The Role of Indonesian Police Through “Cyber Patrol” in Preserving and Maintaining Cyber Room Security

Authors

  • Edi Saputra Hasibuan Faculty of Law, Universitas Bhayangkara Jakarta Raya, Jakarta, Indonesia

DOI:

https://doi.org/10.46799/ijssr.v2i8.146

Keywords:

Police, Cyber, Patrol

Abstract

The development of an increasingly advanced era has an impact on the advancement of technology and information that is increasing rapidly. The era of the Industrial Revolution 4.0 has also become something that requires everyone to be more sensitive and accustomed to using technology. However, like two sides of the same coin, it seems that everything that has a positive impact also has a drawback or a negative impact, the existence of deviations either by system errors or from human resources, causing new problems in the cyber world. Carding crimes, misuse of data, phishing, and defacement of a website, as well as activities that cause unrest, such as defamation and hoaxes, are some disturbing activities in the cyber world. Regarding this problem, the State or Government, which has the responsibility to protect its citizens, has begun to take a stand by coordinating with relevant institutions to take action and prevent the increase of crime in the cyber world. The National Police, as one of the state's tools and the front line in dealing with security and law enforcement, has formed a patrol team called the "Cyber Police" by conducting "Cyber Patrol" activities. It is very interesting to discuss, considering that nowadays, people can use technology to do something that violates the law; therefore, the existence of the Cyber Police is expected to prevent the bad impact of a cyber incident to create a safe and comfortable environment both directly (real), or indirectly (virtual world).

References

Cascavilla, G., Tamburri, D. A., & Van Den Heuvel, W.-J. (2021). Cybercrime threat intelligence: A systematic multi-vocal literature review. Computers & Security, 105, 102258. Scopus

CNN, I. (2021). BSSN Akui Situs Diretas, Kena Serangan Deface. https://www.cnnindonesia.com/teknologi/20211025175708-185-712153/bssn-akui-situs-diretas-kena-serangan-deface

Corfield, G. (2018). Morrisons supermarket: We’re taking payroll leak liability fight to UK Supreme Court. https://www.theregister.com/2018/10/23/morrisons_loses_court_appeal_data_theft/

Cyber Police. (2022). Siber Polri Tangkap Pelaku Ransomware Pada Sebuah Perusahaan di Sebuah Perusahaan USA. https://patrolisiber.id/

Halim, D. (2021). Kompolnas Minta Penyidik Polri Laksanakan SE Kapolri soal UU ITE. Kompas.Com. https://nasional.kompas.com/read/2021/02/24/08335521/kompolnas-minta-penyidik-polri-laksanakan-se-kapolri-soal-uu-ite.

Hill, D. G. (2009). Data Protection Governance, Risk Management, and Compliance. CRC Press. Google Scholar

Ismail, C. (2011). Polisi Sipil dan Paradigma Baru Polri. Merlyn Press, Jakarta. Google Scholar

Latumahina, R. E. (2014). Aspek Hukum Perlindungan Data Pribadi di Dunia Maya. Google Scholar

Sautunnida, L. (2018). Urgensi Undang-Undang Perlindungan Data Pribadi di Indonesia: Studi Perbandingan Hukum Inggris dan Malaysia. Kanun Jurnal Ilmu Hukum, 20(2), 369–384. Google Scholar

Stevenson, A. (2010). Oxford dictionary of English. Oxford University Press, USA. Google Scholar

Utomo, T. C., & Putranti, I. R. (2016). Kerjasama Kepolisian Negara Republik Indonesia (Polri)-Australian Federal Police (Afp) Sektor Capacity Building Dalam Penanggulangan Tindak Pidana Cyber Crime Di Indonesia Periode 2012-2014. Journal of International Relations, 2(1), 38–46. Google Scholar

Velarosdela, R. N. (2020). Kronologi dan Peran 8 Pelaku Pembobolan Rekening Ilham Bintang. Kompas.Com. https://megapolitan.kompas.com/read/2020/02/05/13355011/kronologi-dan-peran-8-pelaku-pembobolan-rekening-ilham-bintang?page=all

Warren, S., & Brandeis, L. (2013). The right to privacy. Civilistica. Com, 2(3), 1–22. Google Scholar

William, G. (1984). Neuromancer, ACE Science Fiction Books. The Berkley Publishing Group, New York. Google Scholar

Downloads

Published

2022-08-29