Law Enforcement Jurisdiction In Cybercrime Irpan Master of Notarial Sultan Agung Islamic University irfanmakkarumpa37@gmail. Abstract Crimes using technology, namely information technology, especially computers and the internet have reached an alarming stage. Combating internet crime has become a major portion of national and international law enforcement agencies and intelligence, including business practitioners, merchants, customers, and to the end-user. In most cases, internet crime starts with exploiting hosts and computer networks. The approach method used uses the normative juridical method, the results of the research obtained are that Law Enforcement regarding Cybercrime in Indonesia is manifested in the enactment of Law Number 11 of 2008 concerning Electronic Information and Transactions and has been updated by Law Number 19 of 2016 Amendments to Law Law Number 11 of 2008 concerning Information and Transactions. Electronic where the provisions in criminal law are applied by means of extensive interpretation of laws and regulations that explicitly regulate crimes that attack computers and Jurisdiction related to law enforcement is regulated in 3 . areas of law enforcement. First, the authority to make substantive law is called legislative jurisdiction. Second, the authority to judge or apply law is called judicial or applicative jurisdiction. Third, the authority to implement/ enforce legal compliance that he makes is called executive jurisdiction. Keywords: Cybercrime. Jurisdiction. Law Enforcement. Introduction The development of technology has been so rapid that there have been developments in various aspects of peopleAos lives. Including the business community, while in the trading community these technological advances have been used. Not only what happens in trade traffic, but also in the relationships that occur in these trade relations. Among the activities in trade, banking services are also used, where in this sector too there are developments that also use technological developments. Currently, a new legal regime has been born, known as cyber law. The term Aycyber lawAy is defined as the equivalent word for Cyber Law, which is currently internationally used for a legal term related to the use of information technology. Another term that is also used is the Loebby Loqman. Kapita Selekta Tindak Pidana Di Bidang Perekonomian. Cetakan Pertama. Datacom. Jakarta, 2002, page. Ay Omnibus Law Opportunities And Challenges Towards Entrepreneurs And Labor : Comparative Review lawAy Law of Information Technology. Virtual World Law and Mayantara Law. These terms were born considering internet activities and the use of virtual-based information technology. From the very beginning, people have always looked for convenience in carrying out activities in achieving life. This has been fulfilled by advances in technology. Even so, people are still not satisfied, so there is always a search for the possibility of convenience in fulfilling their On the other hand, in achieving their needs, someone often does something despicable. Either in the field of trade or in any field where the person carries out his activities. Included in this negative activity are activities in the banking sector. This is because in the banking sector, it is directly engaged in the money sector, so that it has attracted attention, whether in positive business ventures or activities that are negative in nature. Crime using technology, namely information technology, especially computers and the internet . yber crim. has reached an alarming stage. The progress of information technology, apart from bringing to the practical world of revolutionary business . igital revolution er. , turns out to have a terrible dark side, such as pornography, computer crime, even digital terrorism, trash information wars, and hackers. The rapid development of telecommunication and computer technology has brought legal development towards the fourth revolution in law enforcement construction in Indonesia. The success of national development requires a requirement for national resilience which is supported by community empowerment, which constitutes a condition for avoiding disturbances and threats, including in the form of crimes. Along with the advancement and development of science and technology in society, this also applies to the development of crime. The crimes committed have taken advantage of and exploited the opportunities provided by the convenience of modern instruments with sophisticated equipment, not traditional anymore. Such a crime is a crime with a new dimension. This term is to indicate a crime related to the development of society in the economic sector in an industrial society, the perpetrators consist of the wealthy, intellectual, and organized . ncluding white collar crim. Cyber crime or crime in cyberspace is a criminal activity that uses a computer network or computer as a tool, and is used as a target for the place where the crime occurs, also known as virtual world crime. Cyber crime is sometimes technically complex and legally complex. Thus, the rapid advances in information communication technology (ICT) functionality and the inherent disparities between legal systems globally are formidable challenges for first responders. Bonanda Japatani Siregar. Problem dan Pengaturan Cybercrime Melalui Aktifitas Internet Dalam Kasus Sara Di Pilkada Serentak 2018. Jurnal Penelitian Pendidikan Sosial Humaniora. Vol. No. 1 2018, Ade Maman Suherman. Aspek Hukum Dalam Ekonomi Global. Edisi Revisi. Ghalia Indonesia. Bogor, 2005. Supanto. Perkembangan Kejahatan Teknologi Informasi (Cyber Crim. dan Antisipasinya Dengan Penal Policy. Yustisia. Vol. 5 No. 1 Januari-April 2016, page. The 1th Proceeding International Conference And Call Paper Sultan Agung Islamic University investigative authorities, forensic interrogators, prosecution agencies and criminal justice 5 Cybercrime is also related to crime which is a process of dehumanization that will undermine trust among people. Corruption can arise through cyberspace that institutionalizes suspicion and creates a deep loss of trust in the organization. Cyber crime . is a new form of threat that has never existed before in the world community. Hacking, cracking, defacing, sniffing, carding, phishing, spaming, or scam are a series of internet crimes that are quite dangerous and have caused real losses to many parties. With this imbalance, that is, when information technology, in this case computer technology, especially the internet, has developed greatly even in remote villages and has been used as a means and media to commit crimes, our law cannot reach it so that technology criminals have not or even not. cannot be convicted and sentenced for his actions as well as unclear resolution of cases of other technological crimes that occur without our knowledge and without our knowing Combating internet crime has become a major portion of national and international law enforcement agencies and intelligence, including business practitioners, merchants, customers, and end-users. In most cases, internet crime starts with exploiting hosts and computer networks. therefore scammers and entrants are coming across the network, especially networks based on the TCP / IP protocol. With regard to cybercrime perpetrators who have unique characteristics, the author argues that imprisonment for cybercrime actors as practiced in Indonesia so far is an unwise This is due to the mismatch between the characteristics of the perpetrator of a criminal act and the system of guiding prisoners in prisons, so that the objectives of criminalization are regulated in the social law. The author argues that the type of imprisonment can be replaced with social work or supervisory penalties, because there is a match between the characteristics of cybercrime offenders and the criminal paradigm in social work and supervisory penalties, so that the purpose of punishment can be achieved. Social work and surveillance crimes are more humane and prospective than imprisonment. The results of research in several countries, social work punishment and supervision punishment are quite effective in applying to criminals, including cybercrime. In eight countries in the world threatening cybercrime offenders with social work penalties, and this is not against the provisions of the convention on cybercrime. The purpose of this study is to determine and analyze the jurisdiction of law enforcement regarding cybercrime where computer-related crimes are all forms of crime directed against Brown and Cameron S. Investigating and Prosecuting Cyber Crime: Forensic Dependencies and Barriers to Justice. International Journal of Cyber Criminology. Vol. No. 1, 2015, page. Andri Winjaya Laksana. Pemidanaan Cybercrime Dalam Perspektif Hukum Pidana Positif. Jurnal Hukum Unissula. Vol 35. No I . , page. Rachmat Rafiudin,Internet Foeronsik,CV Andi Offset. Yogyakarta, 2009, page. Ay Omnibus Law Opportunities And Challenges Towards Entrepreneurs And Labor : Comparative Review lawAy computers, computer networks and their users, and traditional forms of crime using or with the help of computer equipment. These crimes can be divided into two categories, namely cybercrime in a narrow sense and in a broad sense. Cybercrime in the narrow sense is a crime against computer systems, while cybercrime in a broad sense includes crimes against computer systems or networks and crimes that use computer facilities. Research Method The approach method used is juridical normative, namely research by examining library materials . econdary dat. or library law research. 8 The legal approach method is as a norm system building. The norm system in question is about the principles, norms, rules of legislation and doctrine. Normative juridical research examines the rule of law as a system building related to certain legal events. The type of data used in this research is secondary data which consists of primary legal materials, secondary legal materials, and tertiary law materials obtained from books, literature, papers, journals, laws and regulations, and other data sources. Secondary data collection was carried out using a literature approach method. The collection of legal materials is done by conventional search, collection and study of documents such as reading, viewing, listening, and information technology. Result and Discussion. Cybercrime Criminal Law Enforcement in Indonesia The development of the use of information technology (IT) in Indonesia has formed a regime in which all life activities can be carried out on a digital basis. Various facilities can be obtained but various problems will also arise if there is no strong regulation on Information The number of problems is indicated by the increasing number of cybercrime in Indonesia which is very worrying. To ensure benefit, justice, and balance and harmony, the state . has created policies related to criminal acts, both through the Penal policy . he eradication of crime with criminal la. and the non-Penal policy . he eradication of crime without criminal la. 9 One of the governmentAos Penal policies in an effort to eradicate cybercrime . yber crim. is by issuing Law Number 11 of 2008 concerning Electronic Information and Transactions which was passed on April 21, 2008. This law covers a broad range of matters and is adapted to current needs. As is known, currently has Law Number 11 of 2008 concerning Electronic Information and Transactions. However, the ITE Law is in fact still unable to solve current problems. Ediwarman. Monograf Metodologi Penelitian Hukum, genta Publishing. Yogyakarta, 2016, page. Widodo. Aspek Hukum Pidana Kejahatan Mayantara. Aswaja Pressindo. Yogyakarta, 2013, page. Ahmad Muyasir. Kejahatan Defecting: Studi Perbandingan antara Undang-Undang ITE dan Hukum Pidana Islam. Al-Mazahib. Volume 3. Nomer 1. Juni 2015, page. The 1th Proceeding International Conference And Call Paper Sultan Agung Islamic University especially in the context of building ethics for media users to use social media in accordance with their freedom guaranteed by the constitution. As for the hustle and bustle of this political year. Law Number 19 of 2016 concerning Amendments to Law Number 11 of 2008 concerning Electronic Information and Transactions was born (Law Number 19 of 2. This law is a change from the ITE Law and was born as a constitutional solution from the state to regulate ethics for media users in exercising their freedom on social media and preventing cybercrime in Indonesia. Relating to cybercrime in Indonesia, until this time the majority of cybercrime has not been regulated in a clear legal norms in the legislation, because it was in prosecuting cybercrime applied the provisions of the Criminal Code and the provisions of the Act beyond the Criminal Code. The provisions in the Criminal Code that can be used to prosecute cybercrime by means of extensive interpretation are provisions on the crime of forgery . s regulated in Article 263 to Article . , theft . s regulated in Articles 362 to . , fraud . s referred to regulated in Articles 378 to . , and the crime of damage to property . s regulated in Articles 407 to Imprisonment for perpetrators of cybercrime in the Draft Bill is also very dominant, in fact none of the types of crimes that are not punishable by imprisonment. Based on the comparison between the results of a study of the 56 foreign nationals with criminal law provisions in the Indonesian criminal law and the Criminal Code draft above can be seen kind of criminal imprisonment be the most dependable staple in most countries criminal policies. Completion of cybercrime is an indicator of a decrease in work ability of Indonesian National Police in the investigation, as well as a decrease in the ability of the criminal law in solving the crime. Factors decline in legal ability to solve crimes occur because of the legal structure of the legal function is not developed in parallel so that law enforcement tends to The threat of imprisonment for cybercrime perpetrators in the Draft Criminal Code is also very dominant, in fact there is no single type of crime that is not punishable by imprisonment. Based on a comparison between the results of a study of 56 criminal laws of foreign countries with the provisions in Indonesian criminal law and the Draft Criminal Code above, it can be seen that the type of imprisonment is the most reliable principal criminal in the criminal policy of most countries. Achmadudin Rajab. Urgensi Undang-Undang Nomor 19 Tahun 2016 Tentang Perubahan Atas UndangUndang Nomor 11 Tahun 2008 Tentang Informasi Dan Transaksi Elektronik Sebagai Solusi Guna Membangun Etika Bagi Pengguna Media. Jurnal Legislasi Indonesia. Vol. 14 No. 04 Desember 2017, page. Andri Winjaya Laksana. Cybercrime Comparison Under Criminal Law In Some Countries. Jurnal Pembaharuan Hukum. Vol V No. 2 April-Agustus 2018, page. Mahfud MD. Politik Hukum Nasional. Alumni. Bandung, 2000, page. Barda Nawawi Arief, kebijakan legislatif dalam penanggulangan kejahatan dengan pidana Ay Omnibus Law Opportunities And Challenges Towards Entrepreneurs And Labor : Comparative Review lawAy Based on the description of the criminal law that regulates cybercrime in Indonesia, it can be concluded as follows. In regulating Cybercrime, there are 4 alternative arrangements, namely . enforcing the conventional Criminal Code by expanding the meaning of certain terms through legal interpretation, . amending the Criminal Code, . issuing laws and regulations that specifically regulate crimes that related to computers. amending the Criminal Code as well as issuing a special law that regulates Cybercrime. The country that regulates cybercrime for the first time in special laws, and has the most laws and regulations governing the world of AymayantaraAy . is the United States. While the country that last issued a Special Law that regulates Cybercrime was Mauritius in 2003 (The Computer Misuse And Cybercrime Act 2. The material of Law Number 19 Year 2016 ITE in general includes information and electronic documents, sending and receiving of electronic mails, electronic signatures, electronic certificates, and electronic system operations. Based on the description of crime cases and the application of criminal law enforcement above, it can be concluded as follows: Provisions in criminal law are applied by means of extensive interpretation. Laws and regulations that explicitly regulate crimes that attack computers are only the Telecommunications Law. Meanwhile, the only law that specifically regulates computer program piracy is the Copyright Law. The types of punishment imposed are imprisonment and fines. When compared with the provisions in the Convention on Cybercrime, the forms of cybercrime in Indonesia that have already been tried are data interference . amely cases of breaching the KPU site. Computer Realeted Fraud . amely cases of corruption in several bank. Computer Realeted Forgery, offenses Realeted to infrigement of copyright and related rights . amely the case of piracy of the Word Star computer program version 5. Criminal Law Jurisdiction in Cybercrime Jurisdiction is very crucial and complex, especially with regard to the disclosure of international cybercrime . nternational cybercrim. With the existence of jurisdiction certainty, a country gets full recognition and sovereignty for its various rules and policies in full. This power must also be respected by every other country as the power possessed by other countries. The jurisdiction of a country that is recognized by international law in a conventional Badan Penerbit Universitas Diponegoro. Semarang, 1996, page. Sri Sumarwani. Tinjauan Yuridis Pemidanaan Cybercrime Dalam Perpektif Hukum Pidana Positif. Jurnal Pembaharuan Hukum. Volume I No. 3 September-Desember 2014, page. Yudha Bhakti Ardhiwisastra, 1999. Imunitas Kedaulatan Negara di Forum Pengadilan Asing. Alumni. Bandung, page. The 1th Proceeding International Conference And Call Paper Sultan Agung Islamic University sense, is based on geographic boundaries, while multimedia communication is international, multi-jurisdictional, without borders, so that until now it is not certain how the jurisdiction of a country can be applied to multimedia communication as one of the uses. Technology. In relation to the determination of the applicable law, there are several commonly used principles, namely:17 Subjective territoriality, which emphasizes that the validity of the law is determined based on the place where the act is committed and the settlement of the crime is committed in another country. Objective territoriality, which states that the applicable law is the law where the main result of the act occurs and gives a very detrimental impact to the country Nationality which determines that the state has jurisdiction to determine laws based on the nationality of the perpetrator. Passive nationality emphasizing jurisdiction based on the nationality of the victim. Protective principle which states that the law is enforceable based on the desire of the state to protect the interests of the state from crimes committed outside its territory, which is generally used if the victim is the state or the government. Universality. The principle of Universality should receive special attention related to legal handling of cyber cases. This principle is also known as Auuniversal interest jurisdictionAy. At first the principle of Universality stipulated that every country has the right to arrest and punish the perpetrators of piracy. This principle was later expanded to cover crimes against humanity, for example torture, genocide, air hijacking and others. Although in the future the principle of universal jurisdiction may be developed for internet piracy, such as computers, cracking, carding, hacking and viruses, it should be considered that the use of this principle is only applicable to very serious crimes based on developments in international law. It must be admitted that applying proper jurisdiction to crimes in cyberspace . is not an easy job, because the type of crime is international in nature so that it has a lot to do with the sovereignty of many countries . egal systems of other countrie. With regard to this jurisdiction, an important question that must be raised is the extent to which a state has given its authority to the courts to try and punish the perpetrators of criminal acts. Regarding cyberspace crimes. Darrel Menthe stated that jurisdiction in cyberspace requires clear principles rooted in international law. Furthermore. Menthe stated that by Ahmad M. Ramli. Perkembangan CyberLaw Global dan Implikasinya Bagi Indonesia. Makalah Seminar The Importance of Information System Security in E-Government,Tim koordinasi Telematika Indonesia. Jakarta, 28 Juli 2004, page. Ay Omnibus Law Opportunities And Challenges Towards Entrepreneurs And Labor : Comparative Review lawAy recognizing the principles of jurisdiction that apply in international law in cyberspace activities by each country, it will be easy for countries to collaborate in order to harmonize criminal provisions to tackle cybercrime. This opinion of the Minister can be interpreted that by recognizing the principles of jurisdiction that apply in international law in cyberspace activities by each country, it will be easy for countries to carry out cooperation in order to harmonize criminal provisions to tackle According to Masaki Hamano, there are three scopes of jurisdiction in cyberspace, as quoted by Barda Nawawi Arief which is owned by a country regarding the determination and implementation of supervision of every event, every person and every object. The three categories of jurisdiction, namely: legislatif jurisdiction or jurisdiction to prescribe. judicial jurisdiction or jurisdiction to adjudicate. And executive jurisdiction or jurisdiction to enforce. The jurisdiction above relates to the limits of state authority in three areas of law First, the authority of making substantive laws . ence, called legislative jurisdiction, or can also be called Auformulative jurisdictionA. Second, the authority to judge or apply the law . ence the name judicial or applicative jurisdictio. Third, the authority to carry out / enforce legal compliance that is made by it . herefore, it is called executive jurisdictio. 18 According to Barda Nawawi Arief, the problem of jurisdiction that stands out is the problem of judicial jurisdiction . he authority to judge or apply the la. and executive jurisdiction . he authority to implement a decisio. rather than the issue of legislative jurisdiction . awmaking authorit. with the territorial sovereignty and the legal sovereignty of each country. The countries that are members of the European Union (Council of Europ. on 23 November 2001 in the city of Budapest. Hungary have made and agreed on the Convention on Cybercrime which was then included in the European Treaty Series with Number 185. The purpose of the Convention is to protect the public from cybercrime , either through law or international cooperation. This is intended to overcome cyber crime, without reducing the opportunity for each individual to continue to be able to develop creativity in the development of information technology. In Section 3. Article 22 of the Convention is governed by matters of jurisdiction, it is stated: Each Party shall adopt such legislative and other measures as may be necessary to estabilish jurisdiction over any offence estabilished in accordance with Article 2 through 11 of this convention,when the offence is Barda Nawawi Arief. Kapita Selekta Hukum Pidana. Citra Aditya Bakti. Bandung, 2003, page. Barda Nawawi Arief. Sari Kuliah: Perbandingan Hukum Pidana. Raja Grafindo Persada. Jakarta, 2006. The 1th Proceeding International Conference And Call Paper Sultan Agung Islamic University commited: In its teritorry. On board a ship flying the flag of that party. On board an aircraft registered under the laws of that party. By one its national,if the offence is punishable under criminal law where it was commited outside the territorial jurisdiction of any Each party may reserve the right not to apply only in specific cases or conditions the jurisdiction rules laid down in paragrphs 1. b through d of this article or any part there of. Each party shall adopt such measures as may be necesarry to estabilish jurisdiction over the offences reffered to in Article 24,paragraph 1, of this convention, in cases where an alleged offender is present in its territory and it does not estradite him or her to another party,solely on the basis of his or her natonality,after a request for extradition. This convention does not exclude any criminal jurisdiction exercised by a Party in accordance with its domestic law. when more than one Party claims jurisdiction over an alleged offence estabilished in accordance with this Convention, the Parties involved shall, where apporiate,consult with a view to determining the most apporiate jurisdiction for prosecution. The issue of jurisdiction relates to the ability of a particular forum to hear cases . djudicate jurisdictio. Jurisdiction in cybercrime can use theory:20 The therory of uploader and downloader. Uploader adalah pemberi informasi dan downloader adalah penerima transaksi elektronik. The law of the server. Jurisdiksi ditentukan dengan menggunakan atau memperlakukan server dimana webpages secara fisik berlokasi,yaitu dimana mereka dicatat sebagai data elektronik. The theory of internasional spaces, ada usulan bahwa internet dijadikan ruang tersendiri, menjadi ruang ke empat setelah air, darat, dan udara. Regulations regarding the issue of jurisdiction are important, and in the formation of a special law on cybercrime, it is necessary to think about a form of jurisdiction capable of reaching crimes in the cyber world, considering that this crime has a unique character and is transborder in nature. Thus the application of the universal principle . biquity principl. can be used as well as the need for cooperation with other countries. Edmon Makarim. Kompilasi Hukum Telematika. Raja Grafindo Persada. Jakarta, 2003, page. Ay Omnibus Law Opportunities And Challenges Towards Entrepreneurs And Labor : Comparative Review lawAy Conclusion. Law Enforcement regarding Cybercrime in Indonesia is manifested in the enactment of Law Number 11 of 2008 concerning Electronic Information and Transactions and has been updated by Law Number 19 of 2016 Amendments to Law Law Number 11 of 2008 concerning Information and Transactions. Electronic where the provisions in criminal law are applied by means of extensive interpretation of laws and regulations that explicitly regulate crimes that attack computers and Jurisdiction related to law enforcement is regulated in 3 . areas of law enforcement. First, the authority to make substantive law is called legislative jurisdiction. Second, the authority to judge or apply law is called judicial or applicative jurisdiction. Third, the authority to implement/ enforce legal compliance that he makes is called executive jurisdiction BIBLIOGRAPHY