Feb 12, 2011

Cyber Crime

Internet brings many benefits but on the other hand, the Internet also have negative impact on the wearer. therefore we get some conclusions that depend on the mental users illness, users that have a criminal mentality will make the Internet as a tool to do crimes or so-called cyber crime

According to Edmon Makarim (2001: 12) crime on the Internet or cybercrime essentially is a criminal offense relating to cyberspace, whether that attack public facilities in private ownership atupun cyberspace.
The types of crimes on the Internet are divided into various versions. One version states that these crimes are divided into two types, namely crimes with intellectual motive. Usually the first type does not cause any harm and done for personal satisfaction. The second type is a crime with political motives, economic, or potential criminal enimbulkan losses even information warfare.
Other versions cybercrime divide into three parts, namely an access violation, theft of data, and dissemination of information for criminal purposes.
Broadly speaking, there are several types of cybercrime, such as the proposed Philip Renata in Warta Ekonomi No. BisTek supplements. 24th edition, July 2000, h.52 namely:
a. Joy computing, namely the use of other people's computers without permission. These include theft of computer operating time.
b. Hacking, namely access illegally or without permission by means of a terminal.
c. The Trojan Horse, the manipulation of data or programs by way of changing the data or instructions in a program, erase, add, make out of reach with goals for personal or private interest of others.
d. Data leakage, that is concerning the leaking of data to the outside, especially with regard to data that must be kept secret. Disclosure of computer data that can be a form of state secrets, the company entrusted to one's data and data in certain situations.
e. Diddling data, ie an act that changes the valid or invalid data in a way not valid, change the input data, or output data.
f. To frustate data communication or a waste of computer data.
g. Software piracy is software piracy of copyright-protected intellectual property rights.
Of the seven types of cybercrime such, it appears that cybercrime is the assault on the core content, computer systems and communication systems owned by others or the public in cyberspace (Edmon Makarim, 2001: 12).
The general pattern that is used to attack computer networks are gaining access to user accounts and then use the victim's system as a platform to attack other sites. This can be completed within 45 seconds and automate will greatly reduce the time required (Purbo, and Wijahirto, 2000: 9).
The phenomenon of cybercrime is to watch out because the crime is rather different from other crimes in general. Cybercrime can be done without knowing the territorial limits and not required direct interaction between actors with victims of crime. Can be ensured by the global nature of the Internet, all countries that perform Internet activities will almost certainly be affected by the development of cybercrime break even this.
News Kompas Cyber Media (03/19/2002) writes that according to AC Nielsen survey of 2001 Indonesia was ranked the sixth largest in the world or the fourth in Asia dala crime on the internet. Although not mentioned in detail what sort of crimes that occurred in Indonesia and Indonesians involved in these crimes, this is a warning to all parties to be aware of crime that has been, is, and will emerge from users of information technology (Heru Sutadi, Kompas, 12 April 2002, 30).
According to RM Roy Suryo in Warta Ekonomi No. 9, March 5, 2001 h.12, cybercrime cases that frequently occur in Indonesia at least three types based on the mode, namely:

1. Theft No Credit.
According Rommy Alkatiry (Deputy Head of Informatics KADIN), misuse of credit cards owned by other people on the internet is the largest cybercrime case relating to the world of internet business in Indonesia.
Abuse of other people's credit cards are not complicated and can be done physically or on-line. The names and credit cards of others obtained at various locations (restaurant, hotel, or any place of payment transactions by credit card) is included in the application of purchase of goods on the internet.
2. Entering, Modifying, or damage Homepage (Hacking)
According to John. S. Tumiwa in general, Indonesia has not been as bad hackers action action abroad. Indonesian hacker behavior is merely go to a site other people's computers that were vulnerable to intrusion and notify the owner to be careful. Overseas hackers had accessed the system and destroying data base perbnkan bank
3. Attack sites or e-mail through a virus or spamming.
The most common mode is to send a virus through e-mail. According to Roy M. RM Suryo, such crimes abroad has been given a severe enough punishment. Unlike in Indonesia, which are difficult to overcome because existing regulations do not reach them.
Meanwhile, Yusuf As'ad detailing the cases of cybercrime that often occur in Indonesia into five, namely:

a. credit card numbers.
b. Takeover website belongs to someone else.
c. Theft of Internet access that is often experienced by ISPs.
d. Crime domain name.
e. Cause interference with business competition for rival sites.

Special cybercrime in e-commerce, by Edmon Makarim is defined as any action that inhibits and on behalf of others in the trade over the internet. Edmon Makarim predicted that the new mode such as buy-sell consumer data and presenting false information in starting a business site frequently occur in e-commerce.
According to Mas Wigrantoro in BisTek No. 10, July 24, 2000, p. 52 outline there are five topics of cyberlaw in each country, namely:
a. Information security, concerning the problem of authenticity and integrity of the sender or receiver of messages flowing through the Internet. In this set of confidentiality issues and the validity of electronic signatures.
b. On-line transactions, including bidding, buying and selling, payment until the shipment of goods via the internet.
c. Right in electronic information, a matter of copyright and the rights that arise for users and content providers.
d. Information content regulation, the extent of legal instruments which regulate content streamed over the Internet.
e. Regulation on-line contact, good karma in communicating and doing business via the Internet, including taxation, export-import restriction, crime and legal jurisdiction.

Currently in Indonesia has already made script cyberlaw bill prepared by the Faculty of Law University of Indonesia in cooperation with the Ministry of Trade and Law Faculty of Padjadjaran University, Bandung in cooperation with the Ministry of Post and Telecommunications. Until now, Cyberlaw draft law has not been passed as legal cases relating to crime on the Internet continue to emerge from the credit card piracy, banking fraud, illegal access to information systems, the destruction of the web site until the theft of data.

Currently, regulation is used as the legal basis for the cases of cybercrime is the Telecommunications Law and the Criminal Penal Code (Penal Code). However, the interpretation is done on the articles of the Criminal Code in cases of cybercrime are sometimes less inclined to apply. Hence the urgency of ratification of the Bill should Cyberlaw priority to the era of cyberspace with all the consequences that accompany it, including the recent rise of cybercrime.

1 comment:

  1. AnonymousMay 15, 2013

    Nice post. I learn ѕomethіng new and challengіng on ωebsіteѕ I stumbleupon eѵeгyԁaу.

    It's always exciting to read through articles from other authors and use a little something from other web sites.

    Also visit my site Same Day Payday Loans

    ReplyDelete