PENERAPAN PRINSIP PEMBEDAAN DAN PROPORSIONALITAS DALAM PERANG SIBER: STUDI KASUS KONFLIK BERSENJATA RUSIA–UKRAINA

Authors

  • Michelle Golda Meir Universitas Udayana Author
  • I Made Budi Arsika Universitas Udayana Author

DOI:

https://doi.org/10.62281/t0fgv245

Keywords:

Perang Siber, Prinsip Pembedaan, Prinsip Proporsionalitas, Konflik Rusia–Ukraina

Abstract

Perkembangan perang siber sebagai domain peperangan modern menghadirkan tantangan signifikan bagi kerangka Hukum Humaniter Internasional (HHI) yang ada. Penelitian ini bertujuan untuk menganalisis tantangan penerapan prinsip-prinsip fundamental HHI, khususnya prinsip pembedaan dan proporsionalitas. Dalam konteks operasi siber pada konflik bersenjata Rusia–Ukraina. Dengan menggunakan metode penelitian hukum normatif (yuridis normatif), penelitian ini menerapkan pendekatan perundang-undangan, pendekatan konseptual, dan pendekatan studi kasus. Temuan utama menunjukkan bahwa karakteristik unik perang siber, seperti sifat infrastruktur berfungsi ganda dan efek serangan yang berjenjang, secara fundamental mengaburkan batasan antara objek militer dan objek sipil. Hal ini menyebabkan kesulitan substansial dalam mengimplementasikan prinsip pembedaan secara efektif. Selain itu, kalkulasi proporsionalitas menjadi sangat kompleks karena sulitnya mengukur kerusakan non-fisik dan memprediksi dampak insidentil yang berlebihan terhadap penduduk sipil. Penelitian ini menyimpulkan bahwa meskipun HHI tetap berlaku, terdapat kesenjangan implementasi yang mendesak. Diperlukan klarifikasi dan penguatan kerangka hukum HHI agar tetap relevan dan mampu memberikan perlindungan efektif bagi warga sipil di era peperangan digital.

Downloads

Download data is not yet available.

References

Buku

Dinstein, Y. (2016). The Conduct of Hostilities under the Law of International Armed Conflict (3rd ed.). Cambridge, United Kingdom: Cambridge University Press.

Fleck, D. (Ed.). (2013). The Handbook of International Humanitarian Law (3rd ed.). Oxford, United Kingdom: Oxford University Press.

Haryomataram. (1984). Hukum Humaniter. Jakarta: CV Rajawali.

Henckaerts, J.-M., & Doswald-Beck, L. (2005). Customary International Humanitarian Law, Volume I: Rules. Cambridge, United Kingdom: Cambridge University Press for the ICRC.

Marzuki, P. M. (2009). Penelitian Hukum. Jakarta: Kencana Prenada Media Group.

Pictet, J. (1985). Development and principles of international humanitarian law. Dordrecht, Netherlands: Martinus Nijhoff Publishers.

Instrumen Hukum Internasional

Charter of the United Nations. (1945). 1 U.N.T.S. XVI.

Convention (IV) relative to the Protection of Civilian Persons in Time of War. (1949). 75 U.N.T.S. 287.

Protokol Tambahan pada Konvensi Jenewa 12 Agustus 1949, dan yang berhubungan dengan Perlindungan Korban-korban Pertikaian Bersenjata Internasional (Protokol I). (1977). 1125 U.N.T.S. 3.

Jurnal Ilmiah

Chen, S., Hao, M., Ding, F., & et al. (2023). Exploring the global geography of cybercrime and its driving forces. Humanities and Social Sciences Communications, 10, 71.

Fenton, H. III. (2019). Proportionality and its applicability in the realm of cyber attacks. Duke Journal of Comparative & International Law, 29(2), 335-359.

Finlay, L., & Payne, C. (2019). The attribution problem and cyber armed attacks. American Journal of International Law, 113, 202-206.

Hakala, J. (2023). Cyber operations in the Russo-Ukrainian War: A challenge to the existing legal order? Journal of Conflict & Security Law, 28(1), 121–143.

Hathaway, O. A., Khan, A., & Revkin, M. R. (2025). The dangerous rise of “dual-use” objects in war. Yale Law Journal, 134(8).

Jensen, E. T. (2021). The principle of distinction and cyber operations: Gray areas and difficult questions. International Law Studies, 97, 998-1025.

Kharismawan, G. K., & Arsika, I. M. B. (2022). Collateral damage: Perlindungan lingkungan pada saat konflik bersenjata dalam perspektif deep ecology. Veritas et Justitia, 8(2), 362–385.

Lin, H. (2013). Cyber conflict and international humanitarian law. International Review of the Red Cross, 94(886), 515–531.

Lin, H. (2022). Russian cyber operations in the invasion of Ukraine. The Cyber Defense Review, 7(4), 31–46.

Pascucci, C. D. (2017). Distinction and proportionality in cyber war. Minnesota Journal of International Law, 26(2).

Pedersen, F. A. H., & Jacobsen, J. T. (2024). Narrow windows of opportunity: The limited utility of cyber operations in war. Journal of Cybersecurity, 10(1), tyae014.

Riggs, H., Tufail, S., Parvez, I., Tariq, M., Khan, M. A., Amir, A., Vuda, K. V., & Sarwat, A. I. (2023). Impact, vulnerabilities, and mitigation strategies for cyber-secure critical infrastructure. Sensors, 23(9), 4060.

Schmitt, M. N. (2012). Cyber operations and the jus in bello: The Tallinn Manual. Loyola University Chicago International Law Review, 9(2), 99-122.

Shereshevsky, Y. (2022). International humanitarian law-making and new military technologies. International Review of the Red Cross, 104(920–921), 273–302.

Tavakkoli, N., Çetin, O., Ekmekcioglu, E., & Savaş, E. (2025). From frontlines to online: Examining target preferences in the Russia–Ukraine conflict. International Journal of Information Security, 24(64), 1–15.

Tsagourias, N. (2018). The principle of proportionality in cyber operations. International Law Studies, 94, 39-65.

Komentar dan Manual

Sandoz, Y., Swinarski, C., & Zimmermann, B. (Eds.). (1987). Commentary on the Additional Protocols of 8 June 1977 to the Geneva Conventions of 12 August 1949. Geneva, Switzerland: Martinus Nijhoff Publishers for the ICRC.

Schmitt, M. N. (Gen. Ed.). (2017). Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge, United Kingdom: Cambridge University Press.

Laporan dan Dokumen Resmi

Chivvis, C. S. (2017). Understanding Russian “Hybrid Warfare”. Santa Monica, CA: RAND Corporation. Diakses dari https://www.rand.org/pubs/testimonies/CT468. html

Council of the European Union. (10 Mei 2022). Declaration by the High Representative on behalf of the European Union on malicious cyber activity conducted by the Russian Federation against Ukraine. Diakses dari https://www.consilium.europa. eu/en/press/press-releases/2022/05/10/russia-s-malicious-cyber-activity-against-ukraine-declaration-by-the-high-representative-on-behalf-of-the-eu/

International Committee of the Red Cross. (2019). International humanitarian law and the challenges of contemporary armed conflicts: Recommitting to protection in armed conflict on the 70th anniversary of the Geneva Conventions. Diakses dari https://www.icrc.org/sites/default/files/document/file_list/challenges-report_new-technologies-of-warfare.pdf

North Atlantic Treaty Organization (NATO). (30 Juli 2024). Cyber defence. Diakses dari https://www.nato.int/cps/en/natohq/topics_78170.htm

U.S. Department of Justice. (19 Oktober 2020). Six Russian GRU officers charged in connection with worldwide deployment of destructive malware and other disruptive actions in cyberspace. Diakses dari https://www.justice.gov/opa/pr/six-russian-gru-officers-charged-connection-worldwide-deployment-destructive-malware-and

Sumber dari Internet dengan Nama Penulis

Borys, C. (26 Juli 2017). Ukraine braces for further cyber-attacks. BBC News. Diakses dari https://www.bbc.com/news/technology-40706093

Greenberg, A. (17 November 2022). The untold story of the Viasat hack, the most devastating cyberattack of the Ukraine war. Wired. Diakses dari https://www.wired.com/story/viasat-hack-ukraine-russia-most-devastating-cyberat tack/

Greenberg, A. (22 Agustus 2018). The untold story of NotPetya, the most devastating cyberattack in history. Wired. Diakses dari https://www.wired.com/ story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/

Korniienko, A. (15 Februari 2022). Defense Ministry, state banks suffer 'powerful' cyberattack. The Kyiv Independent. Diakses dari https://kyivindependent.com/ defense-ministry-state-banks-suffer-powerful-cyberattack/

Sumber dari Internet tanpa Nama Penulis

Microsoft Threat Intelligence Center. (15 Januari 2022). Destructive malware targeting Ukrainian organizations. Microsoft Security Blog. Diakses dari https://www.microsoft.com/en-us/security/blog/2022/01/15/destructive-malware-targeting-ukrainian-organizations/

Microsoft Threat Intelligence Center. (24 Februari 2022). Destructive 'wiper' malware targeting Ukrainian organizations. Microsoft Blog. Diakses dari https://www. microsoft.com/en-us/security/blog/2022/02/24/destructive-malware-targeting-ukrainian-organizations/

Published

2025-12-09

How to Cite

PENERAPAN PRINSIP PEMBEDAAN DAN PROPORSIONALITAS DALAM PERANG SIBER: STUDI KASUS KONFLIK BERSENJATA RUSIA–UKRAINA. (2025). Jurnal Media Akademik (JMA), 3(12). https://doi.org/10.62281/t0fgv245