scholarly journals Law Enforcement of Cyber Terorism in Indonesia

Rechtsidee ◽  
2015 ◽  
Vol 2 (2) ◽  
pp. 157
Author(s):  
Sri Ayu Astuti

Cyber terrorism is one of the category of crimes that cross border organized and has been established as an extraordinary crime. This crime is becoming a serious threat to countries in the world. In this regard, the Government's attitude of firmness needed to enforce cyber laws against the freedom development in social media. The development of the immeasurable it in the country of Indonesia required the limitations by doing legal liability over the behavior of law which deviates towards the use of technology tools. Strict law enforcement efforts as a clear attitude to stop actively moving massive terrorism, by enacting the provisions of the law on information and electronic transactions as well as the law of terrorism effectively. How To Cite: Astuti, S. (2015). Law Enforcement of Cyber Terorism in Indonesia. Rechtsidee, 2(2), 157-178. doi:http://dx.doi.org/10.21070/jihr.v2i2.82

Author(s):  
Gomgom T.P Siregar ◽  
Indra Purnanto S. Sihite

The handling of cases of spreading pornographic photos through the social media Facebook is not subject to temporary detention when conducting an investigation because based on the investigator's belief, the perpetrator will not run away, nor will he remove evidence, but what happens is evidence from the perpetrator. Using normative juridical research, which examines the regulations of Law No. 19/2016 on ITE. Criminal law enforcement for perpetrators of spreading pornographic content on social media in terms of the Law on Information and Electronic Transactions Article 45 paragraph 1 of Law No. 19 of 2016 on ITE, the threat of punishment for the perpetrators of dissemination can be sentenced to a maximum imprisonment of 6 years and a maximum fine of Rp. 1,000,000,000 billion.


2021 ◽  
Vol 4 (1) ◽  
pp. 36-48
Author(s):  
Uyan Wiryadi

The purpose of this study: 1) To find out copyright violations in the field of music in the form of a cover song by recording through social media connected with Law Number 28 of 2014 concerning Copyright. 2) To find out the factors that influence copyright violations in the music field in the form of cover songs by recording through social media. The writing of this thesis uses a statute approach, by reviewing amendments to Law Number 28 of 2014 concerning Copyright and its implications for copyright and its implementation by state institutions and the Republic of Indonesia Law No. 19 of 2016 concerning Amendment of Law Number 11 Year 2008 Regarding Information and Electronic Transactions. Results of research conducted by the author: When someone does a cover song through social media without permission from the creator, both for the purpose not for commercial or commercial purposes, it is an infringement of copyright. Factors that influence the occurrence of violations of copyright in Indonesia include: 1) Weak law enforcement against violators. 2) Works on the internet can easily be duplicated and disseminated globally in a short period of time and in large quantities. 3) There is no limit on the place of the offender because a domain name or website can be accessed by anyone globally. 4) Procedures for events between countries in dealing with violations of copyright on the internet, such as to determine who the perpetrators are and when they occur and determine the jurisdiction of violations still vary.  


2020 ◽  
Vol 4 (2) ◽  
pp. 51-58
Author(s):  
Sry Wahyuni ◽  
Elwidarifa Marwenny

The subject matter of this research is the Juridical Review of the Crime of Threats in the Information and Electronic Transactions Law (Case Study of the Koto Baru District Court). This issue is divided into two sub-discussions, first, how is the application of material crimes against criminal acts of threats in the Law on Information and Electronic Transactions, second, how are judges' legal considerations in imposing crimes against threats of threats in the Law on Electronic Information and transactions. The method used in this research is to use a normative juridical problem approach. about the problem that is the object of the problem.The results showed that efforts to apply sanctions were made to overcome the perpetrators of extortion and threats, namely: firmly enforcing the existing positive laws. For subjective positive law enforcement, it may be necessary to have instruments or law enforcers who have the instinct of justice, namely "Judges" who decide all existing cases. The research implication is: it is hoped that the inculcation of social values ​​and norms in society in using social media and in UUITE is not trapped in behavior that plunges them into criminal acts / crimes, it is also hoped that the Panel of Judges in deciding cases must consider more The facts of the trial, the elements of the offense, and the consideration of the severity of the crime with reference to the defendant's situation and the victim's loss.


2019 ◽  
Vol 19 (1) ◽  
pp. 1
Author(s):  
Ika Dewi Sartika Saimima ◽  
Fransiska Novita Eleanora ◽  
Widya Romasindah

<p><em>The rise of child crime is increasing, even using networks on social media (Facebook), the culprit is not only personal, but also the corporation, in handling it using Law Number 11 of 2008 concerning Information and Electronic Transactions (ITE), by looking at forms of criminal liability corporation in child pornography content providers. the purpose of the study is to find out the criminal liability of the corporation providing the content of child pornography, and to know the obstacles in the prevention of child sexual crime (social media) through internet media. The results obtained were more emphasizing and directing the accountability of corporations providing child pornography content (official loly candy; s group case studies), and the penalties given to perpetrators could provide: deterrent effects and were given punishments in the form of actions and rehabilitation to perpetrators, and the law Indonesia in tackling child crime on social media</em><strong><em></em></strong></p>


2019 ◽  
Vol 2 (2) ◽  
pp. 129-143
Author(s):  
Citra

Children are the next generation of the nation, the existence of children is very important because the child is a potential fate of the nation as well as a mirror attitude of life of the nation in the future. A child who is a superior seed and has the widest hope to prepare for his future as a milestone of success of a nation in the future should not fall in the world of evil. It is unfortunate that children at an early age have been involved in criminal offenses and past their youth behind bars, increasingly contaminated with other inmates. This research was empirical legal research, that is the research on the provisions of the legislation in the national law concerning restorative approach in the imposition of action sanctions against children in conflict with law in order to keep children away from imprisonment and negative stigma in society . Addressing the issue of a child in conflict with the law should be done in a familial approach and avoiding children from prison as much as possible. The sanction of action for the child contained in Article 82 of Law Number 11 of 2012 on Criminal Justice System for Children expected to prevent the child from the negative stigma in society and keep the children from bad effects of prison. Thus the current restorative model of punishment is more applicable in handling child offenders. It is expected that law enforcement officers to pay attention to the provisions of the rules that apply to children in conflict with the law in terms of imposition of more sanctions toward education and character development of children so that the threat of imprisonment becomes the last alternative in imposing sanctions for children


2020 ◽  
pp. 87-97
Author(s):  
Valeriy KHOMA ◽  
Victor ZAIATS

Introduction. The purpose of the customs authorities is to effectively protect society and ensure that appropriate taxes are levied, using, inter alia, the fight against cross-border crime. The way in which the customs carries out its law enforcement mission in combating the above offenses remains in the focus of discussions of the customs administrations – members of the World Customs Organization (hereinafter – WCO), of which Ukraine has been a member since 1992. As a result, there is a growing need for further customs enforcement research and improved, with the support of the WCO Secretariat, exchange of experience and a common approach that will allow customs administrations around the world to unify the methodology they use to identify and mitigate potential institutional risks. The purpose. The article covers the analysis of Ukraine’s own customs service methods and, possibly, taking measures to improve the existing national system, in particular, expanding its legal foundation (assistance to authority) and operational capabilities (options) on which state procedures and practices are based. Methods. In the course of the research, general scientific methods were used, in particular: analysis to determine the content of law enforcement powers of the Customs Service of Ukraine; comparison for the provisions of Ukrainian and international legislation regarding the institutional preconditions for law enforcement activities by national customs services. The synthesis method was used to formulate proposals on the need to improve the customs legislation of Ukraine. Results. The main scientific result of the article is to identify, related to the of customs affairs, shortcomings in the institutional capacity in the field of law enforcement of the Customs Service of Ukraine and determine the prospects for their further elimination. Particular attention is paid to the need to synchronize the provisions of Ukrainian legislation, both among themselves and with the relevant rules in force for Ukraine on customs matters, international agreements. Perspectives. Further research in this direction should be conducted on the basis of the formed theoretical justification of the law enforcement powers of the Customs Service of Ukraine, taking into account the levels of official interaction – departmental, interagency, international.


2021 ◽  
Vol 16 (4) ◽  
pp. 184-192
Author(s):  
A. A. Shulakov

The study contains a step-by-step algorithm for determining the law applicable to private cross-border legal relations. The algorithm is developed based on legislation, law enforcement practice and doctrine. The initial rule of the sequential execution of the stages (steps) of the algorithm is a mechanism in which the determination of the law applicable to the legal relationship at one of the stages excludes the subsequent stages of the algorithm. Public policy interests dictate the rules for determining the law to be applied to private law relations complicated by a foreign element. The establishment by the legislator and law enforcement officer of the closest connection between the interests of conflicting public orders (legal orders) with elements of cross-border legal relations is the basis for the process regulation in the Russian Federation. At the first, second and third stages of the algorithm, the interests of the domestic public order (law and order) dominate. At the fourth stage of the algorithm, public interests in the part not regulated by super imperative norms are correlated with the agreement of the parties on the choice of the applicable law. At the fifth — eighth stages of the algorithm, the law enforcement officer is guided by the rules established by the legislator taking into account the interests of public orders that are conflicting in cross-border legal relations. At the last, ninth stage of the algorithm, the applicable law is established by the judge based on the closest connection between the interests of public order (law and order) with elements of crossborder legal relations.


2019 ◽  
pp. 27-42
Author(s):  
Loo Seng Neo ◽  
Leevia Dillon ◽  
Priscilla Shi ◽  
Jethro Tan ◽  
Yingmin Wang ◽  
...  

Exploiting the benefits afforded by the Internet, violent extremists have created and utilised a myriad of online platforms (e.g., websites, forums, blogs, social media) that have abetted and enhanced their recruitment campaigns across the world. While the idea of countering violent extremists' online presence is a matter of considerable security interest, the paucity of research analysing the persuasiveness of their online platforms to certain target audiences impedes law enforcement agencies' capability to deal with them. There is a need to understand why their online platforms are so persuasive to certain target audiences. Focusing on these online platforms, this chapter will examine the features of these platforms that enhance the appeal of violent extremist messages.


Author(s):  
Kirti Raj Raj Bhatele ◽  
Deepak Dutt Mishra ◽  
Himanshu Bhatt ◽  
Karishma Das

This chapter provides prerequisites associated with cyber crimes, cyber forensics, and law enforcement. It consists of a brief introduction to the definition of cyber crimes, its classification, challenges associated with it and how it evolved with time, impact on the society, cyber terrorism, and the extent of problem scalability along with focusing on law enforcement aspects associated with the tracking and the prevention from such type crimes. The aspects discussed here include various cyber laws and law enforcement techniques introduced by various countries throughout the world which helps them to fight against cyber crimes. The cyber laws discussed include Australian, Canadian, United States, United Kingdom, and Indian law. This chapter also deals with the digital/cyber forensics, what does digital/cyber forensics mean, its types, and laws/rules revolving around them, like how to collect evidence, jurisdictions, and e-discovery.


2020 ◽  
pp. 64-81
Author(s):  
Kirti Raj Raj Bhatele ◽  
Deepak Dutt Mishra ◽  
Himanshu Bhatt ◽  
Karishma Das

This chapter provides prerequisites associated with cyber crimes, cyber forensics, and law enforcement. It consists of a brief introduction to the definition of cyber crimes, its classification, challenges associated with it and how it evolved with time, impact on the society, cyber terrorism, and the extent of problem scalability along with focusing on law enforcement aspects associated with the tracking and the prevention from such type crimes. The aspects discussed here include various cyber laws and law enforcement techniques introduced by various countries throughout the world which helps them to fight against cyber crimes. The cyber laws discussed include Australian, Canadian, United States, United Kingdom, and Indian law. This chapter also deals with the digital/cyber forensics, what does digital/cyber forensics mean, its types, and laws/rules revolving around them, like how to collect evidence, jurisdictions, and e-discovery.


Sign in / Sign up

Export Citation Format

Share Document