OVERVIEW OF CYBER TERRORISM IN INDONESIA
PRESENTED BY:SUPT. DRS. BOY RAFLI AMAR
SPECIAL DETACHMENT 88 AT – [email protected]
ARF SEMINAR ON CYBER-TERRORISM
BUSAN, 16-19 OCT 2007
THE USE OF CYBER BY TERRORIST
MEANS OF COMMUNICATION MEANS OF PROPAGANDA STEALING SECRET INFORMATIONS
TO PLAN AN ATTACK MEANS OF DIRECT ATTACK: HACKING
/ CARDING.
DEFINITION OF CYBER TERORRISM
“ Electronic attack through computer network towards critical infrastructure that has big potential to disturb social
and economic activity of a nation.”
Misused of cyberspace by Terrorist Group
for specific goal.
CHARACTERISTICS OF CYBER TERRORISM
1. The capital needed for the attack is quite small, a big and vast attack only needs a simple computer and modem.
2. Can be done by individual, does not have to be done by a group of people.
3. The risk is small. It is difficult to locate the suspects, even sometimes does not realize that one is being attacked
4. No time or place limitation, the attack can take place anytime and anywhere
5. The loss will be very big and widely spread when successful.
UP TO JULY 2007, INP CAPTURED 405
PERPRETATORS
UNCOVER TERRORIST ACTIVITY IN CYBER
ESTABLISH A WEBSITE IDENTIFY TERRORIST ACTION
PLANNED BY JI GROUP (THE EMAIL OF ASMAR LATIN SANI) IP
ADDRESS CAN LOCATE THE SUSPECTS COMMUNICATION AMONG THE
TERRORIST GROUP ( CHATTING LOG ABOUT TUTORIAL “HOW TO HACK A WEBSITE AND SQL” BY JI MEMBERS)
EXISTENCE OF CYBERSPACE INCREASES THE GROWTH OF
TERRORIST NETWORK
INDONESIAN LAWLaw NO. 15 / 2003 ABOUT TERRORISM ACT
ERADICATIONART 7 :
Mention other elements such as:Violence or violence threat, to cause terror atmosphere or fear towards people widely
ART 27:Mention other elements such as:
Evidence in the form of information device that is spoken, sent, accepted or saved
electronicaly with optic device
INVESTIGATION OF CYBER TERRORISM BY DET-88
- TRACING IP ADDRESS, SEARCHING FOR SUSPECTS’ LOCATION
- CLONING OF THE SUSPECT’S COMPUTER- UNDERCOVER IN CYBERSPACE- CYBER PATROL
INDONESIAN NATIONAL POLICY1. Developing a national information system.
- The fundamental infrastructure: Human resources and regulation.- Technical infrastructure: Network security and data centre protection.
2. The establishment of an e-indonesia, COVER e-governance, e-learning, e-banking, e-commerce, e-health and e-finance.
3. Legal Basis : Currently finalizing a draft law on Information Technology and Elecronic Transaction (ITET)
4. Technical Realm: Dept of Com and Inf Tech cooperation with INP and Internet Community, establishment of Indonesia Security Incident Response Team on Internet Infrastructure.
WHAT WE’VE DONE SO FAR The Government of Indonesia established a
working group on Transnational Organized Crime in 2005 (INP, Cyber Crime Unit).
WHAT WE SHOULD BE AWARE OF The threats of cyber terrorism by misuse
of internet an attack to an important data center or computer networking system wich support vital infrastructure (air traffic control, computer network of nuclear facilities, railways traffic control.)
INTERNATIONAL COOPERATIONCOOPERATION IN OPENING
SERVERCOOPERATION IN CAPTURING THE
SUSPECT WHO IDENTIFIED THEIR LOCATION IN OVERSEAS
ENHANCING CAPABILITY OF THE INVESTIGATOR
RESEARCH ON DEVELOPMENT OF IT / CYBERMEDIA
RECOMMENDATIONS ESTABLISHING MOU TO IMPLEMENT COOPERATION ESTABLISHING MOU TO IMPLEMENT COOPERATION
AMONG THE COUNTRIES MEMBERS IN COMBATING AMONG THE COUNTRIES MEMBERS IN COMBATING
CYBER-TERRORISMCYBER-TERRORISM
CAPACITY BUILDING: PERSONAL TRAINING COOPERATION CAPACITY BUILDING: PERSONAL TRAINING COOPERATION
, ONLINE INVESTIGATION AND DIGITAL FORENSIC UNIT, , ONLINE INVESTIGATION AND DIGITAL FORENSIC UNIT,
SECURITY MANAGEMENT OF CYBERSPACESECURITY MANAGEMENT OF CYBERSPACE
MAXIMIZATION OF THE UTILIZATION OF JCLEC AS A MAXIMIZATION OF THE UTILIZATION OF JCLEC AS A
TRAINING CENTRETRAINING CENTRE
ENHANCING A COOPERATION BETWEEN SOFTWARE ENHANCING A COOPERATION BETWEEN SOFTWARE
COMPANIES, ISP AND LAW ENFORCEMENT INSTITUTIONS COMPANIES, ISP AND LAW ENFORCEMENT INSTITUTIONS
IN THE FRAMEWORK OF LAW ENFORCEMENT PROCCESSIN THE FRAMEWORK OF LAW ENFORCEMENT PROCCESS
BE AWARE OUR ENEMY ANYWHERE
Website creator, Hacker, Carder, Robber, Bomb maker !!!
[email protected]@[email protected]@[email protected]
IMAM SAMUDRA