Dampak Implementasi Lawfull Interception pada Pemberantasan Tindak Pidana Terorisme
DOI:
https://doi.org/10.55927/fjmr.v1i2.551Keywords:
Lawful Interception, Terrorism, Crime, Investigation, PolicingAbstract
The terrorism is crime categorized as a serious threat that requires speed of handling with the support of access to accurate and fast information. The Lawful Interception approach that has been accommodated in the latest revised terrorism law has made an important contribution. This is a new way to speed up the investigation of criminal acts of terrorism. The research was conducted qualitatively by studying literature and in-depth interviews with 3 informants. The research focus on law enforcement for criminal acts of terrorism in Indonesia. The results of the research study state that the impact of Lawful Interception has a significant influence in assisting the process of disclosure and investigation of criminal acts of terrorism. However, there is a need for oversight and procedures to guard against potential breaches of privacy.
Downloads
References
Technical Report, Lawful Interception (LI); Concepts of Interception in a Generic Network Architecture, ETSI TR 101 943 V2.2.1 (2006-11)
Ardhiansyah, Wellza., (2012), Tesis, "Tindakan penyadapan pada hakikatnya merupakan tindakan yang dilarang dalam hukum pidana akan tetapi merupakan tindakan yang sangat diperlukan dalam proses penegakan hukum terutama terkait kejahatan yang sulit dibuktikan", Jakarta: Universitas Indonesia.
Borg , Lars C. (2017). Improving Intelligence Analysis: Harnessing Intuition and Reducing Biases by Means of Structured Methodology, The International Journal of Intelligence, Security, and Public Affairs, 19:1, 2-22.
Christianto, Hwian, (tanpa tahun),Tindakan Penyadapan ditinjau dari Perspektif Hukum Pidana, Dosen Fakultas Hukum Universitas Surabaya, Jawa Timur, Email: hwall4jc@yahoo.co.id
Congram , Mitchell & Bell, Peter (2010) Laying the Groundwork for the Successful Deployment of Communication Interception Technology (CIT) in Modern Policing, Journal of Policing, Intelligence and Counter Terrorism, 5:1, 9-27, DOI: 10.1080/18335300.2010.9686938.
Deflem , Mathieu (Ed).(2004). Terrorism And Counter-Terrorism:Criminological Perspectives. Department of Sociology. University of South Carolina, USA.
Dempsey, M. 2013. Joint intelligence. Joint Publication, 2–0.
Dwilaksana, Chryshnanda. (2020). Bagimu Negeri Untuk Semakin Mencintai Indonesia. Jakarta : YPKIK (Yayasan Pengembangan Kajian Ilmu Kepolisian)
Gardner, Jeffrey & Riedel, Eric. (2017). A Duty to Share: The Opportunities and Obstacles of Federal Counterterrorism Intelligence Sharing with Nonfederal Fusion Centers. 10.13140/RG.2.2.29633.45923.
Graham, Robert. (2016). “How Terrorists Use Encryption,” CTC Sentinel, Vol. 9.6, 2016, https:// ctc.usma.edu/posts/how-terrorists-use-encryption.
Harrison, Seth. “Evolving Tech, Evolving Terror”, research intern with the Transnational Threats Project at CSIS. Sumber :
Hasani , Ismail & Naipospos, Bonar Tigor (Editor). (2012). Dari Radikalisme Menuju Terorisme: Studi Relasi Dan Transformasi Organisasi Islam Radikal Di Jawa Tengah & D.I. Yogyakarta. Jakarta : Pustaka Masyarakat Setara
Herold, Rebecca. (2011). Managing an Information Security and Privacy Awareness and Training Program, USA, CRC Press
Hoffman, Bruce. (2017). Inside Terrorism, Third Edition. New York. Columbia University Press, https://www.csis.org/npfp/evolving-
tech-evolving-terror, tanggal akses 8 Maret 2022.
Istiqomah, Milda. (2013). Perbandingan Hukum Pengaturan Tindakan Penyadapan (Wiretapping) di Indonesia dan Filipina. Arena Hukum Volume 6, Nomor 1, April 2013, Halaman 1-151..Fakultas Hukum Universitas Brawijaya, Jl. Mayjen Haryono 169, Malang, email: milda.istiqomah@ub.ac.id
Kbarek, Leonard J.F., & Patiran , Andarias. (2012). Analisis Pengaruh Pelatihan Terhadap Kinerja Personil Pada Satuan Detasemen Khusus 88 Anti Teror Polda Papua, (Jurnal Fokus Ekonomi), Vol. 7 No. 1 Juni 2012 : 83 – 92
Kumar, Narender. (2019). Use of Modern Technology to Counter Terrorism.
Mahyudin, Emil. (2016). Tantangan Intelijen Dalam Kontra-Terorisme di Indonesia: Suatu Pandangan, Departemen Hubungan Internasional Universitas Padjadjaran email: emil.mahyudin@unpad.ac.id, Journal of International Studies, e-ISSN 2503-443X Volume 1, No. 1, November 2016 (23-35) doi:10.24198/intermestic.v1n1.3
Muradi, (2017), “Polri dan UU Anti Teror Baru, Jurnal Ilmu Kepolisian”, Edisi 089, Agustus-Oktober 2017.
Nunan, J., Stanier, I., Milne, R., Shawyer, A., & Walsh, D. (2020). “Source Handler perceptions of the interviewing processes employed with informants. Journal of Policing, Intelligence and Counter Terrorism”, 15(3), 244-262.
Prunckun, Hank. (2002). Counterintelligence Theory and Practice. United Kingdom: Rowman & Littlefield Publisher, Inc
Seth, Shashi Mehrotra & Mishra, Rajan, (2011), “Comparative Analysis Of Encryption Algorithms For Data Communication”, International Journal of Computer Science and Technology (IJCST) Vol. 2, Issue 2, June 2011
Shaffan, Ahmad Mafud. (2018). Respons Indonesia terhadap Kasus Penyadapan Australia, Journal of International Relations, Volume 4, Nomor 2, 2018, hal. 285-294, Online di http://ejournal-s1.undip.ac.id/index.php/jihi
Škrtić , Dražen. (2016). (Ministry of Interior Republic of Croatia), Lawful Interception: European Union Legal, Framework,
https://www.researchgate.net/publication/275462294
Smith, Megan J."Correctional Agencies Receive Assistance From the Law Enforcement Analysis Facility", (Megan J. Smith, LEAF technical administrator, coordinates statistical information regarding technology success and is the facility technical writer), www.nlectc.org/nlectcne tanggal akses 9 Mei 2022
Zeiger, Sara.(2016). Melemahkan Narasi Ekstremis Brutal di Asia Tenggara Sebuah Panduan Praktis. Canberaa: Alhedayah, (naskah lanjutan dari Australia’s Regional Summit To Counter Violent Extremism (Cve)
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Ade Mulya, Marzuki Ismail, R. Bayu Yuliantoro, Heriyanto Kandati

This work is licensed under a Creative Commons Attribution 4.0 International License.




























