NEXUS PENGAWASAN SIBER SEBAGAI INSTRUMEN KEAMANAN NASIONAL DAN RELEVANSINYA DENGAN DEMOKRASI: PERBANDINGAN BEBERAPA NEGARA

Main Article Content

Anggi Anggraeni Kusumoningtyas

Abstract

Beberapa tingkat pengawasan dan kerahasiaan negara diperlukan untuk melindungi dari ancaman keamanan nasional. Akan tetapi, pengawasan siber dengan transparansi minimal mengancam hak-hak politik yang melekat pada nilai-nilai demokrasi jika tidak dilakukan sesuai dengan kriteria yang ketat. Penelitian ini berfokus pada perdebatan nexus pengawasan siber sebagai instrumen keamanan nasional dan relevansinya dengan demokrasi. Untuk mendapatkan hasil yang komprehensif, peneliti menggunakan metode kualitatif yang datanya dikumpulkan melalui studi pustaka dan analisis bukti dokumen. Adapun teori yang digunakan ialah teori dan infrastruktur pengawasan siber Lawrence Lessig, serta Jack Balkin dan Sanford Levinson dengan fenomena national surveillance state-nya. Kemudian peneliti juga menggunakan konsep demokrasi dan konsep keamanan nasional untuk mengkaji penggunaan pengawasan siber dalam kaca mata demokrasi sehingga menghasilkan perdebatan di antara keduanya. Dari hasil penelitian ini ditemukan hal-hal sebagai berikut: Pertama, komponen utama dari debat pengawasan siber dan demokrasi adalah kompetisi teknologi. Kedua, keseimbangan dalam praktik pengawasan siber dengan memperhatikan perlindungan data pribadi sebagai bagian dari hak asasi manusia harus dihasilkan oleh demokrasi.


Kata Kunci : Pengawasan Siber, Demokrasi, Keamanan Nasional, Teknologi Siber.

Downloads

Download data is not yet available.

Article Details

How to Cite
Anggi Anggraeni Kusumoningtyas. (2023). NEXUS PENGAWASAN SIBER SEBAGAI INSTRUMEN KEAMANAN NASIONAL DAN RELEVANSINYA DENGAN DEMOKRASI: PERBANDINGAN BEBERAPA NEGARA. Jurnal Adhikari, 2(3), 416–433. https://doi.org/10.53968/ja.v2i3.80
Section
Articles
Author Biography

Anggi Anggraeni Kusumoningtyas, Program Studi Ilmu Pemerintahan Universitas Sutomo

Dosen Program Studi Ilmu Pemerintahan Universitas Sutomo

References

Altheide, David L. “The Triumph of Fear: Connecting the Dots about Whistleblowers and Surveillance.” International Journal of Cyber Warfare and Terrorism (IJCWT) 4, no. 1 (January 1, 2014): 1–7. https://doi.org/10.4018/ijcwt.2014010101.

Aradau, Claudia, Luis Lobo-Guerrero, dan Rens Van Munster. “Security, Technologies of Risk, and the Political: Guest Editors’ Introduction.” Security Dialogue 39, no. 2–3 (April 1, 2008): 147–54. doi:10.1177/0967010608089159.

Ball, Kirstie and Laureen Snider, eds. (2013). The Surveillance-Industrial Complex: A Political Economy of Surveillance. Abingdon, UK: Routledge.

Baum, Matthew A., dan Tim Groeling. “Shot by the Messenger: Partisan Cues and Public Opinion Regarding National Security and War.” Political Behavior 31, no. 2 (June 1, 2009): 157–86. https://doi.org/10.1007/s11109-008-90749.

BBC/Panorama, Source: “Edward Snowden: GCHQ Wants to Own Your Phone – Video.” The Guardian, October 5, 2015, sec. US news. http://www.theguardian.com/us-news/video/2015/oct/05/edward-snowdengchq-wants-own-your-phone-video, diakses pada 9 Desember 2022 pukul 21.03 WIB.

Bennett, Colin J., Kevin D. Haggerty, David Lyon dan Valerie Steeves, eds. (2014). Transparent Lives: Surveillance in Canada. Edmonton, AB: Athabasca University Press.

Bennett, Colin J., dan David Lyon, eds. (2008). Playing the Identity Card: Surveillance, Security and Identification in Global Perspective. 1 edition. London, New York: Routledge.

Boring, Nicolas. “Foreign Intelligence Gathering Laws: Belguim.” Web page, June 2016. https://www.loc.gov/law/help/intelligence-activities/belguim.php, diakses pada 8 Januari 2023, pukul 19.00 WIB.

Born, Dr Hans, dan Ms Marina Caparini. (2013). Democratic Control of Intelligence Services: Containing Rogue Elephants. Ashgate Publishing, Ltd.

Botsman, Rachel. “Big Data Meets Big Brother as China Moves to Rate Its Citizens.” WIRED UK, October 2017. http://www.wired.co.uk/article/chinese-government-social-credit-scoreprivacy-invasion, diakses pada 9 Desember 2022, pukul 19.00 WIBCeyhan, Ayse. (2012). “Surveillance as Biopower.” Dalam Routledge Handbook of Surveillance Studies, disunting oleh Kirstie Ball, Kevin D. Haggerty, dan David Lyon, 38–45. New York: Routledge.

Cole, David, dan Martin S. Lederman. “The National Security Agency’s Domestic Spying Program: Framing the Debate Document.” Indiana Law Journal 81 (2006): 1355–1426.

Creswell, John W. (2015). Penelitian Kualitatif dan Desain Riset: Memilih di antara Lima Pendekatan, terj. Ahmad Lintang Lazuardi. Yogyakarta: Pustaka Pelajar.

Damien McGuinness, “How a Cyber Attack Transformed Estonia,” BBC News. 27 April 2017. https://www.bbc.com/news/39655415, diakses pada 9 Desember 2022 pukul 09.00 WIB.

Darmono, Bambang. (2010). Konsep. Jakarta: Jurnal Ketahanan Nasional XV (1).

Deibert Ronald J., dan Rohozinski Rafal. “Risking Security: Policies and Paradoxes of Cyberspace Security.” International Political Sociology 4, no. 1 (March 7, 2010): 15–32. https://doi.org/10.1111/j.1749-5687.2009.00088.x.

Diez, Thomas, Ingvild Bode, dan Aleksandra Fernandes da Costa. (2011). Key Concepts in International Relations. Los Angeles, London: SAGE Publications Ltd.

Evans, Hayley. “Summary: U.K. Intelligence and Security Committee Annual Report.” Lawfare, January 4, 2018. https://www.lawfareblog.com/summary-uk-intelligence-and-securitycommittee-annual-report, diakses pada 8 Januari 2023 pukul 09.00 WIB.

Fuchs, Christian, Kees Boersma, Anders Albrechtslund, dan Marisol Sandoval, eds. 2011. Internet and Surveillance: The Challenges of Web 2.0 and Social Media. New York: Routledge, 2011.

Fuchs, Christian. “New Media, Web 2.0 and Surveillance.” Sociology Compass 5, No. 2 (2011): 134–47.

Goad, Ben. “New Pressure on US Tech to Comply with China’s Access Demands.” Text. TheHill, October 16, 2015. http://thehill.com/policy/cybersecurity/257194-new-pressure-on-us-techto-comply-with-chinas-access-demands.

Goldman, Zachary K., dan Samuel J. Rascoff. (2016). Global Intelligence Oversight: Governing Security in the Twenty-First Century. Oxford: Oxford University Press Gomez, James. (2004). “Dumbing down democracy: Trends in internet regulation, surveillance and control in Asia”, Monash Asia Institute, Monash University, Pacific Journalism Review 10 (2) 2004.

Gorman, Siobhan. “Reengineering Surveillance Oversight.” Lawfare, September 6, 2017. https://www.lawfareblog.com/reengineering-surveillance-oversight, diakses pada 8 Januari 2023 pukul 12.30 WIB.

Greenwald, Glenn, dan Spencer Ackerman. “How the NSA Is Still Harvesting Your Online Data.” the Guardian, June 27, 2013. http://www.theguardian.com/world/2013/jun/27/nsa-online-metadatacollection¸ diakses pada 9 Desember 2022 pukul 11.00 WIB.

Grozdanoska, Natasha. (2014). National Defence and Security. European Scientific Journal February 2014/SPECIAL/edition vol.1 ISS: 1857.

Heywood, Andrew. (1997). Politics. Macmillan: England.

Iskandar. (2009). Metodologi Penelitian Kualitatif. Jakarta: Gaung Persada.

Ivan Watson, Antonia Mortensen, & Victoria Butenko, “Ex-Soviet states tell US 'I told you so' over Russia hacking allegations,” CNN. 16 Desember 2016. https://edition.cnn.com/2016/12/16/politics/russia-hackingallegations-mikheil-saakashvili/index.html, diakses pada 9 Desember 2022.

Jensen, Carl J., David H. McElreath, dan Melissa Graves. (2013). Introduction to Intelligence Studies. Boca Raton: CRC Press.

Kristie Ball, Kevin Haggerty, dan David Lyon (Eds.). (2012). Routledge Handbook of Surveillance Studies. New York: Routledge.

Knake, Robert K. (2010). Internet Governance in an Age of Cyber Insecurity. New York: Council on Foreign Relations.

Ladislav Hofreiter. (2015). About Security in Contemporary World. Slovakia: Securitologia No. 1/2015.

Lee, Dave. “China and US Clash over Backdoors.” BBC News, March 4, 2015, sec. Technology. http://www.bbc.com/news/technology-31729305, diakses pada 9 Desember 2022 pukul 16.00 WIB

Ling, Justin. “The Story of How Canadian Police Committed Arson to Stop a Black Panther Meeting.” VICE News, June 2017. https://news.vice.com/en_ca/article/eva8da/story-of-how-canadianpolicecommitted-arson-to-stop-a-black-panther-meeting, diakses pada 9 Desember 2022 pukul 19.00 WIB.

Mitchell, Anna, and Larry Diamond. “China’s Surveillance State Should Scare Everyone.” The Atlantic, February 2, 2018. https://www.theatlantic.com/international/archive/2018/02/chinasurveillance/552203/, diakses pada 9 Desember 2022 pukul 22.00 WIB.

Monaghan, Jeffrey, dan Kevin Walby. “Making up ‘Terror Identities’: Security Intelligence, Canada’s Integrated Threat Assessment Centre and Social Movement Suppression.” Policing and Society 22, no. 2 (June 1, 2012): 133–51. https://doi.org/10.1080/10439463.2011.605131.

Moleong, Lexy J. (2000). Metodologi Penelitian Kualitatif. Bandung: Remaja Rosdakarya.

Phillips, Tom. “China Testing Facial-Recognition Surveillance System in Xinjiang – Report.” the Guardian, January 18, 2018. http://www.theguardian.com/world/2018/jan/18/china-testing-facialrecognitionsurveillance-system-in-xinjiang-report, diakses pada 9 Desember 2022 pukul 12.23 WIB.

Reuters, China Passes Tough New Intelligence Law.” Reuters, June 28, 2017. https://www.reuters.com/article/us-china-securitylawmaking/china-passes-tough-new-intelligence-lawidUSKBN19I1FW, diakses apda 9 Desember 2022 pukul 17.07 WIB.

Richards, Julian. “Intelligence Dilemma? Contemporary Counter-Terrorism in a Liberal Democracy.” Intelligence and National Security 27, no. 5 (October 1, 2012): 761–80. https://doi.org/10.1080/02684527.2012.708528.

Soldatov, Andrei, and Irina Borogan. “Inside the Red Web: Russia’s Back Door onto the Internet–Extract. ”the Guardian, September 8, 2015. http://www.theguardian.com/world/2015/sep/08/red-web-book-russiainternet, diakses pada 9 Desember 2022 pukul 10.30 WIB.

Unver, H. Akin. “Politics of Digital Surveillance, National Security and Privacy, Oxford CTGA & Kadir Has University”, Centre for Economics and Foreign Policy Studies (edam), Cyber Governance and Digital Democracy 2018/2. dan Sistem Keamanan Nasional Indonesia

Williams, M. J. “(In) Security Studies, Reflexive Modernization and the Risk Society.” Cooperation and Conflict 43, no. 1 (March 1, 2008): 57–79. doi:10.1177/0010836707086737.

Williams, Nik. “The Cost of Silence: Mass Surveillance & SelfCensorship.” openDemocracy, April 6, 2015. https://www.opendemocracy.net/nik-williams/cost-of-silence-masssurveillance-selfcensorship, diakses pada 8 Januari 2023 pukul 11.00 WIB.

Wilson Matthew C., and Piazza James A. “Autocracies and Terrorism: Conditioning Effects of Authoritarian Regime Type on Terrorist Attacks.” American Journal of Political Science 57, no. 4 (June 3, 2013): 941–55. https://doi.org/10.1111/ajps.12028.