Professional Documents
Culture Documents
Cyber Crime Assignment - Noorila Ulfa Nafisah (031311133081)
Cyber Crime Assignment - Noorila Ulfa Nafisah (031311133081)
By:
2016
INTRODUCTION
The higher the technology develops; the methods of committing crimes also enter
into new dimension. If a long time ago, the modus operandi in committing a crime is limited
to the conventional means, now, since people recognize more about the computer-media
network, they tend to operate and to optimize their felony or misdemeanor through that
sophisticated mechanism rather than use of non-cyber media. It can even expand or cut
through the border of states. Hence, the users of cyberspace can either be the victims of a
particular crime or merely be the audience as to be the means of circulating the news on the
existing crime such as what has been done by the cyber-terrorists.
Recently, the reports of terrorism across cyber media are frequently disseminated.
The cyber-based terrorism is another significant global issue throughout the world, since it
brings about several effects on its publication. Indeed, the method in committing terrorism
always deal with the technology itself, but using the cyberspace as the media takes place to
another real dangerous threat which can be felt even for the unrelated civilians. According to
the annual report of Federal Bureau of Investigation (FBI) on Internet Crime Complaint
Center, the total victims of terrorism through internet increase significantly on the last two
years. The number of victims on 2014 is 96 people with the total loss of $60,1001, while last
year, such number multiples three times which is 361 people with the victims’ total loss of
$65,789.2
In Indonesia, the use of internet as the media to support the terrorism activity is
actually not a brand new affair. Indonesia has its first time in 2006 to successfully dismantle
the cyber-terrorism case which involves the sentenced-to-death Abdul Azis alias Imam
Samudra on 2002 Bali Bombing.3 Probably, Imam Samudra is considered as the initiator of
any other follow-up terrorism movement in Indonesia. Two weeks after the occurrence of
Bali Bombing, he made website www.istimata.com which contains the explanation why they
did such action in Bali. One of the reasons is they intended to take a revenge on America and
its allies who are deemed to kill the Muslims in Islamic states such as Afghanistan. 4 Imam
1
FBI Internet Crime Complaint Center, “2014 Internet Crime Report”, www.ic3.gov, 2014,
visited on 25 May 2016, p. 47.
2
FBI Internet Crime Complaint Center, “2015 Internet Crime Report”, www.ic3.gov, 2015,
visited on 25 May 2016, p. 14 and 16.
3
P r i y a m b o d o, “Indonesia Pertama Kali Bongkar Kasus Cyber - Terrorism”,
www.antaranews.com, 2006, visited on 26 May 2016.
4
Solahudin, “Cyber Jihad di Indonesia”, ctscui.com, 2014, visited on 23 May 2016.
1
Samudra was quite careful in doing his action since he takes into account the security of the
website by buying domain and hosting of the website in America with false identity and
obtain money to fund the action from the result of carding5.
Furthermore, based on the recent report, the cyber-terrorists also upload various
military knowledge starting from weapon training to field engineering from some jihad sites.6
Not only to that scale, they even openly create some group discussions in regard with jihad in
social media such as Facebook.7 The recent phenomenal case is the propaganda of group of
Islamic State in Iraq and Syria (ISIS). ISIS is a religious movement that seeks to enforce the
state government or the system based on Islam (Khilafah Islamiyah) is an extremist group
that follows the hardline ideology of al Qaeda and guided by the principles of global jihad.8
Recently, those people did cyber-attack by showing support or delivering threats through the
media of Youtube so that anyone who can access to internet is possible to watch it online.
Quoting Association of Indonesian Internet Providers (APJII) data, the National
Counterterrorism Agency (BNPT) said there were 81.1 million internet users in Indonesia in
2014, of which 49 percent were young people and children who were vulnerable to IS
influence through social media.9
ISSUES
5
The term “Carding”, according to Kimberly Kiefer Peretti one of the members in U.S.
Department of Justice, in its narrow sense, refers to the unauthorized use of credit and debit card
account information to fraudulently purchase goods and services.
6
Ibid.
7
Ibid.
8
Devi Aryani, “Fenomena Radikalisme Gerakan ISIS di Indonesia”, Bachelor Thesis,
Fakultas Keguruan dan Ilmu Pendidikan Universitas Muhammadiyah Surakarta, 2015, p. 9.
9
Marguerite Afra Sapiie, “Indonesia Joins World to Fight Cyber-Terrorism”,
www.thejakartapost.com, 2015, visited on 24 May 2016.
2
2. Does the notion behind Indonesia Criminal Code and Indonesia Law No. 11 of 2008 and
Law No. 15 of 2003 cover the conduct of cyber-terrorism?
ANALYSIS
Prior discussing about the notion of cyber-terrorism, the definition and the scope of
terrorism should be firstly examined. Terrorism is categorized as one of the extraordinary
crimes. Terrorism in its development has been building an organization and has a global
network in which terrorist groups operating in various countries have been co-opted by an
international terrorist network and has a relationship and cooperation mechanism with one
another both in the operational aspects of infrastructure and supporting infrastructure. 13 On
10
Susan W. Brenner, Cybercrime: Criminal Threats from Cyberspace, Praeger, California, p.
9.
11
Ibid, p. 10.
12
Maskun, Kejahatan Siber (Cyber Crime) Suatu Pengantar, Prenada Media, Jakarta, 2013,
p. 5.
13
Moch. Faisal Salam, Motivasi Tindakan Terorisme, Mandar Maju, Bandung, 2005, p. 1.
3
the one hand, according to the arguments of some experts, terrorism activity will never be
justified because its main characteristics among others14:
1) The action is committed by using violence and threats to create public fear;
2) Addressed to the state, society or individual or a certain group of people;
3) Reigning its members to perform terror as well;
4) Committing violence with the intention to gain support systematically and in
organized manner.
Cyber-terrorism is one of the category of crimes that cross border organized and has
been established as an extraordinary crime.18 Based on the Counter Terrorism Task Force of
Council of Europe, there are some reasons why terrorists use internet as the medium to
commit terrorism activity because the attack can be committed anywhere on any parts of the
world, in fast moment by way of worm and virus which can be spread without any further
involvement of the perpetrator. Such attack through internet can be obfuscated by particular
program or particular technic so that is difficult to be traced.19
14
Ibid.
15
Imran Awan, ‘Debating The Term Cyber-Terrorism: Issues and Problems’, Internet Journal
of Criminology, 2014, downloaded from www.internetjournalofcriminology.com, p. 2.
16
Jihad is literally originated from Arabian word jihād. The simple definition given by
Merriam-Webster Dictionary, jihad means a war fought by Muslims to defend or spread their beliefs.
According to Abou El Fadl, in Arabic itself, the word jihad is a noun meaning the act of “striving,
applying oneself, struggling, persevering.” To figure out the meaning of jihad itself, people must
interpret it in a careful way.
17
Solahudin, Loc.Cit.
18
Sri Ayu Astuti, ‘Law Enforcement of Cyber Terrorism in Indonesia’, Rechtsidee Law
Journal, Faultas Huum Universitas Muhammadiyah, Sidoarjo, Vol. 2, No. 2, 2015, p. 1.
19
Petrus Reinhard Golose, Seputar Kejahatan Hacking: Teori dan Studi Kasus, Yayasan
Pengembangan Kajian Ilmu Kepolisian, Jakarta, 2008, p. 31.
4
To sum up since the concept of cybercrime basically the same with the
‘conventional’ crime, the cyber-terrorism which is part of a crime shall be included into the
discussion of cybercrime as well. The legal enforcement of cyber-terrorism, therefore, must
be encompassed into the concept of cybercrime. To encounter any cyber-terrorism, the
cybercrime concept shall plays its role to avoid and to eradicate the growing cyber-terrorism.
Cyber-terrorism is agreed as one of the real threat in current days since social
interaction through virtual world is important nowadays. Pursuant to the current news and
threat such as from ISIS, Indonesia is one of the most targeted country for the terrorists to
recruit their new members. Therefore, to protect and to avoid any unwanted situations, there
must be observed the existence of cyber-terrorism law in Indonesia.
“Systematical unlawful act with the intent to destroy the sovereignty of the nation
and the state to be harmful to one’s body, life, moral, property and freedom of the
person or cause damage to public or atmosphere of terror or tacit sense to another
widely, resulting in the destruction of the vital strategic objects, people's basic needs,
environmental, moral, civilization, state secrets, culture, education, economy,
technology, industry, public facilities, or international facilities.”
20
R. Atang Ranoemihardja, Hukum Pidana: Asas-asas, Pokok Pengertian, dan Teori Serta
Pendapat Beberapa Sarjana, Tarsito, Bandung, 1984, p. 127.
21
Article 1 point 1 of Government Regulation In Lieu of Law No. 1 of 2002.
22
Putri Almina Sari, “Upaya Pemerintah Meminimalisir Aksi Terorisme Melalui Pendekatan
Hukum dan Sosio Kultural di Indonesia”, Bachelor Thesis, Fakultas Hukum Universitas Sumatera
Utara, Medan, 2011, downloaded from repository.usu.ac.id, p. 2.
5
According to article 8, the crime of terrorism also includes any felony or negligence
to the aircraft. Any form of incitement to any terrorism activity can also be charged through
article 14 to 16. Moreover, the perpetrators of terrorism are not limited to individual person
but also to legal person as stated under article 17 to 18 of the law.
However, the term ‘terrorism’ here does not specifically points out the modus
operandi through cyberspace. The enactment of the Law itself is due to the emergency
situation on 2002 of Bali Bombing conducted by Imam Samudra and his associates. In
addition, the Indonesian Criminal Code also does not stipulate about terrorism since it still
has the sense of colonialism era. Thus, the law needs to accommodate the stipulations of
cyber-terrorism as well since the internet users are growing time by time and vary from
younger persons to adults. Not only to the civilians, any state infrastructure or public facility
or private sectors have emphasized the performance on computerized basis such as e-
government, e-commerce, or e-banking. The notion of legality principle which is written
down in article 1 paragraph (1) of Indonesia Criminal Code signifies that an act cannot be
convicted unless there exists the statutory provisions on it. It might become one of the
stumbling block because there is an absence of law in cyber-terrorism. Nevertheless, the
stipulations in Government Regulation in Lieu of Law No. 1 of 2002 actually can be the basis
to ensnare the perpetrators pursuant to article 6 to article 19 on Chapter III. Since there is an
absence of law, as a lawyer, the law needs to be interpreted legally.
The role of Law No. 11 of 2008 on Information and Electronic Transaction, then
takes the role to support such interpretation. The scope of Law No. 11 of 2008 generally
among others containing the electronic information and documents, sending and receiving
email, electronic signature, electronic certificate, intellectual property rights and privacy, also
criminal provisions which related to the use of information and electronic transaction.23
Almost all chapters have been applied to protect particularly for internet users or
netizens from criminal acts of cyber terrorism. Law No. 11 Year 2008 on Information and
Electronic Transactions is legislation governing crimes based on technologies (cybercrime),
while the criminal offense of cyber terrorism is section/type of cybercrime that way or
method used to perform the offense is already stipulated in this law. For the entrapment of
cyber-terrorism perpetrators by using Law No. 15 of 2003 on Criminal Acts of Terrorism
23
Widodo, Hukum Pidana di Bidang Teknologi Informasi (Cybercrime Law): Telaah Teoritik
dan Bedah Kasus, Aswaja Pressindo, Yogyakarta, 2013, p. 49.
6
Eradication and the Law Number 11 Year 2008 regarding Information and Electronic
Transaction can be used as a mere clauses that can support or match with each other in order
to ensnare the cyber-terrorists, but both of these laws still have weaknesses such as no
definition grammatically regarding cyber terrorism; does not include probation delict in Law
No. 15 of 2003; and the elements are different in the those two laws.24
24
Agis Josianto Adam, ‘Tindak Pidana Cyber Terrorism dalam Transaksi Elektronik’, Lex
Administratum, Vol. II, No. 3, 2014, p. 171.
7
government may also educate the netizens or internet users to be more aware with the
threat of cyber-terrorism and how to address it.
BIBLIOGRAPHY
Book
Golose, Petrus Reinhard. Seputar Kejahatan Hacking: Teori dan Studi Kasus. Yayasan
Pengembangan Kajian Ilmu Kepolisian. Jakarta. 2008.
Maskun. Kejahatan Siber (Cyber Crime) Suatu Pengantar. Prenada Media. Jakarta. 2013.
Ranoemihardja, R. Atang. Hukum Pidana: Asas-asas, Pokok Pengertian, dan Teori Serta
Pendapat Beberapa Sarjana. Tarsito. Bandung. 1984.
Salam, Moch. Faisal. Motivasi Tindakan Terorisme. Mandar Maju. Bandung. 2005.
Widodo. Hukum Pidana di Bidang Teknologi Informasi (Cybercrime Law): Telaah Teoritik
dan Bedah Kasus. Aswaja Pressindo. Yogyakarta. 2013.
Journal
Adam, Agis Josianto. ‘Tindak Pidana Cyber Terrorism dalam Transaksi Elektronik’. Lex
Administratum. Vol. II. No. 3. 2014.
Astuti, Sri Ayu. ‘Law Enforcement of Cyber Terrorism in Indonesia’. Rechtsidee Law
Journal. Fakultas Hukum Universitas Muhammadiyah. Sidoarjo. Vol. 2. No. 2.
2015.
Awan, Imran, ‘Debating The Term Cyber-Terrorism: Issues and Problems’, Internet Journal
of Criminology, 2014, downloaded from www.internetjournalofcriminology.com.
Thesis
Aryani, Devi. “Fenomena Radikalisme Gerakan ISIS di Indonesia”. Bachelor Thesis,
Fakultas Keguruan dan Ilmu Pendidikan Universitas Muhammadiyah. Surakarta.
2015.
Sari, Putri Almina. “Upaya Pemerintah Meminimalisir Aksi Terorisme Melalui Pendekatan
Hukum dan Sosio Kultural di Indonesia”. Bachelor Thesis. Fakultas Hukum
Universitas Sumatera Utara, Medan. 2011. downloaded from repository.usu.ac.id,
8
Internet
FBI Internet Crime Complaint Center. “2014 Internet Crime Report”. www.ic3.gov, 2014.
visited on 25 May 2016.
-----------------, “2015 Internet Crime Report”. www.ic3.gov. 2015. visited on 25 May 2016.
Priyambodo. “Indonesia Pertama Kali Bongkar Kasus Cyber-Terrorism”.
www.antaranews.com. 2006. visited on 26 May 2016.
Sapiie, Marguerite Afra. “Indonesia Joins World to Fight Cyber-Terrorism”.
www.thejakartapost.com. 2015. visited on 24 May 2016.
Solahudin. “Cyber Jihad di Indonesia”. ctscui.com. 2014. visited on 23 May 2016.