Fragmentation of Authority in National Cyber Defense A Legal Analysis of Overlapping Inter-Agency Authority and the Urgency of Integrated Command
DOI:
https://doi.org/10.33751/palar.v12i1.41Abstract
The evolution of cyberspace as the fifth domain of warfare has transformed the national defense landscape, where hybrid threats can now disrupt sovereignty without physical war declarations. Indonesia responds to this challenge through the Total People's Defense and Security System (Sishankamrata) doctrine, yet its implementation is hindered by acute institutional fragmentation. This study aims to analyze the implications of regulatory disharmony on strategic defense effectiveness and formulate an ideal legal construction for national cyber governance. Using normative legal research methods with statutory and conceptual approaches, this study finds that current sectoral regulations create legal antinomy between defense mandates (Military/TNI), law enforcement (Police/Polri), and administrative security (National Cyber and Crypto Agency/BSSN). An asymmetry of authority is identified where BSSN, as the coordinator, is based only on a Presidential Regulation, lacking operational coercive power over institutions established by Law. The absence of legal escalation mechanisms in the "grey zone" leads to decision-making paralysis during crises. This study concludes the need for legal reconstruction through the enactment of a Cyber Security and Defense Law as lex specialis. This law must institutionalize a Unified Command System that establishes a single authority and clear thresholds for transferring operational control from civil to military domains, ensuring a rapid, integrated, and legally certain state response.
Keywords: National Cyber Security Policy, Strategic Defense, Authority Fragmentation, Unified Command, Total Defense System.
References
A. Legislation
Indonesia Governance. Government Regulation in Lieu of Law No. 23 of 1959 on the Declaration of a State of Danger. Accessed January 2, 2026. http://peraturan.bpk.go.id/Details/53973/perpu-no-23-tahun-1959.
Indonesia Governance. Law No. 1 of 2024. Accessed January 2, 2026. https://peraturan.bpk.go.id/details/274494/uu-no-1-tahun-2024.
Indonesia Governance. Law No. 2 of 2002. Accessed January 2, 2026. http://peraturan.bpk.go.id/Details/44418/uu-no-2-tahun-2002.
Indonesia Governance. Law No. 3 of 2002. Accessed January 2, 2026. http://peraturan.bpk.go.id/Details/44421/uu-no-3-tahun-2002.
Indonesia Governance. Law No. 34 of 2004. Accessed January 2, 2026. http://peraturan.bpk.go.id/Details/40774/uu-no-34-tahun-2004.
Indonesia Governance. Presidential Regulation No. 28 of 2021. Accessed January 2, 2026. http://peraturan.bpk.go.id/Details/165493/perpres-no-28-tahun-2021.
Indonesia Governance. Presidential Regulation No. 66 of 2019. Accessed January 2, 2026. http://peraturan.bpk.go.id/Details/123703/perpres-no-66-tahun-2019.
B. Books
Asshiddiqie, Jimly. Perihal Undang-Undang. Jakarta: Rajawali Press, 2020.
Chen, Yu-che. Managing Digital Governance: Issues, Challenges, and Solutions. New York: Routledge, n.d. Accessed January 2, 2026. https://www.routledge.com/Managing-Digital-Governance-Issues-Challenges-and-Solutions/Chen/p/book/9781439890912.
Hollis, Duncan B., ed. The Oxford Guide to Treaties. 2nd ed. Oxford: Oxford University Press, 2020.
Klimburg, Alexander. National Cyber Security Framework Manual. 2012. https://ccdcoe.org/library/publications/national-cyber-security-framework-manual/.
Libicki, Martin C. Cyberdeterrence and Cyberwar. Santa Monica, CA: RAND Corporation, 2009. https://www.rand.org/pubs/monographs/MG877.html.
Schmitt, Michael N. Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. 2nd ed. Cambridge: Cambridge University Press, 2017. https://doi.org/10.1017/9781316822524.
Shackelford, Scott. Managing Cyber Attacks in International Law, Business, and Relations: In Search of Cyber Peace. Cambridge: Cambridge University Press, 2012. https://doi.org/10.1017/CBO9781139021838.
C. Journal Articles
Aini, Nurul, and Fauziah Lubis. “Tantangan Pembuktian dalam Kasus Kejahatan Siber.” Judge: Jurnal Hukum 5, no. 2 (2024): 55–63.
Catota, Frankie E., M. Granger Morgan, and Douglas C. Sicker. “Cybersecurity Education in a Developing Nation: The Ecuadorian Environment.” Journal of Cybersecurity 5, no. 1 (2019). https://doi.org/10.1093/cybsec/tyz001.
Cinrapole, Andi, and Arianty Mangarengi. “Dilema Yuridiksi di Ruang Siber: Tantangan dan Strategi Penegakan Keamanan Lintas Negara.” Judicatum: Jurnal Dimensi Cakra Hukum 3 (2025): 221–35. https://doi.org/10.35326/judicatum.v3i1.7734.
Haber, Eldar, and Lev Topor. “Sovereignty, Cyberspace, and the Emergence of Internet Bubbles.” Journal of Advanced Military Studies 14 (2023). https://doi.org/10.21140/mcuj.20231401006.
Qushayyi, Muhammad Faiq. “The Dynamics of Cyber Security Cooperation Between Countries: A Case Study of Indonesia and the Netherlands.” Journal of Peace, Security and Democracy 1, no. 1 (2025): 37–56. https://doi.org/10.63280/jpsd.v1i1.42626.
Reich, Pauline C., Stuart Weinstein, Charles Wild, and Allan S. Cabanlong. “Cyber Warfare: A Review of Theories, Law, Policies, Actual Incidents—and the Dilemma of Anonymity.” European Journal of Law and Technology 1, no. 2 (2010).
Roedy, and Asep Adang Supriyadi. “Integrasi Kebijakan Pertahanan dan Kebijakan Publik dalam Penanggulangan Ancaman Perang Hibrida: Pendekatan Analisis Keamanan Nasional.” Inovasi Pembangunan: Jurnal Kelitbangan 13, no. 1 (2025). https://doi.org/10.35450/jip.v13i1.992.
Sawlani, Dhiraj Kelly, and Asep Adang Supriyadi. “Bridging Public Policy and Defense Strategy to Combat Hybrid Warfare: An Analytical Study on National Security.” Jurnal Praksis dan Dedikasi Sosial 7, no. 2 (2024): 292–307.
Silver, Daniel. “Computer Network Attack as a Use of Force under Article 2(4) of the United Nations Charter.” International Law Studies 76, no. 1 (2002).
D. Book Chapters and Other Sources
Liff, Adam P. “Cyberwar: A New ‘Absolute Weapon’? The Proliferation of Cyberwarfare Capabilities and Interstate War.” 2012. https://adampliff.com/2012/05/21/publication-cyberwar-a-new-absolute-weapon-the-proliferation-of-cyberwarfare-capabilities-and-interstate-war/.
Tagarev, Tador. “The Art of Shaping Defense Policy: Scope, Components, Relationships (but No Algorithms).” Connections: The Quarterly Journal, n.d. Accessed January 2, 2026. https://www.researchgate.net/publication/267374585.
Tams, Christian. “Article 2(4).” In The Charter of the United Nations: A Commentary, edited by Bruno Simma et al. Oxford: Oxford University Press, 2024. https://doi.org/10.1093/law/9780192864536.003.0010
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Jurnal Pakuan Law review based on the provisions Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. / CC-BY-NC-SA 4.0 this license requires that you provide appropriate credit, provide a link to the license, and indicate if any changes have been made. You may do so in any reasonable way, but not in any way that would imply that the licensor endorses you or your use. this license shall not use the material for commercial purposes. this license permits Share Alike If you mix, modify, or build upon the material, you must distribute your contributions under the same license as the original. No additional restrictions. You may not apply legal provisions or technological measures that legally restrict others from doing anything the license permits.


.png alt=)
























