Penanggulangan Tindak Pidana Cyber Terrorism dalam Perspektif Kepastian Hukum
Abstract
One example of the Cyber terrorism case committed by Bahrumsyah and M. Bahrun Naim, who is known to have transferred funds to make car bombs to ISIS support groups in Solo. So based on the crimes committed by Bahrun in getting money from the ISIS group in Syria, while the money sent to his network in Indonesia was carded. The main problem of this research is law enforcement in the prevention of cyber terrorism according to Indonesian positive law, and the legal provisions for tackling cyber terrorism from the perspective of legal certainty. This research is included in the normative juridical research typology with secondary data types, so as to produce research in the form of prescriptive analytical through literature studies. The results of this study reveal that there is no law enforcement in the prevention of cyber terrorism. Theoretically, the perpetrators of cyber terrorism cannot be held accountable because criminal liability takes into account the elements against the law in the formulation of offenses and is related to the principle of legality and elements of guilt. The lack of certainty in tackling cyber terrorism is due to the higher frequency of technology use with a developing system, with the existing convergance of media. It is hoped that it can provide legal certainty that comprehensively regulates the movement and use as well as irregularities in cyber crime that uses computers as the main tool and benefits of the developing technological media
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License .
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).