Cybercrime Comparison Under Criminal Law in Some Countries

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

CYBERCRIME COMPARISON UNDER CRIMINAL LAW IN SOME COUNTRIES

Andri Winjaya Laksana


Faculty of Law UNISSULA
andriwinjaya@gmail.com

Abstract
Cybercrime has been become a major portion for law enforcement agencies and intelligence services
to both national and international matter, development of information and technology’s crime
resulted in every country have a different policy of criminalization. The emphasis on cross-country
has made a crime on the internet is not just a national issue, but has become an International
problem. therefore it is important to have uniformity in the prevention of cybercrime that this crime
can be solved. Based on the comparison of cybercrime that included the rules from various countries
including the United States, Singapore, the Netherlands, the Philippines, Myanmar as a reference in
the application of criminal law enforcement regulations regarding cybercrime seal the document.

Keywords: Cybercrime; Comparison; Some Countries.

A. INTRODUCTION real life which we have long struggled with


The development of technology has all existing heritage. Netizens can see this
been significant, so that there was as a problem to be solved before it moves
development in various aspects of further down the road and alleys of
community life. Including the business cyberspace.
community, while the trade community From the beginning people are
had used the technology advances. Not always looking for ease in carrying out the
only that occurred in trade traffic, but also activities in achieving life. It has been
in the trade relationship. Among the fulfilled with the advancement of
activities in the trade are also used technology. Nonetheless, people are still
banking services, in which the not satisfied, so always look for the
development occurs even this sector are possibility to easily meet their needs.
also technological developments.1 On the other hand to achieve
Developments in information common needs someone actually doing is
technology have transformed almost all reprehensible. Both in the field of trade
facets of life. In one side of the computer and nor in any field where people are
technology has the advantage of an doing business. Included in the negative
opportunity to get information, work, activities are the activities in the field of
participate in politics and democratic life banking. Resulting also in the banking
and other advantages, but on the other sector is directly engaged in the money, so
hand, information technology will "bite" it is very gimmicky, whether in business
ventures which can be positive or negative
1 Loebby Loqman 2002, Kapita Selekta Tindak Pidana Di events.
Bidang Perekonomian, First Edition, Datacom, Jakarta,
P.46.

Jurnal Pembaharuan Hukum CYBERCRIME COMPARISON UNDER CRIMINAL LAW


Vol V No.2 April – Agustus 2018 IN SOME COUNTRIES 217
Andri Winjaya Laksana
Crime by using technology, namely spawned new unrest-unrest with the
information technology, especially advent of sophisticated crime in the form
computers and the Internet (cyber crime) of cyber crime.
has reached the stage of worrying. In accordance with the development
Advances in information technology, in of science and technology, especially
addition to bringing the business world information and communication
into a revolutionary (digital revolution era) technologies have contributed to improve
the very practical, it has a horrible dark actions, dissemination and use of the
side, such as pornography, computer Internet that an adverse influence on the
crimes, even digital terrorism, information moral and noble personality of the
warfare garbage, and hackers.2 Indonesian nation that threatens the life
The rapid development of and social fabric of Indonesian society.3
telecommunications technology and With the existence of this gap, the
computer technology produces current information technology in this case
multifunctional internet. This development is a computer technology, especially the
brings us to the threshold of the fourth Internet has been highly developed in
revolution in the history of human thought remote villages though and has been used
when the review of the construction of as a means and media to commit crimes,
human knowledge which is characterized the law we can not reach them so that the
by the way of thinking without borders perpetrators of crimes technology has not
(borderless way of thinking). Acceleration yet or no can not be convicted and
technology progressively increasing the sentenced for the act of doing and their
material cause continuous changes in all completion is not clear to cases of crimes
interactions and activities of the other technologies is the case without the
information society. knowledge and without us knowing.
Advances in technology have Cybercrime has been become a
brought about changes and rapid shifts in major portion for law enforcement
a life without limits. Utilization of these agencies and intelligence services to both
technologies have encouraged rapid national and international non-pratisi
business growth, due to a variety of exception practitioners of business, the
information can be presented via a long merchant, the customer, to the end-user.
distance relationship and those who want In most cases, Internet crime begins by
to enter into transactions do not have to exploiting the hosts and computer
meet face to face, but simply through a networks therefore the swindlers and
computer and telecommunications entruder coming across networks,
equipment. Developments in information especially networks based on TCP/IP
technology also establish a new world protocol.4
society that is no longer hindered by
territorial boundaries and have reversed
everything away so close to the imaginary 3 Suratman, Andri Winjaya Laksana, Analisis Yuridis
Penyidikan Tindak Pidana Pornografi Berdasarkan
so real. But behind the progress it has also Undang-Undang Nomor 44 Tahun 2008 di Era
Digitalisasi, Jurnal pembaharuan hukum, Volume I
2 Ade Maman Suherman 2005, Aspek Hukum Dalam No. 2 Mei-Agustus 2014, P.169.
Ekonomi Global, Revised Edition, Ghalia Indonesia, 4 Rachmat Rafiudin 2009, Internet Forensik, CV Andi
Bogor, P.189. Offset, Yogyakarta, P.1

CYBERCRIME COMPARISON UNDER CRIMINAL LAW Jurnal Pembaharuan Hukum


218 IN SOME COUNTRIES Vol V No.2 April – Agustus 2018
Andri Winjaya Laksana
In connection with the perpetrators facilities. The only international instrument
of cybercrime that has unique which regulates Cybercrime is the
characteristics, the authors argue that the Convention on Cybercrime, signed in
imposition of imprisonment for Budapest (Hungary) in 2001. The
perpetrators of cybercrime as practiced in Convention is directed mainly in an effort
Indonesia for this is a step that is not wise. to (1) the harmonization of the elements
This is caused by the mismatch between of the laws governing material criminal
the characteristics of the offender with offense under national law in conjunction
guidance systems inmates in correctional with the provisions of Cybercrime, and (2)
institutions, so that the objective of complete the formal criminal law of
sentencing how regulated in the law national importance to the process of
community will not be achieved. The investigation, investigation, and
author argues kind of imprisonment can be prosecution of offenders who use or
replaced with social work or criminal addressed on a computer system, along
criminal surveillance, because there is a with the evidence relating to these crimes.
match between the characteristics of the Currently the convention already in
perpetrators of cybercrime with the force, because it meets the requirements
paradigm of punishment in criminal social stipulated in the convention. Convention
work and criminal surveillance, so that the on Cybercrime does not regulate in detail
purpose of punishment can be achieved. about the types of sanctions that can be
Criminal and criminal social work and threatened left entirely to the parties
prospective surveillance more humane ratifying or acceding to the treaty. The
than imprisonment. Results of research in penalties may be imposed on people who
some countries, social work and criminal commit a violation of the provisions of
criminal pretty effective supervision applied Article 2 through Article 12 is sanctions
to the perpetrators of the crime, including that are effective, proportionate, and can
cybercrime. In eight countries around the educate, including criminal deprivation of
world threatened by the criminal liberty (imprisonment).
perpetrators of cybercrime social work, Under the provisions of Article 13
and it is not contrary to the provisions of can be seen that each State authorities
the convention on cybercrime. determine what kind of sanctions
Computer-related crime is an overall threatened against the perpetrators of
form of crime directed against the cybercrime to everyone, whether human
computer, computer network and its users or legal entities.
and traditional forms of crime that use or
with the aid of computer equipment. The B. DISCUSSION
offense is differentiated into two Relating to cybercrime in Indonesia,
categories namely Cybercrime. It is in the until this time the majority of cybercrime
narrow sense and in a broad sense. has not been regulated in a clear legal
Cybercrime in the narrow sense is a norms in the legislation, because it was in
crime against computer systems, while prosecuting cybercrime applied the
cybercrime in the broad sense includes provisions of the Criminal Code and the
crimes against the system or computer provisions of the Act beyond the Criminal
network and crimes using computer Code. The provisions in the Criminal Code

Jurnal Pembaharuan Hukum CYBERCRIME COMPARISON UNDER CRIMINAL LAW


Vol V No.2 April – Agustus 2018 IN SOME COUNTRIES 219
Andri Winjaya Laksana
that can be used to prosecute cybercrime Iceland, Jamaica, Nicaragua, Slovakia,
by way of interpretation, extensive is the Slovenia, Sri Lanka, and Tunisia. etc.,
provision on the crime of counterfeiting (as obtained descriptions of Cybercrime
stipulated in Article 263 to Article 276), the settings as follows:
crime of theft (under Article 362 up to a. Countries that have not made
367), the crime of fraud (as under Article amendments to the Criminal Code
378 up to 395), and the crime of and does not have specific
destruction of goods (as stipulated in legislation to regulate Cybercrime is
Article 407 through Article 412). Argentina, Bangladesh, Bostwania,
Imprisonment for perpetrators of Cyprus, Cezhnya, Iceland, Jamaica,
cybercrime in the Draft Bill is also very Nicaragua, Slovakia, Slovenia, Sri
dominant, in fact none of the types of Lanka, and Tunisia. 7
crimes that are not punishable by b. The countries who have made
imprisonment. Based on the comparison amendments to the Criminal Code is
between the results of a study of the 56 Azerbaijan, the Netherlands,
foreign nationals with criminal law Byelorussian, Denmark, Estonia,
provisions in the Indonesian criminal law Finland, Georgia, Germany, Hungary,
and the Criminal Code draft above can be Italy, Canada, Kazakhstan,
seen kind of criminal imprisonment be the Kyrgyzstan, Korea, Croatia, Latvia,
most dependable staple in most countries Lithuania, Malta, Mexico, Norway,
criminal policies.5 France , Peru, Poland, Russia,
Completion of cybercrime is an Tajikistan, Turkmenistan, New
indicator of a decrease in work ability of Zealand, Slovakia, Slovenia, Spain,
Indonesian National Police in the Sweden, Switzerland, Tunisia,
investigation, as well as a decrease in the Turkey, Ukraine, Uzbekistan, and
ability of the criminal law in solving the Greece8
crime. Factors decline in legal ability to c. Countries that amend the Criminal
solve crimes occur because of the legal Code simultaneously publish the Law
structure of the legal function is not especially set Cybercrime is the
developed in parallel so that law United States, China, (Computer
enforcement tends to weaken.6 Information Network and Internet
Comparison criminalization of Security, Protection And
"cybercrime" in seventy foreign countries Management Regulation), Korea (Act
are: Albania, South Africa, Argentina, USA, on Promotion of Information and
Azerbaijan, Bangladesh, the Netherlands, Comunications Network Utilization
Belgium, Botzwania, Brazil, Bulgaria, and Information Protection, etc; and
Blyelorusia, Chile, China, Cyprus, Cheznya, Infratructure Information Protection
Denmark, Estonia, Finland, Georgia, Italy, Act), Malta (Computer Misuse 2001),
and Nicaragua (Copyright Law of
1999)9
5 Barda Nawawi Arief, 2003, kebijakan legislatif dalam
penanggulangan kejahatan dengan pidana penjara ,
Publisher Agency Diponegoro University, Semarang, 7 http: www.cybercrimelawnet. accessed on 20
P.201-202 November 2016 23:40 GMT
6 Mahfud MD, in 2000, Politik Hukum Nasional, Alumni, 8 Ibid.
Bandung, P. 35 9 Ibid.

CYBERCRIME COMPARISON UNDER CRIMINAL LAW Jurnal Pembaharuan Hukum


220 IN SOME COUNTRIES Vol V No.2 April – Agustus 2018
Andri Winjaya Laksana
Based on the exposure of the national issue, but has become an
criminal law governing cybercrime can be International problem. This can be seen
summed up as follows; from the recommendations issued by the
a. In regulating Cybercrime, there United Nations through a congress or also
are four alternative the Council of Europe.
arrangements, namely (1) Combating the crime of information
enforce the Criminal Code technology into a problem in the countries
conventionally by expanding the of the world. The arrangement is also
understanding of certain terms different in each country. Therefore, it
through the interpretation of the needs study comparative law (comparative
law, (2) to amend the Criminal juridical) to determine how well the legal
Code, (3) issuing regulations that arrangements to forward the issue of
specifically regulate related crime criminal offenses related to information
with the computer; and (4) to technology, especially the criminalization
amend the Criminal Code at the and regulation models.
same time issuing a special Act
governing cybercrime. 1. United States of America
b. State that the first set of Widespread use of the Internet that
cybercrime legislation in is unmatched in the United States has led,
particular, and have at most and continues to cause various studies,
legislation governing the world policy proposals and draft legislation that
"cybercrime" (cyberlaw) is the regulate against the abuse of the use of
United States. While the latter technology’s information. The United
country issuing Special Act States has imposed a variety of laws that
governing Cybercrime is Mauritius criminalize acts associated with the
in 2003 (The Computer Misuse criminal offense of information technology.
And Cybercrime Act 2003) Cybercrime settings in the United
Criminalization in cyberspace by States, among others, the Computer Fraud
special arrangement outside the Criminal and Abuse Act (Title 18 Part I Chapter 47
Code should be done carefully, not to Section 1030 entitled "Fraud and related
create the impression which violates the activity in connection with computers"), in
principle of Ultimum Remedium (Ultima the United States Congress in 1986 which
Ratio Principle) and backfired in the social aims to tackle the hacking to computers.
life in the form of excessive criminalization The setting of the Computer Fraud and
(over-criminalization), which actually Abuse Act amended in 1994, 1996 and
reduces authority of the law. Juridical 2001. The forms of information technology
comparative study was instrumental in criminal offense stipulated in Section 1030
conducting criminal offenses prevention are as follows:10
policy information technology in the future. "whoever –
The development of information 1. having knowingly accessed a computer
technology crime resulted in every country without authorization or exceeding
have a policy of criminalization different.
The emphasis on cross-country has made 10http://blog.washingtonpost.com/securityfix/2008/07/s
a crime on the internet is not just a enate_approves_bill_to_fight.html
accessed on 2 November, 2016.

Jurnal Pembaharuan Hukum CYBERCRIME COMPARISON UNDER CRIMINAL LAW


Vol V No.2 April – Agustus 2018 IN SOME COUNTRIES 221
Andri Winjaya Laksana
authorized access, and by means of that department or agency that is
such conduct having Obtained EXCLUSIVELY for the use of the
information that has been determined Government of the United States or, in
by the United States Government the case of a computer not
pursuant to an Executive order or EXCLUSIVELY for such use, is used by or
statute to require protection against for the Government of the United States
unauthorized disclosure for reasons of and such conduct that Affects use by or
national defense or foreign relations, or for the Government of the United
any restricted the data, as defined in States;
paragraph y. Of section 11 of the Atomic 4. knowingly and with intent to defraud,
Energy Act of 1954, with reason to accesses a protected computer without
believe that such information so authorization, or exceeds authorized
Obtained could be used to the injury of access, and by means of such conduct
the United States, or to the advantage furthers the intended fraud and obtains
of any foreign nation willfully anything of value, UNLESS the object of
communicates, delivers, transmits, or the fraud and the thing Obtained
causes to be communicated, delivered, consists only of the use of the computer
or transmitted, or attempts to and the value of such use is not more
communication, deliver, transmit or than $ 5,000 in any 1-year period;
cause to be communicated, delivered, or 5. a. knowingly causes the transmission of
transmitted the same to any person not a program, information, code, or
entitled to receive it, command, and as a result of such
2. intentionally accesses a computer conduct, intentionally causes damage
without authorization or exceeds without authorization, to a protected
authorized access, and thereby obtains - computer;
a. information contained in a financial b. intentionally accesses a protected
record of a financial institution, or computer without authorization, and
of a card issuer as defined in as a result of such conduct,
section 1602 (n) of title 15, or recklessly causes damage; or
contained in a file of a consumer c. intentionally accesses a protected
reporting agency on a consumer, computer without authorization, and
as such terms are defined in the as a result of such conduct, causes
Fair credit Reporting Act (15 USC damage;
1681 et seq.); 6. knowingly and with intent to defraud
b. information from any department traffics (as defined in section 1029) in
or agency of the United States; or any password or similar information
c. information from any protected through the which a computer may be
computer if the conduct Involved accessed without authorization, if -
an interstate or foreign a. such trafficking Affects interstate
communication; or foreign commerce; or
3. intentionally, without authorization to b. such computer is used by or for
access any nonpublic computer of a the Government of the United
department or agency of the United States; '' Or '
States, accesses such a computer of

CYBERCRIME COMPARISON UNDER CRIMINAL LAW Jurnal Pembaharuan Hukum


222 IN SOME COUNTRIES Vol V No.2 April – Agustus 2018
Andri Winjaya Laksana
7. with intent to extort from any person, 2. Singapore
firm, association, educational institution, In Singapore, there is an interesting
financial institution, government entity, development of the information technology
or other legal entity, any money or other crime prevention policies. On the basis of
thing of value, transmits in interstate or the Computer Misuse Act (CMA) 1993 Act
foreign commerce any communication misuse Computer (Computer Misuse Act,
containing any threat to cause damage CMA) Singapore 1993 modeled based on
to a protected computer; " English Law in 1990, which ruled to 4 (four)
The United States has set things:
Concerning to “Internet Gambling”, a. Unauthorized access;
through the Federal Government to Article 3 of the Law prohibits the
implement the Wire Act, the Travel Act, CMA containing 'hacking' which
The Professional and Amateur Sports causes a computer plays a function
Protection Act and the Interstate for the purpose of securing
Transportation of wagering Paraphernalia unauthorized access to the program
Act, attention is also directed at the issue or any data stored on the computer.
of sexual immorality (obscenity) and adult Article 3, paragraph 1 only aimed at
entertainment and cyberporn, especially unauthorized access.
children pornography. In this regard may Article 3, paragraph 2 access to any
be mentioned the obscenity provisions of resulting losses that exceed the
the Federal Law, the form "Transportation value of 10,000 dollars will be
of Obscene Matters for Sale or subject to heavy penalties.
Distribution" (18 USC Section 1465) and b. Access to the hidden intentions;
"Communications Decency Act of 1996". Article 4 of the CMA Act criminalizes
Act in the United States governing unauthorized access where there is a
the criminalization of acts related to purpose to commit or facilitate acts
information technology than those listed of violations involving property,
United States Congress also noted in some fraud, dishonest act, or acts that
special rules, among others: result in bodily injury.
a. Prohibition Act of 1997 on Electronic c. Modification of the contents of the
Theft computer; and
b. Introduced to close a loophole in Article 5 of the CMA Act relating to
copyright law that does not recognize the modification of the contents of
the US prior to copyright infringement the computer unauthorized and
if the defendant did not benefit. accidental such as data, computer
c. National Stolen Property Act 1934 software programs and databases
(Act national swag 1934) and the for example by inserting a virus into
Economic Espionage Act of 1996 the computer system.
(Economic Espionage Act of 1996) d. Intercepting a computer service.
prohibits the abuse of trade secrets. Article 6 of the Law CMA introduces
d. Identity Theft and Assumption a new concept of the use of or
deterrence Act of 1998 (Act Identity unauthorized interception of
Theft and Assumption Denial 1998) computer services, it may be more

Jurnal Pembaharuan Hukum CYBERCRIME COMPARISON UNDER CRIMINAL LAW


Vol V No.2 April – Agustus 2018 IN SOME COUNTRIES 223
Andri Winjaya Laksana
like a theft of service or computer c. The setting of the offense with
use time. ulterior motives under Article 4 and
In 1998 CMA experienced inclusion, based Sub Article 4 (a)
amendments, which through criminal new about the reference for
weighting and the creation of new criminal someone who has the authority to
offenses are trying to strengthen the access a computer but has preferred
protection of computer systems set up the authority to commit the same
CMA 1993. The development of new forms offense. In addition, the maximum
of misuse of the Internet network resulted penalty for all violations of the
CMA Act requires expansion of coverage so hidden and minimum penalties for
that on 24 July 1998 Amendments to the offenses involving property, fraud,
passing of the Computer Misuse Act. dishonesty and personal injury
Amendment CMA 1998 which aims remains unchanged, despite the
to strengthen the level and nature of the reorganization of the entire Article.
protection of computer systems that have
been set by the previous law. Amendments 3. Netherlands
to renew the CMA with five (5) ways: Netherlands establishing a
a. Proposed a definition of damage as committee called Franken commission
vandalism on a computer or the tasked advise on setting cybercrime crime.
integrity or availability of data, The Commission considers cybercrime as
programs or systems or information. ordinary crimes (ordinary crime) done with
Amendments to connect the crime computer technology (high-tech) so that
by the level of damage caused, thus only enhance the Wetboek van Strafrecht
helping the overall objective to (Criminal Code of the Netherlands) in 1993
prosecute offenders commensurate to be used to combat the cybercrime
with the damage they caused or the (certainly with additions) with enter at
threat posed. certain criminal provisions. Franken
b. Penalties against various types of Commissie cybercrime formulate some
violations have been enhanced and criminal acts in the formulation of Wetboek
apply to everyone. Thus, the initial van Strafrecht, the formulation of the nine
fines for violations under Article 3, forms of abuse (misbruikvormen) are:
the existing maximum $ 5,000 for a a. Without the right to enter a computer
first offense and double for a system;
second offense or repeated b. Without the right to take
condemnation; there is also a new (onderscheppen) computer data;
prison sentence for an offense that c. Without the right to know
is repeated in jail for 3 years. (kennisnemen);
Likewise, the provisions of Article 5, d. Without the right to copy / copies;
paragraph 1 has been increased to a e. Without the right to change;
fine of $ 10,000 and / or three years f. Retrieving data;
in prison for a first offense, and the g. Without the right to use the
punishment a second time or equipment;
recurring plus 20,000 dollars or h. Sabotage of computer systems;
imprisonment for 5 years. i. Disrupted telecommunications

CYBERCRIME COMPARISON UNDER CRIMINAL LAW Jurnal Pembaharuan Hukum


224 IN SOME COUNTRIES Vol V No.2 April – Agustus 2018
Andri Winjaya Laksana
4. Myanmar information and communication systems; or
Myanmar made a policy on any access to reduce, alter, steal, or destroy
information technology since 20 September using a computer or information and
1996 concerning the Development of communication equipment are similar,
Computer Science (Computer Development without the knowledge and permission of
Law), which requires that the user- the owner of the computer or information
computer users in importing, possessing or systems and communications, including
using a computer must have a permit from inserting computer viruses and the like,
the Ministry of Communications, Posts and which resulted in the reduction,
Telegraphs. This law is specifically targeted destruction, alteration , theft or
at computers that are sending and disappearance of electronic documents will
receiving of data (that is utilizing the be threatened with arrest and fines
Internet). Article 34 of the Act specifically penalties.
shows the sanctions given to people who
do a job and distributed possess or transmit C. CONCLUTION
any information deemed confidential by the Study of harmonization and
state that violates the political, legal and synchronization with the material/substance
economic order as well as the national criminalization of the act in the virtual world
culture. can not only be made to the convention or
the law of other countries, but also the
5. Philippines necessary input from experts in the field of
At first the Philippines disregard of cyber, because they are more aware of
protection against the development of what conduct is and how it sees as a
technology and information, but progress disadvantage or harm so it is worth being
with the virus "I Love You" recognized criminalized.
issued by the student in the Philippines that Through the study of comparative
lead to the dissemination of damage to the law (comparative judicial) criminal offenses
tissue around the world, who not only against computer systems (against a
seized global attention but also urged computer system or network) is adjusted
action emergency by all countries. The case by the countries in the world are: illegal
of the virus "I Love You" encourage the access, illegal interception, data
Philippine government issued a policy on interference, system interference. ITAC
June 12, 2000 by authorizing the E- (Information Technology Association of
Commerce. The Act contains a partial legal Canada) on "International Information
recognition of the authenticity of the Industry Congress (IIIC) 2000 Millenium
messages and electronic documents, mostly Congress" in Quebec on 19 September
in line with international trends. Hacking 2000 provides that: "Cybercrime is a real
and cracking action is already contained in and growing threat to economic and social
Section 33 (1) of the Act, identifying development around the world. Information
hacking and cracking which refers to the technology touches every aspect of human
unauthorized access to or do annexation life and so can electronically enable crime ".
into a server / computer system or to the

Jurnal Pembaharuan Hukum CYBERCRIME COMPARISON UNDER CRIMINAL LAW


Vol V No.2 April – Agustus 2018 IN SOME COUNTRIES 225
Andri Winjaya Laksana
BIBLIOGRAPHY

Books:
Ade Maman Suherman 2005, Aspek Hukum Dalam Ekonomi Global, Revised Edition, Ghalia
Indonesia, Bogor.
Barda Nawawi Arief, 2003, kebijakan legislatif dalam penanggulangan kejahatan dengan pidana
penjara, Publisher Agency Diponegoro University, Semarang.
Loebby Loqman 2002, Kapita Selekta Tindak Pidana Di Bidang Perekonomian, First Edition,
Datacom, Jakarta.
Mahfud MD, in 2000, Politik Hukum Nasional, Alumni, Bandung.
Rachmat Rafiudin 2009, Internet Foeronsik, CV Andi Offset, Yogyakarta
Laksana, Andri Wijaya, and Suratman Suratman “Analisis Yuridis Penyidikan Tindak Pidana
Pornografi Berdasarkan Undang-Undang Nomor 44 Tahun 2008 di Era Digitalisasi”, Jurnal
pembaharuan hukum, Volume I No. 2 Mei-Agustus 2014
Internet :
http://blog.washingtonpost.com/securityfix/2008/07/senate_approves_bill_to_fight.html
http: www.cybercrimelawnet.

CYBERCRIME COMPARISON UNDER CRIMINAL LAW Jurnal Pembaharuan Hukum


226 IN SOME COUNTRIES Vol V No.2 April – Agustus 2018
Andri Winjaya Laksana

You might also like