Techno-Prevention in Counterterrorism: Between Countering Crime and Human Rights Protection

Authors

  • Ali Masyhar Faculty of Law, Universitas Negeri Semarang, Semarang, Indonesia https://orcid.org/0000-0002-2317-7517
  • Silaas Oghenemaro Emovwodo Faculty of Art and Social Science, Universiti Brunei Darussalam, Brunei Darussalam

DOI:

https://doi.org/10.53955/jhcls.v3i3.176

Abstract

Terrorism has become a significant concern throughout the world. This concern is supported by the increasing use of the internet, which has triggered an increase in cyberattacks. This research aims to determine the role of governance in counter-cyber terrorism. The normative legal methodology utilized in this study results from an exhaustive literature evaluation. This research shows that the government's role is needed to counter cyber terrorism. Although the Indonesian government has initiated a national cybersecurity strategy and implemented short-term and long-term programs, some obstacles and challenges hinder its implementation. The ITE Law has encouraged Indonesia to establish policies and regulations regarding information security. There have yet to be any regulations regarding cyber-attacks to counter cyber terrorism. Various institutions with common interests in national defense and security, including the cyber domain, must collaborate with BSSN. Other government agencies that depend on each other include the TNI, Polri, Ministry of Defense, BIN, and Ministry of Communication and Information. Apart from that, governance is also needed, including international organizations, several non-governmental organizations (NGOs), government and private governance, and several other components. 

References

Aghajani, Gholamreza, and Noradin Ghadimi, ‘Multi-Objective Energy Management in a Micro-Grid,’ Energy Reports, 4 (2018), 218–25 https://doi.org/10.1016/j.egyr.2017.10.002

Ahmetoglu, Huseyin, and Resul Das, ‘A Comprehensive Review on Detection of Cyber-Attacks: Data Sets, Methods, Challenges, and Future Research Directions,’ Internet of Things, 20 (2022), 100615 https://doi.org/10.1016/j.iot.2022.100615

Akanni, J.O., ‘A Non-Linear Optimal Control Model for Illicit Drug Use and Terrorism Dynamics in Developing Countries with Time-Dependent Control Variables,’ Decision Analytics Journal, 8 (2023), 100281 https://doi.org/10.1016/j.dajour.2023.100281

Alhayani, Bilal, Sara Taher Abbas, Dawood Zahi Khutar, and Husam Jasim Mohammed, ‘WITHDRAWN: Best Ways Computation Intelligent of Face Cyber Attacks’, Materials Today: Proceedings, 2021 https://doi.org/10.1016/j.matpr.2021.02.557

Amarini, Indriati, Yusuf Saefudin, Ika Ariani Kartini, Marsitiningsih Marsitiningsih, and Noorfajri Ismail, ‘Digital Transformation: Creating an Effective and Efficient Court in Indonesia’, Legality : Jurnal Ilmiah Hukum, 31.2 (2023), 266–84 https://doi.org/10.22219/ljih.v31i2.28013

Ampratwum, Godslove, Robert Osei-Kyei, and Vivian W.Y. Tam, ‘Exploring the Concept of Public-Private Partnership in Building Critical Infrastructure Resilience against Unexpected Events: A Systematic Review,’ International Journal of Critical Infrastructure Protection, 39 (2022), 100556 https://doi.org/10.1016/j.ijcip.2022.100556

Ardiana, Meity, Adriano Adriano, Kurniadi Doni, and Yulianto Yulianto, ‘Corporate Criminal Liability in Procurement of Goods and Services in Hospital,’ Yuridika, 38.2 (2023), 399–414 https://doi.org/10.20473/ydk.v38i2.43674

Ariefulloh, Ariefulloh, Hibnu Nugroho, Angkasa Angkasa, and Riris Ardhanariswari, ‘Restorative Justice-Based Criminal Case Resolution in Salatiga, Indonesia: Islamic Law Perspective and Legal Objectives’, Ijtihad : Jurnal Wacana Hukum Islam Dan Kemanusiaan, 23.1 (2023), 19–36 https://doi.org/10.18326/ijtihad.v23i1.19-36

Arifin, Ridwan, Sigit Riyanto, and Akbar Kurnia Putra, ‘Collaborative Efforts in ASEAN for Global Asset Recovery Frameworks to Combat Corruption in the Digital Era,’ Legality : Jurnal Ilmiah Hukum, 31.2 (2023), 329–43 https://doi.org/10.22219/ljih.v31i2.29381

Atiyah, Ghassan Adhab, Nazura Abdul Manap, and Saidatul Nadia Abd Aziz, ‘Legal Status of Cryptocurrency Circulation in Iraq: Lessons from the United Arab Emirates and the United States,’ Hasanuddin Law Review, 9.1 (2023), 1 https://doi.org/10.20956/halrev.v9i1.3867

Azhmyakov, Vadim, Erik I. Verriest, Moises Bonilla, and Stefan Pickl, ‘Optimal Control Methodology for the Counter-Terrorism Strategies: The Relaxation Based Approach’, Journal of the Franklin Institute, 359.13 (2022), 6690–6708 https://doi.org/10.1016/j.jfranklin.2022.07.013

Bakry, Muammar, Abdul Syatar, Achmad Abubakar, Chaerul Risal, Ahmad Ahmad, and Muhammad Majdy Amiruddin, ‘Strengthening the Cyber Terrorism Law Enforcement in Indonesia: Assimilation from Islamic Jurisdiction’, International Journal of Criminology and Sociology, 10 (2021), 1267–76 https://doi.org/10.6000/1929-4409.2021.10.146

Barry, Thomas, Jonathan Jona, and Naomi Soderstrom, ‘The Impact of Country Institutional Factors on Firm Disclosure: Cybersecurity Disclosures in Chinese Cross-Listed Firms’, Journal of Accounting and Public Policy, 41.6 (2022), 106998 https://doi.org/10.1016/j.jaccpubpol.2022.106998

Beechey, Matthew, Konstantinos G. Kyriakopoulos, and Sangarapillai Lambotharan, ‘Evidential Classification and Feature Selection for Cyber-Threat Hunting’, Knowledge-Based Systems, 226 (2021), 107120 https://doi.org/10.1016/j.knosys.2021.107120

Bolbot, Victor, Ketki Kulkarni, Päivi Brunou, Osiris Valdez Banda, and Mashrura Musharraf, ‘Developments and Research Directions in Maritime Cybersecurity: A Systematic Literature Review and Bibliometric Analysis’, International Journal of Critical Infrastructure Protection, 39 (2022), 100571 https://doi.org/10.1016/j.ijcip.2022.100571

Brata, Al Fadilla Yoga, and Rakotoarisoa Maminiaina Heritiana Sedera, ‘The Implementing a Carbon Tax as a Means of Increasing Investment Value in Indonesia’, Journal of Sustainable Development and Regulatory Issues (JSDERI), 1.2 (2023), 39–50 https://doi.org/10.53955/jsderi.v1i2.6

Bullock, Jane A., George D. Haddow, and Damon P. Coppola, ‘Cybersecurity and Critical Infrastructure Protection’, in Introduction to Homeland Security (Elsevier, 2021), pp. 425–97 https://doi.org/10.1016/B978-0-12-817137-0.00008-0

Burdon, Mark, and Lizzie Coles-Kemp, ‘The Significance of Securing as a Critical Component of Information Security: An Australian Narrative’, Computers & Security, 87 (2019), 101601 https://doi.org/10.1016/j.cose.2019.101601

Cappai, Marco, ‘The Role of Private and Public Regulation in the Case Study of Crypto-Assets: The Italian Move towards Participatory Regulation’, Computer Law & Security Review, 49 (2023), 105831 https://doi.org/10.1016/j.clsr.2023.105831

Chang, Lennon Y.C., and Nicholas Coppel, ‘Building Cyber Security Awareness in a Developing Country: Lessons from Myanmar’, Computers & Security, 97 (2020), 101959 https://doi.org/10.1016/j.cose.2020.101959

Chatzis, Petros, and Eliana Stavrou, ‘Cyber-Threat Landscape of Border Control Infrastructures’, International Journal of Critical Infrastructure Protection, 36 (2022), 100503 https://doi.org/10.1016/j.ijcip.2021.100503

Cheryl, Barr-Kumarakulasinghe, Boon-Kwee Ng, and Chan-Yuan Wong, ‘Governing the Progress of Internet-of-Things: Ambivalence in the Quest of Technology Exploitation and User Rights Protection’, Technology in Society, 64 (2021), 101463 https://doi.org/10.1016/j.techsoc.2020.101463

Choudhary, Sheraz Ahmad, Muhammad Azhar Khan, Abdullah Zafar Sheikh, Mohd Khata Jabor, Mohd Safarin bin Nordin, Abdelmohsen A. Nassani, and others, ‘Role of Information and Communication Technologies on the War against Terrorism and on the Development of Tourism: Evidence from a Panel of 28 Countries’, Technology in Society, 62 (2020), 101296 https://doi.org/10.1016/j.techsoc.2020.101296

Cleary, Christopher, ‘Public-Private Partnerships: Security Organizations’, Encyclopedia of Security and Emergency Management, 2019, 1–7 https://doi.org/10.1007/978-3-319-69891-5_228-1

Cross, M.K.D., ‘Counter-Terrorism & the Intelligence Network in Europe’, International Journal of Law, Crime and Justice, 72 (2023), 100368 https://doi.org/10.1016/j.ijlcj.2019.100368

Diaz Valdivia, Andres, ‘Between Decentralization and Reintermediation: Blockchain Platforms and the Governance of “Commons-Led†and “Business-Led†Energy Transitions’, Energy Research & Social Science, 98 (2023), 103034 https://doi.org/10.1016/j.erss.2023.103034

Dong, Changyin, Yujia Chen, Hao Wang, Leizhen Wang, Ye Li, Daiheng Ni, and others, ‘Evaluating Impact of Remote-Access Cyber-Attack on Lane Changes for Connected Automated Vehicles’, Digital Communications and Networks, 2023 https://doi.org/10.1016/j.dcan.2023.06.004

Fu, Lipeng, Xueqing Wang, Bingsheng Liu, and Ling Li, ‘Investigation into the Role of Human and Organizational Factors in Security Work against Terrorism at Large-Scale Events’, Safety Science, 128 (2020), 104764 https://doi.org/10.1016/j.ssci.2020.104764

Ge, Hui, Lei Zhao, Dong Yue, Xiangpeng Xie, Linghai Xie, Sergey Gorbachev, and others, ‘A Game Theory Based Optimal Allocation Strategy for Defense Resources of Smart Grid under Cyber-Attack’, Information Sciences, 652 (2024), 119759 https://doi.org/10.1016/j.ins.2023.119759

Ginting, Jamin, and Patrick Talbot, ‘Fundraising Aspect of International Terrorism Organization in ASEAN: Legal and Political Aspects’, Lex Scientia Law Review, 7.1 (2023), 1–30 https://doi.org/10.15294/lesrev.v7i1.60074

Homburger, Zine, ‘The Necessity and Pitfall of Cybersecurity Capacity Building for Norm Development in Cyberspace’, Global Society, 33.2 (2019), 224–42 https://doi.org/10.1080/13600826.2019.1569502

IAIANI, Matteo, Alessandro TUGNOLI, Sarah BONVICINI, and Valerio COZZANI, ‘Analysis of Cybersecurity-Related Incidents in the Process Industry’, Reliability Engineering & System Safety, 209 (2021), 107485 https://doi.org/10.1016/j.ress.2021.107485

Jaelani, Abdul Kadir, and Resti Dian Luthviati, ‘The Crime Of Damage After the Constitutional Court’s Decision Number 76/PUU-XV/2017’, Journal of Human Rights, Culture and Legal System, 1.1 (2021) https://doi.org/10.53955/jhcls.v1i1.5

Kelemen, Barbara, and Alessandro Fergnani, ‘The Futures of Terrorism against China in the Greater Middle East’, Futures, 124 (2020), 102643 https://doi.org/10.1016/j.futures.2020.102643

Kouloufakos, Triantafyllos, ‘Untangling the Cyber Norm to Protect Critical Infrastructures’, Computer Law & Security Review, 49 (2023), 105809 https://doi.org/10.1016/j.clsr.2023.105809

Kusumaningtyas, Reza Octavia, and James Kalimanzila, ‘The Impact of Tax Incentive on Increase Foreign Direct Investment’, Journal of Sustainable Development and Regulatory Issues (JSDERI), 1.2 (2023), 51–63 https://doi.org/10.53955/jsderi.v1i2.7

Lattanzio, Gabriele, and Yue Ma, ‘Cybersecurity Risk and Corporate Innovation’, Journal of Corporate Finance, 82 (2023), 102445 https://doi.org/10.1016/j.jcorpfin.2023.102445

Lee, Claire Seungeun, and Ji Hye Kim, ‘Latent Groups of Cybersecurity Preparedness in Europe: Sociodemographic Factors and Country-Level Contexts’, Computers & Security, 97 (2020), 101995 https://doi.org/10.1016/j.cose.2020.101995

Li, Yuchong, and Qinghui Liu, ‘A Comprehensive Review Study of Cyber-Attacks and Cyber Security; Emerging Trends and Recent Developments’, Energy Reports, 7 (2021), 8176–86 https://doi.org/10.1016/j.egyr.2021.08.126

Macas, Mayra, Chunming Wu, and Walter Fuertes, ‘Adversarial Examples: A Survey of Attacks and Defenses in Deep Learning-Enabled Cybersecurity Systems’, Expert Systems with Applications, 238 (2024), 122223 https://doi.org/10.1016/j.eswa.2023.122223

Mahardika, Harryadin, Juliana French, and Agung Sembada, ‘Keep Calm and Eat Satay: Indonesia’s Consumption-Themed Signals of Defiance against Terrorism’, Australasian Marketing Journal, 26.3 (2018), 231–38 https://doi.org/10.1016/j.ausmj.2018.06.002

Masyhar, Ali, Muhammad Azil Maskur, Sri Redjeki Prasetyowati, Aldita Evan Prihama, Roy Priyono, and Ahmad Alif, ‘Digital Transformation of Youth Movement for Counter Radicalism’, 2022, p. 030010 https://doi.org/10.1063/5.0109808

Masyhar, Ali, Ali Murtadho, and Ahmad Zaharuddin Sani Ahmad Sabri, ‘The Driving Factors for Recidivism of Former Terrorism Convicts in Socio-Legal Perspective’, Journal of Indonesian Legal Studies, 8.1 (2023) https://doi.org/10.15294/jils.v8i1.69445

Mishra, Alok, Yehia Ibrahim Alzoubi, Memoona Javeria Anwar, and Asif Qumer Gill, ‘Attributes Impacting Cybersecurity Policy Development: An Evidence from Seven Nations’, Computers & Security, 120 (2022), 102820 https://doi.org/10.1016/j.cose.2022.102820

Mohammadi, Mokhtar, Tarik A. Rashid, Sarkhel H.Taher Karim, Adil Hussain Mohammed Aldalwie, Quan Thanh Tho, Moazam Bidaki, and others, ‘A Comprehensive Survey and Taxonomy of the SVM-Based Intrusion Detection Systems’, Journal of Network and Computer Applications, 178 (2021), 102983 https://doi.org/10.1016/j.jnca.2021.102983

Motsch, William, Alexander David, Keran Sivalingam, Achim Wagner, and Martin Ruskowski, ‘Approach for Dynamic Price-Based Demand Side Management in Cyber-Physical Production Systems’, Procedia Manufacturing, 51 (2020), 1748–54 https://doi.org/10.1016/j.promfg.2020.10.243

Niraja, K.S., and Sabbineni Srinivasa Rao, ‘WITHDRAWN: A Hybrid Algorithm Design for near Real Time Detection Cyber Attacks from Compromised Devices to Enhance IoT Security’, Materials Today: Proceedings, 2021 https://doi.org/10.1016/j.matpr.2021.01.751

Nugraha, Yudhistira, and Andrew Martin, ‘Towards a Framework for Trustworthy Data Security Level Agreement in Cloud Procurement’, Computers & Security, 106 (2021), 102266 https://doi.org/10.1016/j.cose.2021.102266

Okey, Ogobuchi Daniel, Ekikere Umoren Udo, Renata Lopes Rosa, Demostenes Zegarra Rodríguez, and João Henrique Kleinschmidt, ‘Investigating ChatGPT and Cybersecurity: A Perspective on Topic Modeling and Sentiment Analysis’, Computers & Security, 135 (2023), 103476 https://doi.org/10.1016/j.cose.2023.103476

Plotnek, Jordan J., and Jill Slay, ‘Cyber Terrorism: A Homogenized Taxonomy and Definition’, Computers & Security, 102 (2021), 102145 https://doi.org/10.1016/j.cose.2020.102145

QMN-Nguyen, Moon, ‘Media Presentations of Vietnam’s Cybersecurity Law: A Comparative Approach with Corpus-Based Critical Discourse Analysis’, Computer Law & Security Review, 50 (2023), 105835 https://doi.org/10.1016/j.clsr.2023.105835

Radomyski, Adam, and Paweł Bernat, ‘Contemporary Determinants of Organising Effective Protection of Civil Aviation Against Terrorism’, Transportation Research Procedia, 35 (2018), 259–70 https://doi.org/10.1016/j.trpro.2018.12.021

Röell, Christiaan, Ellis Osabutey, Peter Rodgers, Felix Arndt, Zaheer Khan, and Shlomo Tarba, ‘Managing Socio-Political Risk at the Subnational Level: Lessons from MNE Subsidiaries in Indonesia’, Journal of World Business, 57.3 (2022), 101312 https://doi.org/10.1016/j.jwb.2022.101312

Safaei Pour, Morteza, Christelle Nader, Kurt Friday, and Elias Bou-Harb, ‘A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security’, Computers & Security, 128 (2023), 103123 https://doi.org/10.1016/j.cose.2023.103123

Saputra, Rian, Tiara Tiolince, Iswantoro Iswantoro, and Sanju Kumar Sigh, ‘Artificial Intelligence and Intellectual Property Protection in Indonesia and Japan’, Journal of Human Rights, Culture and Legal System, 3.2 (2023), 210–35 https://doi.org/10.53955/jhcls.v3i2.69

Seger Guttmann, Tali, Shaked Gilboa, and Judith Partouche-Sebban, ‘“I Live with Terror inside Meâ€: Exploring Customers’ Instinctive Reactions to Terror’, International Journal of Hospitality Management, 92 (2021), 102734 https://doi.org/10.1016/j.ijhm.2020.102734

Septasari, Dita, ‘The Cyber Security and The Challenge of Society 5.0 Era in Indonesia’, Aisyah Journal Of Informatics and Electrical Engineering (A.J.I.E.E), 5.2 (2023), 227–33 https://doi.org/10.30604/jti.v5i2.231

Sepúlveda Estay, Daniel A., Rishikesh Sahay, Michael B. Barfod, and Christian D. Jensen, ‘A Systematic Review of Cyber-Resilience Assessment Frameworks’, Computers & Security, 97 (2020), 101996 https://doi.org/10.1016/j.cose.2020.101996

Sholecha, Ema Mar’ati, Ahmat Saiful, Sheilla Yunika, Hariyanto Hariyanto, and Norhaiden Unsil, ‘Justice Collaborator’s Position and Function on Witness Protection’s Rights as a Suspect from the Perspective of Criminal Law in Indonesia’, Volksgeist: Jurnal Ilmu Hukum Dan Konstitusi, 2023, 131–43 https://doi.org/10.24090/volksgeist.v6i1.7246

Da Silva, Joseph, ‘Cyber Security and the Leviathan’, Computers & Security, 116 (2022), 102674 https://doi.org/10.1016/j.cose.2022.102674

Spalek, Basia, and Salwa El-Awa, ‘Governance and Counter-Terrorism: Engaging Moderate and Non-Violent Extremist Movements in Combatting Jihadist-Linked Terrorism’, International Journal of Law, Crime and Justice, 72 (2023), 100367 https://doi.org/10.1016/j.ijlcj.2019.100367

Stacey, Patrick, Rebecca Taylor, Omotolani Olowosule, and Konstantina Spanaki, ‘Emotional Reactions and Coping Responses of Employees to a Cyber-Attack: A Case Study’, International Journal of Information Management, 58 (2021), 102298 https://doi.org/10.1016/j.ijinfomgt.2020.102298

Suryono, Ryan Randy, Indra Budi, and Betty Purwandari, ‘Detection of Fintech P2P Lending Issues in Indonesia’, Heliyon, 7.4 (2021), e06782 https://doi.org/10.1016/j.heliyon.2021.e06782

Tan, Sen, Peilin Xie, Josep M. Guerrero, Juan C. Vasquez, Yunlu Li, and Xifeng Guo, ‘Attack Detection Design for Dc Microgrid Using Eigenvalue Assignment Approach’, Energy Reports, 7 (2021), 469–76 https://doi.org/10.1016/j.egyr.2021.01.045

Tauda, Gunawan A., Andy Omara, and Gioia Arnone, ‘Cryptocurrency: Highlighting the Approach, Regulations, and Protection in Indonesia and European Union’, BESTUUR, 11.1 (August) (2023), 1 https://doi.org/10.20961/bestuur.v11i1.67125

Tian, Shu, Bo Zhao, and Resi Ong Olivares, ‘Cybersecurity Risks and Central Banks’ Sentiment on Central Bank Digital Currency: Evidence from Global Cyberattacks’, Finance Research Letters, 53 (2023), 103609 https://doi.org/10.1016/j.frl.2022.103609

Uchendu, Betsy, Jason R.C. Nurse, Maria Bada, and Steven Furnell, ‘Developing a Cyber Security Culture: Current Practices and Future Needs’, Computers & Security, 109 (2021), 102387 https://doi.org/10.1016/j.cose.2021.102387

Wardana, Dodi Jaya, Sukardi Sukardi, and Radian Salman, ‘Public Participation in the Law-Making Process in Indonesia’, Jurnal Media Hukum, 30.1 (2023), 66–77 https://doi.org/10.18196/jmh.v30i1.14813

Wei, Xingxing, ‘A Critical Evaluation of China’s Legal Responses to Cyberterrorism’, Computer Law & Security Review, 47 (2022), 105768 https://doi.org/10.1016/j.clsr.2022.105768

Yaacoub, Jean-Paul, Hassan Noura, Ola Salman, and Ali Chehab, ‘Security Analysis of Drones Systems: Attacks, Limitations, and Recommendations’, Internet of Things, 11 (2020), 100218 https://doi.org/10.1016/j.iot.2020.100218

Downloads

Published

2023-11-20

Citation Check