INTERNATIONAL JOURNAL OF SOCIAL SERVICE AND RESEARCH

 

THE ROLE OF INDONESIAN POLICE THROUGH “CYBER PATROL” IN PRESERVING AND MAINTAINING CYBER ROOM SECURITY

 

Edi Saputra Hasibuan

Faculty of Law, Universitas Bhayangkara Jakarta Raya, Jakarta, Indonesia

Email: [email protected].ac.id

 

 

 

Abstract

The development of an increasingly advanced era, of course, has an impact on rapidly advancing technology and information. The era of the Industrial Revolution 4.0 has also become something that requires everyone to be more sensitive and accustomed to using technology. However, like two sides of the same coin, it seems that everything that has a positive impact also has a drawback or negative impact, any deviation either by system error or from human resources, causing new problems in the cyber world. Carding crimes, data abuse, phishing, and defacement of a website, as well as activities that cause unrest such as defamation and hoaxes are some examples of disturbing activities in the cyber world. This study aims to determine the role of the Indonesian police through "cyber patrol" in maintaining and maintaining security in cyberspace. The normative research method was used by examining each article, its rules and application, and combining it with a literature study by analyzing books, journals, papers, print media, and online news related to the Cyber Patrol. The police, as agencies that bridge this matter, are also not tired of continuing to work and provide innovation in dealing with every symptom and phenomenon in society. With the presence of the Cyber Police, it is hoped that they will be able to create comfort in using social media and other platforms

 

Keywords: police; cyber; patrol

 

Received August 03, 2022, Revised August 18, 2022, Accepted August 27, 2022

 


INTRODUCTION

The progress of an information system has forced a revolution in many ways, including news spread. For example, in the past, everyone could enjoy tea in the morning while waiting for the newspaper delivery with the latest news to arrive. All information is listed in newspapers that are sold from morning to evening. Now, only by opening a device through an internet connection can anyone access news through the news portals that have been provided, without the need to wait and turn pages one by one (Stevenson, 2010). this is only as far as the fingers play to turn the page and look for other news.

  Not only that, another thing that is also very visible in the impact of the changes is when someone can talk and even see each other by using video calls on the available applications. In the past, meeting each other who were separated by distance took time. We are getting easier to connect with anyone as long as there is the internet, an infinite world (Cyber ​​Space).

  Cyberspace terms cannot be separated from work by Novelist science fiction named William Gibson. In one of his works entitled Neuromancer this term by William intends to describe or show a form of virtual hallucinations. He realized that a new room (space) emerged due to the electrically conducting wire media (cyber) connection, bringing together computer systems and telecommunications systems in electronic system activity. Increasingly, this term has become popular for communication from computer networks, which later became a global computer system network (William, 1984). Moreover, professionals in threat intelligence and cybersecurity concur that internet crime is growing exponentially (Cascavilla et al., 2021).

  The threat of crime in the cyber world is not just a figment. Indonesia is increasingly massive, and the enactment of Electronic Identity Cards (E-KTP), mobile banking, and e-commerce provides an opportunity for criminals to misuse sensitive data. According to their needs, the realization of the E-KTP is a personal data recording program launched by the government (Latumahina, 2014).

  Cases regarding crimes in cyberspace are indeed very diverse. If examined, the backgrounds of the perpetrators may vary. Some are just for fun, some intend to penetrate security to test a system, and the worst is those who commit crimes to gain and make a person suffer certain losses. In October 2021, the site of the National Cyber ​​and Crypto Agency (BSSN) experienced a deface in which there was a change in its appearance of a site. BSSN admits that there is no important data related to disturbing public interests. The deface attack allegedly occurred in retaliation because, previously, someone from Indonesia hacked the Brazilian state website (CNN, 2021).

  Furthermore, in the account burglary case in early February 2020, the victim was a senior journalist named Ilham Bintang, who had an account burglary by eight professional hackers. This case occurred by duplicating a telephone number where the last telephone number had been dead for a long time (not valid). This telephone number duplication was using the Population Identification Number listed on the victim's ID card; at that time, the victim himself was in Australia. Furthermore, with the new number they already have, the perpetrators replace the electronic mail account (email) so that from there, it allows the perpetrators to get the victim's new password. In this way, the hackers can also see the bank data owned by the victim and scoop up rupiah coffers from the victim's account (Velarosdela, 2020).

  Cybercrime is indeed continuous with the increasing growth of telephone users. This makes the government get an additional burden with the emergence of this phenomenon, and the government must be busy and alert in dealing with internet network traffic. Internet installation in the form of levelling and improving facilities in each region includes effective oversight and regulation in the face of these developments (Hill, 2009).

  Some of the above trigger the National Police, as a state institution tasked with protecting the public, to take a brilliant idea by conducting Cyber ​​Patrols to provide maximum protection, which is tasked with monitoring all activities in cyberspace through various social media and platforms and ready to receive reports from those who have been or are being victims of cybercrimes.

 

METHOD

In this study, the normative research method was used by examining each article, its rules and application, and combining it with a literature study by analyzing books, journals, papers, print media, and online news related to the Cyber ​​Patrol. The target data collected is related to cyber cases, prosecution, and prevention, then the existence of the Cyber ​​Patrol, especially concerning the efforts made by the Cyber ​​Police.

 

RESULTS AND DISCUSSION

A.  Cyber ​​Crime and the Importance of Data Protection

 Humans are indeed intelligent and unique creatures. At the same time, humans are creatures who love to cause problems. How not, in reality, the existence of the law exists to regulate human behaviour. The existence of order, tolerance, security, and harmony cannot be separated from the presence of law in human life. Even like that, there are still many people who still commit violations and act against the law. If the law can be found in real-world criminal acts, such as robbery, fraud, humiliation, persecution, and so on, it comes through the Criminal Code and other regulations that specifically regulate it. Now, with the internet's presence and the virtual world's existence, problems seem to start moving from a real place to another place called cyberspace.

Advances in technology and information are increasingly rapidly giving birth to a variety of behaviours, both negatively and positively. From there, Law Number 11 of 2018 was born, later changed to Law Number 19 of 2016 concerning Information and Electronics. This law is not due to ordinary things, but the various phenomena in cyberspace have become the background of why this law was born.

Today, violations of the use of the internet in cyberspace have entered a growing stage, meaning that when one of the internet users harms and damages the activities of others, which often results in losses, one of which is data breaches. Data includes facts, communications or opinions relating to confidential, private, or sensitive individuals so that the data owner wants to keep and restrict other parties from collecting, using, or distributing it (Sautunnida, 2018).

Regarding data protection and privacy, Samuel Warren and Lois Brandeis wrote the legal conception of the right to privacy in Harvard Law Review Vol. IV No. 5, 15 December 1980. The article entitled "The Right To Privacy" was the first to conceptualize the right to privacy as a legal right (Warren & Brandeis, 2013). From this, it can be seen that the existence of legal rights must be protected.

Cybercrime case does not only occur in Indonesia but throughout the world. A case occurred in 2017 regarding the theft of data by a supermarket employee in the UK. The perpetrator, Andrew Skelton, stole employee salary data and used the data for personal purposes. In this case, Morrisons, the head of the supermarket, argues that the supermarket cannot be prosecuted because it happened not because of the will or orders of the company but purely a crime committed by an individual. But in the end, the British High Court ruled that the company remains responsible for criminal acts committed by its employees (Corfield, 2018). It can be seen from this case that data entry can indeed lead to other criminal cases, such as burglary, hacking, or phishing.

The parts of Cyber ​​itself exist in several forms: Cyber ​​Crime is a form of virtual crime that utilizes computer media connected to the internet that exploits other computers that are also connected to the internet. Cyber ​​Threat, a threat here, is defined as a threat in the operation of information that interferes with confidentiality and availability. Cyber-attacks, you could say, are the realization of previous threats, intentionally disrupting the confidentiality, integrity, and availability of information physically and logically in the information system. Cyber ​​Security is every effort to protect and minimize interference with the confidentiality of information; last is Cyberlaw, which is a form of legal protection related to legal subjects, namely individuals who take advantage of the technology and information they use, such as the ITE Law as an example.

 

 

 

B.  Cyber ​​Patrol A Breakthrough in Monitoring and Ordering Cyberspace

1.  Police Flexibility

In practice, the police must be professional and always ready to deal with any symptoms in the community and must be able to become a flexible agency by following the times and adapting them. From a sociological point of view, there will always be related to a position (status) thus, understanding the role of the National Police cannot be separated from its position in the constitutional system adopted (Ismail, 2011).

In a democratic system, the function of the police can be grouped into three functions that demand character and ways of working with each other: fighting crime, protecting citizens and maintaining public order (preservation of law and order) (Ismail, 2011). From these police functions, four roles must be carried out: the role of the law enforcement agency, the role of maintaining order (law and order maintenance), the role of peacekeeping official, and the role of (public servant). These four roles lead to the output of protecting (to protect) and serving (to serve) so that the police as guardians of civil values ​​in a climate of democratic life can be realized (Ismail, 2011).

One of the Cyber ​​Police establishments began by issuing a circular letter from the National Police Chief, namely (SE) No. SE/2/11/2021 concerning Ethical Cultural Awareness to Create a Clean, Healthy, and Productive Digital Space for Indonesia. The SE is a decision to follow up on the President's request for the police to be more selective in handling cases of alleged violations of Law No. 11 of 2008 as amended by Law No. 19 of 2016.

Some of the points outlined by the National Police Chief, which are expected to be realized by the ranks below him, are: (Circular Letter of the Chief of Police No. Se/2/11/2021) First, following the development of the use of digital space which continues to develop. Second, understand the ethical culture that occurs in the digital space by taking an inventory of various problems and impacts that occur in society. Third, prioritizing preemptive and preventive efforts through virtual police and virtual alerts aimed at monitoring, educating, giving, warning, and preventing the public from potential cybercrimes. Fourth, in receiving public reports, investigators must distinguish between criticism, input, hoaxes, and defamation that can be punished. Fifth, after receiving the report, the investigator must communicate with the parties, especially the victim (not represented) and facilitate by giving the widest possible space to the disputing parties to mediate. Sixth, investigators conduct comprehensive studies and case titles on cases handled involving elements of the Criminal Investigation Agency, or the Directorate of Cyber ​​Crime can go through zoom meetings and make collegial collective decisions based on existing facts and data. Seventh, investigators have the principle of criminal law to be the last resort in law enforcement and prioritize restorative justice in handling cases. Eighth, parties and victims who take peaceful steps become part of the priority of investigators to carry out restorative justice. Ninth, no detention is carried out for the victim whose case still wants to go to court, but the suspect has apologized and is aware of his actions. Before the file is submitted to the Public Prosecutor (JPU) to be given space for mediation again. Tenth, investigators should coordinate with the public prosecutor in its implementation, including providing advice on the implementation of mediation at the prosecution level. Eleventh, to carry out supervision in stages on every investigation step. Then give rewards and punishments for continuous assessment.

Furthermore, the National Police Chief provides a classification of ITE Law cases that can be resolved through restorative justice efforts, namely defamation, slander and humiliation, by issuing the National Police Chief's Telegram Letter No. ST/339/II/RES 1.1.1/2021 regarding guidelines for Handling Cyber ​​Crime Cases using the ITE Law. This telegram was issued on 22 February 2021. Various parties strongly support this effort, one of which is the National Police Supervision Commission; its spokesman Poengky Indarti said that the circular needs to be understood and used as a guideline for the implementation of Police investigators to always prioritize a preventive attitude in ITE Law cases, especially cases that are mild and can forgive each other. Despite other cases that have the potential to divide the nation, such as the SARA issue, hoaxes need to be followed up by legal processes to achieve legal certainty (Halim, 2021).

2.  The Existence of Cyber ​​Police in Conducting Cyber ​​Patrols in Providing Security and Convenience in the Virtual World

Cyber ​​Police conduct Cyber ​​Patrol activities by monitoring every activity in the virtual world, especially through social media and various other platforms. In the domestic scope, the efforts made by the National Police in tackling the occurrence of cybercrime have made several efforts, namely (Utomo & Putranti, 2016):

a)   Respond to and receive every report from the public on cybercrime allegations and record every case handled against the report.

b)  Conduct online investigations (via the internet/virtually) against crimes using social networks, email and e-commerce.

c)   Coordinating with the Ministry of Communication and Information

d)  Cooperating in the banking sector, especially with Bank Indonesia, to avoid fake accounts used by criminals.

e)   We urge the public always to use the internet safely.

f)    It is improving the understanding and training of Indonesian Police expertise in cybercrime by sending its members to training and courses in several developed countries.

The efforts and activities carried out by the police in improving Cyber ​​security so far have had many significant impacts through arrests and the disclosure of causes related to cybercrimes. In December 2019, the Cyber ​​Police arrested Ransomware perpetrators at companies in the USA. The perpetrators spread or blast emails to potential victims containing a link that has been installed crypto locker, which can cause the mail server system at a company to be encrypted at a company, and the perpetrator directs the victims to open the link. If a company eats the bait, the perpetrator asks for a ransom in cryptocurrency so that the webmail server can be reused (Cyber Police, 2022).

Another example can also be seen through fraud cases under the guise of online loans, and the perpetrator pretends to be the party who will provide online loans. Still, if someone is interested, then the person is asked for some money as administrative funds. After the money is given, the perpetrator disappears and immediately decides to communicate with the victim by blocking the victim's contact number. It did not take long. After receiving the report, the Regional Police Force Cyber ​​Sub-Directorate team conducted further searches and found the perpetrator's location in a village in South Sulawesi Province. It is conceivable how communication technology allows someone to make money by fraudulent means without having to meet and regardless of distance. From the search, one of the interesting things was finding evidence, namely a box of starters (Cyber Police, 2022). This indicates that the perpetrators use many numbers to eliminate traces and make tracking difficult. Unfortunately, it is not easy; law enforcers always try to be 1 step ahead of the criminals.

In addition, to promote preventive action, the National Police also uses a method of activity called public relations on the internet by delivering information virtually. Implementing cyber public relations is considered a key component in supporting and succeeding the Indonesian National Police program, especially regarding countering negative opinions on social media related to Tohate speech. The National Police prioritizes a persuasive approach with a gentle approach rather than being carried out utilizing violence which usually will only be carried out if conditions are out of control.

 

CONCLUSION

Globalization era progress and the advancement of technology in the dissemination of information has become a fact that the flow of the industrial revolution cannot be dammed and continues to progress. The best choice is to respond well to these flows. Cybercrime needs serious attention for anyone; the existence of deviant behaviour from a group of people or individuals who use technology and cyberspace to commit crimes for personal gain tends to cause losses to other parties.

Understanding and knowledge of the importance of data protection is one thing that must continue to be improved, the government with all efforts, both through legislation and direct guidance through outreach to the public. It is an effort that needs to be appreciated and must continue to be maximized. Still, on the other hand, it has people should be aware and control of their behaviour on the internet because nowadays, our fingers can do anything, and can be anything in cyberspace, whether it be a positive thing or it has a negative impact on themselves and others. Elaboration between the community and government organs must go hand in hand to create security and comfort on the internet.

The police, as agencies that bridge this matter, are also not tired of continuing to work and provide innovation in dealing with every symptom and phenomenon in society. With the presence of the Cyber ​​Police, it is hoped that they will be able to create comfort in using social media and other platforms. At the same time, the National Police continues to monitor and train its members to provide a preventive attitude in dealing with cases that occur in cyberspace. Thus, it can be said that the Cyber ​​Police is not only tasked with handling public complaints or reports but also for prevention through socialization and cyber public relations to ensure that the public gets good information and prevent the circulation of hoaxes. Hopefully, this will continue to grow and provide more benefits to the general public.

 

 

REFERENCES

 

Cascavilla, G., Tamburri, D. A., & Van Den Heuvel, W.-J. (2021). Cybercrime threat intelligence: A systematic multi-vocal literature review. Computers & Security, 105, 102258. Scopus

 

CNN, I. (2021). BSSN Akui Situs Diretas, Kena Serangan Deface. https://www.cnnindonesia.com/teknologi/20211025175708-185-712153/bssn-akui-situs-diretas-kena-serangan-deface

 

Corfield, G. (2018). Morrisons supermarket: We’re taking payroll leak liability fight to UK Supreme Court. https://www.theregister.com/2018/10/23/morrisons_loses_court_appeal_data_theft/

 

Cyber Police. (2022). Siber Polri Tangkap Pelaku Ransomware Pada Sebuah Perusahaan di Sebuah Perusahaan USA. https://patrolisiber.id/

 

Halim, D. (2021). Kompolnas Minta Penyidik Polri Laksanakan SE Kapolri soal UU ITE. Kompas.Com. https://nasional.kompas.com/read/2021/02/24/08335521/kompolnas-minta-penyidik-polri-laksanakan-se-kapolri-soal-uu-ite.

 

Hill, D. G. (2009). Data Protection Governance, Risk Management, and Compliance. CRC Press. Google Scholar

 

Ismail, C. (2011). Polisi Sipil dan Paradigma Baru Polri. Merlyn Press, Jakarta. Google Scholar

 

Latumahina, R. E. (2014). Aspek Hukum Perlindungan Data Pribadi di Dunia Maya. Google Scholar

 

Sautunnida, L. (2018). Urgensi Undang-Undang Perlindungan Data Pribadi di Indonesia: Studi Perbandingan Hukum Inggris dan Malaysia. Kanun Jurnal Ilmu Hukum, 20(2), 369–384. Google Scholar

 

Stevenson, A. (2010). Oxford dictionary of English. Oxford University Press, USA. Google Scholar

 

Utomo, T. C., & Putranti, I. R. (2016). Kerjasama Kepolisian Negara Republik Indonesia (Polri)-Australian Federal Police (Afp) Sektor Capacity Building Dalam Penanggulangan Tindak Pidana Cyber Crime Di Indonesia Periode 2012-2014. Journal of International Relations, 2(1), 38–46. Google Scholar

 

Velarosdela, R. N. (2020). Kronologi dan Peran 8 Pelaku Pembobolan Rekening Ilham Bintang. Kompas.Com. https://megapolitan.kompas.com/read/2020/02/05/13355011/kronologi-dan-peran-8-pelaku-pembobolan-rekening-ilham-bintang?page=all

 

Warren, S., & Brandeis, L. (2013). The right to privacy. Civilistica. Com, 2(3), 1–22. Google Scholar

 

William, G. (1984). Neuromancer, ACE Science Fiction Books. The Berkley Publishing Group, New York. Google Scholar

 

 

 

 

 

 

 



 

© 2022 by the authors. It was submitted for possible open access publication under the terms and conditions of the Creative Commons Attribution (CC BY SA) license (https://creativecommons.org/licenses/by-sa/4.0/).