* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Slide 1
Cracking of wireless networks wikipedia , lookup
Operation AntiSec wikipedia , lookup
Cyber-security regulation wikipedia , lookup
Computer and network surveillance wikipedia , lookup
International cybercrime wikipedia , lookup
Computer security wikipedia , lookup
Cyberwarfare wikipedia , lookup
Cybercrime countermeasures wikipedia , lookup
OVERVIEW OF CYBER TERRORISM IN INDONESIA ARF SEMINAR ON CYBER-TERRORISM BUSAN, 16-19 OCT 2007 PRESENTED BY: SUPT. DRS. BOY RAFLI AMAR SPECIAL DETACHMENT 88 AT – INP [email protected] THE USE OF CYBER BY TERRORIST MEANS OF COMMUNICATION MEANS OF PROPAGANDA STEALING SECRET INFORMATIONS TO PLAN AN ATTACK MEANS OF DIRECT ATTACK: HACKING / CARDING. DEFINITION OF CYBER TERORRISM “ Electronic attack through computer network towards critical infrastructure that has big potential to disturb social and economic activity of a nation.” Misused of cyberspace by Terrorist Group for specific goal. CHARACTERISTICS OF CYBER TERRORISM 1. The capital needed for the attack is quite 2. 3. 4. 5. small, a big and vast attack only needs a simple computer and modem. Can be done by individual, does not have to be done by a group of people. The risk is small. It is difficult to locate the suspects, even sometimes does not realize that one is being attacked No time or place limitation, the attack can take place anytime and anywhere The loss will be very big and widely spread when successful. UP TO JULY 2007, INP CAPTURED 405 PERPRETATORS UNCOVER TERRORIST ACTIVITY IN CYBER ESTABLISH A WEBSITE IDENTIFY TERRORIST ACTION PLANNED BY JI GROUP (THE EMAIL OF ASMAR LATIN SANI) IP ADDRESS CAN LOCATE THE SUSPECTS COMMUNICATION AMONG THE TERRORIST GROUP ( CHATTING LOG ABOUT TUTORIAL “HOW TO HACK A WEBSITE AND SQL” BY JI MEMBERS) EXISTENCE OF CYBERSPACE INCREASES THE GROWTH OF TERRORIST NETWORK INDONESIAN LAW Law NO. 15 / 2003 ABOUT TERRORISM ACT ERADICATION ART 7 : Mention other elements such as: Violence or violence threat, to cause terror atmosphere or fear towards people widely ART 27: Mention other elements such as: Evidence in the form of information device that is spoken, sent, accepted or saved electronicaly with optic device INVESTIGATION OF CYBER TERRORISM BY DET-88 - TRACING IP ADDRESS, SEARCHING FOR SUSPECTS’ LOCATION - CLONING OF THE SUSPECT’S COMPUTER - UNDERCOVER IN CYBERSPACE - CYBER PATROL INDONESIAN NATIONAL POLICY 1. Developing a national information system. - The fundamental infrastructure: Human resources and regulation. - Technical infrastructure: Network security and data centre protection. 2. The establishment of an e-indonesia, COVER egovernance, e-learning, e-banking, e-commerce, e-health and e-finance. 3. Legal Basis : Currently finalizing a draft law on Information Technology and Elecronic Transaction (ITET) 4. Technical Realm: Dept of Com and Inf Tech cooperation with INP and Internet Community, establishment of Indonesia Security Incident Response Team on Internet Infrastructure. WHAT WE’VE DONE SO FAR The Government of Indonesia established a working group on Transnational Organized Crime in 2005 (INP, Cyber Crime Unit). WHAT WE SHOULD BE AWARE OF The threats of cyber terrorism by misuse of internet an attack to an important data center or computer networking system wich support vital infrastructure (air traffic control, computer network of nuclear facilities, railways traffic control.) INTERNATIONAL COOPERATION COOPERATION IN OPENING SERVER COOPERATION IN CAPTURING THE SUSPECT WHO IDENTIFIED THEIR LOCATION IN OVERSEAS ENHANCING CAPABILITY OF THE INVESTIGATOR RESEARCH ON DEVELOPMENT OF IT / CYBERMEDIA RECOMMENDATIONS ESTABLISHING MOU TO IMPLEMENT COOPERATION AMONG THE COUNTRIES MEMBERS IN COMBATING CYBER-TERRORISM CAPACITY BUILDING: PERSONAL TRAINING COOPERATION , ONLINE INVESTIGATION AND DIGITAL FORENSIC UNIT, SECURITY MANAGEMENT OF CYBERSPACE MAXIMIZATION OF THE UTILIZATION OF JCLEC AS A TRAINING CENTRE ENHANCING A COOPERATION BETWEEN SOFTWARE COMPANIES, ISP AND LAW ENFORCEMENT INSTITUTIONS IN THE FRAMEWORK OF LAW ENFORCEMENT PROCCESS BE AWARE OUR ENEMY ANYWHERE IMAM SAMUDRA Website creator, Hacker, Carder, Robber, Bomb maker !!! [email protected] [email protected] [email protected] [email protected] [email protected]