Implications/Applications: The lack of legal regulation, both international and national which directly refers to cyber espionage because they alluded to illegal access and illegal interception related only. Results: The result of this research showed that it could use computing devices and internet network by means of spies, destroying computer system in order to securely obtain state confidential data or by spreading internet virus which is sporadic to government-owned domains and corporation it is clear that cyber espionage id either part of the cybercrime.
Methodology: Research methods used statute approach and conceptual approach.
The legal issues raised in this legal research are: (1) cyber espionage is one kind of cybercrime (2) Legal mechanisms to crack down on the international legal system and national law again Cyber espionage crime. This issue becomes complicated when faced with the principle of sovereignty and how the challenge of countries around the world to respond in maintaining the honor, security, and peace of their own countries.
Purpose of Study: A conception of cyber espionage today is extremely vulnerable since the crime has evolved from conventional wiretapping into cyber-based spy activities.