Presentation is loading. Please wait.

Presentation is loading. Please wait.

OVERVIEW OF CYBER TERRORISM IN INDONESIA PRESENTED BY: SUPT. DRS. BOY RAFLI AMAR SPECIAL DETACHMENT 88 AT – INP ARF SEMINAR ON.

Similar presentations


Presentation on theme: "OVERVIEW OF CYBER TERRORISM IN INDONESIA PRESENTED BY: SUPT. DRS. BOY RAFLI AMAR SPECIAL DETACHMENT 88 AT – INP ARF SEMINAR ON."— Presentation transcript:

1 OVERVIEW OF CYBER TERRORISM IN INDONESIA PRESENTED BY: SUPT. DRS. BOY RAFLI AMAR SPECIAL DETACHMENT 88 AT – INP boyamar1988@yahoo.co.id ARF SEMINAR ON CYBER-TERRORISM BUSAN, 16-19 OCT 2007

2 THE USE OF CYBER BY TERRORIST  MEANS OF COMMUNICATION  MEANS OF PROPAGANDA  STEALING SECRET INFORMATIONS TO PLAN AN ATTACK  MEANS OF DIRECT ATTACK: HACKING / CARDING.

3 DEFINITION OF CYBER TERORRISM “ Electronic attack through computer network towards critical infrastructure that has big potential to disturb social and economic activity of a nation.” Misused of cyberspace by Terrorist Group for specific goal.

4 CHARACTERISTICS OF CYBER TERRORISM 1. The capital needed for the attack is quite small, a big and vast attack only needs a simple computer and modem. 2. Can be done by individual, does not have to be done by a group of people. 3. The risk is small. It is difficult to locate the suspects, even sometimes does not realize that one is being attacked 4. No time or place limitation, the attack can take place anytime and anywhere 5. The loss will be very big and widely spread when successful.

5 UP TO JULY 2007, INP CAPTURED 405 PERPRETATORS

6 UNCOVER TERRORIST ACTIVITY IN CYBER  ESTABLISH A WEBSITE ESTABLISH A WEBSITE  IDENTIFY TERRORIST ACTION PLANNED BY JI GROUP  (THE EMAIL OF ASMAR LATIN SANI) IP ADDRESS CAN LOCATE THE SUSPECTS  COMMUNICATION AMONG THE TERRORIST GROUP ( CHATTING LOG ABOUT TUTORIAL “HOW TO HACK A WEBSITE AND SQL” BY JI MEMBERS) CHATTING LOG

7 EXISTENCE OF CYBERSPACE INCREASES THE GROWTH OF TERRORIST NETWORK

8 INDONESIAN LAW Law NO. 15 / 2003 ABOUT TERRORISM ACT ERADICATION ART 7 : Mention other elements such as: Violence or violence threat, to cause terror atmosphere or fear towards people widely ART 27: Mention other elements such as: Evidence in the form of information device that is spoken, sent, accepted or saved electronicaly with optic device

9 INVESTIGATION OF CYBER TERRORISM BY DET-88 - TRACING IP ADDRESS, SEARCHING FOR SUSPECTS’ LOCATION - CLONING OF THE SUSPECT’S COMPUTER - UNDERCOVER IN CYBERSPACE - CYBER PATROL

10 INDONESIAN NATIONAL POLICY 1.Developing a national information system. - The fundamental infrastructure: Human resources and regulation. - Technical infrastructure: Network security and data centre protection. 2. The establishment of an e-indonesia, COVER e- governance, e-learning, e-banking, e-commerce, e-health and e-finance. 3. Legal Basis : Currently finalizing a draft law on Information Technology and Elecronic Transaction (ITET) 4. Technical Realm: Dept of Com and Inf Tech cooperation with INP and Internet Community, establishment of Indonesia Security Incident Response Team on Internet Infrastructure.

11 WHAT WE’VE DONE SO FAR The Government of Indonesia established a working group on Transnational Organized Crime in 2005 (INP, Cyber Crime Unit). WHAT WE SHOULD BE AWARE OF The threats of cyber terrorism by misuse of internet an attack to an important data center or computer networking system wich support vital infrastructure (air traffic control, computer network of nuclear facilities, railways traffic control.)

12 INTERNATIONAL COOPERATION  COOPERATION IN OPENING SERVER  COOPERATION IN CAPTURING THE SUSPECT WHO IDENTIFIED THEIR LOCATION IN OVERSEAS  ENHANCING CAPABILITY OF THE INVESTIGATOR  RESEARCH ON DEVELOPMENT OF IT / CYBERMEDIA

13 RECOMMENDATIONS  ESTABLISHING MOU TO IMPLEMENT COOPERATION AMONG THE COUNTRIES MEMBERS IN COMBATING CYBER-TERRORISM  CAPACITY BUILDING: PERSONAL TRAINING COOPERATION, ONLINE INVESTIGATION AND DIGITAL FORENSIC UNIT, SECURITY MANAGEMENT OF CYBERSPACE  MAXIMIZATION OF THE UTILIZATION OF JCLEC AS A TRAINING CENTRE  ENHANCING A COOPERATION BETWEEN SOFTWARE COMPANIES, ISP AND LAW ENFORCEMENT INSTITUTIONS IN THE FRAMEWORK OF LAW ENFORCEMENT PROCCESS

14 BE AWARE OUR ENEMY ANYWHERE

15 Website creator, Hacker, Carder, Robber, Bomb maker !!! sangpria@yahoo.co.nz gulajawa333@yahoo.com piring@yahoo.com.tw priaidaman@yahoo.co.nz freddymd@yahoo.com IMAM SAMUDRA


Download ppt "OVERVIEW OF CYBER TERRORISM IN INDONESIA PRESENTED BY: SUPT. DRS. BOY RAFLI AMAR SPECIAL DETACHMENT 88 AT – INP ARF SEMINAR ON."

Similar presentations


Ads by Google