Documente Academic
Documente Profesional
Documente Cultură
net/publication/311893981
CITATIONS READS
4 345
1 author:
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Rizqiya Windy Saputra on 20 June 2018.
Abstract—Increasing user of the Internet in the world is going Watches, Vehicles[2] or cyber crime is the use of information
rapidly, by the same condition in Indonesia now days. This technology to carry out the criminal acts[4]. Both definition
increasing is triggering the vulnerability of securing information give us a brave conclusion that cyber crime is every crime
technology advantage and user privacy. The vulnerability in many use information technology directly or indirectly for getting
security and privacy protection caused cyber crime to be happen. profit or not. Tapping email account, Personal Identification
Not existing of the right policy for cyber crime is becoming
Number (PIN), defacing website, cheating and many violations
the major problem. In this research, we try to collect many
information about cyber crime in Indonesia and embrace it to of privacy right are common Indonesia cyber crime.
be a paper.The information collected from questionnaire, articles Indonesia as one of development country has large popu-
and papers related to the cases. This paper supposed to explain lation and as mentioned above only 28.1% people use Inter-
cyber crime by Indonesia perspective, type of cyber crime, some
study cases and many prevention majors. And finally, this papers
net. Although, Indonesia has small percentage in Information
can proposed a new policy related to cyber crime for government. technology using, but criminal level in cyber is not as small
as percentage user. Based on State of Internet 2nd quarter
report 2013 Indonesia reached first rank as the country source
attack[7].
I. I NTRODUCTION
However, defenders have few tools to handle the situation
Internet is the most important things today. Every works in a timely an effective way. In the cyber space, it is easy to
was doing by using Internet. Since 2010, Internet user in initiate attacks and fly under the radar, and hard to identify
Indonesia has been increased from 21.1% to 28.1% in the end attackers and trace back attack sources. The vulnerability
of 2013 and still continue to grow in many years forward[1]. of the cyber space firstly roots at the Internets non-security
People use Internet in many aspects of helping their life. original architecture design as a private network back to the
Automatic Transfer Machine(ATM) used for taking money, 1960s. Secondly, as the largest and the most complex man-
mobile transaction (e-banking), on-line transaction/trading (e- made system in human history, our understanding of this
commerce), e-business and e-government are some of example giant system is limited or even incorrect so far. Thirdly, the
from advantage the Internet that involve many transaction anarchism management environment of the Internet is hard for
between users. Although, Internet had already become a com- large scale collaboration against cyber crimes. As a result, the
mon platform as the important things for Indonesian in most cyber space has become a heaven for intelligent criminals, who
activities, but the security and privacy issues still become the are motivated by significant financial or political reward[3].
problems appear and both of them need to be protected in Therefore, we purpose a survey of cyber crime in Indonesia
electronic transaction. and its connectivity with the Information and Electronic Law
Many articles define the term of cyber crime. Cyber crime (UU-ITE) 11/2008. from the leaks of Indonesia government
is all about the crimes in which communication channel and laws, this research try to recommend many newest policy
communication device has been used directly or indirectly as a related to cyber crime cases now days. This Paper will start
medium whether it is a Laptop, Desktop, PDA, Mobile phones, with introduction in part one and continue with some definition
need to explain about cyber crime. In part three and four, this
paper will discuss some UU-ITE 11/2008 regulation and some
cases of cyber crime related to the laws. finally, the part five
will give the conclusion of this paper.
Fig. 1. Indonesia Internet User[1] Fig. 2. Country with most provided cyber attack[7]
1
2016 International Conference on ICT For Smart Society
Surabaya, 20-21 July 2016
ISBN : 978-1-5090-1620-4
from the classification above, Bosco(2012) states there are IV. I NDONESIA C YBER C RIME C ASES
five common cyber crime attack mostly[5]. Five attacks has
been using by most hacker in Indonesia. They are[9]: In this paper, we will analysis two cases of cyber crime
happens in Indonesia. In many articles report, most of Indone-
1. Malware/Spam and The Underground Economy sian Cyber crime cases comes from transaction fraud.
2
2016 International Conference on ICT For Smart Society
Surabaya, 20-21 July 2016
ISBN : 978-1-5090-1620-4
A. e-commerce Fraud
3
2016 International Conference on ICT For Smart Society
Surabaya, 20-21 July 2016
ISBN : 978-1-5090-1620-4
country for the customers that are placing the orders. an obstacle for Indonesia government. The issues disturbed
If the customers billing and shipping addresses are national security. Every people asked about the safety of
in the US, but the person placing the order is logged Indonesian privacy data. At this point, Indonesia government
in from an IP in Russia, this will require closer has no good policy. Corruption Fight Committee (KPK) as
scrutiny, and will often trigger anti-fraud precautions. government committee also using interception telecommunica-
Although this situation could be legitimate, but it’s tion to help their work. They are spying government member
probably worth a phone call to the customer’s US using information technology and government should have the
phone number or other measures to confirm the order perfect policy to arrange the borders of KPK work.
and the identity of the credit card user.
This case is not the only one, in February 2014, a local
3. Check whether the phone number is valid and located
newspaper[15] reports that Indonesian new president(in that
within the correct ZIP code.
day he was an Jakarta governor), Joko Widodo, was being
Often, merchant will discover orders with invalid zip
spying in his office residence. Jokowi admitted tapping (in-
codes or a mismatch between the zip code and area
terception communication) it really happened. But he chose
code will produce fraud rates that are significantly
not to think about it because they feel no one is talking about
higher than usual. They may wish to apply more
the important things in the office residence. in 2009, on of
rigorous fraud prevention standards by verifying the
Indonesia police headmaster, Susno Duadji, was being tapping
validity of zip code and the area code. In addition, if
by KPK (Corruption Eradiction Commision). KPK tried to
the phone is identified as a V.O.I.P phone, offered by
get some secret important information about the involve of
many services these days, a delay in shipment until
Indonesian police in corruption of Century Bank case.
the payment clears may be in order, especially for
non-times sensitive items. Government stated this problem in the law. in UU No.
4. Call the credit card issuing bank to verify the validity 36 1999 about telecommunication, stated: Telecommunications
of credit card. provider shall keep confidential the information sent and or
If online merchants have any suspicions about an received, by the customers of telecommunications services via
order and need to confirm the details of the order, telecommunications networks and telecommunication services
they can call the issuing bank and ask to confirm the are convening. Provider the telecommunication services should
general account details. This is to make sure that the give the costumer the security and their privacy. And probably
card is not stolen. The issuing bank phone number the provider should give the government special service for
is based on the first 6 digits of credit card number government purpose.
known as the Bank Identification Number (BIN).
5 Request more identification if in doubt. V. C ONCLUSION
While consumers value their privacy and require
quick web site ordering facilities, it is important to Indonesia as being the the first rank of the most country
gather sufficient customer identity details during the provided cyber crime attack is a huge problem. Indonesia as
ordering process. The customers name, credit card a big country should not have this problem. Cyber crime
number and expiry date is not enough. Merchants can disrupt stability of the country. The situation have to
should call them for verification through phone or be prevented and one of many ways Indonesian government
request a photo ID to be faxed if they have any should make the regulation as purposed above.
doubts.
ACKNOWLEDGMENT
Every costumer should aware of e-commerce fraud crime,
The authors would like to thank BlackBerry Innovation
although it is something that can never be completely erased,
Center(BBIC) Labs of Bandung Institute of Technology for
but rather something that must be managed. One of the most
supporting this research.
important factors in controlling fraud is understanding the
customer and implementing security measures that can adapt to
the level of risk in each transaction. Applying fraud detection R EFERENCES
web services in the order management can greatly reduce the [1] Indonesia Internet User Data. Available at http://www.apjii.or.id/v2/
problem[16]. index.php/read/page/halaman-data/9/statistik.html#
[2] Gunjan. Vivit Kumar, Kumar. Amit and Avdhanam. Sharda, A Survey of
B. Illegal Interception Telecommunication Cyber Crime in India.
[3] Yu. Shui, Zhou. Wanlei, Dou, Wanchun and Makki, S.Kami. Why it is
Indonesian shocked by a news from Australian media, Hard to Fight Against Cyber Criminals?. 32nd International Conference
based on leaked document from snowden, that Australian spy on Distributed Computing System Workshop. IEEE. 2012
agencies have targeted Indonesian President Susilo Bambang [4] Mesko, Gozard and Bernik. Igor, Cybercrime: Awareness and Fear,
Slovenian Perspective. European Intelligence and Security Informatics
Yudhoyono(SBY), the vice-president and other senior minis- Conference. IEEE. 2011.
ters for telephone monitoring. the news made a terrible shock [5] P. Kleve, R. De Mulder, and K. van Noortwijk, The Definition of ICT
for Indonesian government. Because, as a leader of country Crime. Elsavier. Computer Law and Security Review 27 (2011) 162-167.
president SBY has very private conversation on his phone [6] Lubis. Muharman and Maulana. Fajri Achmad, Information and Elec-
and maybe ministry did have their privacy about country or tronic Transaction Law Effectiveness (UU-ITE) in Indonesia. Proceeding
government too. 3rd International Conference on ICT4M 2010.
[7] Cyber Crime Attack Source. available at:http://sharingvision.com/2014/
illegal interception is a crucial cases. The cases is hard 06/indonesia-nomor-satu-sumber-serangan-cyber/ accessed on Friday at
to be traced and solved. Less of human resource is being 10.02 AM 10 September 10, 2014.
4
2016 International Conference on ICT For Smart Society
Surabaya, 20-21 July 2016
ISBN : 978-1-5090-1620-4