Prevention of Financial Crime After Covid19 by Nikmah Mentari SH and Nurul Hudi SH
Prevention of Financial Crime After Covid19 by Nikmah Mentari SH and Nurul Hudi SH
Introduction
Since the advent of Coronavirus Diseases on 2019 (Covid-19) until June 1, 2021, countless
cases of positive confirmation number 170 426 245 and the confirmation of death reached
3,548,628 worldwide (Nanthini & Nair, 2020). Covid-19 cases in Indonesia reached 1,826,527
and 50,723 deaths, but 1,674,479 patients were confirmed to have recovered. Covid-19 has
not only impacted the health and mental safety sector, however, but it has also become a
worldwide pandemic and affects all important sectors in human life. Until now, the major
impact caused by a pandemic of a disease on a country is very complex. This is because,
unlike a localized and brief tragedy, a pandemic will spread throughout the globe over
months or years, most likely in waves, and will affect populations of different sizes and
composition. In terms of scale, a severe pandemic's impact may be outweighed by war or a
widespread economic catastrophe rather than a hurricane, earthquake, or terrorist attack
(Homeland Security Council, 2006).
This is evidenced by the mutation of new variants of Covid-19 in the form of B.1.1.7,
B.1.3.5.1, and B.1.6.1.7 which has increased the number of confirmed Covid-19 patients in
mid-June 2021. Pandemic Covid-19, which has similarities with the influenza pandemic is
a serious threat not only to the world population but also to the economy. The impact of
economic losses can lead to economic instability. The impact is through direct costs, long-
term expenses, and indirect costs. This pandemic is a worldwide concern that deserves a
global response. Given the speed in which the virus spreads and the susceptibility of the
human population as a whole
In addition to the economic and social impact, the Covid-19 pandemic also affects the type
and level of crime that occurs in a country. During the lockdown or Large-Scale Social
Restriction applied, some countries experience the uniqueness of the level of crime. For
example, in Sweden, crime rates that have decreased are molestation, sexual crimes, and
traffic offenses. Meanwhile, fraud and robbery did not change significantly. In global area,
when the number of other crimes decreased, cybercrimes actually increased, especially
hoaxes, hate crimes, and online transaction fraud. Cyber activity is an activity that has a
global dimension coupled with very rapid advances in information technology so that it is
very difficult for legal experts to give a firm definition of this crime.
One of the cybercrimes, namely online transaction fraud, is rife throughout 2020- 2021, with
an estimated loss due to cybercrime of around USD 171 billion (detik.com, 2020). In
addition, scams in the name of banks, and phishing have become commonplace during the
pandemic. In the United States, the Federal Trade Commission (FTC) recorded fraud that
cost consumers more than $469 million with an average loss of $360 through June 14, 2021.
Fraudsters use a full suite of fraudulent tools including emails, phishing texts, fake social
media posts, robot calls (robocalls), impostor schemes, and so on. Fraudsters follow the
headlines, adapting messages and current issues during the Covid-19 pandemic.
The FBI's Internet Crime Complain Center received reports that phishing, smishing and
similar scams had more than doubled in 2020. Additionally, cybercriminals
(cybercrooks) registered tens of thousands of fake web domains related to Covid at the start
of the pandemic. If people are not careful and visit these malicious domains, fraudsters will
share phishing emails to directly hack personal data information. Fraudsters will also plant
malware that digs into personal files on individuals' computers, hacking passwords and
other personal data for identity theft.
The economy affected by the pandemic raises concerns for the public, thus providing an
opportunity for fraudsters to imitate the banking industry and online loan providers.
Scammers offer loans or assistance either by calling a phone, text message, or email. In
addition, fraudsters also commit investment fraud, by offering investments both on the
stock exchange and outside the stock exchange. In Indonesia itself, many cases of
fraudulent investment were reported during the Covid-19 pandemic. The mode is in the
form of offering high-interest rates above the Bank Indonesia rate.
The existence of crime in the financial sector during the pandemic definitely worsens the
condition of countries that are struggling against Covid-19. This is considering that the
community has been harmed due to the Covid-19 pandemic, then as a victim of crime and
the emergence of unrest for the wider community. Especially now, as of June 2021, Covid-
19 cases have experienced a spike and new variants have emerged due to the Covid-19
mutation. When the Covid-19 vaccine has been completed and vaccinations have begun, it
is hoped that people's lives can run normally. Although it cannot return to its daily routine
before the Covid-19 pandemic. For example, the implementation of health protocols that
are still in effect, micro-scale social restrictions that have an impact on life patterns that are
all online and remotely. Therefore, the prevention of financial crime in cybercrime is
deemed necessary so that it does not recur during the Covid-19 pandemic which is still in
waves until the implementation of the new normal era.
Methodology
This research is juridical-normative research with a conceptual approach and statute
approach. The juridical-normative research means that research would be focused in depth
regarding the existence of Law and Regulations to analyze the legal issues. The Law and
Regulations would be differed not only in the certain law but also law which contains of
common rules to harmonize the explanation in research. Conceptual approach used to
analyze specific or common theoretical about prevention and nonpenal policy. Statute
approach used to analyze the regulation related to prevention of cybercrime before the
Covid-19 pandemic.
are experts in various hacking techniques. It is not uncommon for cybercrime to be carried
out from different places at the same time (Suwiknyo et al., 2021)
The essence of the existence of cyberspace is a virtual construction created by a computer
that contains abstract data that functions as follows: self-actualization; a forum for
exchanging ideas; and means of strengthening democratic principles (Budhijanto,2019).
People can enter the data system and computer network and then get a feeling that they
really have entered a space that has no attachment at all to physical realities. Therefore, all
of its activities in the cyber world have characters, namely: easy; its spread is very fast and
widespread which can be accessed by anyone and anywhere; and can be destructive from
loading insulting and/or defamatory material using electronic media, which is
extraordinary because it has unlimited victimization patterns (Budhijanto, 2019).
Cybercrime, on the other hand, is a more particular definition of illicit action involving the
internet and information technology. However, as cybercrime has evolved in everyday life,
it has taken on many different shapes and manifestations. The direct effects of cyberattacks
resulting from unlawful access to information resources and successful technical
manipulation methods determine the unfavorable impact on business. The process of
primary identification, recovery, and detection of later cybercrime attacks, on the other
hand, necessitates a thorough examination as a managerial strategy, taking into account the
fundamental position of authority (Antonescu & Birău, 2015).
Cybercrime is becoming a bigger problem, especially in underdeveloped countries.
International cyber terrorism aims to steal classified information in order to gain complete
control and hence large revenues. Furthermore, due to their inherent vulnerabilities,
underdeveloped countries are particularly vulnerable to cybercrime. Due to these
catastrophic occurrences, the global environment, which encompasses both financial and
non-financial components, has changed dramatically. Modern technology allows for
incredibly sophisticated tracking methods that appear to be untraceable and invisible.
Cyber-attacks, in a metaphorical sense, are based on security system flaws, and their
strategy is determined through tracking. The economic and corporate targets are severely
harmed as a result of this illicit behavior (Antonescu & Birău, 2015).
Further, related to financial crimes. Internationally, there is no patent definitionrelated to
the definition of financial crime (Hairi, 2015). Financial crime is one of the most widespread
forms of criminality in any society. However, there has been no consensus on the definition
of financial crime until today. It is impossible to recognize and respond to the newest sorts
of financial crimes without correct classification and conceptualization of financial crimes.
As a result, it's critical to comprehend the nature and characteristics of today's financial
crime (Jung & Lee, 2017)
Financial crime is frequently defined as a crime against property, involving the illicit
conversion of another's property for personal advantage. Financial crime is defined as "any
non-violent crime that often ends in financial loss," according to the International Monetary
Fund in 2001. Meanwhile, in the UK, the Financial Services and Markets Act 2000 (FSMA)
states that financial crimes include 'any offense involving fraud or dishonesty; errors in, or
misuse of information relating to, financial markets; or dealing with the proceeds of crime.
Pickett and Pickett (2002) use the phrases financial crime, white-collar crime, and fraud,
financial crime is defined as "the employment of fraud for illegal gain, usually involving a
violation of trust and some concealing of the true nature of the action." consecutively.
Financial crimes, on the other hand, are often referred to as white-collar crimes, according
to Interpol, which were initially described by Sutherland (1939) as "perpetrated by persons
of respectable and high social status in the course of their employment". White-collar crimes
are equivalent to occupational crimes under this concept. Financial crimes are classified as
white-collar crimes, which are committed by people or organisations regardless of their
vocation. Money laundering, insider dealing, fraud, and market manipulation are examples
of white-collar crimes that financial crimes can catch (Jung & Lee, 2017).
Financial crimes, according to Interpol, are typically global and include the use of networks
such as the internet. Transnational crime and cybercrime are inextricably linked to financial
crime, posing a threat to financial institutions and individuals all over the world.
According to Gottschalk, Victims range from individuals to institutions, companies, thus
affecting all walks of life. At the micro-level, individual citizens and corporations suffer the
consequences of serious financial crimes. Several market scams have claimed thousands of
people, with many losing their savings, security and also affecting their emotional well-
being, physical health, and relationships (Australian Crime Commission). At the macro
level, financial crimes harm the entire economic and social system through substantial
financial losses.
Financial crime in the sense of fraud is defined as a series of unlawful acts that are carried
out intentionally and harm other parties. These harmful actions can take the form of
corruption, collusion, and nepotism (KKN), fraud, theft, bribes, manipulation,
embezzlement, looting, fraud, smuggling, misstatements. The act as a whole is an act that
deviates from ethics and propriety/abuse (Sutrisno, 2013). Fraud, on the other hand, refers
to a variety of criminal offences the deception of financial persons or services in order to
conduct theft, including as forgery, credit scams, and insider threats. Financial
organizations have always treated fraud as a loss problem, but in recent years, powerful
analytics have been used to detect and even prevent fraud in real time. Financial institutions
must utilize many of the same techniques to protect assets from all three types of crime, as
the distinction between them has become less important (Hasham et al., 2019). Cyberattacks
against financial companies are increasingly sophisticated and diverse. They use
website attacks (DDoS), fake transfers, ATM hacks, and crypto theft. 40%of the dark web is
financial fraud and leaked data is stolen. Brian Krebs, journalist and investigative reporter
stated that expropriated accounts pose a less challenging threat than fake accounts and
synthetic identity fraud, where stolen data is attached to fake accounts and identities.
Financial firms invest in AI forces that uncover criminal behavior and hunt down
fraudsters. Organizations will need a quantum strategy to stay safe incyberspace. Quantum
computers are very fast and use the principles of quantum mechanics .
The act of acquiring financial benefit through profit-driven criminal activities, such as
identity fraud, ransomware attacks, email and internet fraud, and attempts to steal financial
accounts, credit cards, or other payment card information, is referred to as financial
cybercrime. To put it another way, financial cybercrime includes things like obtaining
payment card information, gaining access to bank accounts to make unlawful transactions,
extortion, and identity fraud to apply for financial products, among other things
(visma.com, n.d.). That financial crimes use electronic devices. So, it is very closely related
to cybercrime or in other words, financial crime is part of cybercrime. Cyber, used to
commit financial crimes. For example (Suwiknyo et al., 2021)
a. Phishing, a phishing technique used by perpetrators to trick or manipulate bank
account owners so that they provide data and information that can be used to access
customer banking accounts. Deception is carried out to obtain confidential
information such as passwords by impersonating a trusted person or business in an
electronic communication. Channels are used as email, instant messaging services
(SMS), or spreading fake links on the internet to direct victims to websites that have
been designed to deceive.
b. Impersonation, which is an attempt by fraudsters to pretend to be someone else to
obtain confidential information.
c. Internet banking fraud and online transactions using credit/debit cards, where the
perpetrator claims to be a bank employee who informs him of changes in
SMS/internet banking service fees, giving credit bonuses, distribution of invitation
gifts, and others. The perpetrators also commit fraudulent online loan offers with
low-interest rates.
d. Bank contact centers, namely fraudsters manipulate ATMs so that victims fail to
make transactions and swallow cards in the machine. At the same time, members of
the fraud team standby around the ATM to direct the victim to call a fake call center
number. The team pretending to be a fake call center informed that the ATM had
been blocked, then asked the victim to provide personal identity including the ATM
PIN. The perpetrators who were around the victim then took the victim's ATM card
which was swallowed in the machine.
e. Fraud SMS fraud, victims receive SMS content containing the lure of gifts, discounts,
credit bonuses, tour packages, online loans, and others. Under the pretext of
withdrawing the prize, the victim will be lured into an ATM and directed to follow
instructions given by the perpetrator, such as transferring funds or top- up e-
commerce balances.
f. Customer identity theft through open banking. Open banking is a service provider
system for interaction between customers and financial institutions. This system can
be read by the perpetrators of theft by 'skimming' or tapping customer profile data.
g. Skimming, this technique is carried out by the perpetrators by cloning the
customer's ATM card into an empty ATM card. The trick is to install a pocket wifi
router with a camera that is modified to resemble a PIN cover on ATMs to steal
customer PINs before they are duplicated.
h. Malware, which stands for malicious software, means unwanted software in a
computer system. Malware can include any software that is used to measure,
manipulate or even spy on a system. Malware is a term used to describe malicious
software. Malware can be spread through several methods. Most of it is via the
internet, email, private messages, or web pages.40 Malware is very difficult for
computer systems to detect. Because there are two (2) paths that cause the computer
system to be affected by malware, namely through a USB Drive and through the
internet. Until now, malware is still a serious threat to cyberspace globally.
i. Hacking is a fairly common cybercrime term. This action is carried out by accessing
the victim's computer system without rights. Hackers will use their skills to carry
out various public crimes. Hacking is not always aimed at getting financial gain.
Many hackers just want to show off their skills. For example, hacking actions that
often occur are password breaches. This step is the starting point for hackers to
commit further crimes. Some time ago, two major media in Indonesia were victims
of hacking. The hackers managed to penetrate the security system of the media
website and managed to make some of the news that was published.
Even before the pandemic, it was seen that the development of e-commerce crimes or
buying and selling online had shown a sharp increase. It is easy to predict that the pandemic
period will provide more opportunities for cybercriminals to act. The limitations of
movement during the pandemic have forced people not to leave their homes or restricted
people from leaving their homes, thus making more people dependent on digital platforms
to live their daily lives. This is because, during the pandemic period with the existence of
work from home, online studies, and everything based on online transactions, Indonesian
people have increased their use of the internet and digital technology. According to a
survey by the Indonesian Internet Service Providers Association (APJII) from 2019 to the
second quarter of 2020, the number of internet users in Indonesia was 196.7 million,
equivalent to 73.7% of the population in Indonesia (BSSN, 2020).
Description of digital transactions and cybercrimes according to the White Paper on
Mitigation of Cyber Incidents during the COVID-19 Pandemic compiled by BSSN. Massive
distribution of malware and leveraging public curiosity about COVID-19 has the potential
to cause unauthorized intrusion of an organization's IT infrastructure, leak of sensitive data,
malware infection (ransomware, virus, etc.), or other cyber incidents. Inaddition, the majority
of employees who currently work from home (WFH) are potentially exposed to this risk
because they are not connected to a secure network as in the organization’s corporate
network (Syafrina & Irwansyah, 2018). It is not surprising that this period is a window of
opportunity for criminals who make users of digital platforms – bothsellers and buyers –
easy targets. Building fake websites to make shoppers believe they are dealing with the
official website of a legal business entity, offering low-quality goods as genuine, are some
of the more common online scams. This condition increasingly demands people to be more
digitally literate, so it is not easy to fall into the trap of online criminals.
According to the general description of the Financial Action Task Force (FATF), there is an
increasing trend and the emergence of financial crime risks due to the pandemic, namely
financial fraud, one of which is fake investment offers and phishing. It’s also a virtual scam
(ojk.go.id, 2020). Report of Interpol related to typology of crimes that appear during Covid-
19 (crime Typologies emerging from covid-19) based on the modus operandi was reported
from the member states during pandemic era that is (Khweiled et al., 2021)
c. Health Care Scams: Fraudsters offer free (and fake) coronavirus testing to obtain
Medicare or other health insurance information that they use to make false claims
for benefits.
d. Counterfeit protection and equipment: Fraudsters advertise fake or untested
personal protective equipment (including respiratory masks) through websites,
social media, and robots. Fraudsters may not have real equipment to sell or provide
equipment that has not been proven to work as advertised.
e. Phishing: A fraudster masquerades as representatives of well-known agencies such
as the World Health Organization (WHO) and the Centers for Disease Prevention
and Control (CDC) to trick victims into downloading malware or providing
personal and financial information.
f. Fake Healthcare Providers: Fraudsters pretend to be doctors or hospital employees
and call the individual by phone or email. They make false claims that they are
treating a relative or friend for the coronavirus and ask for money for the purported
treatment.
g. Identity theft: A fraudster uses social media to fraudulently search for donors or
provide stimulus funds. The victim provides her bank account number or other
personally identifiable information. A fraudster uses information entered by the
victim to impersonate the victim and steal money from the victim's bank account.
h. Securities Fraud: The fraudster promotes securities in a public company that falsely
claims that he has found the cure.
i. Fake Charity: A fraudster asks for charitable donations which he deems to be
beneficial to the person affected by this virus and has the money for himself.
On another side, the economic crisis caused by COVID-19 has resulted in an upsurge in
investment frauds, such as advertisements erroneously stating that publicly traded firms'
products or services can prevent, detect, or cure COVID-19. Microcap stocks, which are
often issued by the smallest companies, are particularly vulnerable to fraudulent
investment schemes, according to FATF members, because they are low-priced equities
with less publicly available information.
The Corona Virus Disease 2019 (COVID-19) outbreak that occurs in most areas of the world
is currently being used by threat actors to spread malware (viruses, ransomware, etc.) and email
spam to many parties. Based on information released by security service provider
TrendMicro*, at least more than 200,000 malware and spam spread campaigns were detected
worldwide in Q1 2020. In Indonesia alone, at least 4800 similar campaign activities were
detected during that time span.
In research entitled 'Future-proofing Fraud Prevention in Digital Channels: An Indonesian
FI Study', GBG collaborated with The Asian Banker to conduct a survey in more than 300
financial institutions in 6 countries in the Asia Pacific region. Managing Director of APAC
GBG June Lee said the type of crime with the money mule model is predicted to increase
drastically in 2020-2021 which has an impact on consumers in the banking and financial
sectors. In 2019, more than 50 percent of respondents saw an increase in fraud, the most
prominent of which was the synthetic ID of more than 60 percent. While in 2020, there is an
increase in first-party fraud, but the most prominent is the money mule. Research
conducted by GBG also found that 55% of identity theft and 53% of identity theft were
entered with money mules.
It is estimated that the loss due to cybercrime is around USD 171 billion because
cyberattacks are increasingly complex, organized, and coordinated. Based on data from the
National Cyber and Crypto Agency (BSSN), from January to August 2020, there were nearly
190 million cyber-attack attempts in Indonesia, an increase of more than four times
compared to the same period last year which was recorded at around 39 million. The
highest number was recorded in August 2020, where BSSN recorded the number of
cyberattacks in the range of 63 million, much higher than August 2019 which was only in
the range of 5 million. According to the Head of Sub-Directorate for Vulnerability
Identification and Risk Assessment of National Critical Information Infrastructure
III BSSN, Sigit Kurniawan, the sharp increase in the number of cyberattacks in Indonesia is
directly influenced by changes in people’s lifestyles during the pandemic (kompas.com,
2021). This is due to the increasing use of the internet and digital transactions during work
from home and Large Scale Restritions.
Pusopskamsinas 2020 detected the occurrence of phishing emails in as many as 2549 cases
with an increase in the number of cases of phishing emails occurring in March-May 2020. A
total of 55.53% of phishing emails were sent during working hours (09.00 - 17.00) and 44.37%
were sent outside working hours (BSSN. Email Phishing is a technique of Social Engineering
that is widely used by hackers to trick victims. The hacker sends an email with an attractive
title for the victim to open, usually financial or advertising-related (gifts, vouchers,
discounts, etc.). The email usually contains a file insertion (attachment) or a link that leads to
the download of a malicious program. This program can automatically work on the victim's
computer and steal credentials, passwords, accounts, credit card information, and more.
Phishing is becoming a popular choice among hackers because it is cheap, and its ease and
effectiveness are quite high. Although many organizations have implemented security
systems to block phishing attacks, attackers are also increasingly having more sophisticated
phishing tools.
Phishing is the practice of sending fraudulent communications that appear to come from a
trusted source and is usually done via e-mail. The purpose of phishing is to steal sensitive
data such as personal data (name, age, address), account data (username and password),
and financial data (credit card information, accounts) belonging to the victim, even to install
malware on the victim's device.
considerations, in 2008 the ITE Law was issued (Law Number 11 of 2008 which is the first
Law in the field of Information Technology and Electronic Transactions as a legislative
product that became a pioneer in laying the basis for regulation and protection in the field
of utilization of Information Technology and Electronic Transactions) Electronic
Transactions (Budhijanto, 2019).
The Indonesian government's policy with the promulgation of the ITE Law is the first legal
umbrella that regulates the cyber world (cyberlaw), because of its broad content and scope
in discussing regulations in cyberspace such as the expansion of electronic evidence to the
same as evidence that has been known so far, admits electronic signatures as a means of
verification, and valid authentication of an electronic document, as well as regulation of
acts committed in cyberspace as a crime. The formulation policy for regulating information
technology crimes in Indonesia is regulated by the ITE Law which is special in nature
(Sumadi, 2015).
Article 26 of the ITE Law Number 11 of 2008 states that unless otherwise stipulated by the
laws and regulations, the use of any information through electronic media concerning a
person's data must be carried out with the consent of the person concerned. In addition,
any person whose rights are violated can file a lawsuit for the losses incurred under the
law. The provisions in the article explicitly provide protection and prevent acts of data theft
(theft) which are usually also misused for account break-ins, fraud to third parties with the
mode of borrowing money, and other forms of crime that have implications for material
losses.
The ITE Law also accommodates protection against hackers late either directly or indirectly
through Article 30 which states that: (1) Every person intentionally and without right or
against the law to access Computers and/or Electronic Systems belonging to other people
in any way. Furthermore, in paragraph (2) Any Person intentionally and without rights or
against the law accesses a computer and/or Electronic System in any way to obtain
Electronic Information and/or Electronic Documents. Finally, paragraph (3) Any person
intentionally and without rights or against the law accesses a computer and/or Electronic
System in any way by violating, breaking through, exceeding, or breaking into the security
system.
The sanctions imposed are contained in Article 46 of the ITE Law for actions in Article 30
paragraph (1) in the form of, being punished with imprisonment for a maximum of six years
and/or a fine of a maximum of Rp. 600,000,000.00. Sanctions in paragraph (2) Anyone who
fulfills the elements as referred to in Article 30 paragraph (2) shall be sentenced to a
maximum imprisonment of 7 (seven) years and/or a maximum fine of Rp. 700,000,000.00
(seven hundred million rupiahs). And in paragraph (3) Anyone who fulfills the elements
as referred to in Article 30 paragraph (3) shall be sentenced to a maximum imprisonment
of 8 (eight) years and/or a maximum fine of Rp.800,000,000.00 (eight hundred million
rupiahs).
Article 32 (1) Any person intentionally and without rights or against the law in any way
alters, adds, reduces, transmits, damages remove, transfers, hides an Electronic Information
and/or Electronic Document belonging to another person or the public. (2) Any person
intentionally and without rights or against the law in any way transfers or transfers
Electronic Information and/or Electronic Documents to the Electronic System of another
person who is not entitled. This activity is also often used in hacking social media accounts
to commit fraud, for example asking for funds or making loans.
Sanctions for violators of Article 32 are contained in Article 48 (1) Anyone who meets the
elements as referred to in Article 32 paragraph 1 shall be sentenced to a maximum
imprisonment of 8 (eight) years and/or a maximum fine of Rp. 2,000,000,000.00 (two billion
rupiah). (2) Everyone who fulfills the elements as referred to in Article 32 paragraph 2 shall
be sentenced to a maximum imprisonment of 9 (nine) years and/or a maximum fine of Rp.
3,000,000,000.00 (three billion rupiah). (3) Everyonewho fulfills the elements as referred to
in Article 32 paragraph (3) shall be sentenced to a maximum imprisonment of 10 (ten) years
and/or a maximum fine of Rp. 5,000,000,000.00.
Recently, there have been several cases of buying and selling personal data online.
Previously, data leaks also occurred in BPJS Kesehatan. This is certainly very worrying
because in the end it will be misused, for example for online loan applications. The ITE Law
has warned in Article 34 that, (1) Any person intentionally and without rights or against
the law produces, sells, procures for use, imports distribute, provides, or possesses:
a. Computer hardware or software designed or specifically developed to facilitate the
actions as referred to in Article 27 to Article 33;
b. password via a Computer, Access Code, or something similar that is intended to
make the Electronic System accessible
Sanctions for violating Article 34 are contained in Article 50 that any person who fulfills the
elements as referred to in Article 34 paragraph (1) shall be sentenced to a maximum
imprisonment of 10 years and/or a maximum fine of Rp. 10,000,000,000.00
(ten billion rupiah). Article 35 Any person intentionally and without rights or against the
law manipulates, creates, changes, deletes, destroys Electronic Information and/or
Electronic Documents with the aim that the Electronic Information and/or Electronic
Documents are considered as if the data is authentic.
Article 51 (1) Anyone who fulfills the elements as referred to in Article 35 shall be sentenced
to a maximum imprisonment of 12 (twelve) years and/or a maximum fine of Rp.
12,000,000,000.00. (2) Everyone who fulfills the elements as referred to in Article 36 shall
be sentenced to a maximum imprisonment of 12 (twelve) years and/or a maximum fine of
Rp. 12,000,000,000.00.
The ITE Law provides flexibility to investigators outside the Police environment so that
other institutions with investigative authority can enforce cybercrime eradication following
their fields. This is contained in Article 43 paragraph (1) In addition to Investigators of the
Indonesian State Police, certain Civil Servants in the environment. The government whose
scope of duties and responsibilities is in the field of Information Technology and Electronic
Transactions is given special authority as an investigator as referred to in the Law on
Criminal Procedure Law to investigate criminal acts in the field of Information Technology
and Electronic Transactions.
The implementer of law enforcement of the ITE Law to prevent penal crimes is the
Indonesian National Police. The Police, through the Directorate of Cyber Crime (Direktorat
Tindak Pidana Siber also known as Dittipidsiber), Bareskrim Polri, is a work unit under the
Bareskrim Polri and is tasked with enforcing the law against cybercrimes. In general,
Dittipidsiber handles two groups of crimes, namely computer crime and computer-related
crime. Computer crime is a group of cybercrimes that use computers as the main tool. The
forms of crime are hacking of electronic systems (hacking), illegal interception (illegal
interception), changing the appearance of websites (web defacement), system interference
(system interference), data manipulation (data manipulation) (patrolisiber.id, n.d.).
Computer-related crime is a cybercrime that uses computers as a tool, such as online
pornography, online gambling, online defamation, online extortion, and online fraud.
(Online fraud), hate speech, threats in the network (online threat), illegal access (illegal
access), data theft (data theft). To support cybercrime evidence, Dittipidsiber is equipped
with various capabilities and supporting facilities, one of which is a digital forensic
laboratory. Therefore, Dittipidsiber also serves the examination of digital evidence from
various work units, from the Headquarters to the Polsek level. In addition, Dittipidsiber
also cooperates with various institutions, both at home and abroad, to facilitate
coordination in the disclosure of transnational and organized cybercrimes (patrolisiber.id,
n.d.)
Dittipidsiber also provides complaint services for victims of cybercrime through the cyber
patrol website, as an effort to prevent and at the same time eradicate financial crime through
cybercrime. According to Sudarto, police patrol activities that are carried out continuously
include non-penal measures that have a preventive effect on potential criminals (Arief,
2011). In this regard, raids or operations carried out by the police in certain places and
activities oriented towards community service or educative communicative activities with
the community can also be seen as an effective non-penal effort (Arief, 2011). However, the
National Police as law enforcers in preventing financial crimes in the cyber world does not
work alone. There is another institution called Center for Indonesian Financial Transaction
Reports and Analysis Center (PPATK), as an independent agency established to prevent
and combat money laundering (Article 1 paragraph 2 of Law No. 8 of 2010 on the
Prevention and Eradication of the Crime of Money Laundering). The role of the PPATK
institution is to supervise if a suspicious transaction occurs which is the result of a criminal
act. One of them is criminal acts in the financial sector such as banking, capital markets,
insurance, fraud, and others. In other words, the crime can also be suspected or originated
from cybercrime in the financial sector.
The presence of PPATK is to prevent the occurrence of financial crimes, which even though
they do not have the authority to investigate and investigate, prevent predicate crimes. This
is based on the PPATK's functions, namely preventing and eradicating money laundering
offenses, managing data and information, monitoring the compliance of the Reporting
Party, and analyzing or examining reports and information on financial transactions with
indications of money laundering and other criminal acts. Thus, PPATK also has an
important role to monitor the flow of funds for financial crime actors which can then be
used as evidence for law enforcement.
In the practice of providing financial services, the OJK, based on the mandate of the OJK
Law, also has an important role in preventing financial crimes, especially by financial
service providers. H al this is a kind of prevention that is specifically regulated in the field
of financial services. As for the legitimacy of the OJK as an authorized institution in law
enforcement to prevent financial crimes, namely based on article 1 number 1 of Law
Number 21 of 2011 concerning the Financial Services Authority (OJK Law), which is an
independent institution and free from interference from other parties, which has functions,
duties, and authorities of regulation, supervision, examination, and investigation.
In addition, it is emphasized in CHAPTER XI of the OJK Law concerning Investigations
that certain Civil Servant Officials whose scope of duties and responsibilities include
supervision of the financial services sector within the OJK are given special powers as
investigators as stipulated in the Criminal Procedure Code. In the implementing
regulations, OJK Regulation Number 22/POJK.01/2015 concerning Criminal Acts in the
Financial Services Sector confirms the technical implementation of OJK investigators as law
enforcement for crimes in the financial services sector. Article 1 Number 2 explains that a
criminal act in the Financial Services sector is an act/event that is punishable by a crime
regulated in several laws.
For example, the laws governing OJK, Banking, Sharia Banking, Capital Markets, Pension
Funds, Microfinance Institutions, Insurance, Indonesian Export Financing Institutions,
Social Security Administering Bodies, Bank Indonesia as long as it relates to interference
with the implementation of OJK duties in regulating and bank supervision, as well as the
Law on other Financial Services Institutions, as referred to in the OJK Law. The above
mandate also gives legitimacy to the OJK to monitor and carry out investigations into any
financial crimes, whether carried out conventionally or in cyber.
Regarding cyber-based financial crimes, OJK focuses on implementing digital financial
innovations and digital-based investment services and implementing anti-money laundry.
Digital financial innovation is regulated in OJK Regulation Number
13/POJK.02/2018 concerning Digital Financial Innovation in the Financial Services Sector.
OJK requires digital-based financial service providers to apply the principles of
independent monitoring at least including:
a. the principles of information and communication technology governance following
thelaws and regulations;
b. consumer protection under the provisions of this Financial Services
AuthorityRegulation;
c. education and socialization to consumers;
d. confidentiality of consumer data and/or information including transaction
dataand/or information;
e. the principles of risk management and prudence;
f. the principle of anti-money laundering and the prevention of terrorism financing
inaccordance with the provisions of the legislation; and
g. inclusiveness and the principle of information disclosure.
In accordance with Article 18 paragraph (1) POJK 13/POJK.02/2018. OJK also requires to
provide data protection and confidentiality for digital-based financial service providers
following Article 30. As well as the prohibition in Article 38 to provide data and/or
information regarding consumers to third parties. OJK Regulation Number
12/POJK.01/2017 concerning Implementation of Anti-Money Laundering and Prevention
of Terrorism Financing Programs in the Financial Services Sector. The POJK anti-money
Laundry is a form of prevention to prevent financial crimes, especially the type of money
laundry and funding for terrorism. OJK requires financial service providers (PJK) to
implement anti-money laundry programs and prevent terrorism financing. The output of
the regulation is the internal policy of the PJK company.
Conclusion
In fact, the pattern of community activity during the pandemic has shifted due to physical
and social distancing policies. This has led to changes in remote-based activities or using
more interactions with online media. Work from home, online study, and transaction
services even in terms of buying and selling and delivery have increased internet usage.
The increasing use of the internet also increases the threat and attacks of cybercrime. One
of the cybercrime attacks is related to financial crimes. Prior to the pandemic, the state
through several laws and regulations had accommodated penal and non-penal-based
prevention, namely through the ITE Law, OJK Regulations, supervision by PPATK, and the
establishment of a special division within the National Police Agency related to cybercrime.
However, referring to the pandemic which is an extraordinary condition, and the increasing
use of online transactions, more adaptive prevention efforts are needed. That in the future,
when there is a disease pandemic after society has completely depended on online
transactions, as well as the increasingly sophisticated online digital technology, prevention
efforts from three parties are needed. This three-party prevention is the implementation of
non-penal prevention, which includes prevention by online service providers; prevention
by users of online services, and prevention by the government.
References
Antonescu, M., & Birău, R. (2015). inancial and Non-Financial Implications of Cybercrimes
in Emerging Countries. Procedia Economics and Finance, 32, 618–621.
Arief, B. N. (2011). Bunga Rampai Kebijakan Hukum Pidana : Perkembangan Penyusunan Konsep