Cyber Terrorism Criminal Acts in the Perspective of Transnational Organized Crime International Criminal Law, Global Security Studies

Main Article Content

Okti Putri Andini

Abstract

This research was conducted to explain the legal instrument governing Cyber terrorism from an organized transnational crime perspective as well as analyzing the modus operandi used by Cyber terrorism. This research is a normative legal research using a qualitative approach to finding data sources by studying all the laws and regulations concerned with Cyber terrorism. Because this research is a normative legal research then the data sources used in this research are secondary data sources. In collecting data, authors conduct literature studies and the validity of the obtained data is examined using triangulation techniques. Then the results are analyzed and presented using a descriptive analytical method. The results of this study found that there were several international conventions that could be used as legal instruments for Cyber terrorism. And based on the study by the authors modus operandi used by terrorists in committing Cyber terrorism very diverse namely through: hacking, propaganda, fraud, DDoS attacks and the spread of viruses, worms or malware. The outcome of the results are: although there is no legal instrument that governs Cyber terrorism but some of the relevant and existing international conventions can be used as Cyber  terrorism law resource, and it can be noted that there are various of modus operandi used by terrorists in Cyber terrorism. 

Article Details

How to Cite
Andini, O. P. (2021). Cyber Terrorism Criminal Acts in the Perspective of Transnational Organized Crime. Unnes Law Journal: Jurnal Hukum Universitas Negeri Semarang, 7(2), 333-346. https://doi.org/10.15294/ulj.v7i1.38804
Section
Review Article

References

Alkhouri, L. Kassirer, A. and Nixon, A. 2016. Hacking for ISIS. Falshpoint Publisher

Al-Rawi, A. 2018. Video games, terrorism, and ISIS's Jihad 3.0. Terrorism and political violence journal: Vol. 30 No.4. DOI: 10. 1080 / 09546553.2016.1207633

Ambrosio, PJ E. 2015. Cyber security A-15. Mexico: National Polytechnic Institute

Arief, Barda N. 2008. Interest in Criminal Law Policy. Jakarta: Prenadamedia Group

Arraromi, M. Ayodeji. 2018. Cyber-terrorism under the Nigerian law: a new form of threat or an old threat in a new skin ?. Nigeria.

Bucaj, E. 2017. The Need for Regulation of Cyber Terrorism Phenomena in Line With Principles of International Criminal Law. Juridica: Vol 13 No 17. Galati: Universitatea Danubius.

Charvat, M. 2009. The Virtual Battlefield: Perspectives on Cyber Warfare: Cyber terrorism: A new Dimension in Battlespace. IOS Press

Giantas, D. Stergiou, D. 2018. From Terrorism to Cyber terrorism: The Case of ISIS. Greece.

Jarvis, L. Macdonald, S. 2015. What is Cyber terrorism? Finding From Survey of Researchers. Journal of Terrorism and Political Violance: Vol 27 Issue 4.

Lillington, K. 2016. How Real Is The Treat of Cyberterrorism ?. Irish Times

McQuade, SC 2009. Encyclopedia of Cybercrime. USA: Greenwood Press The Concise Oxford Dictionary of Current English (8th edition). 1990. Oxford: Clarendon Press

Stroobants, S. 2018. Expert Contributions: Cyberterrorism is The New Frontier. Global Terrorism Index
Sudarto. 1981. Law and Criminal Law. Bandung: Alumni.

Terzi, M. 2019. Turkish Journal of TESAM Academy: E-Government and Cyber terrorism: Conceptual Framework, Theoretical Discussions and Possible Solutions. TESAM Academy Dergisi.

UNODC. 2012. The Use of Internet For Terrorist Purpose. New York: United Nations

Whiting, A. Macdonald, S. Jarvis, L. 2018. Cyber terrorism: Understandings, Debates and Representations. Accessed at https://www.cambridge.org at 14/01/20 2019

Zerzri, M. 2017. The Threat of Cyber Terrorism and Recommendations for Countermeasures. No 4. CA Perspective on Tunisia