OVERVIEW OF CYBER TERRORISM IN INDONESIA PRESENTED BY: SUPT. DRS. BOY RAFLI AMAR SPECIAL DETACHMENT 88 AT – INP ARF SEMINAR ON.

Slides:



Advertisements
Similar presentations
STRENGTHENING COOPERATION ON CYBER SECURITY WITHIN THE ASEAN REGION
Advertisements

Efforts of Pakistan to Curb Electronic Crimes and Combat Cyber Terrorism Syed Mohammed Anwer Director Legal Ministry of Information Technology Government.
Philippine Cybercrime Efforts
Cyber Security and Data Protection Presented by Mrs Drudeisha Madhub (Data Protection Commissioner ) Tel: Helpdesk:+230.
What is Insider Threat? “Potential damage to the interests of an organization by a person(s) who is regarded, falsely, as loyally working for or on behalf.
Breaking Trust On The Internet
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
Mobile Technology & Cyber Threats Promoting E-Commerce in Ghana Ruby Saakor Tetteh Ministry of Trade & Industry, Ghana Sixth Annual African Dialogue Consumer.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Dr. Pradnya Saravade Dy.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Cyberspace and the Police Mamoru TAKAHASHI Head of Computer Forensic Center, Hi-tech Crime Technology Division National Police Agency, Japan.
(Geneva, Switzerland, September 2014)
Geneva, Switzerland, September 2014 Overview of Kenya’s Cybersecurity Framework Michael K. Katundu Director, Information Technology Communications.
CYBER CRIME AND SECURITY TRENDS
Network security policy: best practices
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Cracking down on international cyberterrorism
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Securing Information Systems
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Reducing Crime in Cyberspace: A Privacy Industry View Stephanie Perrin Adam Shostack Zero-Knowledge Systems, Inc.
IDENTIFYING THREATS IN A GLOBAL MARKETPLACE Ira S. Somerson, BCFE, CPP Loss Management Consultants, Inc. Institute for Global Management Studies And Temple.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
Investigating Cybercrime DATALAWS Information Technology Law Consultants Presented by F. F Akinsuyi (MSc, LLM)MBCS.
IAEA International Atomic Energy Agency IAEA Nuclear Security Programme Enhancing cybersecurity in nuclear infrastructure TWG-NPPIC – IAEA May 09 – A.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
ADOC Week THAILAND VIETNAM PAPUA NEW GUINEA INDONESIACHILEPHILIPPINESPERUMEXICO INDONESIA OCTOBER 2009 ADOC 2.0 WEEK 2009 ICT Policy & ADOC Training.
Big Data Bijan Barikbin Denisa Teme Matthew Joseph.
Chapter 1 Introduction to Cybercrime and Cyberterror Copyright © 2015 Carolina Academic Press. All rights reserved.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
Jeopardy: Digital Citizenship Please use presentation mode!
A FRICA INTERNET GOVERNANCE FORUM TH SEPTEMBER,2015 AFRICA UNION COMMISSION HQS, ADDIS ABABA,ETHIOPIA Presented By: Michael Ilishebo, ZAMBIA.
InfraGard A Government and Private Sector Alliance Information sharing begins with human relationships – people talking with people whom they trust. Information.
Freedom of Expression in the Information Society : Some Current Issues & Development Dr. A.K. Chakravarti * Adviser Department of Information Technology.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
Advanced attack techniques Advanced attack techniques Increased by passing techniques against the existing detection methods such as IDS and anti- virus.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Training on “Albanian and Italian experience in investigation and prosecution of Cybercrime” General Prosecutor Office, Tirana 10 June 2014 VQA Ivano GABRIELLI.
High-Tech Crime Countermeasures Ko IKAI High-Tech Crime Technology Division National Police Agency, JAPAN.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
Regional Telecommunications Workshop on FMRANS 2015 Presentation.
Cybercrime Courses 1.Child Protection Software 2.Forensic Scan 3.Internet For Investigators 1.Intelligence Gathering On The Internet (Open Source) 1.Covert.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
WHEN, NOT IF THE CYBER SECURITY CHALLENGES AMONG LOCAL GOVERNMENT UMBC Public Policy Forum Baltimore Maryland April 15, 2016 Gayle B. Guilford CISO Baltimore.
CYBERCRIME & ADVANCED PERSISTENT THREATS TEMITAYO OLOYEDE ( ) ATHABASCA UNIVERSITY ETHICAL, LEGAL, AND SOCIAL ISSUES IN INFORMATION TECHNOLOGY (COMP607)
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Implementing a Security Policy JISC – ICT Security Threats & Promises, April 2002 Mick Ismail ICT Services Manager City of Wolverhampton College.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
Backdoor Attacks.
Securing Information Systems
Video: Digital citizenship is defined as the norms of appropriate,
8 Building Blocks of National Cyber Strategies
U.S. Department of Justice
AFRICAN UNION- 23RD-27TH July 2018 PRESENTER: Mr. Nawa J.T Samatebele
Cyber Security Ecosystem of Georgia. Experience and Challenges
Challenges and Successes in the Zambian ICT Security Sector
LO1 - Know about aspects of cyber security
Presentation transcript:

OVERVIEW OF CYBER TERRORISM IN INDONESIA PRESENTED BY: SUPT. DRS. BOY RAFLI AMAR SPECIAL DETACHMENT 88 AT – INP ARF SEMINAR ON CYBER-TERRORISM BUSAN, OCT 2007

THE USE OF CYBER BY TERRORIST  MEANS OF COMMUNICATION  MEANS OF PROPAGANDA  STEALING SECRET INFORMATIONS TO PLAN AN ATTACK  MEANS OF DIRECT ATTACK: HACKING / CARDING.

DEFINITION OF CYBER TERORRISM “ Electronic attack through computer network towards critical infrastructure that has big potential to disturb social and economic activity of a nation.” Misused of cyberspace by Terrorist Group for specific goal.

CHARACTERISTICS OF CYBER TERRORISM 1. The capital needed for the attack is quite small, a big and vast attack only needs a simple computer and modem. 2. Can be done by individual, does not have to be done by a group of people. 3. The risk is small. It is difficult to locate the suspects, even sometimes does not realize that one is being attacked 4. No time or place limitation, the attack can take place anytime and anywhere 5. The loss will be very big and widely spread when successful.

UP TO JULY 2007, INP CAPTURED 405 PERPRETATORS

UNCOVER TERRORIST ACTIVITY IN CYBER  ESTABLISH A WEBSITE ESTABLISH A WEBSITE  IDENTIFY TERRORIST ACTION PLANNED BY JI GROUP  (THE OF ASMAR LATIN SANI) IP ADDRESS CAN LOCATE THE SUSPECTS  COMMUNICATION AMONG THE TERRORIST GROUP ( CHATTING LOG ABOUT TUTORIAL “HOW TO HACK A WEBSITE AND SQL” BY JI MEMBERS) CHATTING LOG

EXISTENCE OF CYBERSPACE INCREASES THE GROWTH OF TERRORIST NETWORK

INDONESIAN LAW Law NO. 15 / 2003 ABOUT TERRORISM ACT ERADICATION ART 7 : Mention other elements such as: Violence or violence threat, to cause terror atmosphere or fear towards people widely ART 27: Mention other elements such as: Evidence in the form of information device that is spoken, sent, accepted or saved electronicaly with optic device

INVESTIGATION OF CYBER TERRORISM BY DET-88 - TRACING IP ADDRESS, SEARCHING FOR SUSPECTS’ LOCATION - CLONING OF THE SUSPECT’S COMPUTER - UNDERCOVER IN CYBERSPACE - CYBER PATROL

INDONESIAN NATIONAL POLICY 1.Developing a national information system. - The fundamental infrastructure: Human resources and regulation. - Technical infrastructure: Network security and data centre protection. 2. The establishment of an e-indonesia, COVER e- governance, e-learning, e-banking, e-commerce, e-health and e-finance. 3. Legal Basis : Currently finalizing a draft law on Information Technology and Elecronic Transaction (ITET) 4. Technical Realm: Dept of Com and Inf Tech cooperation with INP and Internet Community, establishment of Indonesia Security Incident Response Team on Internet Infrastructure.

WHAT WE’VE DONE SO FAR The Government of Indonesia established a working group on Transnational Organized Crime in 2005 (INP, Cyber Crime Unit). WHAT WE SHOULD BE AWARE OF The threats of cyber terrorism by misuse of internet an attack to an important data center or computer networking system wich support vital infrastructure (air traffic control, computer network of nuclear facilities, railways traffic control.)

INTERNATIONAL COOPERATION  COOPERATION IN OPENING SERVER  COOPERATION IN CAPTURING THE SUSPECT WHO IDENTIFIED THEIR LOCATION IN OVERSEAS  ENHANCING CAPABILITY OF THE INVESTIGATOR  RESEARCH ON DEVELOPMENT OF IT / CYBERMEDIA

RECOMMENDATIONS  ESTABLISHING MOU TO IMPLEMENT COOPERATION AMONG THE COUNTRIES MEMBERS IN COMBATING CYBER-TERRORISM  CAPACITY BUILDING: PERSONAL TRAINING COOPERATION, ONLINE INVESTIGATION AND DIGITAL FORENSIC UNIT, SECURITY MANAGEMENT OF CYBERSPACE  MAXIMIZATION OF THE UTILIZATION OF JCLEC AS A TRAINING CENTRE  ENHANCING A COOPERATION BETWEEN SOFTWARE COMPANIES, ISP AND LAW ENFORCEMENT INSTITUTIONS IN THE FRAMEWORK OF LAW ENFORCEMENT PROCCESS

BE AWARE OUR ENEMY ANYWHERE

Website creator, Hacker, Carder, Robber, Bomb maker !!! IMAM SAMUDRA