URGENSI PENGUATAN REGULASI PELINDUNGAN DATA DAN KEAMANAN SIBER DI INDONESIA TERHADAP ANCAMAN HACKING DALAM SISTEM PEMERINTAHAN BERBASIS ELEKTRONIK

Christhoper Kristian Darmawan, Ezra Sebastian, Frederick Leroy Notokusumo, Jeshua Resa Loprang

Abstract


The rapid advancement of information technology has introduced new challenges in cybercrime enforcement. The Bjorka case, involving data breaches and leaks of state secrets, highlights the weaknesses in Indonesia’s cyber regulations. This study aims to analyze the limitations and effectiveness of Indonesia’s Electronic Information and Transactions Law (UU ITE) and Personal Data Protection Law (UU PDP) in addressing cybercrime, comparing them with the cyber law framework in the United States. This research employs a normative juridical approach with a comparative analysis of both legal systems. The findings reveal that UU ITE lacks specific provisions on transnational cybercrime, cross-border jurisdiction mechanisms, and critical information infrastructure protection. In contrast, the United States has a more comprehensive legal framework, such as the Computer Fraud and Abuse Act (CFAA) and the CLOUD Act, which provide broader enforcement authority in handling similar cases. This study recommends the establishment of more specific cybercrime regulations, strengthening international cooperation, and enhancing law enforcement capabilities in cyber investigations. By implementing a more adaptive legal framework, Indonesia can effectively mitigate the growing threats of cybercrime thru Indonesia Cyber security and resilience law (RUU KKS)


Keywords


Jurnal Suara Keadilan

References


U.S. Code § 1030 - Fraud and related activity in connection with computers https://www.law.cornell.edu/uscode/text/18/1030

U.S. Code § 2511 - Interception and disclosure of wire, oral, or electronic communications prohibited https://www.law.cornell.edu/uscode/text/18/2511

U.S. Code § 2701 - Unlawful access to stored communications https://www.law.cornell.edu/uscode/text/18/2701

U.S. Code § 1831 - Economic espionage https://www.law.cornell.edu/uscode/text/18/1831

U.S. Code § 1028 - Fraud and related activity in connection with identification documents, authentication features, and information https://www.law.cornell.edu/uscode/text/18/1028

Abdul Wahid dan Mohammad Labib, Kejahatan Mayantara (Cyber Crime) (Bandung: Refika Aditama, 2005), 146.

Adami Chazawi, Hukum Pidana Positif Penghinaan, Edisi Revisi (Malang: Media Nusa Creative, 2013), 81.

Antonius Galih Prasetyo, “Prasyarat Keberhasilan Dan Nilai Tambah ‘Super App,’” Kompas.Id, July 31, 2022, accessed March 15, 2025, https://www.kompas.id/baca/opini/2022/07/28/prasyarat-keberhasilan-dan-nilai-tambah-super-app

Arifah, D. A. (2011). Kasus cybercrime di Indonesia. Jurnal Bisnis dan Ekonomi (JBE), 18(2).

Benzel, T. (2015). A strategic plan for cybersecurity research and development. IEEE Security & Privacy, 4, 3–5.

Chazawi, A. (2013). Hukum pidana positif penghinaan (Edisi Revisi). Malang: Media Nusa Creative.

Databoks.katadata.co.id. (2022). Indonesia masuk 3 besar negara dengan kasus kebocoran data terbanyak dunia: Databoks. Retrieved from https://databoks.katadata.co.id/teknologi-telekomunikasi/statistik/3f6a7dc0c5d0b7e/indonesia-masuk-3-besar-negara-dengan-kasus-kebocoran-data-terbanyak-dunia.

Desy Setyowati, “Daftar Data Diambil Hacker Bjorka Dan Bahayanya Bagi Warga Indonesia,” Teknologi Katadata.Co.Id, accessed March 15, 2025,https://katadata.co.id/digital/teknologi/631ec2eb7a23a/daftar-data-diambil-hacker-bjorka-dan-bahayanya-bagi-warga-indonesia

D. Hodges and S. Creese, “Understanding cyber-attacks,” Cyber warfare: A multidisciplinary analysis, pp. 33–60, 2015.

Dinda, A. L. S. (2024). Efektivitas penegakan hukum terhadap kejahatan siber di Indonesia. AL-DALIL: Jurnal Ilmu Sosial, Politik, dan Hukum.

Dss. (n.d.). Sistem pemerintahan berbasis elektronik (SPBE). Kementerian Pendayagunaan Aparatur Negara dan Reformasi Birokrasi. Retrieved from https://www.menpan.go.id/site/kelembagaan/sistem-pemerintahan-berbasis-elektronik-spbe-2.

Electronic Communications Privacy Act. (1986). Pub. L. No. 99-508, 100 Stat. 1848. Retrieved from https://www.congress.gov/bill/99th-congress/house-bill/4952.

Farmita, Artika Rachmi, and Inge Klara Safitri. “Sosok Bjorka, Peretas Yang Mengacak-ACAK Sistem Data Indonesia.” Tempo.Co. Tempo, September 12, 2022. Last modified September 12, 2022. Accessed March 15, 2025. https://www.tempo.co/infografik/infografik/sosok-bjorka-peretas-yang-mengacak-acak-sistem-data-indonesia-875.

Guffey, C. A. (2019). Customer Authentication in the Payment Industry (Order No. 13865720). Available from ProQuest Dissertations & Theses Global. (2219369436). https://www.proquest.com/dissertations-theses/customer-authentication-payment-industry/docview/2219369436/se-2

Hardiansyah, Z. (2022, September 7). Apa itu Breached Forums yang terlibat 4 kasus kebocoran data di Indonesia sebulan terakhir? Retrieved from https://tekno.kompas.com/read/2022/09/07/16150067/apa-itu-breached-forums-yang-terlibat-4-kasus-kebocoran-data-di-indonesia.

Hardiansyah, Z. (2022b, September 12). Rentetan aksi hacker Bjorka dalam kasus kebocoran data di Indonesia sebulan terakhir. Kompas.com. Retrieved from https://tekno.kompas.com/read/2022/09/12/11000027/rentetan-aksi-hacker-bjorka-dalam-kasus-kebocoran-data-di-indonesia-sebulan?page=all.

Hodges, D., & Creese, S. (2015). Understanding cyber-attacks. In Cyber warfare: A multidisciplinary analysis.

Hukumonline (2025) RUU KKS 2025: Kewajiban Pelaporan Insiden Siber Baru Bagi Penyelenggara https://pro.hukumonline.com/a/lt67b7e7443afc2/ruu-kks-2025--kewajiban-pelaporan-insiden-siber-baru-bagi-penyelenggara

Kasia, J. (2025, January 6). Indeks SPBE nasional meningkat, Menteri Rini: Penguatan integrasi pelayanan publik berbasis digital. Kementerian Pendayagunaan Aparatur Negara dan Reformasi Birokrasi. Retrieved from https://www.menpan.go.id/site/berita-terkini/indeks-spbe-nasional-meningkat-menteri-rini-penguatan-integrasi-pelayanan-publik-berbasis-digital.

Kane, S. (2020). Available, Granted, Revoked: A New Framework for Assessing Unauthorized Access Under the Computer Fraud and Abuse Act. The University of Chicago Law Review, 87(5), 1437-1477. https://www.proquest.com/scholarly-journals/available-granted-revoked-new-framework-assessing/docview/2425612708/se-2

Kementerian Komunikasi dan Informatika Republik Indonesia. (2013). Ancaman cyber attack dan urgensi keamanan informasi nasional. Retrieved from https://www.kominfo.go.id/index.php/content/detail/3479

Kurniawan, Galih Eko. (2019). OPINI: Urgensi UU Keamanan dan Ketahanan Siber. Available online from:https://opini.harianjogja.com/read/2019/10/08/543/1021151/opini-urgensi-uu-keamanan-dan-ketahanansiber

Leahy, G. F. (2022). Keeping gates down:Further narrowing the Computer Fraud and Abuse Act in the wake of Van Buren. William & Mary Business Law Review, 14.

National Cyber Security Alliance, Stop.Think.Connect,. [Online]. Available: www.stopthinkconnect.org/

Naskah Akademik RUU Keamanan dan Ketahanan Siber (RUU PKS) (2019) (https://berkas.dpr.go.id/akd/dokumen/RJ1-20190617-025848-5506.pdf

Marsa, M. (2022). Meninjau urgensi Undang-Undang Keamanan dan Ketahanan Siber di Indonesia. Retrieved from https://www.kompasiana.com/mochmarsa_t/5ea77147d541df16d93dab72/meninjau-urgensi-undang-undang-keamanan-dan-ketahanan-siber-di-indonesia?page=2&page_images=1.

Melynda Dwi Puspita and Grace gandhi, “Nama Bjorka Disebut-Sebut Dalam Pembobolan 6 Juta NPWP, Ada Data Milik Jokowi, Gibran, Hingga Sri Mulyani,” Tempo, September 19, 2024, accessed March 15, 2025, https://www.tempo.co/ekonomi/nama-bjorka-disebut-sebut-dalam-pembobolan-6-juta-npwp-ada-data-milik-jokowi-gibran-hingga-sri-mulyani--8048

Moch. (2022). Meninjau Urgensi Undang-Undang Keamanan dan Ketahanan Siber di Indonesia.Available online from: Taufiqurrohman https://www.kompasiana.com/mochmarsa_t/5ea77147d541df16d93dab72/meninjau-urgensi-undang-undang-keamanan-dan-ketahanan-siber-diindonesia?page=2&page_images=1

National cyber investigative joint task force releases ransomware fact sheet. (2021). Computer and Internet Lawyer, 38(5), 22. Retrieved from https://www.proquest.com/trade-journals/national-cyber-investigative-joint-task-force/docview/2630359675/se-2

P. Schwartz, “Scenarios for the future of cyber security,” America’s Cyber Future, vol. 2, pp. 217–228, 2011.

PERPRES No. 18 Tahun 2020. (n.d.). Database Peraturan | JDIH BPK. Retrieved from https://peraturan.bpk.go.id/Details/131386/perpres-no-18-tahun-2020.

PERPRES No. 95 Tahun 2018. (n.d.). Database Peraturan | JDIH BPK. Retrieved from https://peraturan.bpk.go.id/Details/96913/perpres-no-95-tahun-2018.

Prasetyo, A. G. (2022). Prasyarat keberhasilan dan nilai tambah “Super App.” Retrieved from https://www.kompas.id/baca/opini/2022/07/28/prasyarat-keberhasilan-dan-nilai-tambah-super-app.

Puspita, M. D., & Gandhi, G. (2024, September 19). Nama Bjorka disebut-sebut dalam pembobolan 6 juta NPWP. Tempo. Retrieved from https://www.tempo.co/ekonomi/nama-bjorka-disebut-sebut-dalam-pembobolan-6-juta-npwp-ada-data-milik-jokowi-gibran-hingga-sri-mulyani--804.

Rona, Nabella (2024) “Perjanjian Ekstradisi Dalam Penegakan Hukum Tindak Pidana Korupsi Di Indonesia” https://yustitia.unwir.ac.id/index.php/yustitia/article/download/123/107/281

Rongiyati, S. (2021). Urgensi sinergitas pengaturan perlindungan data pribadi dan keamanan siber nasional. Info Singkat: Kajian Singkat Terhadap Isu Aktual dan Strategis.

Schwartz, P. (2011). Scenarios for the future of cybersecurity. America’s Cyber Future.

Sigid Suseno, Yurisdiksi Tindak Pidana Siber (Bandung: Refika Aditama, 2012), 177–78.

Soullier, B. A. (2023). Decriminalizing trivial computer use: The need to narrow the Computer Fraud and Abuse Act (CFAA) after Van Buren. Federal Communications Law Journal, 76.

Suseno, S. (2012). Yurisdiksi tindak pidana siber. Bandung: Refika Aditama

Sulasi Rongiyati. (2021). Urgensi Sinergitas Pengaturan Perlindungan Data Pribadi dan Keamanan Siber Nasional. Info Singkat: Kajian Singkat Terhadap Isu Aktual dan Strategis, 13(11), 1-6.

Soullier, B. A. (2023). Decriminalizing Trivial Computer Use: The Need to Narrow the Computer Fraud and Abuse Act (CFAA) After Van Buren.Fed. Comm. LJ,76, 239.

Spiezia, Filippo (05/2022). "International cooperation and protection of victims in cyberspace: welcoming Protocol II to the Budapest Convention on Cybercrime". ERA Forum (1612-3093), 23 (1), p. 101.

Stigall, D. (2016). Countering convergence: "Central authorities" and the global network to combat transnational crime and terrorism. Air and Space Power Journal - Afrique & Francophonie, 1st Quarter 2016. George Washington University - Law School; U.S. Department of Justice.

T. Benzel, “A strategic plan for cybersecurity research and development,” IEEE Security & Privacy, vol. 4, pp. 3–5, 2015.

Thantawi. (2014). Perlindungan korban tindak pidana cyber crime dalam sistem hukum pidana Indonesia. Jurnal Ilmu Hukum Pascasarjana Universitas Syiah Kuala, 2(1).

United States Code. (n.d.). Title 18 - Crimes and criminal procedure. Retrieved from https://www.law.cornell.edu/uscode/text/18.

Wahid, A., & Labib, M. (2005). Kejahatan mayantara (cyber crime). Bandung: Refika Aditama.

Wahyuni, W. (n.d.). Jerat Hukum Peretasan oleh Hacker. Retrieved from https://www.hukumonline.com/berita/a/jerat-hukum-peretasan-oleh-hacker-lt631ec0ed9e52c

Wallace, I. (2013). The military role in national cybersecurity governance. Brookings.

Winarto, Yudho. (2022). RUU Keamanan dan Ketahanan Siber. Availabe online from: https://nasional.kontan.co.id/news/kominfo-dukung-ruukeamanan-ketahanan-siber-untuk-lengkapi-uu-ite.8Marsa

Zulfikar Hardiansyah, “APA ITU Breached Forums Yang Terlibat 4 Kasus Kebocoran Data Di Indonesia Sebulan Terakhir?,” KOMPAS.Com, September 7, 2022, accessed March 15, 2025,https://tekno.kompas.com/read/2022/09/07/16150067/apa-itu-breached-forums-yang-terlibat-4-kasus-kebocoran-data-di-indonesia

Hacker Bjorka Dalam Kasus Kebocoran Data Di Indonesia Sebulan Terakhir Halaman All,” KOMPAS.Com, September 12, 2022, accessed March 15, 2025, https://tekno.kompas.com/read/2022/09/12/11000027/rentetan-aksi-hacker-bjorka-dalam-kasus-kebocoran-data-di-indonesia-sebulan?page=all




DOI: https://doi.org/10.24176/sk.v26i1.14752

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

Flag Counter

View My Stats

Jurnal Suara Keadilan is licensed under CC BY-NC-SA 4.0