Download Slide 1

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Document related concepts

Cracking of wireless networks wikipedia, lookup

Computer security wikipedia, lookup

Cybercrime countermeasures wikipedia, lookup

Computer and network surveillance wikipedia, lookup

Cyber-security regulation wikipedia, lookup

Cyberwarfare wikipedia, lookup

International cybercrime wikipedia, lookup

Cyberattack wikipedia, lookup

Operation AntiSec wikipedia, lookup

Cybercrime wikipedia, lookup

Cyberterrorism wikipedia, lookup

Transcript
OVERVIEW OF CYBER TERRORISM
IN INDONESIA
ARF SEMINAR ON CYBER-TERRORISM
BUSAN, 16-19 OCT 2007
PRESENTED BY:
SUPT. DRS. BOY RAFLI AMAR
SPECIAL DETACHMENT 88 AT – INP
[email protected]
THE USE OF CYBER
BY TERRORIST
 MEANS OF COMMUNICATION
 MEANS OF PROPAGANDA
 STEALING SECRET INFORMATIONS TO
PLAN AN ATTACK
 MEANS OF DIRECT ATTACK: HACKING /
CARDING.
DEFINITION OF CYBER TERORRISM
“ Electronic attack through computer
network towards critical infrastructure that
has big potential to disturb social and
economic activity of a nation.”
Misused of cyberspace by Terrorist Group
for specific goal.
CHARACTERISTICS OF CYBER TERRORISM
1. The capital needed for the attack is quite
2.
3.
4.
5.
small, a big and vast attack only needs a
simple computer and modem.
Can be done by individual, does not have
to be done by a group of people.
The risk is small. It is difficult to locate the
suspects, even sometimes does not realize
that one is being attacked
No time or place limitation, the attack can
take place anytime and anywhere
The loss will be very big and widely spread
when successful.
UP TO JULY 2007,
INP CAPTURED 405
PERPRETATORS
UNCOVER TERRORIST ACTIVITY IN
CYBER
 ESTABLISH A WEBSITE
 IDENTIFY TERRORIST ACTION PLANNED BY
JI GROUP
 (THE EMAIL OF ASMAR LATIN SANI) IP
ADDRESS CAN LOCATE THE SUSPECTS
 COMMUNICATION AMONG THE TERRORIST
GROUP ( CHATTING LOG ABOUT
TUTORIAL “HOW TO HACK A WEBSITE
AND SQL” BY JI MEMBERS)
EXISTENCE OF CYBERSPACE
INCREASES THE GROWTH OF
TERRORIST NETWORK
INDONESIAN LAW
Law NO. 15 / 2003 ABOUT TERRORISM ACT
ERADICATION
ART 7 :
Mention other elements such as:
Violence or violence threat, to cause terror
atmosphere or fear towards people widely
ART 27:
Mention other elements such as:
Evidence in the form of information device that is
spoken, sent, accepted or saved electronicaly with
optic device
INVESTIGATION OF CYBER TERRORISM
BY DET-88
- TRACING IP ADDRESS, SEARCHING FOR
SUSPECTS’ LOCATION
- CLONING OF THE SUSPECT’S COMPUTER
- UNDERCOVER IN CYBERSPACE
- CYBER PATROL
INDONESIAN NATIONAL POLICY
1. Developing a national information system.
- The fundamental infrastructure: Human resources
and regulation.
- Technical infrastructure: Network security and
data centre protection.
2. The establishment of an e-indonesia, COVER egovernance, e-learning, e-banking, e-commerce,
e-health and e-finance.
3. Legal Basis : Currently finalizing a draft law on
Information Technology and Elecronic Transaction
(ITET)
4. Technical Realm: Dept of Com and Inf Tech
cooperation with INP and Internet Community,
establishment of Indonesia Security Incident
Response Team on Internet Infrastructure.
WHAT WE’VE DONE SO FAR
The Government of Indonesia established a
working group on Transnational Organized
Crime in 2005 (INP, Cyber Crime Unit).
WHAT WE SHOULD BE AWARE OF
The threats of cyber terrorism by misuse of internet
an attack to an important data center or computer
networking system wich support vital infrastructure
(air traffic control, computer network of nuclear
facilities, railways traffic control.)
INTERNATIONAL COOPERATION
COOPERATION IN OPENING SERVER
COOPERATION IN CAPTURING THE
SUSPECT WHO IDENTIFIED THEIR
LOCATION IN OVERSEAS
ENHANCING CAPABILITY OF THE
INVESTIGATOR
RESEARCH ON DEVELOPMENT OF IT /
CYBERMEDIA
RECOMMENDATIONS

ESTABLISHING MOU TO IMPLEMENT COOPERATION AMONG THE
COUNTRIES MEMBERS IN COMBATING CYBER-TERRORISM

CAPACITY BUILDING: PERSONAL TRAINING COOPERATION , ONLINE
INVESTIGATION
AND
DIGITAL
FORENSIC
UNIT,
SECURITY
MANAGEMENT OF CYBERSPACE

MAXIMIZATION OF THE UTILIZATION OF JCLEC AS A TRAINING
CENTRE

ENHANCING A COOPERATION BETWEEN SOFTWARE COMPANIES,
ISP AND LAW ENFORCEMENT INSTITUTIONS IN THE FRAMEWORK OF
LAW ENFORCEMENT PROCCESS
BE AWARE OUR ENEMY ANYWHERE
IMAM SAMUDRA
Website creator, Hacker, Carder, Robber, Bomb maker !!!
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]