terrorist use of the internet as an operational tool in indonesia it & cyber crime unit of inp1

33
TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP 1

Upload: brian-richards

Post on 27-Mar-2015

217 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1

TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL

IN INDONESIA

IT & Cyber Crime Unit of INP 1

Page 2: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1

INTRODUCTIONTHE GROWTH OF INFORMATION TECHNOLOGY AS WELL

AS INTERNET HAS BROUGHT US BOTH POSITIVE AND NEGATIVE IMPACT.

ONE OF THE NEGATIVE IMPACTS IS THE USAGE OF INTERNET FOR ACHIEVING TERRORIST GROUPS’ GOALS.

IN MANY CASES, TERRORIST GROUPS ARE AHEAD OF GOVERNMENTS IN USING THIS TECHNOLOGY TO FURTHER THEIR ACTIVITIES.

TERRORISTS IN INDONESIA IN FACT HAVE USED IT AS THEIR TOOLS AS WELL AS COMMUNICATION MEDIA TO SUPPORT THEIR TERROR ACTIVITIES AND ACHIEVE THEIR CERTAIN GOALS. WE CLASSIFIED IT AS CYBER TERRORISM.

IT & Cyber Crime Unit of INP 2

Page 3: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1

CYBER TERRORISM

IT & Cyber Crime Unit of INP 3

Page 4: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1

WHAT IS CYBER TERRORISM?

CYBER TERRORISM IS A PREMEDITATED, POLITICALLY MOTIVATED ACT AGAINST INFORMATION, COMPUTER SYSTEMS, AND DATA WHICH RESULT IN VIOLENCE AGAINST NONCOMBATANT TARGETS BY SUB NATIONAL GROUPS OR CLANDESTINE AGENTS (POLLITS, 2002).

IN INDONESIA, WE DEFINE CYBER TERRORISM AS: ANY TERRORISM ACTS USING INFORMATION TECHNOLOGY AND COMMUNICATION SPECIALLY INTERNET AS A TOOL TO CONDUCT FUND RAISING, COLLECT INFORMATION, CAMPAIGN ANY PARTICULAR ISSUES THAT ARE CAUSING FEAR AS WELL AS TO EXECUTE ANY TERRORIST ATTACKS.

IT & Cyber Crime Unit of INP 4

Page 5: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1

TERRORISTS’ MOTIVATION IN INDONESIA

• THE ESSENCE OF TERRORISM IS TO IMPOSE INTEREST FACTOR OR ACTION OR THREATEN HARASSMENT, CAUSING FEAR, TARGETING CIVIL CITIZEN (NON-MILITARY/NON-COMBATANT), AND HAS PARTICULAR TARGETS, USUALLY POLITICAL AGENDA.

• FOUR WAVES OF MODERN TERRORISM:– ANARCHIST/REVOLUTIONARY TERRORISM– ANTI COLONIAL; NATIONALIST TERRORISM– NEW LEFT (IDEOLOGICAL) TERRORISM– RADICAL RELIGIOUS TERRORISM

• IN INDONESIA, MOST TERRORISTS ARE MOTIVATED BY RELIGIOUS RADICALISM SO THAT CLASSIFIED AS RADICAL RELIGIOUS TERRORISM.

IT & Cyber Crime Unit of INP 5

Page 6: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1

TERRORISTS USED THE INTERNET

THE TERRORISTS EXPLOIT INTERNET FOR: – MEDIA COMMUNICATION

• NETWORKING WITHIN GROUPS• CAMPAIGN AND PROPAGANDA• MEMBERS RECRUITMENT• FUND RAISING• COLLECT INFORMATION AND LEARNING MEDIA

– EXECUTING ANY ATTACK IN CYBER SPACE.

IT & Cyber Crime Unit of INP 6

Page 7: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1

TERRORISTS ACTIVITIES VIA INTERNET

CREATING WEBSITE/BLOGCOMMUNICATION VIA EMAIL OR CHATTINGDISCUSSION VIA CHAT ROOME-TRANSACTION (E-COMMERCE/E-BANKING)USING SEARCHING MACHINE TO COLLECT DATA OR

FINDING INFORMATIONPHISHING/HACKINGMANY OTHER TYPES SUCH AS VIRUSES, WORM,

TROJAN, ROOTKIT, MALICIOUS CODE, AND DDOS ATTACK.

IT & Cyber Crime Unit of INP 7

Page 8: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1

POTENTIAL TARGET

IT & Cyber Crime Unit of INP 8

Page 9: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1

IT & Cyber Crime Unit of INP 9

OFFICIAL WEBSITESOFFICIAL WEBSITES – THESE ARE IDENTIFIED AS GOVERNMENT WEB SITES

THAT ARE AVAILABLE TO THE PUBLIC FOR INFORMATION ON GOVERNMENTAL SERVICES.

THE VAST MAJORITY OF GOVERNMENT WEB SITES ARE HOSTED BY PRIVATE INDUSTRY INTERNET SERVICE PROVIDERS.

TERRORIST ORGANIZATIONS CAN GATHER INFORMATION FROM OFFICIAL GOVERNMENT WEBSITES ON LAW ENFORCEMENT AND MILITARY PERSONNEL AND ACTIVITIES.

GOVERNMENT AGENCIES SHOULD CONDUCT PERIODIC REVIEWS OF THEIR WEBSITES IN ORDER TO DETERMINE IF CRITICAL INFORMATION IS BEING POSTED TO THE SITE.

Page 10: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1

IT & Cyber Crime Unit of INP 10

OFFICIAL WEBSITES

TERRORIST GROUPS CAN LAUNCH DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS AGAINST GOVERNMENT WEBSITES TO DISRUPT SERVICE.

WEBSITES MAY BE ATTACKED BY TERRORIST ORGANIZATIONS IN ORDER TO GAIN ACCESS TO GOVERNMENT NETWORKS WHERE CRITICAL INFORMATION IS STORED.

THE CYBER ATTACKS OCCUR DUE TO THE LACK OF SECURITY MECHANISMS ON COMPUTER SYSTEMS.

Page 11: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1

IT & Cyber Crime Unit of INP 11

FINANCIAL & MONETARY INSTITUTIONS

MONETARY INSTITUTIONS - THE VERY NATURE OF A NATION-STATES EXISTENCE RELIES ON ITS ABILITY TO FUNCTION ECONOMICALLY.

THREATS TO THE FINANCIAL SYSTEMS WILL HAVE DIRE CONSEQUENCES FOR A NATIONS ABILITY TO OPERATE EFFECTIVELY AND EFFICIENTLY.

THE VAST MAJORITY OF FINANCIAL AND BANKING SYSTEMS NOW HAVE A PRESENCE ON THE INTERNET.

THE PRESENCE OF BANKING ON THE INTERNET ALSO EXPOSES THE FINANCIAL SYSTEMS TO RISKS FROM CYBER TERRORIST ATTACKS.

PRIVATE INDUSTRY AND GOVERNMENT MUST ENSURE THAT THEY SECURE THEIR COMPUTER SYSTEMS.

Page 12: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1

IT & Cyber Crime Unit of INP 12

WATER SYSTEMSWATER SOURCES – THE WATER FACILITIES, PLANTS AND DAMS THAT

CONTAIN AND PROVIDE WATER AND ENERGY TO COMMUNITIES.THESE FACILITIES ARE CONTROLLED BY SUPERVISORY CONTROL AND

DATA ACQUISITION SYSTEMS (SCADA). IMAGINE THE IMPLICATIONS OF A CYBER TERRORIST GAINING

ACCESS TO THE SCADA NETWORK THAT CONTROLS A LARGE DAM AND THEN RELEASING THE WATER UPON AN UNSUSPECTING TOWN OR CITY.

THE VULNERABILITIES OF SCADA ARE WELL KNOWN AND DOCUMENTED.

Page 13: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1

INDONESIAN TERRORISTS’ WEBSITES

THE INP HAS MONITORED SOME WEBSITES USED BY THE TERRORIST GROUPS:

WEBSITE www.anshar.net RELATED WITH ABDUL AZIZ AND POSSIBLY RELATED WITH THE

SECOND BALI BOMBING TRAGEDYWEBSITE www.ar-risalah.com

RELATED WITH AR RISALAH MAGAZINE;WEBSITE www.istimata.com

RELATED WITH THE SECOND BALI BOMBING TRAGEDY;WEBSITE www.muharridh.comwww.geocities.com/maktabistimata.index.html?200619

BRIGADE ISTIMATA INTERNATIONAL

IT & Cyber Crime Unit of INP 13

Page 14: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1

ACTUAL CASE

INVESTIGATION ON WEBSITE www.anshar.netTHE INVESTIGATION WAS FOCUSED IN:

- THE WEBSITE CREATOR;- THE OBJECTIVES OF THE WEBSITE CREATION;- INVOLVEMENT OF OTHER TERRORISTS GROUPS;- FUNDING: WHO SPONSORED THE WEBSITE; - RECRUITMENT METHOD FOR NEW MEMBERS;

IT & Cyber Crime Unit of INP 14

Page 15: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1

PARTIES INVOLVED IN THE INVESTIGATION

• INVESTIGATORS OF THE INP IT & CYBER CRIME UNIT OF INP• YAHOO ADMINISTRATOR• INTERNET PROVIDER• CELLULAR PROVIDER• OTHER INVESTIGATORS FROM OTHER COUNTRIES AFP & FBI• SOME IT EXPERTS

IT & Cyber Crime Unit of INP 15

Page 16: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1

RESULT OF THE INVESTIGATION

THE INVESTIGATION HAS SUCCEEDED TO:– REVEAL THE MOTIVATION OF THE WEBSITE

ESTABLISHMENT;– REVEAL ANY PARTIES WHO SUPPORTED THE WEBSITE;– IDENTIFY ANY PERSONS WHO DIRECTLY AND INDIRECTLY

INVOLVED IN ESTABLISHING, DEVELOPING AND MAINTAINING THE WEBSITE AS WELL AS THEIR RELATION WITH THE TERRORISTS GROUPS WHICH OPERATES IN INDONESIA.

IT & Cyber Crime Unit of INP 16

Page 17: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1

CHALLENGES OF INVESTIGATING CYBER TERRORISM

LOCUS DELICTI (THE EXACT PLACE WHERE A LAW WAS BROKEN) ISSUE

IN THIS CASE, THE INVESTIGATOR HAS COME TO THE CONCLUSION THAT THE LOCUS DELICTI TOOK PLACE IN CENTRAL JAVA.

GENERALLY DIGITAL EVIDENCE IS NOT RECOGNIZED AS LEGAL EVIDENCE BEFORE THE COURT UNDER INDONESIAN LEGAL SYSTEM. DIGITAL EVIDENCE SHOULD BE INTRODUCED TO INDONESIAN LEGAL SYSTEM, ALLOWING DIGITAL EVIDENCE AS LEGAL EVIDENCE BEFORE THE COURT SUCH AS COMPUTER PROGRAM, EMAIL AND WEBSITE.

ESPECIALLY FOR TERRORISM CASE, DIGITAL EVIDENCE HAS BEEN ALLOWED AS LEGAL EVIDENCE BEFORE THE COURT, HOWEVER IT IS STILL REQUIRED MORE SOSIALIZATION IN EACH LAW ENFORCEMENT OFFICER INCLUDING POLICE, ATTORNEY AND JUDGES.

IT & Cyber Crime Unit of INP 17

Page 18: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1

INVESTIGATION REPORTS: WEBSITE www.anshar.net CASE

SUSPECTS:

• THE WEBSITE WAS INITIATED BY NOORDIN M. TOP (ONE OF THE TERRORISTS “MOST WANTED”), CREATED AND HOSTED BY MOHAMMAD AGUNG PRABOWO A.K.A MAXFIDERMAN

• THE CONTENT/SUBSTANCE WAS CREATED AND UPLOADED BY ABDUL AZIS A.K.A QITAL

IT & Cyber Crime Unit of INP 18

Page 19: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1

“MAX FIDERMAN”MOHAMMAD AGUNG PRABOWO

Student of Electronic EngineeringFaculty of Semarang University

AGUNG SETYADI Skom.“pakne” “salafuljihad”

IT TEACHER at UNIVERSITY ofSTIKUBANK

ABDUL AZIS “qital”(Computer Teacher at Senior High

School in Pekalongan)

“AL-IRHAB” IMAM SAMUDRA

CAHYO a.k.a WAHYU a.k.a WISNU,ABDUL HADI

(DEAD)

TEDI a.k.aRENO

Request to learn: CARDINGHACKINGHOSTING/DOMAIN

REJECTED TO BUY LAPTOP BY CARDINGJOIN NGAJI ON JUNE 14, 2005THOUGHT AGUNG ABOUT:- CARDING- HACKING- HOSTING

- MET MAXFIDER - FOUND LAPTOP- RECEIVED Rp 3 MILLION VIA BANK TRANSFER- SENT LAPTOP ECS 1,2 GHz (JUNE 2005) MET ONCE

TIME

GROBOGANREHABILITATIONCENTER- Laptop- Mobile Phone

Website anshar.net

ASKED MAXFIDER TO JOIN NGAJIMET MAX 3 TO 5 TIMESLEARNED CARDING,HACKING,HOSTING, PROXY

JUNE TO AUGUST 2005JUNE TO AUGUST 2005

Rented House in Kedung WuniMedono, Pekalongan FATHUROHMANYASIN a.k.a REZBUKHORI

AUSTRALIAN EMBASSY BOMBINGAUSTRALIAN EMBASSY BOMBING

Channel #caféislam #ahlussunnah

ISLAMICARD

SECOND BALI BOMBING SECOND BALI BOMBING OCTOBER 1, 2005OCTOBER 1, 2005

AFTER KUNINGANAFTER KUNINGANBOMBING BOMBING

NMT

-HELPED TO FIND RENTED HOUSE IN MEDONO -TOGETHER DEVELOPED WEB CONTENT

IT & Cyber Crime Unit of INP 19

Page 20: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1

hostin

g

dom

ain

www.openhosting.co.uk

www.joker.com

MAX FIDERMAN alias MAP Gg. Pangeran Cendono Rt. 04/05

Dawe, Kudus, Central Java

www.anshar.net“online”

Registration Form:- E-mail: [email protected] Payment Confirmation- Credit Card Form- Submit of Credit Card (Carding) hosting = £300 per year domain = US$60 per year

QITAL

UPLOADED CONTENTAND TEMPLATE

http://www.anshar.net

HOSTING & DOMAIN REGISTRATIONhttp://www.anshar.net

IT & Cyber Crime Unit of INP 20

Page 21: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1

INVESTIGATION REPORTS: WEBSITE www.anshar.net

PURPOSE OF THE WEBSITE ESTABLISHMENT:

– PROPAGANDA;

– PUBLICATION OF EXECUTION OF THE AL-JAMAAH AL-ISLAMIYAH GROUPS;

– DISTRIBUTION OF TRAINING MATERIAL FOR THE ASKARIYAH (SOLDIERS).

IT & Cyber Crime Unit of INP 21

Page 22: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1

CONTENT OF WEBSITE anshar.net

IT & Cyber Crime Unit of INP 22

Page 23: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1

TEMPLATE CONTENT OF www.anshar.netCREATED BY NMT FROM ASKARIYAH TACTICS

IT & Cyber Crime Unit of INP 23

Page 24: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1

JI HAD A PLAN TO TARGET SOME LOCATIONS

IT & Cyber Crime Unit of INP 24

Page 25: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1

IT & Cyber Crime Unit of INP 25

Page 26: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1

IT & Cyber Crime Unit of INP 26

Page 27: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1

IT & Cyber Crime Unit of INP 27

Page 28: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1

IT & Cyber Crime Unit of INP 28

Page 29: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1

IT & Cyber Crime Unit of INP 29

Page 30: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1

IT & Cyber Crime Unit of INP 30

Page 31: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1

IT & Cyber Crime Unit of INP 31

Page 32: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1

CONCLUSIONTHE INTERNET WILL FACILITATE THE ABILITY OF TERRORIST

ORGANIZATIONS TO COMMUNICATE AMONG THEIR CELLS, RECRUIT NEW MEMBERS, ADVOCATE THEIR VIEWS WITH PROPAGANDA, GATHER INTELLIGENCE OR LAUNCH DEVASTATING ATTACKS ON AN UNPROTECTED CRITICAL INFRASTRUCTURE.

NATIONS NEED TO BE AWARE OF AND BE PREPARED TO RESPOND TO TERRORISM ON THE INTERNET.

FROM WEBSITE INTENSIVE INVESTIGATION, WE WILL FIND OUT THE PARTIES WHO ACTIVELY INVOLVED IN TERRORIST GROUPS, AND COUNTER THE TERRORISTS THREAT.

IT & Cyber Crime Unit of INP 32

Page 33: TERRORIST USE OF THE INTERNET AS AN OPERATIONAL TOOL IN INDONESIA IT & Cyber Crime Unit of INP1

THE END

IT & Cyber Crime Unit of INP 33