From Territoriality to Functional Control: A Jurisdictional Test for Cross-Border Cyberterrorism Operations
Main Article Content
Abstract
Cyberterrorism repeatedly challenged jurisdictional reasoning because its conduct, infrastructure, effects, and evidence were distributed across multiple states, making territorial and effects-based claims both over-inclusive and operationally fragile. This article examined why classical jurisdiction bases produced recurring gaps and conflicts in cross-border cyberterrorism prosecutions and proposed a control-oriented solution. It developed a Functional Control Test that assessed jurisdictional priority by reference to operational direction, meaningful leverage over enabling infrastructure, deliberate targeting and foreseeable coercive effects, and the lawful feasibility of securing decisive electronic evidence. The analysis showed that the test reduced inflated claims driven by incidental routing or compromised nodes, while still accommodating legitimate concurrent jurisdiction for deliberately targeted victim states. It also clarified that strong jurisdiction to prescribe and adjudicate did not entail unilateral cross-border enforcement, preserving consistency with sovereignty and non-intervention constraints. The study concluded that functional control provided a more reviewable and practicable nexus standard for allocating prosecutorial leadership and structuring cooperation in cyberterrorism cases.
Article Details

This work is licensed under a Creative Commons Attribution 4.0 International License.
References
Abraha, H. H. (2021). Law enforcement access to electronic evidence across borders: mapping policy approaches and emerging reform initiatives. International Journal of Law and Information Technology, 29(2), 118–153. https://doi.org/10.1093/ijlit/eaab001
Beckerman, C. E. (2022). Is there a cyber security dilemma? Journal of Cybersecurity, 8(1). https://doi.org/10.1093/cybsec/tyac012
Bederna, Z., & Rajnai, Z. (2022). Analysis of the cybersecurity ecosystem in the European Union. International Cybersecurity Law Review, 3(1), 35–49. https://doi.org/10.1365/s43439-022-00048-9
Eichensehr, K. E. (2022). Back to the roots: The laws of neutrality and the future of due diligence in cyberspace. European Journal of International Law, 33(3), 789–819.
Fatihah, C. Y. N. (2022). Indonesia’s Approach on Cyberattack Attribution through its Foreign Policy. Global Legal Review, 2(2), 121. https://doi.org/10.19166/glr.v2i2.5140
Garcia, G. S., íno-Solano, A. V., & Salazar, B. P. (2024). The Debate Concerning Deviance and Divergence: A New Theoretic Proposal. Oñatio Socio-Legal Series, 14(2), 505–529.
Guan, C. (2025). Cross-border cybercrime digital evidence: Current research and fundamental categories. Modern Law Research, 6(4).
Guo, Z. (2023). Regulating the use of electronic evidence in Chinese courts: Legislative efforts, academic debates and practical applications. Computer Law & Security Review, 48, 105774. https://doi.org/10.1016/j.clsr.2022.105774
Kadir, Z. K. (2026a). Narrative Closure in Honor killing Cases: How Judgments Stabilise Meaning, Eliminate Ambiguity, and Produce Sentencing Certainty. Punggawa Law Review, 1(1), 1–10.
Kadir, Z. K. (2026b). Neurocriminology and the Next Generation of Criminological Theory: Integration, Limits, and Ethical Risks. Punggawa Global Research: Jurnal Multidisiplin, 1(1), 1–8.
Kusak, M. (2024). EU Cross-Border Gathering and Admissibility of Electronic Content Data. European Journal of Crime, Criminal Law and Criminal Justice, 32(2), 126–155. https://doi.org/10.1163/15718174-bja10054
Liat, K. E., & Wahyuningtyas, S. Y. (2025). PELINDUNGAN DATA PRIBADI DALAM BISNIS KOMPUTASI AWAN DI INDONESIA: TRANSFER DATA LINTAS NEGARA DAN AKSES OLEH OTORITAS PUBLIK. Refleksi Hukum: Jurnal Ilmu Hukum, 9(2), 195–214. https://doi.org/10.24246/jrh.2025.v9.i2.p195-214
Miller, C. M. (2023). A survey of prosecutors and investigators using digital evidence: A starting point. Forensic Science International: Synergy, 6, 100296. https://doi.org/10.1016/j.fsisyn.2022.100296
Muhtada, D., Al-Fatih, S., & Yuliantoro, N. R. (2023). The direction of Indonesia’s legal policy on the ASEAN Mutual Legal Assistance Treaty in criminal matters: A path to law reform in cross-border crime enforcement in Southeast Asia. The Direction of Indonesia’s Legal Policy on the ASEAN Mutual Legal Assistance Treaty in Criminal Matters: A Path to Law Reform in Cross-Border Crime Enforcement in Southeast Asia, 5(2), 749–780.
Nurkhasanah, K. I., & Prasetyo, Z. M. (2024). Law Enforcement of State Jurisdiction in Hacking Crimes. Indonesian Journal of Applied and Industrial Sciences (ESA), 3(3), 319–328. https://doi.org/10.55927/esa.v3i3.9438
Olber, P. (2021). The survey on cross-border collection of digital evidence by representatives from Polish prosecutors’ offices and judicial authorities. Journal of Digital Forensics, Security and Law, 16(2). https://doi.org/10.58940/1558-7223.1700
Osula, A.-M., Kasper, A., & Kajander, A. (2022). EU Common Position on International Law and Cyberspace. Masaryk University Journal of Law and Technology, 16(1), 89–121.
Rahardjo, A. (2022). Legal complexity in dealing with cyber crime in Indonesia. Research Horizon, 2(6), 597–606.
Rusdianto, R., & Risnain, Muh. (2023). Penerapan Prinsip Extraterritorial Jurisdiction Dalam Memerangi Tindak Pidana Siber. Mataram Journal of International Law, 1(1). https://doi.org/10.29303/majil.v1i1.2532
Ryngaert, C. (2023). Extraterritorial Enforcement Jurisdiction in Cyberspace: Normative Shifts. German Law Journal, 24(1), 537–550.
Schmitt, B. (2021). Legal Diversity at the International Criminal Court. Journal of International Criminal Justice, 19(3), 485–510. https://doi.org/10.1093/jicj/mqab038
Setiawan, A. (2024). End-to-end encryption: Apakah ini sebuah ancaman? Jurnal Analis Kebijakan, 8(2), 233–240.
Spáčil, J. (2024). Attribution of Cyber Operations: Technical, Legal and Political Perspectives. International and Comparative Law Review, 24(2), 150–168. https://doi.org/10.2478/iclr-2024-0022
Wheatley, S. (2023). Election hacking, the rule of sovereignty, and deductive reasoning in customary international law. Leiden Journal of International Law, 36(3), 675–698. https://doi.org/10.1017/S0922156523000092
Wijayanto. (2023). Safe harbor principle, exclusion of criminal liability for platform service providers. Indonesian Journal of Criminal Law Studies, 8(2), 187–208.