by cybercriminals. Data thieves in cyberspace can
cybercrime; rather, it is a collaborative effort across quickly gain access to sensitive information by targeting a
communities to vet any news before it is disseminated, specific location (Sitorus & Tannady, 2021).
rather than allowing themselves to be lulled to sleep by Micro-destructive phases, such as disagreements between
the abundance of social media tools (Nicholson et al., several parties, can easily snowball into macro-destructive
2012). T-Mobile, a mobile service provider, has been the stages, threatening national security worldwide
victim of several hacks. This fact has lessened the (Santhoshi et al., 2019).
company’s sense of urgency when dealing with
JURNAL HUBUNGAN INTERNASIONAL
VOL. 11, NO. 2 (2023) 47
The various worldwide initiatives in cyberspace are 337: Accessing computers and/or electronic systems
inseparable from cyberterrorism (Whelan, 2021). As without rights, which causes disturbance or harm to
indicated in the analysis inquiry, cybersecurity must be the state and/or relations with international legal
bolstered by rigorous regulations in dealing with cases of subjects
cybercrime and cyberterrorism, which is critical for 338: Accessing computers and/or electronic systems
policymakers to consider when formulating effective
without the rights to obtain, modify, destroy, or
policies linked to cybercrime handling (Sharma et al.,
eliminate information belonging to the government
2016). Numerous studies in this field have demonstrated
which, due to its status, must be kept confidential
the critical necessity for cybersecurity-focused regulations
or protected
of the cybercrime industry.
A book titled “The Global Cybercrime Industry” 339: Accessing computers and/or electronic systems
discusses factors that might initiate terrorist attacks without rights, with the intention of gaining profit
(Kshetri, 2010). The state must carefully consider the or obtaining financial information from the Central
digital and physical aspects of national security. Bank, banking institutions or financial institutions,
Cyberterrorism is a real problem that might destabilize credit card issuers, or payment cards or containing
Indonesia. To ensure that the spread of excessive customer report data
propaganda does not shake the people of a country’s Cyber governance in Indonesia is not simply artificial
sense of national pride, the stability of the state depends regulation, as seen by the adoption of recent laws on
on the confidence that its citizens have in their cybercrime, such as (1) the Bali bombing incident on
government’s ability to enforce effective regulations October 12, 2002, which prompted the Indonesian
regarding the investigation and prosecution of criminal Government to issue Regulation of the Government of
offenses (Huey & Rosenberg, 2013). the Republic of Indonesia No. 1 of 2002 on the
Cybercrime is rising at 23% annually, as seen by the Eradication of Criminal Acts of Terrorism. International
graph of cumulative growth in cyberterrorism (Beech & cooperation with other countries in the field of
Bishop, 2017). The complexity of the digital world is intelligence, police, and further technical cooperation
heightened because IP addresses in Indonesia are related to acts of combating terrorism is carried out by
frequently the target of cyber attacks. Over 6,000 sites the Indonesian Government in preventing and
have been compromised in the cyber assault, slowing eradicating criminal acts of terrorism following the
down the real estate and business sectors (Horsman, provisions of the applicable regulations. (2) Human
2017). This occurrence also depicts that suitable and Rights and Law Enforcement Guidance for the
effective regulations should be enacted with strong Investigation and Prosecution of Terrorist Crime
synergy with the capacity to identify cybercrime by (Through Revision of Law No. 15 of 2003 concerning
intelligence agencies to monitor cybercrime that will Eradication of Criminal Acts of Terrorism).
spread to produce cyberterrorism (Rabadão, 2013). There is no incompatibility between the execution of
The Regulations of the Criminal Code Bill detail the intelligence missions and the prosecution of the
execution of preventative measures against cyberterrorism. terrorist-related crime in Indonesia, both of which have
The proposed Criminal Code Amendments for 2019 been the subject of recent regulatory efforts. Maintaining
contain many enumerated lists of essential requirements continuity between the regulations and the parties
for criminal acts directly connected to cyberterrorism. responsible for enforcing them creates good synergy with
336: Accessing computers and/or electronic systems in each revision to the regulations. It is illustrated by the
any way without rights, with the intention of circumstances surrounding the Bali Bombing I and the
obtaining, changing, destroying, or eliminating Bali Bombing II at the Australian Embassy and Hotel JW
information on computers and/or electronic systems Marriott inextricably interrelated.
48
(Setiawan, 2020). This study further investigates the being a Muslim or a pious Muslim woman to hide one’s
restrictive definition of national security in the context of true intentions (BBC, 2018). On the other side, the
cybersecurity. attack on the church in Surabaya, East Java, classified as
Cybersecurity, or digital security, integrates offline offline terrorism, has been widely condemned by the
and online social interactions resulting from Indonesian people. Those responsible for terrorist acts
technological progress. Any system incorporating often disguise themselves as mothers and children to
long-distance communication potentially threatens a blend in with the populace. A suicide bomber exploded
country’s national security (Villacampa et al., 2022). The in the churchyard, wounding 40 people. It accomplished
extent of security, which includes the private sector, the the propaganda goal. As the characteristics of the bomb
government, and public infrastructure, is a cause for preparation suggest, the case’s assumption has become a
worry that necessitates a deeper level of protection in the heated debate in proving the presence of organized
digital realm. In situations calling for the utmost secrecy, collaboration by ISIS as a terrorist pioneer (Wahyudi,
a password or other sort of security system that 2018).
cybercriminals are unable to crack can be an effective People increasingly rely on messaging services to
means of preventing the release of sensitive corporate maintain relationships and efficiently complete tasks
information. (Kuk & Ranđelović, 2017). However, despite the
John P. Lovell first proposed the idea of a security numerous legitimate uses for messaging apps, some
strategy as a means for a nation to achieve its objectives exploit the heightened sophistication these media
through the application of its preexisting power, be it soft provide to commit fraud or other forms of cybercrime.
power (diplomacy within the purview of this study, such Telegram, as a medium for cybercrime, is an example of
as cyber diplomacy) or hard power (military power clandestine or covert motivation for cybercriminals, such
employing a war strategy). When designing a security as disseminating rumors and recruiting members of
plan to win the cyber war, it is crucial to remember that cyberterrorist groups (Fiorenza, 2007). Cyberterrorists
new technologies can have beneficial and harmful effects are increasingly targeting popular messaging platforms
on people’s daily lives, regardless of where they are like Facebook and Twitter, in addition to more
developed (Dlamini & Mbambo, 2019). Cyber threats traditional targets like communication networks like
have become a new issue requiring a more robust Telegram. Telegram, a digital chat software developed by
cybersecurity response with a traditional focus on the Russian Government, is a platform that can be
territorial concerns. geared toward cyberterrorism recruiters. It is a messaging
This study’s focus is on defending against cybercrime, service with a “People Nearby” function to let people
which can take many forms, including the theft of crucial connect with those in their immediate area. Hence,
internal data, the creation of false identities, and the use cyberterrorist recruiters can easily monitor and hack into
of these methods by criminals posing not only as seemingly unrelated crime targets (Bloom, 2018).
terrorists but also as members of the public, government
officials, and academics (Cherry, 2005). To assess RESEARCH METHOD
Indonesia’s national security regulatory system, the A strategy to account for the variation in complicated
government’s primary aim is to develop a strategic regulatory governance should be implemented to
understanding of the constellations or circumstances eradicate the unfavorable perception of cyberterrorism in
that lead to state security (Ramadhan, 2020). Indonesia. This research employed a descriptive
Ali Imron, a da’wah activist, responded to the current qualitative method to examine this idea (Hull et al.,
restrictions in Indonesia regarding the Bali bombing 2018). This method creates a systematic, factual, and
case, reminding the people to be vigilant against and accurate account of events about the facts, nature, and
prevent acts of extremism, such as using the cover of links between the phenomena researched. Hence, it was
50
applied to explain the issues arising in this research. This high, and a closed, semi-covert intelligence performance
method could provide a full picture of how Indonesia’s system suggests the environment is not optimal (Saputra,
cybercrime and cyberterrorism regulations have been put 2016). Existing issue solutions for dealing with terrorism
into practice. have been significantly impacted by internal rivalries
The method involved several steps, from gathering among intelligence agencies (Pradnyana & Rofii, 2020).
data to drawing conclusions. It is anticipated that this Therefore, handling this competition phenomenon is
method would be both involved and modified to necessary. It is best performed through political guidance
contemporary concerns. Qualitative studies dispel the from the highest stakeholders in the national leadership
belief that researchers must bend the truth to fit their system to bridge this rivalry.
preconceptions (Romanosky et al., 2019). This study Intelligence personnel in Indonesia, particularly at
took a descriptive method with a qualitative approach to the Police Intelligence Agency, the State Intelligence
better understand and address the research problem. Agency (BIN), and the Strategic Intelligence Agency
This study aims to identify the barriers to cybercrime (BAIS), have been working hard, coordinating the
investigation in Indonesia. Literature was employed as a necessary action to destroy current terrorism. The
source of information to provide factual information and consequences of counterterrorism-based national
a framework for organizing the research method. Books security are diminished when people fail to cooperate
also provided information about cybercrime by studying and demonstrate unity. According to the idea of global
actual cases and applying cyber law to actual intelligence, known as intelligence sharing, “knowledge
cybercriminals. This study discussed issues directly linked is power”, making it difficult to exchange and integrate
to the cybercrime epidemic. with other intelligence organizations (Mishra et al.,
In Southeast Asian countries, the paradigm of 2021). Since computer criminals can be counted on to
counterterrorism has emerged, consisting of intense carry out acts of terror, ranging from cyber riots to serious
collaboration based on monitoring principles. The terror that can damage many parties, efforts to combat
variety of research into the efficacy of this sequence of cyberterrorism and cybercrime are urgently required
close coordination aims to systematically execute (Kshetri, 2010).
intelligence integration. Integrating intelligence efforts, Training terrorists to develop their abilities to fool
also known as intelligence sharing, is the most effective tracks is the first step in the sequence of events leading to
means of combating the digital terror that threatens the successful completion of terrorist actions.
national security and prevents it from happening again in Intelligence agencies can track the acquisition and
the future (Nicholson et al., 2012). State intelligence is a distribution of weapons, the maintenance of ongoing
broad discipline with several subfields, but they can be cyberterrorism and cybercrime actions, and the
broken down into two main types: inter-state and recruiting and final execution of members of these
intra-state intelligence ( Harkin & Whelan, 2019). To groups in cyberspace. The spread of cyberterrorism can
elaborate, intra-state intelligence performance means be tracked only with the help of appropriate regulations.
that different intelligence agencies inside a country work However, there has not yet been an all-encompassing
together to increase the quality of intelligence gathered, discussion of the study into the efficacy of these
as seen in intelligence performance in Indonesia. restrictions, particularly those intimately tied to the
There is an internal debate over whether or not functioning system of social media and websites, which
collaboration is more important than individual effort are the media for digital terror actions. The Ministry of
when it comes to eliminating cybercrime and Communication and Informatics took effective measures
cyberterrorism. In Indonesia, the intelligence community to monitor and shut down social media accounts
is highly competitive and has experienced internal associated with disseminating terrorist actions. However,
controversy in the form of a trust deficit. Competition is the intelligence agencies that handle this situation do not
JURNAL HUBUNGAN INTERNASIONAL
VOL. 11, NO. 2 (2023) 51
play a crucial role (Aliprandi et al., 2022). The stability of Pseudo-conflict based on unity-shattering religious
essential public infrastructures is jeopardized when dogmatism is a common tactic employed by terrorists
intelligence agencies take too long to respond to acts of operating in disguised community settings. Based on
cyberterrorism and cybercrime. Critical infrastructures people’s distrust of government power, this
such as electrical grids, financial networks, and phone religious-values-based facade is erected to foster national
lines are at risk from cyberterrorist attacks. When solidarity (Sitorus & Tannady, 2021). Regulations to
enforcing effective and well-thought-out regulations, this monitor the spread of cyberterrorism, particularly on
phenomenon needs collaboration from the nation’s social media and websites that support the commission
leadership. of terrorist activities, have not been extensively explored
Cybersecurity and defense are produced due to the concerning regional security (Damayanti, 2021). The
union of humans and technology surrounding Ministry of Communication and Informatics has
cyberspace. As a result, cybersecurity and cyber monitored how the social media account deals with
self-defense are covered by many associated terminology terror-related content to shut it down. Critical public
and interpretations, both of which have beneficial and infrastructure, including power plants, banks, and
harmful effects on daily life in society and the state. It has telecommunications networks, are at risk due to the
elevated cybersecurity and self-defense from a purely intelligence agency’s sluggish response to cyberterrorism
technological concern to one that threatens national incidents. It is essential for all parties involved in
stability. Accordingly, cybersecurity is now considered an implementing regulations to work together when dealing
element of state security policy. Instead of resorting to with incidents of digital crime (Wahyudi, 2018).
using military forces (use of force) as a kind of hard As a result of the coming together of people and
diplomacy, issues can be settled by the effective technology, new cybersecurity and self-defense domains
implication of regulations as a type of soft diplomacy. have emerged. Consequently, the ideas of cybersecurity
and self-defense are surrounded by a plethora of jargon and
RESULT AND ANALYSIS interpretations (Pradnyana & Rofii, 2020). It explains why
The Indonesian Constitution has discussed the cybersecurity and self-defense threaten national security,
government’s responsibility to protect its citizens from the not solely technological security. Hence, cybersecurity
growing danger of cyberterrorism and cybercrime. Law strategies must shift away from using the military (hard
No. 5 of 2018 concerning the Eradication of Criminal diplomacy) in favor of non-coercive approaches, such as
Acts of Terrorism, is only one of several regulations implementing legislation connected to digital crime in the
regarding criminal acts of terrorism to protect Indonesia’s form of soft diplomacy regulations. Cybersecurity policies
sovereignty. The Indonesian Army (TNI) plays a crucial are implemented online to protect against many forms of
role in covering cyberterrorism threats and completing cybercrime, such as financial fraud, identity theft, and even
the cyberterrorism track record with its various operation military and terrorist strikes (Saputra, 2016). According to
modes. Of course, it synergizes with state intelligence the Copenhagen securitization approach, cybercrime that
because Indonesia is an extremely large country located at spreads to other countries is a security concern because it
a crossroads between countries from a geopolitical and threatens any community or organization that shares its
security standpoint. Therefore, the state’s policies and values, way of life, or philosophy. With the new nuclear
responsibilities in combating cyberterrorism in Indonesia threat paradigm, radioactive materials are now considered
are enshrined in Law No. 5 of 2018 concerning the a component of cyberterrorism (Sakban et al., 2019).
Eradication of Criminal Acts of Terrorism. However, as seen in the recent past with Covid-19, there is
To achieve digital world security in Indonesia, all a need for more coordinated oversight regarding managing
socioeconomic strata and state and non-state entities terror cases becoming the basis for assaults in biology (Ma
require state patronage or full sovereignty from the state. & McKinnon, 2021).
52
Cybercrime, such as disseminating false news, is The modus operandi of evil schemes is reflected in
one-way cyberterrorists’ new methods to make themselves the prevalence of cybercrime and the comprehensiveness
known, as they can distort the public’s understanding of of cyber detection technologies highly effective in
events. Naturally, it will cause friction among society at assaulting all victim data. Since this massive cyber attack
large, which in turn will make it simpler for terrorist strikes can wipe out essential state records, it is highly connected
to deflect attention away from securing the country as a with dangers to a nation’s politics, ideology, and religion.
whole. The Digital Indonesia website revealed that in 2021, Cyberterrorists will utilize vulnerable social media
there were 2,026,000,000 active internet users in Indonesia, accounts to collect sensitive information. An example is
with a further 3,453,000,000 utilizing mobile connections the steady trickle of cybercriminal traps that have caught
and 170,000,000 using social media (Data Reportal, 2021). something, like stolen money. By using the money they
The following graph illustrates the relatively high have stolen to finance further criminal activity online,
vulnerability of the digital world concerning cybercrime. cybercriminals can spread their terror network and close
These numbers quantify the ineffectiveness of more the circle of their cybercrime chain. The government
overarching regulations. Increasingly sophisticated faces a problem adapting the efficacy of regulations and
hacking techniques undermine the efficacy of virtual extending rhythmic patterns in integration to protect the
anti-terror regulations and can even increase future national ecology from the growing threat posed by
counterproductive or dangerous physical terror. The cybercrime (Data Reportal, 2021). This section provides
country’s authoritarian government has a complete say in detailed statistics on the safety of the online environment
improving cybersecurity to the point where it does not in 2020, measured by the number of instances of crime.
facilitate activities like data mining, terrorism-related From January 1, 2020, to April 12, 2020, the National
communication, or the dissemination of propaganda. Cyber and Crypto Agency (BSSN) of Indonesia gathered
Consistently expanding cybercriminals orchestrating the 25,224,811 incidents of cybercrime (BSSN, 2020). An
recruitment of cyberterrorists are cataloged in the uptick in reported cybercrime incidents was seen in
following manner (Kementerian Komunikasi dan February, with 29,188,645 cases recorded. There were
Informatika, 2021). 26,423,989 ongoing cybercrime cases as of the end of
JURNAL HUBUNGAN INTERNASIONAL
VOL. 11, NO. 2 (2023) 53
March. Moreover, 56% of the stated cyber attacks were Ministry of Communication and Informatics
related to trojan activity, 43% included collecting (Kemenkominfo), the Ministry of Law and Human
personal information, and 1% were web application Rights (Kemenkumham), and the Ministry of Defence.
attacks. The prevalence of security organizations in Indonesia is
BSSN was created under the Presidential Regulation insufficient for determining the true extent of
No. 53 of 2017 to ensure that agencies with front-line cybercrime. When it comes to preventing the spread of
access in the field of state security from cybercrime can terrorist activities in Indonesia, the best results could be
carry out their responsibility of bolstering online safety in achieved not only at the highest level of government but
the age of the digital economy, ensure the safety of the also through the concerted efforts of the lower level of
public, and hold offenders accountable for their actions. government. To maximize the strengthening of power,
On December 1, 2020, policymakers in Indonesia, positions, and functions in the leadership positions of
including the Coordinating Ministry for Politics, Law, the BNPT in 2020, BNPT took an active role in
and Security, held the third sub-regional meeting on managing illegal activities. One can characterize the
Counter-Terrorism and Transnational Security (SRM on overall proportion of cybercrime by the following.
CTTS) in Jakarta. It became the precursor of the IDR 304,700,000,000 were required in 2021 to fund
awareness discourse initiative on eradicating digital and efforts to combat cyberterrorism and cybercrime. The
physical terrorism. Several integrations from different BNPT’s funding in 2021 was IDR 515,900,000,000, as
lines in Indonesia have contributed to the BSSN as part the agency’s head planned. Since every aspect of life
of cooperation integration. depends on the internet, measures must be taken to
The main facilitator assigned to BSSN also covers lessen cybercrime. Here, Indonesia has to implement
other cybersecurity such as the Indonesian National several long-term strategies to reduce cyberterrorism. In
Police (POLRI), the National Counterterrorism Agency addition, there has been little progress in enforcing
(BNPT), the Financial Transaction Reports and Analysis Indonesia’s cybersecurity regulations. The headquarters
Center (PPATK), the State Intelligence Agency (BIN), the of BSSN’s mission is to counteract cybercrime and other
Ministry of Foreign Affairs (Kemlu), Coordinating Ministry online dangers. Cyberterrorism has not been adequately
for Politics, Law and Security (Kemenkopolhukam), the addressed by the regulations of Law No. 15 of 2003 on
54
the Eradication of Criminal Acts of Terrorism and Law Indonesia’s cybercrime legislative framework and
No. 11 of 2008 on Information and Electronic policy administration have been in dire need of updating.
Transactions (ITE) (JDIH, 2013). Once a national security theoretical framework is in
place, the government’s policy patronage and regulatory
CONCLUSION power over cybercrime are no longer the sole duty of the
state. Existing policy rhetoric should cover the full range
This study utilized the preceding percentages to
of human experience, from the most micro, in the form
provide a comprehensive illustration of cybercrime.
of individuals, to the most macro, in the form of the
Personal damage-related cybercrime accounted for 9%,
Unitary State of the Republic of Indonesia (NKRI), in
identity theft-related cybercrime accounted for 5%, and
terms of the psychological, economic, and national
privacy or data protection-related cybercrime accounted
security implications of cybercrime.
for 2%. Fraud and identity theft accounted for 24% of all
While the Indonesian Government has enacted
cybercrime, while finance terrorism accounted for 5%.
several regulations as part of its security plan, additional
The fact that spamming-related cybercrime accounted for
measures, such as practicing safe and responsible internet
solely 2% of all cybercrime illustrates a diversity across
use, are also necessary. Furthermore, not all segments of
different cybercrime, all of which should see a decline in
Indonesian society have been educated on the
caseloads in Indonesia. Predictions about the most
significance of cybersecurity awareness, making it
effective solutions from various sources, such as Nazli
imperative to engage in socialization efforts to expand
Choucri’s “Cyber Politics in International Relations,”
knowledge of what constitutes cybercrime. Cybercrime is
revealed that different chronological sequences of
a type of national insecurity in cyberspace. Cybercrime in
cyberterrorism demonstrate that the defense carried out
Indonesia can alter a security system and even erase data
by the government as a policymaker could maximize the
from crucial organizations. Using these examples, the
viewpoint of the protagonist (policymaker) viewing
Indonesian Government and public can refine their
security from an ontological perspective. Perspectives on
understanding of cybercrime and how it should be dealt
cyberterrorism can offer a way forward regarding
with. In addition, the worldwide pandemic has not yet
technology development beneficial to safeguard against
created favorable conditions to be separated from the
computer crime.
JURNAL HUBUNGAN INTERNASIONAL
VOL. 11, NO. 2 (2023) 55
digital world, making all aspects of everyday life from BSSN: https://bssn.go.id/?s=terorisme+siber+2020
Castillo, I., Munoz, J., Lopez, J. I., Rodriguez, L., Romero, L. D.,
dependent on the internet. Gonzalez, M., & Ponce, J. C. (2022). Helping Students
The government can assist politicized activities in Detecting Cyberbullying Vocabulary in Internet with Web
promoting state security in cyberspace using e-governance Mining Techniques. 21–27. https://doi.org/10.1109/CONTIE4
9246.2019.00014
to connect with the public and the media. The beneficial Cherry, S. (2005). Terror goes online [cyberterrorism]. IEEE Spectrum,
and harmful effects of the global community’s reliance 42(1), 72-73.
on the digital realm are like two sides of a knife. The Damayanti, D. (2021). Implementation of the cyber terrorism
prevention, and rehabilitation policy in Polda Metro Jaya
government’s first line of defense against cybercrime Police in Central Jakarta. In IBIMA Business Review (Vol.
must be to initiate the concept of integrated and 2021). IBIMA Publishing. https://doi.org/10.5171/2021.6954
24
cooperative information sharing. By increasing the
Data Reportal. (2021). Digital in Indonesia: All the Statistics You
number of cyber police able to keep a constant vigil over Need in 2021 — Data Reportal – Global Digital Insights.
digital data, hackers can be located and dealt with in https://datareportal.com/reports/digital-2021-indonesia
Dlamini, S., & Mbambo, C. (2019). Understanding policing of
real-time. This problem remains a focus for the cybercrime in South Africa: The phenomena, challenges and
government to tighten security. Still, it can also be a effective responses. Cogent Social Sciences, 5(1).
weakness for cybercriminals, leading to the consolidation https://doi.org/10.1080/23311886.2019.1675404
Fiorenza, N. (2007). NATO considers response to cyber warfare
of power networks and the emergence of even more following attacks on Estonia. Jane’s International Defence
brazen cybercrime colonies. Review, June.
Galis, V., & Summerton, J. (2018). We are all foreigners in an
analogue world: cyber-material alliances in contesting
REFERENCE immigration control in Stockholm’s metro system. Social
Abdullah, F. M. (2019). Using big data analytics to predict and Movement Studies, 17(3), 299–317. https://doi.org/10.1080/
reduce cyber crimes. International Journal of Mechanical 14742837.2017.1383892
Engineering and Technology, 10(1), 1540–1546. h Harkin, D., & Whelan, C. (2019). Exploring the implications of ‘low
Ahmad, R., Yunos, Z., & Sahib, S. (2012). Understanding cyber visibility’ specialist cyber-crime units. Australian and New
terrorism: The grounded theory method applied (pp. Zealand Journal of Criminology, 52(4), 578–594. https://doi.
323–328). https://doi.org/10.1109/CyberSec.2012.6246081 org/10.1177/0004865819853321
Al Moubayed, N., Wall, D., & McGough, A. S. (2017, July). Horgan, S., Collier, B., Jones, R., & Shepherd, L. (2020).
Identifying changes in the cybersecurity threat landscape Re-territorialising the policing of cybercrime in the
using the LDA-web topic modelling data search engine. In post-COVID-19 era: towards a new vision of local democratic
International Conference on Human Aspects of Information cyber policing. Journal of Criminal Psychology, 11(3),
Security, Privacy, and Trust (pp. 287-295). Springer, Cham. 222–239. https://doi.org/10.1108/JCP-08-2020-0034
Aliprandi, C., Lotti, L., Neri, F., & Sanna, G. (2022). Online Police Horsman, G. (2017). Can we continue to effectively police digital
Station, a cutting edge service against cybercrime. 40, crime? Science and Justice, 57(6), 448–454.
237–247. https://doi.org/10.2495/DATA080231 https://doi.org/10.1016/j.scijus.2017.06.001
Arifah, D. A. (2011). Kasus cybercrime di indonesia. Jurnal Bisnis dan Hovorushchenko, T., Herts, A., & Pavlova, O. (2020). Method of
Ekonomi, 18(2). Forming a Logical Conclusion about Legal Responsibility in
Antunes, M., & Rabadão, C. (2019). Cybersecurity and Digital the Cybersecurity Domain. In ICTERI Workshops (pp. 128-135)
Forensics – Course Development in a Higher Education Huey, L., & Rosenberg, R. S. (2013). Reporting and Clearance of
Institution (Vol. 942, pp. 338–348). https://doi.org/10.1007/ Cyberbullying Incidents: Applying “Offline” Theories to Online
978-3-030-17065-3_34 Victims. Canadian Journal of Criminology and Criminal Justice
BBC. (2018). Serangan bom di tiga gereja Surabaya: Pelaku bom , 46(5), 597–606. https://doi.org/10.3138/cjccj.46.5.597
bunuh diri “perempuan yang membawa dua anak” - BBC Hull, M., Eze, T., & Speakman, L. (2018, October). Policing the cyber
News Indonesia. Retrieved December 13, 2022, from BBC: threat: Exploring the threat from cyber crime and the ability
https://www.bbc.com/indonesia/indonesia-44097913 of local law enforcement to respond. In 2018 European
Beech, M., & Bishop, J. (2017). Cyber-stalking or just plain talking?: Intelligence and Security Informatics Conference (EISIC) (pp.
Investigating the linguistic properties of rape-threat messages 15-22). IEEE. https://doi.org/10.1109/EISIC.2018.00011
as compulsive behaviours. In Violence and Society: JDIH. (2013). UU No. 15 Tahun 2003 tentang Penetapan Peraturan
Breakthroughs in Research and Practice (pp. 193–220). Pemerintah Pengganti Undang-Undang Nomor 1 Tahun
https://doi.org/10.4018/978-1-5225-0988-2.ch012 2002 Tentang Pemberantasan Tindak Pidana Terorisme,
Bloom, M., & Daymon, C. (2018). Assessing the Future Threat: ISIS’s Menjadi Undang-Undang. Retrieved December 13, 2022,
Virtual Caliphate. Orbis, 62(3), 372–388. https://doi.org/10. from BPK RI: https://peraturan.bpk.go.id/Home/Details/43015
1016/j.orbis.2018.05.007 /uu-no-15-tahun-2003
BSSN. (2020). Statistik Terorisme Siber. Retriever December 11, 2022 Kementerian Komunikasi dan Informatika. (2021). Statistik Teknologi
56
Digital Asia. Retrieved December 13, 2022, from Kominfo: Analysis Through WebCrawler Cyberforensics. In Soft
https://www.kominfo.go.id/content/detail/10259/hati-teroris- Computing and Signal Processing (pp. 187-199). Springer,
diteguhkan-melalui-telegram-ungkap-kominfo/0/sorotan_ Singapore.
media Saputra, R. W. (2016). A survey of cyber crime in Indonesia. 2016
Kshetri, N. (2010). The global cybercrime industry: economic, International Conference on ICT for Smart Society, ICISS 2016
institutional and strategic perspectives. Springer Science & , July, 1–5. https://doi.org/10.1109/ICTSS.2016.7792846
Business Media. Setiawan, D. A. (2020). Cyber Terrorism and its Prevention in
Kuk, K., & Ranđelović, D. (2017). Knowledge discovery in Indonesia. Jurnal Media Hukum, 27(2), 267–283. https://doi.
cyberspace: Statistical analysis and predictive modeling (pp. org/10.18196/jmh.20200156
1-206). Sharma, P., Doshi, D., & Prajapati, M. M. (2016). Cybercrime:
Leukfeldt, E. R., Notté, R. J., & Malsch, M. (2019). Exploring the Internal security threat. In 2016 international conference on
Needs of Victims of Cyber-dependent and Cyber-enabled ICT in business industry & government (ICTBIG) (pp. 1-4).
Crimes. Victims and Offenders, 15(1), 60–77. IEEE.
https://doi.org/10.1080/15564886.2019.1672229 Sitorus, T., & Tannady, H. (2021). Synergy, System IT. Risk
Ma, K. W. F., & McKinnon, T. (2021). COVID-19 and cyber fraud: Management and The Influence on Cyber Terrorism and Hoax
emerging threats during the pandemic. Journal of Financial News Action. Journal of Theoretical and Applied Information
Crime. https://doi.org/10.1108/JFC-01-2021-0016 Technology, 99(8), 1802-1814.
Martins, I., Resende, J. S., Sousa, P. R., Silva, S., Antunes, L., & Svecova, H., & Blazek, P. (2021). The Impact of Cybersecurity on the
Gama, J. (2019). The Global Cybercrime Industry: Economic, Rescue System of Regional Governments in SmartCities: Vol.
Institutional) and Strategic Nir Kshetri. Future Generation 1371 CCIS (pp. 365–375). https://doi.org/10.1007/978-981-
Computer Systems, 133, 95–113. https://doi.org/10.1016/j. 16-1685-3_30
future.2022.03.001 Villacampa, C., Torres, C., & Miranda, X. (2022). Institutional
Millman, C. M., Winder, B., & Grifths, M. D. (2017). UK-based police Response to Trafficking in Human Beings in Spain: Are All
officers’ perceptions of, and role in investigating, Victims Equally Protected? European Journal on Criminal
cyber-harassment as a crime. International Journal of Policy and Research, 0123456789. https://doi.org/10.1007/
Technoethics, 8(1), 87–102. https://doi.org/10.4018/IJT.2017 s10610-022-09506-w
010107 Wahyudi, S. T. (2018). Hubbul Waton Minal Iman as Reinforcement
Mishra, S., Alowaidi, M. A., & Sharma, S. K. (2021). Impact of Theorem of State Defense in the Context of Terrorism
security standards and policies on the credibility of Prevention in Indonesia. SHS Web of Conferences, 54,
e-government. Journal of Ambient Intelligence and 08019. https://doi.org/10.1051/shsconf/20185408019
Humanized Computing, 2019 (Naidoo 2020). https://doi.org/ Williams, M. L., Edwards, A., Housley, W., Burnap, P., Rana, O., Avis,
10.1007/s12652-020-02767-5 N., & Sloan, L. (2013). Policing cyber-neighbourhoods:
Moise, A. C. (2014). Some considerations on the phenomenon of tension monitoring and social media networks. Policing and
cybercrime. Journal of Advanced Research in Law and society, 23(4), 461-481.
Economics, 5(1), 38–43. https://doi.org/10.14505/jarle.v5.1
(9).04
Nicholson, A., Watson, T., Norris, P., Duffy, A., & Isbell, R. (2012,
July). A taxonomy of technical attribution techniques for
cyber attacks. In European conference on information
warfare and security (p. 188). Academic Conferences
International Limited.
Pradnyana, I. P., & Rofii, M. S. (2020). Cyberterrorism Threats in
Indonesia and State Responses. Literatus Journal, 2(2),
181-192.
Ramadhan, I. (2020). Cyber-Terrorism in the Context of Proselytizing,
Coordination, Security, and Mobility. International Relations
Department of Universitas Pertamina, Islamic World and
Politics, 4(2).
Romanosky, S., Ablon, L., Kuehn, A., & Jones, T. (2019). Content
analysis of cyber insurance policies: How do carriers price
cyber risk? Journal of Cybersecurity, 5(1). https://doi.org/10.
1093/cybsec/tyz002
Sakban, A., Sahrul, Kasmawati, A., & Tahir, H. (2019). Police
preventative against cyber-bullying crimes in indonesia.
International Journal of Scientific and Technology Research, 8
(12), 1532–1534.
Santhoshi, N., Chandra Sekharaiah, K., Madan Mohan, K., Ravi
Kumar, S., & Malathi, B. (2019). Cyber Intelligence
Alternatives to Offset Online Sedition by in-Website Image