Serangan Siber Sebagai Penggunaan Kekuatan Bersenjata dalam Perspektif Hukum Keamanan Nasional Indonesia (Cyber Attacks as the Use of Force in the Perspective of Indonesia National Security Law)

Diny Luthfah

Abstract


Cyber Attack is part of use of force. The scope of use of cyber force in this article is limited to use by state against another state. The increasing of cyber attack grow within the awareness of every country in the world including Indonesia in matters of strategy and regulated their National Security Law. Interpreted cyber attack as some forms of offensive attacks will be challenging. The reason why will be difficult to regulate is that the factual bases for there have to be casualties, physical destruction and attribution will be addressed. Furthermore Indonesia needs to develop new policy and regulated cyber attack in Indonesia National Security Law.


Keywords


Cyber Attack; use of force; national security law.

Full Text:

PDF

Article Metrics

Abstract views : 0| PDF views : 0

References


Anjani, N. H. (2021). Kondisi Keamanan Siber di Indonesia. Ringkasan Kebijakan, 9, 1–12.

Applegate, S. (2013). The Dawn of Kinetic Cyber. In Proceeding of 5th International Conference on Cyber Conflict (p. 2). https://ieeexplore.ieee.org/document/6568376

Baldwin, D. A. (1997). The Concept of Security. Review of International StudiesDavid A. Baldwin,.

Bell, D. (2001). An Introduction to Cyber cultures. Routledge.

Berman, F. (2006). UN Charter and The Use of Force. Singapore Year Book of International Law.

Bernik, I. (2014). Cybercrime and Cyber Warfare. ISTE Ltd.

Boothby, W. H. (2013). Methods and Means of Cyber Warfare. International Law Studies, 89, 387–405.

Clough, J. (2015). Principles of Cybercrime. Cambridge University Press.

Farhat, V., Mccarthy, B., Raysman, R., & Canale, J. (2017). Cyber Attacks: Prevention and Proactive Responses. In Practical Law. https://www.hklaw.com/files/Uploads/Documents/Articles/2017CyberAttacksPreventionandProactiveResponses.pdf

FBI. (2014). A Byte Out of History $10 Million Hack, 1994-Style. Https://Www.Fbi.Gov/News/Stories/a-Byte-out-of-History-10-Million-Hack?__cf_chl_jschl_tk__=pmd_I9w_dSqrCrnTef_iyHRHKmHvnoNHtOWwIOj.Vs8znq0-1633766276-0-GqNtZGzNAnujcnBszQiR.

Hathaway, O. (2012). The Law of Cyber Attack. Yale Law School.

Herzoq, S. (2011). Revisiting the Estonian Cyber Attacks: Digital Threat and Multinational Responses. Journal of Strategic Security, IV(2), 51. https://doi.org/10.5038/1944-0472.4.2.3

Hollis, D. (2011). Cyberwar Case Study: Georgia 2008. Small Wars Journal, 7(1), 1–9. https://smallwarsjournal.com/blog/journal/docs-temp/639-hollis.pdf

International Committee of the Red Cros. (1987). Commentary on the Additional Protocols of 1977 to the Geneva Conventions of 12 August 1949 (Y. S. C. S. . B. Zimmermann (ed.)). Martinus Nijhoff Publishers.

International Court of Justice. (1996). Legality of the Threat or Use of Nuclear Weapons. Advisory Opinion on the Legality of the Threat or Use of Nuclear Weapons.

International Court of Justice. (2007). Case Concerning Application of the Conventionon the Prevention and Punishment of the Crime of Genocide. In Reports of Judgments, Advisory Opinions and Orders (p. 201). Cambridge University Press.

Kilovaty, I. (2015). Rethinking the Prohibition on the Use of Force in the Light of Economic Cyber Warfare: Towards a Broader Scope of Article 2 ( 4 ) of the UN Charter. Journal of Law and Cyber Warfare, 210–244.

Koh, H. H. (2012). International Law in Cyberspace. Harvard International Law Journal, 54.

Leiner, B. M., Cerf, V. G., Clark, D. D., Kahn, R. E., Kleinrock, L., Lynch, D. C., Postel, J., Roberts, L. G., & Wolff, S. (1997). A Brief History of Internet. In Studies in Health Technology and Informatics. Internet Society. https://doi.org/10.3233/978-1-60750-880-9-121

Li, M., Porter, A. L., & Suominen, A. (2018). Insights into Relationships between Disruptive Technology/Innovation and Emerging Technology: A Bibliometric Perspective. Technological Forecasting and Social Change, 129(November), 285–296. https://doi.org/10.1016/j.techfore.2017.09.032

Oppenheim, L. (1996). International Law. A Treatise Volume II War and Neutrality (9th.). Longman Green and Co.

Parks, P. J. (2013). Cyberwarfare. Reference Point Press.

Pellet, A. (2003). The Charter of the United Nations: A Commentary of Bruno Simma’s Commentary. Michigan Journal of International Law, 25(1), 135–151. https://repository.law.umich.edu/cgi/viewcontent.cgi?article=1251&context=mjil

Program on Humanitarian Policy and Conflict Research at Harvard University. (2013). The HPCR Manual On International Law Applicable To Air and Missile Warfare. Cambridge University Press.

Protocols Additional to the Geneva Conventions of 12 August 1949, 30.

Protokol Tambahan I 1977. (n.d.). No Title.

Romm, J. J. (1993). Defining National Security: The Nonmilitary Aspects. Council on Foreign Relations Press.

Schmitt, M. (1999). Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework. Colombia Journal of Transnational Law, 37, 914.

Schmitt, M. N. (2008). Cyber Operations and the Jus in Bello: Key Issues. In Naval War College International Law Studies. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1801176

Sharp, W. G. (1999). Cyber Space and the Use of Force. Aegis Research Corporation.

United Nations. (1945). Charter of the United Nations and Statute of the International Court of Justice (p. 54).

Valuch, J. (2017). Cyber Attacks, Information Attacks, and Postmodern Warfare. Baltic Journal of Law & Politics, 10(1), 81. https://doi.org/10.1515/bjlp-2017-0003

Waxman, M. C. (2011). Cyber Attacks as Force under UN Charter Article 2(4). International Law Studies, 87(4), 43–57. https://scholarship.law.columbia.edu/cgi/viewcontent.cgi?article=1882&context=faculty_scholarship

Weisman, S. (2020). What are Denial of Service (DoS) Attacks ? DoS attacks explained. https://us.norton.com/internetsecurity-emerging-threats-dos-attacks-explained.html

White, S. P. (2018). Understanding Cyberwarfare: Lessons from the Russia-Georgia War. In Modern War Institute, West Point. https://mwi.usma.edu/wp-content/uploads/2018/03/Understanding-Cyberwarfare.pdf

Whittaker, J. (2004). The Cyberspace Handbook. Routledge.




DOI: http://dx.doi.org/10.25105/teras-lrev.v3i1.10742

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.