Main Article Content
This research was conducted to explain the legal instrument governing Cyber terrorism from an organized transnational crime perspective as well as analyzing the modus operandi used by Cyber terrorism. This research is a normative legal research using a qualitative approach to finding data sources by studying all the laws and regulations concerned with Cyber terrorism. Because this research is a normative legal research then the data sources used in this research are secondary data sources. In collecting data, authors conduct literature studies and the validity of the obtained data is examined using triangulation techniques. Then the results are analyzed and presented using a descriptive analytical method. The results of this study found that there were several international conventions that could be used as legal instruments for Cyber terrorism. And based on the study by the authors modus operandi used by terrorists in committing Cyber terrorism very diverse namely through: hacking, propaganda, fraud, DDoS attacks and the spread of viruses, worms or malware. The outcome of the results are: although there is no legal instrument that governs Cyber terrorism but some of the relevant and existing international conventions can be used as Cyber terrorism law resource, and it can be noted that there are various of modus operandi used by terrorists in Cyber terrorism.
Al-Rawi, A. 2018. Video games, terrorism, and ISIS's Jihad 3.0. Terrorism and political violence journal: Vol. 30 No.4. DOI: 10. 1080 / 09546553.2016.1207633
Ambrosio, PJ E. 2015. Cyber security A-15. Mexico: National Polytechnic Institute
Arief, Barda N. 2008. Interest in Criminal Law Policy. Jakarta: Prenadamedia Group
Arraromi, M. Ayodeji. 2018. Cyber-terrorism under the Nigerian law: a new form of threat or an old threat in a new skin ?. Nigeria.
Bucaj, E. 2017. The Need for Regulation of Cyber Terrorism Phenomena in Line With Principles of International Criminal Law. Juridica: Vol 13 No 17. Galati: Universitatea Danubius.
Charvat, M. 2009. The Virtual Battlefield: Perspectives on Cyber Warfare: Cyber terrorism: A new Dimension in Battlespace. IOS Press
Giantas, D. Stergiou, D. 2018. From Terrorism to Cyber terrorism: The Case of ISIS. Greece.
Jarvis, L. Macdonald, S. 2015. What is Cyber terrorism? Finding From Survey of Researchers. Journal of Terrorism and Political Violance: Vol 27 Issue 4.
Lillington, K. 2016. How Real Is The Treat of Cyberterrorism ?. Irish Times
McQuade, SC 2009. Encyclopedia of Cybercrime. USA: Greenwood Press The Concise Oxford Dictionary of Current English (8th edition). 1990. Oxford: Clarendon Press
Stroobants, S. 2018. Expert Contributions: Cyberterrorism is The New Frontier. Global Terrorism Index
Sudarto. 1981. Law and Criminal Law. Bandung: Alumni.
Terzi, M. 2019. Turkish Journal of TESAM Academy: E-Government and Cyber terrorism: Conceptual Framework, Theoretical Discussions and Possible Solutions. TESAM Academy Dergisi.
UNODC. 2012. The Use of Internet For Terrorist Purpose. New York: United Nations
Whiting, A. Macdonald, S. Jarvis, L. 2018. Cyber terrorism: Understandings, Debates and Representations. Accessed at https://www.cambridge.org at 14/01/20 2019
Zerzri, M. 2017. The Threat of Cyber Terrorism and Recommendations for Countermeasures. No 4. CA Perspective on Tunisia