DISUSUN OLEH
NIKEN
LIDYA
ADITYA
UNIVERSITAS UNIVERSITAS ATMA JAYA YOGYAKARTA
Cyber Crime Cover Story Fourth July maybe is the most celebrate and joyfull day for American people. Why? Because fourth July is the independence day of United States of Amerika. But, that day isn’t just a day full with joy and love, that day, for some people who knows and life around Cyber World, this day also become a full terror and crushing day. Yes, in American Independence day, In Cyber World, or we known it’s as Internet, terror and criminalism also celebrating too with their own way. Every Fourth July, started in year 2000, internet and it’s network are facing terror and other thing that potentially crush them. For sure, in Fourth July 2001, a new computer virus mutation, Trojan_brontok2k1 virus was send to all known internet network over the world. In 2002, in Indonesia for sure, the “Cinta” Virus was known exist for first time and damage more than 30.000 computer in one single day. And, last year, 2008, when fourth July was celebrated, the Cyber Crimer, Hacker, Bugger, or Cracker is celebrating too, with mass e – mail with a new varian virus – worm mutation, Wormsick attached on it, and sending that mass e - mail to all computer user that active in that time. Fourth July every year, no doubt against it, was the worst day in a year for Cyber World. Fortunately, until this sentence one typed, there is no such serious accident happen in Cyber World at fourth July. Why until now, there wasn’t such a serious accident happen in that time? The answer is because, government and other facilities that have a responsibility to keep that network safe always work hardly to maintain network at that day. We can say Cyber Police Department, Information and Technology Department, National Security Agency, always stay online to watch and keep user safety. They eliminate everything that have a possibilities to crush the network, and their priority was their Major Security Sistem. But, we can’t say now the Internet is safe and unharmed this day, because, in every single second the time passed, the cyber crimer also developed their skill in looking a hole in systems and try to hack and crush them, so, the condition of internet still can’t be predicted.
Cyber Crime Definitions and it’s Description Cyber crime is one type of criminal activities that use, or targeting, or get the source to do it’s and happen in an Computer or in an Internet Network. Cyber Crime firstly named in year 2000, when, a mass e-mail with virus attached on it spread over the world from one computer to another computer that linked in one network. Cyber Crime refers to some activities that have a purpose to make a terror in Internet or a Network, Crush other people system, or use victim ID to make a criminal activities. Cyber Crime have many type for sure, and always developing itself to make a new way to hack, and use weakness of one system for their personal gain. Cyber Crimer, or the person who do Cyber Crime, eventually called by Hacker, Cracker, or Bugger. But, Hacker, Cracker, or Bugger have their own differentiation when they do the action. Hacker, is someone who hack other personal information, systems, or anything else that important, without crush victim original systems. They penetrate and infiltrated other system without authorization for sure, but, not damaging they victim. But, Cracker is different from Hacker, After gain they purpose from one systems, they usually crush their victim sytems, and make a hard customization in that systems, so, they can control that system without detected by the original owner. Bugger, is one kind of cyber crimer who search for one systems weakness and use it to infiltrate their victims without changing, crushing, or damaging the original systems. So, each type of cyber crimer have their personality that different from another Cyber Crimer. Cyber crime can broadly be defined as criminal activity involving an information technology infrastructure, including illegal access (unauthorized access), illegal interception (by technical means of non-public transmissions of computer data to, from or within a computer system), data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data), systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data), misuse of devices, forgery (ID theft), and electronic fraud. We will descript to you 3 type of well know cyber crime: •
Fraud: Computer fraud is any dishonest misrepresentation of fact intended to induce another to do or refrain from doing something which causes loss for other people and the fraud will result in obtaining a benefit to them, example: Bank Fraud, which Is unauthorized way to
enter bank Computer or network, and make a changement in their own account, double their saving or, hack other people account. •
•
Drug trafficking: Drug trafficker are increasingly taking advantage of the Internet to sell their illegal substances through encrypted e-mail and other Internet Technology. Some drug traffickers arrange deals at internet cafes, use courier Web sites to track illegal packages of pills, and swap recipes for amphetamines in restricted-access chat rooms. CyberTerrorism: Is a way to terror and attack other country or people to gain fear from them. Cyber terrorism, include, recruitmen process to gain more follower, attack major system of one country and many more.
So, this is what we think about Cyber Crime.