Transcript Slide 1

OVERVIEW OF CYBER TERRORISM IN INDONESIA

ARF SEMINAR ON CYBER-TERRORISM BUSAN, 16-19 OCT 2007 PRESENTED BY: SUPT. DRS. BOY RAFLI AMAR SPECIAL DETACHMENT 88 AT – INP [email protected]

THE USE OF CYBER BY TERRORIST     MEANS OF COMMUNICATION MEANS OF PROPAGANDA STEALING SECRET INFORMATIONS TO PLAN AN ATTACK MEANS OF DIRECT ATTACK: HACKING / CARDING.

DEFINITION OF CYBER TERORRISM “ Electronic attack through computer network towards critical infrastructure that has big potential to disturb social and economic activity of a nation.”

Misused of cyberspace by Terrorist Group for specific goal.

CHARACTERISTICS OF CYBER TERRORISM 1.

2.

3.

4.

5.

The capital needed for the attack is quite small, a big and vast attack only needs a simple computer and modem.

Can be done by individual, does not have to be done by a group of people.

The risk is small. It is difficult to locate the suspects, even sometimes does not realize that one is being attacked No time or place limitation, the attack can take place anytime and anywhere The loss will be very big and widely spread when successful.

UP TO JULY 2007, INP CAPTURED 405 PERPRETATORS

UNCOVER TERRORIST ACTIVITY IN CYBER

  

ESTABLISH A WEBSITE

IDENTIFY TERRORIST ACTION PLANNED BY JI GROUP (THE EMAIL OF ASMAR LATIN SANI) IP ADDRESS CAN LOCATE THE SUSPECTS COMMUNICATION AMONG THE TERRORIST GROUP ( CHATTING LOG ABOUT TUTORIAL “HOW TO HACK A WEBSITE AND SQL” BY JI MEMBERS)

EXISTENCE OF CYBERSPACE INCREASES THE GROWTH OF TERRORIST NETWORK

INDONESIAN LAW

Law NO. 15 / 2003 ABOUT TERRORISM ACT ERADICATION ART 7 : Mention other elements such as: Violence or violence threat, to cause terror atmosphere or fear towards people widely ART 27: Mention other elements such as: Evidence in the form of information device that is spoken, sent, accepted or saved electronicaly with optic device

INVESTIGATION OF CYBER TERRORISM BY DET-88 TRACING IP ADDRESS, SEARCHING FOR SUSPECTS’ LOCATION CLONING OF THE SUSPECT’S COMPUTER UNDERCOVER IN CYBERSPACE CYBER PATROL

INDONESIAN NATIONAL POLICY

1.

Developing a national information system.

- The fundamental infrastructure: Human resources and regulation.

- Technical infrastructure: Network security and data centre protection.

2. The establishment of an e-indonesia, COVER e governance, e-learning, e-banking, e-commerce, e-health and e-finance.

3. Legal Basis : Currently finalizing a draft law on Information Technology and Elecronic Transaction (ITET) 4. Technical Realm: Dept of Com and Inf Tech cooperation with INP and Internet Community, establishment of Indonesia Security Incident Response Team on Internet Infrastructure.

WHAT WE’VE DONE SO FAR

The Government of Indonesia established a working group on Transnational Organized Crime in 2005 (INP, Cyber Crime Unit).

WHAT WE SHOULD BE AWARE OF

The threats of cyber terrorism by misuse of internet an attack to an important data center or computer networking system wich support vital infrastructure (air traffic control, computer network of nuclear facilities, railways traffic control.)

INTERNATIONAL COOPERATION

 COOPERATION IN OPENING SERVER  COOPERATION IN CAPTURING THE SUSPECT WHO IDENTIFIED THEIR LOCATION IN OVERSEAS  ENHANCING INVESTIGATOR CAPABILITY OF THE  RESEARCH ON DEVELOPMENT OF IT / CYBERMEDIA

RECOMMENDATIONS

ESTABLISHING MOU TO IMPLEMENT COOPERATION AMONG THE COUNTRIES MEMBERS IN COMBATING CYBER-TERRORISM

CAPACITY BUILDING: PERSONAL TRAINING COOPERATION , ONLINE INVESTIGATION AND DIGITAL FORENSIC UNIT, SECURITY MANAGEMENT OF CYBERSPACE

MAXIMIZATION OF THE UTILIZATION OF JCLEC AS A TRAINING CENTRE

ENHANCING A COOPERATION BETWEEN SOFTWARE COMPANIES, ISP AND LAW ENFORCEMENT INSTITUTIONS IN THE FRAMEWORK OF LAW ENFORCEMENT PROCCESS

BE AWARE OUR ENEMY ANYWHERE

IMAM SAMUDRA

Website creator, Hacker, Carder, Robber, Bomb maker !!!

[email protected]

[email protected]

[email protected]

[email protected]

[email protected]