Rabu, 08 Januari 2014

SEJARAH PERKEMBANGAN LINUX DI INDONESIA


Era 1980-an merupakan akhir dari zaman keemasan komputer mini -- komputer yang tidak secanggih "main-frame", namun setiap sistem terdiri dari bongkahan besar. Nama-nama besar pada zaman tersebut, seperti "DEC - Digital Equipment Corp.", "DG -- Data General", "HP -- Hewlett Packard", "Honeywell -- Bull", "Prime", dan beberapa nama lainnya. Setiap komputer mini ini, dijalankan dengan sistem operasi tersendiri. Setiap sistem operasi ini tidak cocok (kompatibel) dengan sistem operasi dari sistem lainnya. Sebuah program yang dikembangkan pada sistem tertentu, belum tentu dengan mudah dapat dijalankan pada sistem lainnya.
            Masalah ini mulai teratasi dengan sebuah sistem operasi yang lagi naik daun, yaitu UNIXTM. Sistem UNIX ini dapat dijalankan pada berbagai jenis komputer. Selain beroperasi pada komputer mini, UNIX pun dapat dioperasikan pada sebuah generasi komputer "super mikro", yang berbasis prosesor 32 bit seperti Motorola MC68000. Ya: pada waktu itu, Motorola belum terkenal sebagai produser Hand Phone!
Sistem berbasis UNIX pertama di Universitas Indonesia (1983) ialah komputer "Dual 83/20" dengan sistem operasi UNIX versi 7, memori 1 Mbyte, serta disk (8") dengan kapasitas 20 Mbytes. Sistem tersebut tentunya sangat "terbatas" dibandingkan komputer zaman sekarang. Namun, penelitian dengan memanfaatkan komputer tersebut, menghasilkan puluhan sarjana S1 UI. Tema penelitian S1 pada saat tersebut berkisar dalam bidang jaringan komputer, seperti pengembangan email (PESAN), alih berkas (MIKAS), porting UUCP, X.25, LAN ethernet, network printer server, dan lainnya. Komputer "Dual 83/20" ini, kemudian lebih dikenal dengan nama "INDOGTW" (Indonesian Gateway), karena pada akhir tahun 1980-an digunakan "dedicated email" server ke luar negeri. Sistem INDOGTW ini beroperasi non-stop 24 jam sehari, 7 hari seminggu.
            Fungsi riset sistem tersebut di atas, digantikan oleh komputer baru "INDOVAX", yaitu DEC VAX-11/750 dengan sistem unix 4.X BSD dengan memori 2 Mbytes, serta disk 300 Mbytes. Pada waktu itu, sanga lazim menamakan satu-satunya VAX pada setiap institusi, dengan akhiran "VAX". Contohnya: UCBVAX (Universitas Berkley), UNRVAX (Universitas Nevada Reno), DECVAX (DEC), ROSEVAX (Rosemount Inc), MCVAX (Amsterdam). Sistem ini pun kembali menghasilkan puluhan sarjana S1 UI untuk berbagai penelitian seperti rancangan VLSI, X.400,dansejenisnya.
            Untuk mewadahi para pengguna dan penggemar UNIX yang mulai berkembang ini, dibentuk sebuah Kelompok Pengguna Unix (Unix Users Group) yaitu INDONIX. Kelompok yang dimotori oleh bapak "Didik" Partono Rudiarto (kini pimpinan INIXINDO) ini melakukan pertemuan secara teratur setiap bulan. Setiap pertemuan ini akan diisi dengan ceramah kiat dan trik UNIX, serta sebuah diskusi/ tanya-jawab.
            Komputer mini -- yang UNIX mau pun yang bukan -- dominan hingga pertengahan tahun 1980-an. Komputer Personal (PC) masih sangat terbatas, baik kemampuannya, mau pun populasinya. Bahkan hingga akhir 1980-an, PC masih dapat dikatakan merupakan benda "langka" dan "mewah". Semenjak pertengahan 1980-an, muncul sistem komputer "super-mikro" berbasis prosesor Motorola MC68000 dan sistem operasi Unix. Sejalan dengan ini, juga muncul PC/AT berbasis prosesor Intel 80286 dan 80386 dengan sistem operasi XENIX/SCOUNIX.
            Kehadiran prosesor Intel 80286 (lalu 80386) telah mendorong pengembangan sistem operasi dengan nama "XENIX". Harga sistem yang relatif murah, berakibat kenaikan populasi sistem Unix yang cukup signifikan di Indonesia. Aplikasi yang populer untuk sistem ini ialah sistem basis data Usaha Kecil dan Menengah (UKM).
            Pada awalnya, setiap sistem operasi Unix dilengkapi dengan kode sumber (source code). Namun, hal tersebut tidak berlaku untuk negara non-US (terutama non Eropa) akibat regulasi ekspor US. Sebagai alternatif Prof. Andrew S. Tanenbaum dari VU (Belanda) mengedarkan sebuah sistem Operasi sederhana dengan nama "MINIX" (Mini Unix). Titik berat arah pengembangan MINIX ialah sesederhana mungkin agar dapat dipelajari dengan mudah dalam satu semester. Program Studi Ilmu Komputer Universitas Indonesia, tercatat pernah membeli source code MINIX dua kali, yaitu versi 1.2 (1987) dan versi 1.5 (1999).
            Sebagai penunjang mata kuliah Sistem Operasi, telah hadir MINIX (Mini Unix) yang bahkan dapat dijalankan pada PC biasa tanpa HardDisk! Namun, MINIX memiliki dua keterbatasan bawaan. Pertama, dititik-beratkan agar mudah dipelajari untuk keperluan pendidikan. Akibatnya, dengan sengaja tidak dibuat canggih dan rumit. Kedua, (pada awalnya) MINIX harus dibeli dengan harga lebih dari USD 100 per paket. Harga ini tidak dapat dikatakan murah bahkan untuk ukuran kantong mahasiswa di luar negeri. Namun, MINIX telah digunakan di Program Studi Ilmu Komputer Universitas Indonesia FUSILKOM UI, FakUltas ILmu KOMputer UI) sebagai bagian dari kuliah sistem operasi menjelang akhir tahun1990an.
Besar kemungkinan, siapa pun pengguna MINIX saat itu (termasuk penulis), pernah memiliki angan-angan untuk merancang sebuah kernel "idaman" pengganti MINIX yang dapat -- "dioprek", "dipercanggih", dan "didistribusikan" -- secara bebas. Tidak heran, Linus B. Torvalds mendapat sambutan hangat ketika tahun 1991 mengumumkan kehadiran sebuah kernel "idaman" melalui buletin USENET News "comp.os.minix". Kernel ini kemudian lebih dikenal dengan nama Linux. Namun, Linux tidak langsung mendapatkan perhatian di UI.

Era1990an

            Belum jelas, siapa yang pertama kali membawa Linux ke Indonesia. Namun, yang pertama kali mengumumkan secara publik (melalui milis pau-mikro) ialah Paulus Suryono Adisoemarta dari Texas, USA, yang secara akrab dipanggil Bung Yono. Ketika 1992, bung Yono berkunjung ke Indonesia membawa distro SoftLanding System (SLS) dalam beberapa keping disket. Kernel Linux pada distro tersebut masih revisi 0.9X (alpha testing), dengan kemampuan dukungan jaringan yang sangat terbatas. Pada awal tahun 1990-an, kisaran harga sebuah ethernet board ialah USD 500; padahal dengan kinerja yang jauh dibawah board yang sekarang biasa berharga USD 5.-. Dengan harga semahal itu, dapat dimaklumi, jika masih jarang ada pengembang LINUX yang berkesempatan untuk mengembangkan driver ethernet.
            Perioda 1992-1994 merupakan masa yang vakum. Secara sporadis, terdengar ada yang mendiskusikan "Linux", namun terbatas pada uji coba. Kernel Linux 1.0 keluar pada tahun 1994. Salah satu distro yang masuk ke Indonesia pada tahun tersebut ialah Slackware (kernel 1.0.. Distro tersebut cukup lengkap dan stabil sehingga merangsang tumbuhnya sebuah komunitas GNU/ Linux di lingkungan Universitas Indonesia. Pada umumnya, PC menggunakan prosesor 386 dan 486, dengan memori antara 4-8 Mbytes, dan hardisk 40 - 100 Mbyte. Biasanya hardisk tersebut dibuat "dual boot", yaitu dapat dalam mode DOS atau pun Linux.
            Slackware menjadi populer dikalangan para mahasiswa UI, karena pada waktu itu merupakan satu-satunya distribusi yang ada . Banyak hal-hal baru yang "dioprek"/ "setup". Umpama: yang pertama kali men-setup X11R4 Linux di UI ialah Ivan S. Chandra (1994).
            Tahun 1994 merupakan tahun penuh berkah. Tiga penyelenggara Internet sekali gus mulai beroperasi: IPTEKnet, INDOnet, dan RADnet. Pada tahun berikutnya (1995), telah tercatat beberapa institusi/ organisasi mulai mengoperasikan GNU/Linux sebagai "production system", seperti BPPT (mimo.bppt.go.id), IndoInternet (kakitiga.indo.net.id), Sustainable Development Network (
www.sdn.or.id dan sangam.sdn.or.id), dan Universitas Indonesia (haur.cs.ui.ac.id). Umpamanya, Sustainable Development Network Indonesia (sekarang diubah menjadi Sustainable Debian Network) menggunakan distribusi Slackware (kernel 1.0.9) pada mesin 486 33Mhz, 16 Mbyte RAM, 1 Gbyte disk. Namun sekarang, situs tersebut numpang webhost di IndoInternet.
            Kehadiran internet di Indonesia merangsang tumbuhnya sebuah industri baru, yang dimotori oleh para enterpreneur muda. Mengingat GNU/ Linux merupakan salah satu pendukung dari Industri baru tersebut, tidak dapat disangkal bahwa ini merupakan faktor yang cukup menentukan perkembangan GNU/Linux di Indonesia. Selama perioda 1995-1997, GNU/Linux secara perlahan mulai menyebar ke seluruh pelosok Indonesia. Bahkan krismon 1997 pun tidak
dapat menghentikan penyebaran ini. 

Kamis, 20 Juni 2013

Business Crime

The rise of Online Business Scams (online shop)
The rise of Fraud in Virtual Worlds (Online Business Scams)
Internet in Indonesia began the first time in the 1990s. Society using the internet at that time was still very limited, usually people who are in big cities that use it. In contrast to today, people from all walks of life can use the internet for various things. The old, the young, until the children are now able to use it for kebutuhanya. Online businesses are now rampant once carried people to buy and sell merchandise. Many things which is the reason they use the internet to expand its business in line with the rapid development of the internet. In addition to the many conveniences provided in this sale, but there are many difficulties experienced by many sellers in the market dagangannya.Tetapi also fraud cases through the online sale, because the sale is not like buying and selling in general, they met then there is a transaction. While buying and selling online for example through facebook, they only communicate through facebook or through SMS. This paper discusses the advantages of buying and selling online, the difficulty, as well as cases that occur in the online buying and selling along with the rapid development of the Internet in Indonesia.
Internet development in Indonesia
Information technology has opened the eyes of the world will be a new world, new interactions, new market place, and a business networking world without borders. Well recognized that the development of technology called the Internet, has changed the patterns of community interaction, the interaction of business, economic, social, and cultural. Internet has contributed so much to society, company / industry and government. The presence of internet has been supporting the effectiveness and efficiency of the company's operations, particularly its role as a means of communication, publications, as well as a means to obtain the information needed by a business entity and form a business entity or other institution. the positive impact of a technology in Indonesia yanitu internet can facilitate the search for information, articles, job postings, and much more. But besides a positive side also can not be separated from the negative side, among others makes people become lazy.
Understanding Business Online / Buy Sell Online
In an age when the Internet seemed to have become a primary need for people, especially in urban areas, the process of buying and selling over the internet certainly is not foreign. Internet is not only the consumption of certain groups like many years ago, but has penetrated into the middle class bawahProses buying and selling through the internet is commonly known as e-commerce. E-commerce or Electronic Commerce or EC is essentially a part of the electronic business. EC is a process of buying and selling, transfer, or exchange of products, services, and information through computer networks, including the Internet. Business to Consumer (B2C) is a transaction that occurs between the company and the buyer. Every year there are new technologies that came out in the form of desktop computers, laptops, mobile phones, iPhones, and an assortment of other gadgets. Rapid development makes the price of the gadget becomes cheaper due to less sophisticated then other gadgets. This makes the goods covered by the public. Coupled with easy Internet access, the Internet became a familiar thing.


Online Business Advantages
The online store is a site of numerous trading activity or buying and selling goods and services that are connected in a network in this case is internet.Ketika network transactions in an offline store, we are free to choose the items that we will buy. Sometimes we need to put the goods we buy into the shopping cart and then we give up the shopping cart to the cashier to count the total of expenditures kita.Modal Not Too Big Capital does not not need to be big to millions of dollars. The minimum cost of connecting to the Internet or cafe. No need to buy inventory or stock availability thinkers (except those willing to trade their own products). On the internet many are willing to receive any help from us to sell their products. The term we commonly referred to as an affiliate, associate or partner mereka.Hemat Time and Costs Why shop online can save you time and expense? Imagine if you have a customer that is far beyond the island, of course, the customer is subscribed to find it difficult to shop in your store if you just focus on offline store sales. This is not going to waste a lot of time, effort and cost perjalanan.Tetapi not the case if you also have an online store in addition to your offline store. Customer You just choose the products ordered through your online store website that is presented in the form of an image, then fill out the order form items, pay using a transaction system, and the goods will be in between by courier services on time that has ditentukan.Tidak Need to Keep Stores every Time Not like an offline store, you must faithfully waiting for customers who come to shop. In the online store, you do not need to be constantly waiting for arrival of the prospective buyer, the transaction because reservations can be made by email or system that has been in the online store.
Scams Buy or Sell Business Online
Lately a lot of cases of online fraud is arrested by the police. Online business is easier for the perpetrators of fraud in the act, because they do not meet directly with buyers. Most commonly found in cases of fraud is fraud by using your facebook account. Fraud with sale of mobile phones and electronic mode via online bloom on FB lately, with the claimed goods BM (Black Market) of Batam and the price much cheaper than the market price makes many people interested in ordering the goods on offer, it should be immediately memblow media this case up so that more people are aware that there are scams masquerading handhone and electronics sales in the FB and to be cautious about online transactions over more suspicious if the price offered.

Buying and selling online scams Current Until There Is No Sanctions.
Although buying and selling online scams already partially revealed, but individual action against such measures have not been up to a lot of the realm of law. This is due to online fraud victims are reluctant to report to law enforcement, while the article is a fraud complaint offense.
"Most of them are ashamed of being the victim, and when reports are not accompanied by strong evidence," said Director Bukalapak.com, Achmad Zaky, in discussion "Online Fraud" in Jakarta, Wednesday, December 14, 2011.
Based on the victim's complaint, he never reported to the police. However, efforts are constrained on evidence that the legal process is not running. To that end, prospective online buyers need to be emphasized for data recording details of all transactions conducted online.
"From the start of the first contact, should be recorded. Most buyers are less aware with this data record, "explains ICT Watch activist, Arif Taufik.
Ironically, in terms of regulation, UU ITE already accommodates about online transactions. Arif mentioned in Chapter 5 of Article 17 to 22, but not many people know about it.
Other efforts that can be taken to strengthen the verification of accounts and websites that are suspected of fraud is with the Center for Financial Transaction Reports and Analysis and Information Technology and Ministry Komumikasi. "That we will do," he said.
Zaky advised that internet users are not tempted by the lure of fast earn money in a short time and not be tempted by the price of goods is very skewed. Better said, buy goods to people who already know the track record.
"No Performer online scams everywhere with various modes. Some even use hypnosis, "the message. vivanews.com
Buy Sell Online Fraud is on the Rise Sharply Do Some of Today's
Buying and selling online scams Current Until There Is No Sanctions, 1 of 5 Internet Users Be a Victim of Fraud, Leaked Playboy Magazine In Peer To Peer, Online Fraud, Fraud Online Sales, How to Buy Online, Online Openness

Analysis of Fraud in Online Business
Many factors lead to fraud through an online business, specifically each country has a lever and pull factors that led to the rampant cases of fraud through an online business in Indonesia:
1.      Factors driving
a. the absence of a thorough certification teradap every online purchase.

b. areas where there is poverty, unemployment, tuna wisa with weapons and violent conflict. These areas pose urging people to strive by all means, including fraud.

c. traders who exploit weaknesses in online trading.

d. families who can not overcome its economic life will find other ways to meet their needs

e. economy: poverty, lack of opportunity to get a decent job.

f. Social: social obligation to assist and help the family finances, the desire to be financially independent, wants to align with neighbors or peers are successful.

g. culture: consumerism or materialism, desire to earn money easily.

h. personal or private: the private nature deceitful for personal purposes.


2.      Pull factors

a. efficiency: the needs of the cities will ease trade and business.

b. social or culture: the need for services buying and selling easy and fast.
Process of inquiry and investigation in a case of human trafficking was based on Law No. 8 of the Code of Criminal Procedure (CCP).

As for the investigation of criminal fraud policy is:

1. Protection of victims

2. Revealed evidence of fraud and transaction
.
3. Confiscate profits from crime

4. General and special prevention.

Police should handle cases of business scams online that let trained for it. It is important to prevent the police or the report recipient who then appointed investigator did not know and understand the conditions of the victims of human trafficking. Victims also often have a fear of law enforcement officials because the victim thinks reporting only prolong the problem.

Fraud crime victims the right to obtain information about:

 1. Stages of handling criminal cases, the role of the victim's position relating to the  handling of criminal cases.

2. Possibility to obtain legal assistance free of charge

3. What kind of protection can be expected to reach the protection of victims and the

4. Possibility to obtain information about the progress of the case handling

5. Remedies available to file a claim for compensation in the context of a criminal case.

6. The decision to stop the investigation or prosecution.

Testimony of victims is early evidence to initiate a formal criminal process, this information will be processed. Reports or complaints made trafficking victims can not simply revoke his statement and stop the process of investigation or prosecution has been initiated for the crime of human trafficking is a threat to the public interest. If the investigation is terminated, the police must give to the victim SP3.
Article 378 of the Penal Code formulated as follows: "Any person who with intent to benefit themselves or others with a legal fight, with a false name or false dignity, by cunning or by a series of lies move others to give something to her body, or in order to give eliminate debt and receivables, as threats of fraud with a maximum imprisonment of four years. "


Article 18 UU ITE

(1) Electronic Transaction are poured into the Electronic Contract binding upon the parties.

(2) The parties have the authority to choose the law applicable to international Electronic Transactions made.

(3) If the parties have not made a choice in Electronic Transactions international law, the applicable law is based on the principles of International Law.

(4) The parties have the authority to establish the forum court, arbitration, or other alternative dispute resolution authority to handle disputes that may arise from the international Electronic Transactions made.

(5) If the parties fail to make the choice of forum referred to in paragraph (4),the determination of the authority of the court, arbitration, or other alternative dispute resolution authority to handle disputes that may arise from the transaction, based on the principles of International Law.
Thus, the crime of trafficking in fraud through an online business is a transnational crime and can not be solved by partial or individually by each state.
Tips to Avoid Online Scams Sale
Increase of Internet users in Indonesia, not only in use as a business opportunity, but also as a field of fraud, especially if not fraudulent buying and selling online.
Actual fraud in the transaction on the internet, not only cause harm to the buyer, but also can overwrite the seller. But of the cases, the buyer is the victim of the most in buying and selling online scams. therefore takes precision and vigilance in conducting business transactions online or internet.
Tips to Avoid Scams maybe Buy Online Selling the following can help you.
For Sellers
1. Beware if there is buyer who says, "I'm fast stuff in between these days with the amount of xxxx .. (rather a lot) ". Quite often this is just to get the goods without making payment.

2. Other mode, "I've transfer please send it fast" and apparently transferan never done. However, this method tends to be avoided because most online store owners are already using SMS or internet banking so they can do the check directly.

3. Avoid transactions Saturday and Sunday, because on the internet banking account entries come off.

4. If you receive a payment COD (Cash on Delivery), then you should take a friend to reduce the level of fraud (hypnotized, kidnapped, blackmailed, etc.) and do in a crowded place.
For Buyers
1. Pick Websites Clearly
Before you decide to trade on a website, make sure the website is well-known or obvious like Amazon and make sure the website clearly lists their address and phone number you can call. Perform intensive communication with the seller to know the "style" of the seller.
2. See Pictures and Price
Check, the website displays the goods for sale or not, if not, you should avoid it. And also do not forget about the price in the offer, if it is cheaper (not unreasonable), you should look for another place.
3. Payment Method
Choose websites that use COD payment (Cash On Delivery) or REKBER (see picture below), but it also has its own problems and hassle, because we have to mengecheck further validation or correctness of the Ber Rec. If the seller only accepts payment transfer, then do an intense communication, be it by sms, chat or the other.
4. Testimonials
This is actually not a guarantee, but you can judge the seller of testimony or comments from the buyers, if there is no testimony, then you can do that in the communication as referred to above.
5. Periodically monitor Website
Perform monitor the website that you want to use as a place to buy goods, if there is a significant change as the data address and the phone number in the contact, you should avoid it.
6. The Good Care
Choose sellers who are ready to serve you at any time (normal hours) and with the rapid process, if you get a very slow seller and seem reluctant to sell the goods, then leave it out.
7. Tanya purchase Forums
Try to be active in buying and selling online forums, where we can share knowledge and information with each other about the good and not the seller.

8. Search on Google
Especially for those of you who love doing business with foreign websites by typing an example how to scam or upset and then type the name of the website or the data seller (of Name, Name of the account owner, YM, etc.) that you want to trade if there are a lot of members / reseller who revealed disapointed because bertaransaksi the website or the seller? when you should leave
How to Report Fraud Online Sale
Maybe it is common knowledge that the work of our legal apparatus against online fraud report still looks "reluctantly averse" and the complicated process. However, you can try to report fraud online transaction you experienced how:
1.      Record all the data 'x', phone number, address, photos etc.
2.      Copy all like transactions and other evidence.
3.      Report and provide all the evidence to the nearest police.

Conclution:

So basically, it's a crime depends on human beings themselves, if there is a chance, anyone will surely not humane thing is disgraceful. Economic trouble could be the occurrence of moral turpitude.

Rabu, 29 Mei 2013

CYBER CRIME

CHAPTER 1
INTRODUCTION

1.1 Background of Study

In this occasion we will discuss about the cybercrime, and cyber stalking. As we know, the Development of the Internet and cyberspace in general do not always result in positive things. One thing that is a negative side effect, among others, is a crime in the cyber world or, cybercrime. The loss of the limits of space and time on the Internet changed many things. The phenomenon of cybercrime is to watch out because this crime is quite different from most other crimes. Cybercrime can be done regardless of territorial boundaries and is not required direct interaction between the perpetrator and victim of crime. Could be ascertained with the global nature of the Internet, all countries conducting internet is almost certainly going to be affected by the development of this cybercrime.

1.2 Problem of Study

1.   What is Cybercrime?
2.   How many types of Cybercrime?
3.   What is the Cyber stalking?








CHAPTER 2
CYBERCRIME


2.1 Definition of ­­­­­Cybercrime
Cybercrime is an evil forms arising from the utilization of internet technology. Some opinions match the cybercrime with computer crime. The U.S. Department of Justice gave the explanation computer crime as:

 "Any illegal act requiring knowledge of computer technology for its perpetration, investigation, or prosecution."

The definition is identical to that given Organization of European Community Development, which defines computer crime as:

"Any illegal or unauthorized behavior unehtical Relating to the automatic processing and / or the transmission of the data".
           
            As Andi Hamzah (1989) in his “Aspects of Crime in the Computer field,” defines computer crime as:

"Crime in the field of computers in general can be defined as the illegal use of a computer".

From some of the above, in summary it can be said that cybercrime can be defined as an unlawful act committed with the use of internet-based on the sophistication of computer technology and telecommunications.





1. Characteristics of Cyber ​​Crime
So far, the conventional crime, recognized the existence of two types of crime as follows:
a. Blue-collar crime (blue collar crime)
This crime is a type of crime or criminal acts committed in the conventional, such as robbery, thief, murder and others.

b. White-collar crime (white collar crime)
These crimes are divided into four groups of crimes, namely corporate crime, crime bureaucrats, malpractice, and individual crime.
Cybercrime itself as a crime that appears as a result of online communities on the Internet, has its own characteristics which is different from the above two models. The unique characteristics of crime in cyberspace include five of the following concerns:

1. The scope of the crime
2. Nature of the crime
3. Perpetrator
4. Crime mode
5. Types of losses incurred

2.2      Types of Cyber ​​Crime

1.  Based on the types of activities done, cybercrime can be classified into several
types as follows:
a.    Unauthorized Access
Is a crime that occurs when someone enters or breaking into a computer network system illegally, without permission, or without the knowledge of the owner of the computer network system into. Probing and port is an example of this crime.


b.    Illegal Contents
Crime is done by entering data or information to the internet about something that is untrue, unethical and may be illegal or disrupt public order, for example, is the spread of pornography.

c.    Deliberate spread of virus
Spread of the virus is generally done using email. Often people who email system exposed to the virus do not realize this. The virus is then transmitted to another place via email.

d.    Data Forgery
This type of crime is done with the aim of falsifying data on important documents that exist on the internet. These documents are usually owned by the institution or agency that has a database driven web site.

e.    Cyber ​​Espionage, Sabotage, and Extortion
Cyber ​​Espionage is a crime that utilize the Internet to conduct espionage against the other party, by entering into the computer network of the target system. Sabotage and Extortion is the type of crime committed by creating a disturbance, destruction or destruction of the data, computer programs or computer network systems that are connected to the internet.

f.      Cyber stalking
This type of crime is done to annoy or harass someone by using a computer, such as using e-mail and be done repeatedly. The crime resembles terror directed at someone with utilizing internet media. This could happen because of the ease of making an email to a specific address without having to include the identity of the true self.



g.    Carding
Carding is a crime committed for stealing credit card numbers belonged to someone else and used in commercial transactions on the Internet.

h.    Hacking and Cracker
The term hacker usually refers to someone who had a great interest in learning the details of computer systems and how to improve its capabilities. As for those who often commit acts of vandalism on the internet usually called cracker. Arguably this is actually a hacker cracker that utilizes the ability for negative things. Cracking activity on the Internet has a very wide scope, ranging from hijacking an account belonging to someone else, piracy websites, probing, spreading the virus, to incapacitate the target. The latter acts as a DoS (Denial of Service). Dos attack is an attack aimed at crippling a target (hangs, crashes) and so can’t provide the service.

i.      Cybersquatting and typo squatting
Cybersquatting is a crime committed by registering the domain name of the company of others and then trying to sell them to the company at a price that is more expensive. The typo squatting is a crime to make a play on the domain domains similar to domain names of others. The name is a domain name of a rival company.

j.      Hijacking
Crime of piracy is hijacking other people's work. The most common is Software Piracy (software piracy).




k.    Cyber ​​Terrorism
An act of cybercrime including cyber terrorism if the government threatens or citizens, including cracking to the government or military sites. Some examples of Cyber ​​Terrorism cases as follows:
• Ramzi Yousef, mastermind of the first attack to the World Trade Center, the attack in detail known store encrypted files on his laptop.
• Osama Bin Laden was known to use steganography to communication networks.
• A website called Muslim Hackers Club known tip to write a list of hacking into the Pentagon. A hacker who calls himself Doctor Nuker known to have less than five years of defacing or change the content of a web page to the propaganda of the anti-American, anti-Israel and pro-Bin Laden.

3    Based on the motif activity does, cybercrime can be classified into two types as follows:

a. Cybercrime as a purely criminal act. Pure evil is a crime is a crime committed because the criminal motives. This type of crime is usually to use the internet only as a means of crime. Examples of this kind of crime is Carding, the theft of credit card numbers of others to use in commerce transactions on the Internet. Also the use of Internet media (webserver, mailing lists) for the spread of pirated material. Anonymous sender e-mail containing promotional (spamming) could also be included in the example crimes using the internet as a means. In some developed countries, the perpetrator could be charged with spamming allegations of privacy violations.

b. Cybercrime as a crime "gray". On the type of internet crime that fall into the "gray", is quite difficult to determine whether it was a crime or not activities are sometimes not given the motive for the crime. One example is probing or port scanning. This is the name for the kind of action in the surveillance of other people's systems to gather as much information from the system under surveillance, including the operating system used, the ports there, either open or closed, and so on.

3.  While based on the targets of crime, cybercrime can be grouped into several categories as follows:
a.              Cybercrime is attacking people (Against Person)
This type of crime, targeted attacks directed at an individual or individuals who have certain characteristics or criteria to the purpose of the attack. Some examples of these crimes include:

• Pornography
Activities undertaken to create, post, distribute, disseminate material and pornography, obscenity, and expose things that are inappropriate.

• Cyber Stalking
Activities undertaken to disrupt or harass someone by using a computer, for example, by using e-mail is done repeatedly as cyber terror in the world. The disorder may be sexually explicit, religious, and so forth.

• Cyber- trespass
Activities undertaken violate the privacy of others areas such as Web Hacking. Breaking into the PC, Probing, Port Scanning and others.

b.              Cybercrime attack property rights (Against Property)
Cybercrime carried out to disrupt or attack the rights of others. Some examples of this type of crime such as accessing computers illegally through the cyber world, possession of unauthorized electronic information / information theft, carding, cybersquatting, hijacking, the data forgery and all activities that are detrimental to the rights of others.

c.              Cybercrime attack the government (Against Government)
Cybercrime against the Government done with the specific purpose of the government assault. The activities such as cyber terrorism as acts that threaten the government as well as cracking to the official website of the government or military sites.

4. Mitigation and Cyber ​​Crime Solutions
Cybercrime is a principal activity of the attack on content, computer systems and communication systems of others or the public in cyberspace. The phenomenon of cybercrime is to watch out because this crime is quite different from most other crimes. Cybercrime can be done regardless of territorial boundaries and does not require direct interaction between the perpetrator and victim of crime. Here's how to overcome them:
a.    Securing the system
The real purpose of a security system is to prevent the destruction of parts of the system as entered by unwanted users. Integrated security systems is necessary to minimize the possibility of such destruction. Build a security system must be integrated steps in the overall subsistence, with the aim to narrow or even close the gaps unauthorized adverse actions. Personal security can be carried out starting from the installation of the system until finally heading to the stage of physical security and data security. Safety systems of the attack through the network can also be done by securing FTP, SMTP, Telnet and Web server security.

b.    Global Mitigation
The Organization for Economic Cooperation and Development (OECD) have created guidelines for policy makers dealing with computer-related crime, where in 1986 the OECD has published a report entitled Computer-Related Crime: Analysis of Legal Policy. According to the OECD, several important steps that must be performed every country in tackling cybercrime is:
1. To modernize criminal law and its national procedural law.
2. Improving national computer network security system according to international standards.
3. Increase understanding and expertise of law enforcement officials regarding the prevention, investigation and prosecution of matters related to cybercrime.
4. Increase awareness of citizens on issues of cybercrime and the importance of preventing such crimes occur.
5. Increase cooperation between countries, both bilateral, regional and multilateral, in tackling cybercrime.













CHAPTER 3
CYBER STALKING

Cyberstalking

Cyberstalking is the use of the Internet or other electronic means to harass any individual, group, or organization. It may include false accusations, monitoring, making threats, identity theft, damage for data or equipment, the solicitation of children for sex, or gathering information in order to harass. Action cyberstalking can be very dangerous and scary, especially for children and teenagers. This is because one's personal identity information is not known on the Internet provide give a space for the stalker (stalker) to roam freely carry out the action. Cyberstalker (actor cyberstalker aka stalkers) and often doing something extreme because they feel they can’t be arrested and / or convicted of difficult to detect.

Here are some criteria that cyberstalking act on a number of ways and purposes:

1. Wrong accusations. Many cyberstalkers try to damage the reputation of their victim. They post false information about them on the site and certain websites. They may set up their own websites, blogs or user pages for this evil purpose. They post allegations about the victim to newsgroups, chat rooms or other sites that allow public contributions.

2. Attempts to gather information about the victim. Cyberstalkers may undertake approach their victim's friends, family and co-workers to obtain personal information. They can monitoring an information on the Internet, or hire a private detective. They will often monitor the victim's online activities and attempt to trace their IP address in an effort to gather more information about their victims.


3. Encouraging others to harass the victim. Many cyberstalkers try to involve third parties in the harassment. They may claim the victim has harmed the stalker or his family in some way, for example by posting the victim's name and phone number to encourage others to join disturb the victim.

4. Wrong victims. Cyberstalker will claim that the victim is harassing him.

5. Attacks on data and equipment. They may try to damage the victim's computer by sending viruses.

6. Ordering goods and services. They order items or subscribe to magazines on behalf of the victim. These often involve subscriptions to pornography or ordering a sex toys are then sent to the victim.

7. Arrange a meeting. The youth at high risk, especially against cyberstalkers are trying to arrange a meeting between them.

The Cyberstalker can also do a few things below:

• Keep an eye on the victim's online activities via spyware (a programs that designed to spy on someone's mobile computer or remotely)
• Track the location of the victim using GPS technology
• Intercept by phone call or SMS someone
• Impersonate victims
• Supervise and watch the activities of the victim through a hidden camera



Although online harassment and threats can be done in many forms, cyberstalking has important characteristics with offline stalking. Many online or off stalkers are motivated by a desire to control or supervise their victims and engage in it to achieve their goals. Such evidence exists, most indicated that the majority of cyberstalkers are men and the majority of their victims are women, although there are reported cases of women cyberstalking conduct against men and against same-sex cyberstalking. In many cases, the cyberstalker and the victim had a prior relationship, and the cyberstalking begins when the victim attempts to sever the relationship. However, there are also instances of cyberstalking by strangers. Given the large amount of personal information available through the Internet, a cyberstalker can easily locate private information about a potential victim with.

The fact that cyberstalking does not involve physical contact may create the misperception that it is more dangerous than physical stalking. This is not necessarily true. With internet functions are an integral part of our personal lives, professional stalkers can take advantage of the ease of communication as well as increased access to personal information. In other words, the stalker may be unwilling or unable to confront the victim in person or on the phone, he probably had little hesitation sending harassing or threatening electronic communications to a victim. Finally, like physical harassment stalking, threats online may be the beginning of a more serious behavior, including physical violence.







Prevention Tips
1.    Do not share personal information before the public anywhere online, or give it to strangers, including in e-mail or chat room. Do not use your real name or nickname as your screen name or user ID. Choose a name that is gender and age neutral or appropriate. And do not post personal information as part of the user profile.
2.    Very careful with online meetings and contacts with other people. If you choose to meet, do so in a public place and bring along your friends.
3.    Make sure that you have a network of "acceptable use policy" that prohibits cyberstalking. And if your network fails to respond to your complaints, consider switching to a provider that is more responsive to user complaints.
4.    If the situation becomes hostile online, log off or elsewhere online. If you are in a situation of fear to a place, contact local law enforcement agencies.