INDONESIAN NATIONAL POLICY IN COMBATING CYBER-CRIME
I. Backr!u"# 1. The utilization of internet technology (or information technology) has become an integral part of peoples activities. Such development brings both positive and negative impacts at the same time. Internet makes it possible for people to do business in such a ay that has been never done before. It can be found in a form of online trading! here people trade in a "virtual market#. The transaction is really there! but the physical market is not really there. $. The development! hich creates a ne "virtual orld#! hoever! also creates a ne realm for crimes to be committed. This brings a ne kind of threats to the security and stability of the people in the orld. II. T$e T$reat% II. A. C!mm!" &!'a& t$reat% %. &yber and other computer related crimes have been knon to the orld since the inception of internet technology. The realm of virtual orld has created the so called a ne breed of crime acts. Those crimes ranging from the spreading of computer viruses! hich 'eopardizes local computer system! then in its advancement 'eopardizes a particular computer netork up to the threats of cyber(terrorism. ). In narro sense! *sing internet or cyberspace to commit crime can be found in the forms of crime against online banking that includes credit card fraud! personal account thefts! and a particular banks forgery. +. In broader conte,t! Internet! computer netork (both local and ide area) as the target of a criminal act can be found in the forms of hacking! cracking! database deconstruction! netork stability! spoofing and deployment of tro'an viruses ith intended damaging impact. II. B. I"#!"e%ia(% c$a&&e"e i" cy'er %ecurity -. To date! the most common cyber and other computer related crimes knon to Indonesia are hacking! cracking! &redit card fraud! Internet .anking. /ccording to the survey by the &lear&ommerce! in $00$ Indonesia is the "second best# in the term of country of origin of carders in the orld! after *kraine. 1hereas in $00%! Indonesia as the first in the term of credit card fraud in the orld. 2. The most recent modus of cyber(crime found in Indonesia is counterfeit online transaction. This is done by the deployment of a false online store ebsite to attract buyers. 3nce a deal as made and a potential buyer transferred the money to a fake seller! the buyer got nothing but a missing a particular amount of money. 4. &hallenges that is faced the 5overnment of Indonesia in dealing ith cyber and other computer related crime are (i) the lack of resilient and reliable technical infrastructure (the internet connection is relatively slo and e,pensive)! (ii) the lack of human resources skill! especially those of la enforcement agencies in the term of ade6uacy in information technology! (iii) the lack of legal basis to regulate cyber security. III. I"#!"e%ia" Nati!"a& P!&icy III. A. Ge"era& c!"ce)t !* I"#!"e%ia" Nati!"a& I"*!rmati!" Sy%tem P!&icy 7. 5iven such threats and challenges! the 5overnment of Indonesia is developing a national information system that covers to ma'or infrastructures! i.e. (i) the fundamental infrastructure! hich mainly consists of human resources and regulation and (ii) technical infrastructure! hich mainly consists of netork security! application as ell as content and data center protection. 10. /t national level! both infrastructures are aimed at the establishment of an "e( Indonesia# hich ill cover e(5overnance! e(8earning! e(.anking! e(&ommerce! e( 9ealth and e(:inance. 11. Indonesias ;ational Information System <olicy ill enable all stakeholders in Indonesia to collaborate in establishing a secure and resilient information system society in Indonesia. This ill also include promoting aareness of Indonesian people on information technologys security. That ay! cyber and other computer related crimes can be minimized. III. B. Lea& 'a%i% 1$. &urrently! in deploying its national information system! the establishment of a legal basis for national information system policy is the focus of the Indonesian 5overnment to deal ith threats that emerge in relation ith cyber and other computer related crime. 1%. Indonesia is currently finalizing a draft a 8a on Information Technology and =lectronic Transaction (IT=T). This draft 8a is to be the first Indonesian regulation ith regard to the utilization of information technology and electronic transaction. This 8a provides all la enforcement agencies in Indonesia ith legal definition on matters related to information technology. 1). The draft 8a covers regulation on the folloing matters> a. =lectronic documents and information? b. &omprehensive security of electronic mail? c. =lectronic signatures? d. =lectronic system services? e. =lectronic transaction? f. Intellectual <roperty @ights? g. <rivacy? h. :orbidden activities related to cyberspace? i. Aispute settlement? '. The @ole of the 5overnment? k. The @ole of civil society? l. Investigation! and due process of la? and m. &riminal procedures. 1+. The draft 8a encompasses violations as the folloings> a. 1ebsite content abuses! hich include child pornography! violation of the intellectual property rights. b. &rimes related to electronic transaction! hich include credit card fraud! multilevel marketing fraud! and ebsite forgery. c. 3ther cyber and computer related crimes such as cracking! denial of services attack! virus spreading! hi'acking! backdoor attacking! etc. 1-. Such legal basis is needed to create la supremacy and to be used by la enforcement agencies to deal ith cyber and other computer related crime. 3ne e,ample is that given the advancement of IT! evidence to be brought before the court may be present in digital form! such as data from a hard(drive! e(mails! and other electronic documents. &urrent Indonesias <enal &ode has yet to recognize digital and electronic formats as valid evidence. 12. 9oever! in addition to Indonesias <enal &ode! there are other Indonesias 8as and @egulations! hich can be used as basis to prosecute cyber and other computer related crimes. Those are the (i) 8a ;o. 17 of $00$ on Intellectual <roperty @ights! (ii) 8a ;o. %- on 1777 on Telecommunication! (iii) 8a ;o. 4 of 1772 on the Security of &ompany Aocuments! (iv) 8a ;o. $+ of $00% on Boney 8aundering! and (v) 8a ;o. 1+ of $00% on the &ombating Terrorist /cts. Those 8as have recognized digital and electronic formats of evidences to be used in a proceeding. 14. The enactment of future 8a on IT=T ill provide the court ith a stronger certainty and basis to accept evidences presented in digital and electronic formats! since it is specifically drafted to deal ith cyber(crime. 17. In addition! the 5overnment of Indonesia is also finalizing a draft 8a on Transfer of :unds! hich! although does not specifically covers cyber(crime! can be used as a basis in dealing ith cyber(crime. This draft la encompasses security in transfer of fund hich is done by ire! electronic as ell as online. $0. To implement such 8as once they have been enacted! the 5overnment of the @epublic of Indonesia is also preparing drafts 5overnment @egulation and Binisterial @egulation as follos> a. Araft 5overnment @egulation on =lectronic System <rovider. b. Araft 5overnment @egulation on =lectronic &ontract. c. Araft 5overnment @egulation on =lectronic &ertification. d. Araft 5overnment @egulation on =lectronic Signature. e. Araft 5overnment @egulation on &ompetence &ertification /gency. f. Araft Binisterial @egulation on Aomain ;ames. g. Araft Binisterial @egulation on the 5uidelines of the &ertification /uthority <rovider in Indonesia. III. C. Tec$"ica& Rea&m $1. 3n technical realm! the Aepartment of &ommunication and Information Technology! in cooperation ith the Indonesian ;ational <olice and the Internet &ommunity (the Indonesian Internet <roviders /ssociation) is currently orking on the establishment of Indonesian Security Incident @esponse Team on Internet Infrastructure (IA SII@TI) as the Indonesian computer emergency response team. $$. Its vision is! among others! to create a disturbance free environment of internet infrastructure in Indonesia. Its mission is to increase netork security of internet infrastructure! enhancing online transaction security! supporting la enforcement agencies in dealing ith cyber(crime! and enhancing strategic partnership ith other relevant agencies both nationally and internationally in dealing ith cyber security. III. D. +$at ,e(ve #!"e %! *ar $%. In addition to the enactment of 8as related to cyber(crime! the 5overnment of Indonesia has established a 1orking 5roup on Trans(;ational 3rganized &rime in $00+. The 1orking 5roup consists of four committees? one of them encompasses cyber crime. In con'unction! the Indonesian ;ational <olice also established its special cyber crime unit. $). 1ith the aforementioned 8as and regulations! Indonesian la enforcement agencies have succeeded in dealing ith cyber and other computer related crime. Those are! among others> a. In $00+! Indonesian ;ational <olice arrested Br. Aani 9ermansyah and brought him before the la for the crime of defacing the ebsite of Indonesian 5eneral =lection &ommission (Komisi Pemilihan Umum C D<*). b. In the same year! Indonesian national police also arrested and prosecuted Br. Steven 9aryanto ho committed an online banking ebsite forgery! in an attempt to steal personal account records of the .ank &entral /sia in Indonesia. c. In $00-! &yber(crime unit of the Indonesian ;ational <olice intercepted an attempt to recruit ne member by the Eamaah Islamiyah using internet (online recruitment). III. E. +$at ,e %$!u&# 'e a,are !* $+. There is threats of cyber(terrorism! hich may resulted in catastrophe by the misuse of internet by terrorist group or an attack to an important datacenter or computer netorking system! hich support vital infrastructure. This may include among others attack to computer system and netork of the air traffic control! instrument landing system! and flight records. /ttention should also be paid to computer netork of nuclear facilities! and railays traffic control! 'ust to name a fe. $-. The most possible relation in cyber(crime ith terrorism in todays interaction is misusage of online enabled transaction as a modus to finance their terrorist acts. I-. C!"c&u%i!" $2. In enhancing each countrys comprehensive national anti cyber(crime policy and enhancing cyber security! there is urgency for countries to collaborate in dealing ith recent and future threats of cyber crime and the potential of cyber terrorism. The collaboration may include> a. Technical assistance in establishing a secure and resilient national backbone as ell as in accelerating the implementation of secure database and computer netorking to support la enforcement agencies in combating cyber crime. b. Technical assistance in capacity building of la enforcement agencies in the realm of information technology! both in hardare and softare ise as ell as brain(are ise. This may include personnels training cooperation. c. &apacity building in online investigation and digital forensic unit. d. =nhancing cooperation among /@: participant in combating cyber crime by among others establishing a mutual legal assistance. e. =nhancing real(time e,change of information and best practices including ma,imization of the utilization of the established international netork such as the Interpols I($)C2. F F F F F Aji Surya Deputy Diector for Intra-Regional Cooperation, Indonesian DFA ajisurya@deplu.go.id