ANALYSIST OF CYBER ESPIONAGE IN INTERNATIONAL LAW AND INDONESIAN LAW

Main Article Content

Satria Unggul Wicaksana Prakasa
Noviandi Nur P.E.

Keywords

international law, Indonesia, Legal Regulation, Cyber espionage, Cyber Crime

Abstract

Purpose of Study: A conception of cyber espionage today is extremely vulnerable since the crime has evolved from conventional wiretapping into cyber-based spy activities. This issue becomes complicated when faced with the principle of sovereignty and how the challenge of countries around the world to respond in maintaining the honor, security, and peace of their own countries. The legal issues raised in this legal research are: (1) cyber espionage is one kind of cybercrime (2) Legal mechanisms to crack down on the international legal system and national law again Cyber espionage crime.


Methodology: Research methods used statute approach and conceptual approach.


Results: The result of this research showed that it could use computing devices and internet network by means of spies, destroying computer system in order to securely obtain state confidential data or by spreading internet virus which is sporadic to government-owned domains and corporation it is clear that cyber espionage id either part of the cybercrime.


Implications/Applications: The lack of legal regulation, both international and national which directly refers to cyber espionage because they alluded to illegal access and illegal interception related only.

Downloads

Download data is not yet available.
Abstract 64 | PDF Downloads 51 XML Downloads 0

References

Banks, W. C. (2017). Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage. Emory Journal, 66(3,3,4).
Clough, J. (2010). Principes of Cyber crime. volume 3 of 4. Cambridge University Press.
Ghros, S. and Turrini, E. (2010). Cyber crime: a multidisiplinary analysis. volume 9 of 10. Springer.
Gragido, W. and Pirg, J. (2011). Cyber crime and espionage; an analysis of subversive multivector threats. Elsevier Press,

6(7).
http://www.merdeka.com/peristiwa/the-australian-ungkap-alasan penyadapan-sby-dan-ani-yudhoyono.htm, (Accsess 16 April 2017).
http://www.theguardian.com/world/2013/jun/11/edward-snowden-nsa-whistleblower-profile, (Accsess 16 April 2017).
http://www.theguardian.com/world/2013/jun/11/edward-snowden-nsa-whistleblower-profile, (Accsess 16 April 2017).
Merkibayev, T., Seisenbayeva, Z., Bekkozhanova, G., Koblanova, A., and Alikhankyzy, G. (2018). Oppositions in the conceptual and linguistic category of time. Opción, 34(85-2):116–148.
Nazoktabar, H. and Tohidi, G. (2014). Shanty Town and Socio–Cultural Problems in Sari City, Iran. UCT Journal of Social Sciences and Humanities Research, 2(2):29–31.
Vlasova, V. K., Kirilova, G. I., and Curteva, O. V. (2016). Matrix Classification of Information Environment Algorithms Application in the Educational Process. International Electronic Journal of Mathematics Education, 11(1):165–171.
Wjiayanti, A. (2011). Strategi Penulisan Hukum Normatif. Lubuk Agung, 7(8):137–140.