Satria Unggul, Wicaksana Prakasa and Noviandy, P.E (2019) Analysist of Cyber Espionage in International Law and Indonesian Law. Humanities & Social Sciences Reviews, 7 (3). pp. 38-44. ISSN 2395-6518
![Artikel ANALYSIST OF CYBER ESPIONAGE IN INTERNATIONAL LAW AND INDONESIAN LAW [thumbnail of Artikel ANALYSIST OF CYBER ESPIONAGE IN INTERNATIONAL LAW AND INDONESIAN LAW]](https://repository.um-surabaya.ac.id/style/images/fileicons/application_pdf.png)
1._Cyber_Espionage_Scopus_Q4.pdf
Download (155kB)
![Cek Turnitin ANALYSIST OF CYBER ESPIONAGE IN INTERNATIONAL LAW AND INDONESIAN LAW [thumbnail of Cek Turnitin ANALYSIST OF CYBER ESPIONAGE IN INTERNATIONAL LAW AND INDONESIAN LAW]](https://repository.um-surabaya.ac.id/style/images/fileicons/application_pdf.png)
2021_30_6_HASIL_TURNITIN_SATRIA_1_Cyber_Espionage_Scopus_Q4_Satria_17%.pdf - Supplemental Material
Download (1MB)
![Peer Review ANALYSIST OF CYBER ESPIONAGE IN INTERNATIONAL LAW AND INDONESIAN LAW [thumbnail of Peer Review ANALYSIST OF CYBER ESPIONAGE IN INTERNATIONAL LAW AND INDONESIAN LAW]](https://repository.um-surabaya.ac.id/style/images/fileicons/application_pdf.png)
1._Lembar_Review_Cyber_Espionage_Scopus.pdf - Supplemental Material
Download (616kB)
Abstract
Purpose of Study: A conception of cyber espionage today is extremely vulnerable since the crime has evolved from conventional wiretapping into cyber-based spy activities. This issue becomes complicated when faced with the principle of sovereignty and how the challenge of countries around the world to respond in maintaining the honor, security, and peace of their own countries. The legal issues raised in this legal research are: (1) cyber espionage is one kind of cybercrime (2) Legal mechanisms to crack down on the international legal system and national law again Cyber espionage crime. Methodology: Research methods used statute approach and conceptual approach. Results: The result of this research showed that it could use computing devices and internet network by means of spies, destroying computer system in order to securely obtain state confidential data or by spreading internet virus which is sporadic to government-owned domains and corporation it is clear that cyber espionage id either part of the cybercrime. Implications/Applications: The lack of legal regulation, both international and national which directly refers to cyber espionage because they alluded to illegal access and illegal interception related only.
Item Type: | Article |
---|---|
Subjects: | K Law > K Law (General) |
Divisions: | Jurnal > Fakultas Hukum |
Depositing User: | SATRIA UNGGUL WICAKSANA P |
Date Deposited: | 05 Jul 2021 16:43 |
Last Modified: | 05 Jul 2021 16:43 |
URI: | https://repository.um-surabaya.ac.id/id/eprint/5368 |