ASI AND CYBERTERRORISM: NEW CHALLENGES TO INDONESIA’S NATIONAL SECURITY AND PENAL POLICY

Authors

  • Marthsian Yeksi Anakotta Faculty of Law, Darma Cendika Catholic University

DOI:

https://doi.org/10.24246/alethea.vol8.no2.p1-22

Keywords:

ASI, Cyberterrorism, National Security, Penal Policy

Abstract

The convergence of artificial intelligence—especially artificial superintelligence (ASI)—and cyberterrorism presents serious threats to peace, order, and justice. These threats require strong criminal law enforcement and robust national security strategies. However, Indonesian criminal law policy has yet to adequately address the risks posed by ASI. Criminal law traditionally protects the interests of the state, society, and individuals—an approach also relevant to national security. Ignoring ASI’s development could lead to increased cyberterrorism, turning overlooked risks into real threats. An interdisciplinary perspective reveals that the growing intersection of AI and cyberterrorism introduces urgent new challenges for Indonesia’s national security and criminal law enforcement.

Downloads

Download data is not yet available.

References

Books

Bostrom N, Superintelligence: Path, Dangers, Strategies (Oxford Univerity Press 2014).

Hallevy G, When Robots Kill: Artificial Intelligence Under Criminal Law (Northeastern University Press 2013).

Kanter EY and Sianturi SR, Azaz-Azaz Hukum Pidana Di Indonesia Dan Penerapannya (Storia Grafika 2002).

Laqueur W, The New Terrorism: Fanaticism and the Arms of Mass Destruction (1st edn, Oxford Univerity Press 1999).

Rane J and others, ‘Artificial General Intelligence in Industry 4.0, 5.0, and Society 5.0: Applications, Opportunities, Challenges, and Future Direction’ in Jayesh Rane and others (eds), Future Research Opportunities for Artificial Intelligence in Industry 4.0 and 5.0 (Deep Science Publishing 2024) <https://deepscienceresearch.com/index.php/dsr/catalog/book/4>.

Rapoport D, Waves of Global Terrorism (Columbia University Press 2022) <https://www.degruyter.com/document/doi/10.7312/rapo13302/html>.

Simon JD, ‘Technological and Lone Operator Terrorism’ in Jean E Rosenfeld (ed), Terrorism, Identity and Legitimacy (Taylor & Francis e-Library 2011).

Journals

A.L. FZ, Kurniawan SE and Ginting W, ‘Kebijakan Pertahanan Untuk Mencapai Sistem Keamanan Nasional’ (2024) 7 Jurnal Kajian Stratejik Ketahanan Nasional 1 <https://scholarhub.ui.ac.id/jkskn/vol7/iss1/1>.

Agar N, ‘Don’t Worry about Superintelligence’ (2016) 26 Journal of Evolution and Technology J. Evol. Technol. <https://jetpress.org/v26.1/agar.htm>.

Alviolita FP, ‘Pertanggungjawaban Pidana Korporasi Oleh Pengurus Korporasi Dikaitka Dengan Asas Geen Straf Zonder Schuld’ (2019) 3 Refleksi Hukum: Jurnal Ilmu Hukum 1 <http://ejournal.uksw.edu/refleksihukum/article/view/2096>.

Anakotta MY and Disemadi HS, ‘Melanjutkan Pembangunan Sistem Keamanan Nasional Indonesia Dalam Kerangka Legal System Penanggulangan Kejahatan Terorisme’ (2020) VI Jurnal Keamanan Nasional 2020 <https://online.anyflip.com/jqnnb/gxxw/mobile/index.html>.

Barrett AM and Baum SD, ‘A Model of Pathways to Artificial Superintelligence Catastrophe for Risk and Decision Analysis’ (2017) 29 Journal of Experimental & Theoretical Artificial Intelligence 397 <https://www.tandfonline.com/doi/full/10.1080/0952813X.2016.1186228>.

Baum SD, Barrett AM and Yampolskiy R V., ‘Modeling and Interpreting Expert Disagreement About Artificial Superintelligence’ (2017) 41 Informatica 419 <https://www.informatica.si/index.php/informatica/article/view/1812/1080>.

Bazarkina DY, ‘Countermeasures for Hybrid Threats: The Experience of the European Union and Its Member States’ (2022) 92 Herald of the Russian Academy of Sciences S315 <https://link.springer.com/10.1134/S1019331622100033>.

Bory P, ‘Deep New: The Shifting Narratives of Artificial Intelligence from Deep Blue to AlphaGo’ (2019) 25 Convergence: The International Journal of Research into New Media Technologies 627 <https://journals.sagepub.com/doi/10.1177/1354856519829679>.

Fjelland R, ‘Why General Artificial Intelligence Will Not Be Realized’ (2020) 7 Humanities and Social Sciences Communications 10 <https://www.nature.com/articles/s41599-020-0494-4>.

Gobble MM, ‘The Road to Artificial General Intelligence’ (2019) 62 Research-Technology Management 55 <https://www.tandfonline.com/doi/full/10.1080/08956308.2019.1587336>.

Good IJ, ‘Speculations Concerning the First Ultraintelligent Machine’ (1966) 6 Advances in Computers <https://www.sciencedirect.com/science/article/abs/pii/S0065245808604180>.

Hailtik AGE and Afifah W, ‘Criminal Responsibility of Artificial Intelligence Committing Deepfake Crimes in Indonesia’ (2024) 2 Asian Journal of Social and Humanities 776 <https://ajosh.org/index.php/jsh/article/view/222>.

Hallevy G, ‘Dangerous Robots – Artificial Intelligence vs. Human Intelligence’ (SSRN, 2018) 44 <https://dx.doi.org/10.2139/ssrn.3121905> accessed 31 December 2024.

James AP, ‘The Why, What and How of Artificial General Intelligence Chip Development’ (2022) 14 IEEE Transactions on Cognitive and Developmental Systems 334 <https://ieeexplore.ieee.org/document/9390376>.

Jarvis L and Macdonald S, ‘What Is Cyberterrorism? Findings From a Survey of Researchers’ (2015) 27 Terrorism and Political Violence 657 <https://www.tandfonline.com/doi/full/10.1080/09546553.2013.847827>.

McLean S and others, ‘The Risks Associated with Artificial General Intelligence: A Systematic Review’ (2023) 35 Journal of Experimental & Theoretical Artificial Intelligence 649 <https://www.tandfonline.com/doi/full/10.1080/0952813X.2021.1964003>.

Mulgan T, ‘Superintelligence: Paths, Dangers, Strategies’ [2015] The Philosophical Quarterly 198 <https://academic.oup.com/pq/article-lookup/doi/10.1093/pq/pqv034>.

Rapoport DC, ‘The Four Waves of Rebel Terror and September 11’ (2002) 8 Anthropoetics 1.

Sanz-Caballero S, ‘The Concepts and Laws Applicable to Hybrid Threats, with a Special Focus on Europe’ (2023) 10 Humanities and Social Sciences Communications 360 <https://www.nature.com/articles/s41599-023-01864-y>.

Taliharm A-M, ‘Cyberterrorism: In Theory or in Practice?’ (2010) 3 Defence Against Terrorism Review 59 <https://www.coedat.nato.int/publication/datr/volumes/datr6.pdf>.

Thorn PD, ‘Nick Bostrom: Superintelligence: Paths, Dangers, Strategies’ (2015) 25 Minds and Machines 285 <http://link.springer.com/10.1007/s11023-015-9377-7>.

Torres P, ‘The Possibility and Risks of Artificial General Intelligence’ (2019) 75 Bulletin of the Atomic Scientists 105 <https://www.tandfonline.com/doi/full/10.1080/00963402.2019.1604873>.

Ufran U, ‘Kebijakan Antisipatif Hukum Pidana Untuk Menanggulangi Cyberterrorism’ (2014) 43 Masalah-Masalah Hukum 529 <https://ejournal.undip.ac.id/index.php/mmh/article/view/11083>.

Thesis

Menish-Geryk S, ‘The Evolution of Terrorism Through the Use of Technology: Al-Qaeda and ISIS’ (Thesis, Idaho State University 2019).

Report

Global Catastrophic Risk Institute (A Survey of Artificial General Intelligence Projects for Ethics, Risk and Policy 2017) 17 <https://gcrinstitute.org/a-survey-of-artificial-general-intelligence-projects-for-ethics-risk-and-policy/>.

NATO, ‘Strategic Concept 2010’ (2010) <https://www.nato.int/cps/en/natohq/topics_82705.htm>.

Conference

Galinec D, Steingartner W and Zebic V, ‘Cyber Rapid Response Team: An Option within Hybrid Threats’, 2019 IEEE 15th International Scientific Conference on Informatics (IEEE 2019) <https://ieeexplore.ieee.org/document/9119292/>.

Pohl J, ‘Artificial Intelligence: Extinction or Nirvana?’, 27th International Conference on Systems Research, Informatics, and Cybernetics (IIAS 2015).

Website

Álvarez JSV, ‘The Risks and Inefficacies of AI Systems in Militar Targeting Support’ (Humanitarian Law & Policies, 2024) <https://blogs.icrc.org/law-and-policy/2024/09/04/the-risks-and-inefficacies-of-ai-systems-in-military-targeting-support/> accessed 24 April 2025.

Caruso C, ‘The Risks of Artificial Intelligence in Weapons Design’ (Harvard Medical School, 2024) <https://hms.harvard.edu/news/risks-artificial-intelligence-weapons-design> accessed 24 April 2024.

Cook G, ‘Watson, the Computer Jeopardy! Champion, and the Future of Artificial Intelligence’ (Scientific American, 2011) https://www.scientificamerican.com/article/watson-the-computer-jeopa/ Accesed 24 November 2024.

DeepLearning.AI, ‘A Complete Guide to Natural Language Processing’ (DeepLearning.AI) <https://www.deeplearning.ai/resources/natural-language-processing/> accessed 21 November 2024.

Denning DE, ‘Cyberterrorism’ (2000) https://faculty.nps.edu/dedennin/publications/Testimony-Cyberterrorism2000.htm accesed 20 November 2024.

Greenemeier L, ‘20 Years after Deep Blue: How AI Has Advanced Since Conquering Chess’ (Scientific American, 2017) <https://www.scientificamerican.com/article/20-years-after-deep-blue-how-ai-has-advanced-since-conquering-chess/> accessed 21 November 2024.

Kohs G, ‘AlpaGo - The Movie’ (Google DeepMind, 2017) <https://watchdocumentaries.com/alphago/> accessed 25 November 2024.

Sabar A, ‘Gelombang Baru Terorisme’ (Kompas.id, 2021) <https://www.kompas.id/baca/opini/2021/11/16/gelombang-baru-terorisme?open_from=Search_Result_Page> accessed 12 November 2024.

Wagman S, ‘Weaponized AI: A New Era of Threats and How We Can Counter It’ (Harvard Kennedy School - ASH Center for Democratic Governance and Innovation, 2025) <https://ash.harvard.edu/articles/weaponized-ai-a-new-era-of-threats/> accessed 24 April 2024.

Statutory

Undang-Undang Pemberantasan Tindak Pidana Terorisme 2018.

Downloads

Published

2025-04-26

How to Cite

Anakotta, M. Y. (2025). ASI AND CYBERTERRORISM: NEW CHALLENGES TO INDONESIA’S NATIONAL SECURITY AND PENAL POLICY . Jurnal Ilmu Hukum: ALETHEA, 8(2), 1–22. https://doi.org/10.24246/alethea.vol8.no2.p1-22