Cooperation Between The Cimahi Police Criminal Investigation Unit and the Banking Sector in Disclosing Social Engineering Cases

Authors

  • Tono Listianto Police Science Studies, School of Strategic and Global Studies, Universitas Indonesia
  • Chairul Muriman Setyabudi Police Science Studies, School of Strategic and Global Studies, Universitas Indonesia
  • Sutrisno Police Science Studies, School of Strategic and Global Studies, Universitas Indonesia

DOI:

https://doi.org/10.46799/ijssr.v3i11.611

Keywords:

Cooperation, Criminal Investigation Unit, Information Technology, Banking Sector, Social Engineering

Abstract

Information technology is increasingly advanced, coupled with the existence of the internet, which is now a global communication system that allows everyone around the world to meet and talk about almost anything. The internet has become a medium of communication, which is done through various media available on it. The internet provides various social media platforms, both for positive and negative reasons, and has become the order of the day because nowadays, the world is so tied to the internet. Unfortunately, not everyone uses the internet for a good cause. There are many people who use social networks to commit crimes, such as cyber-crime in the form of social engineering. Social engineering allows malicious hackers to gain unauthorized access to an organization's networks, user accounts and emails, databases, smart devices, and electronics, such as laptops, personal webcams, and sensors, including network connectivity that allows all of these objects to exchange data. These hackers use a variety of methods to carry out social engineering attacks. The technical complexity of the information systems used in locating, examining, and analyzing relevant transaction data requires sufficient time and technical expertise to gather robust evidence to support the case for social engineering, which involves in-depth analysis of bank transaction data related to the attack. This process can be time-consuming, especially if many transactions need to be traced and analyzed.

References

Al-fajri, B. H., Fauzi, R., & Mulyana, R. (2020). Perancangan Manajemen Risiko Operasional Spbe/e-gov Pada Kategori Risiko Infrastruktur, Aplikasi, Layanan, Data Dan Informasi Berdasarkan Permen Panrb Nomor 5 Tahun 2020 (studi Kasus: Pemerintah Kota Bandung). EProceedings of Engineering, 7(2).

Bartolozzi, D., Gara, M., Marchetti, D. J., & Masciandaro, D. (2022). Designing the anti-money laundering supervisor: The governance of the financial intelligence units. International Review of Economics and Finance, 80, 1093–1109. https://doi.org/10.1016/J.IREF.2022.03.009

Besong, S. E., Okanda, T. L., & Ndip, S. A. (2022). An empirical analysis of the impact of banking regulations on sustainable financial inclusion in the CEMAC region. Economic Systems, 46(1). https://doi.org/10.1016/J.ECOSYS.2021.100935

Broache, M. P., Cronin-Furman, K., Mendeloff, D., & McAllister, J. R. (2023). The International Criminal Court at 25. Journal of Human Rights, 22(1), 1–3. https://doi.org/10.1080/14754835.2022.2150518

David, D., Robet, R., & Raymond, R. (2022). Aplikasi Pengenalan Ikan Berformalin Melalui Deteksi Mata Menggunakan Metode Template Matching Dan Metode Klasifikasi KNN. Jurnal Ilmiah Core IT: Community Research Information Technology, 10(4).

Dessein, W., Garicano, L., & Gertner, R. (2010). Organizing for synergies. American Economic Journal: Microeconomics, 2(4), 77–114.

Fred, L. (2011). Organizational Behavior An Evidence-Based Approach Twelfth Edition. mc ggaw hill.

Greve, H. R., & Argote, L. (2015). Behavioral theories of organization. International Encyclopedia of the Social & Behavioral Sciences, 481–486.

Hadnagy, C. (2010). Social engineering: The art of human hacking. John Wiley & Sons.

Hess, K. M., Orthmann, C. H., & Cho, H. L. (2016). Criminal investigation. Cengage learning.

Holtström, J., & Anderson, H. (2021). Exploring and extending the synergy concept–a study of three acquisitions. Journal of Business & Industrial Marketing, 36(13), 28–41.

Johnson, D. (2023). Can competition law aid the United Kingdom in its fight against financial crime? Journal of Economic Criminology, 2, 100025. https://doi.org/10.1016/J.JECONC.2023.100025

Khan, R., McLaughlin, K., Laverty, J. H. D., David, H., & Sezer, S. (2018). Demonstrating cyber-physical attacks and defense for synchrophasor technology in smart grid. 2018 16th Annual Conference on Privacy, Security and Trust (PST), 1–10.

Kikerpill, K. (2023). The crime-as-communication approach: Challenging the idea of online routine activities by taking communication seriously. Journal of Economic Criminology, 2, 100035. https://doi.org/10.1016/J.JECONC.2023.100035

Mbaidin, H. O., Alsmairat, M. A. K., & Al-Adaileh, R. (2023). Blockchain adoption for sustainable development in developing countries: Challenges and opportunities in the banking sector. International Journal of Information Management Data Insights, 3(2). https://doi.org/10.1016/J.JJIMEI.2023.100199

Moore, R. (2014). Cybercrime: Investigating high-technology computer crime. Routledge.

Moses, J. W., & Knutsen, T. L. (2019). Ways of knowing: Competing methodologies in social and political research. Bloomsbury Publishing.

Ogbeide, H., Thomson, M. E., Gonul, M. S., Pollock, A. C., Bhowmick, S., & Bello, A. U. (2023). The anti-money laundering risk assessment: A probabilistic approach. Journal of Business Research, 162. https://doi.org/10.1016/J.JBUSRES.2023.113820

Patel, R., Migliavacca, M., & Oriani, M. E. (2022). Blockchain in banking and finance: A bibliometric review. Research in International Business and Finance, 62. https://doi.org/10.1016/J.RIBAF.2022.101718

Pavlidis, G. (2023). The dark side of anti-money laundering: Mitigating the unintended consequences of FATF standards. Journal of Economic Criminology, 2, 100040. https://doi.org/10.1016/J.JECONC.2023.100040

Raditya, B. C. (2023). Juridical Review Regarding Transfer of The Right to Occupate Service House of Police. Asian Journal of Engineering, Social and Health, 2(2), 91–106. https://doi.org/10.46799/ajesh.v2i2.38

Ryan, M. J. (2022). Criminal Justice Secrets. Am. Crim. L. Rev., 59, 1541.

Rzepka, A. (2017). Inter-organizational relations as a one of sources of competitive advantage of contemporary enterprises in the era of globalization. Procedia Engineering, 174, 161–170. https://doi.org/10.1016/j.proeng.2017.01.195

Thommandru, A., & Chakka, D. B. (2023). Recalibrating the Banking Sector with Blockchain Technology for Effective Anti-Money Laundering Compliances by Banks. Sustainable Futures, 5, 100107. https://doi.org/10.1016/J.SFTR.2023.100107

Wang, Z. (2023). Money laundering and the privacy design of central bank digital currency. Review of Economic Dynamics. https://doi.org/10.1016/J.RED.2023.06.004

Wenni, S., Lijun, H. O. U., Jiawei, T., Chunyuan, M. U., Haoyu, Z., & Tao, X. U. (2022). Experimental Investigation of Underwater Blast Injuries to Beagles. Acta Armamentarii, 43(9), 2172.

Zambrano, P., Torres, J., Tello-Oquendo, L., Yánez, Á., & Velásquez, L. (2023). On the modeling of cyber-attacks associated with social engineering: A parental control prototype. Journal of Information Security and Applications, 75. https://doi.org/10.1016/J.JISA.2023.103501

Downloads

Published

2022-11-20