History Id-SIRTII/CC

Information technology (information, communication, and technology/ICT) is a tool to improve various human activities. ICT has progressed to the point where it has become the community's primary requirement, particularly in large cities. The consequences of phenomena are not necessarily positive, but also have a negative impact in the same way as ICT.

The increase in crime committed utilizing information technology since 2003 is one of the negative consequences. Call it carding crimes (credit card fraud), ATM/EDC skimming (early 2010), hacking, cracking, phishing (internet banking fraud), malware (viruses). /worm/trojan/bots), cybersquatting, pornography, online gambling, transnational crime (drug trafficking, mafia, terrorism, money laundering, human trafficking, underground economy). All of these consequences must be considered.

At least since 2003, the Indonesian National Police (POLRI) has recorded that there have been 71 cases of cybercrime. In 2002, Indonesia was ranked second after Ukraine in terms of crime that used information technology, especially online fraud. Some cases even seriously threaten national security and the life of the nation and state. These include cases of defacing the KPU (General Election Commission) website www.kpu.go.id (2004 Elections), DNS poisoning of President SBY's website (www.presidensby.info), and the cyberwar between Indonesia and Malaysia continues every day and increases when there are negative cases between the two countries (rasa sayange songs, batik claims, ambalat conflicts, etc.)

In Indonesia, the development of communication, and information technologies must be balanced with the readiness of strategic infrastructure to minimize negative impacts. These include the regulatory sector (policy/regulation), the readiness of institutions (institution), and the readiness of human resources (people), especially in the field of security. So that information technology can support increased community productivity in all sectors effectively and safely achieve a better quality of life.

On May 4, 2007, Ministerial Regulation No. 26/PER/M.KOMINFO/5/2007 was published regarding the Security of Utilization of Internet Protocol-Based Telecommunication Networks. The Indonesia Security Incident Response Team on the Internet and Infrastructure/Coordination Center (Id-SIRTII/CC) is charged with overseeing the security of internet protocol-based telecommunications networks by the Minister of Communications and Information Technology.

The idea to establish the Id-SIRTII/CC (Indonesian Security Incident Response Team on Internet Infrastructure/Coordination Center) has been conveyed by several groups, especially practitioners, industry, academics, the information technology community, and the Government since 2005. The initiators (founders and stakeholders)) include:

  • DIRJENPOSTEL (Directorate General of Post and Telecommunication).
  • POLRI (Police of the Republic of Indonesia).
  • The Attorney General's Office (AGO) of the Republic of Indonesia.
  • BI (Bank Indonesia).
  • APJII (Association of Indonesian Internet Service Providers).
  • AWARI (Indonesian Internet Cafe Association).
  • Indonesian Credit Card Association.
  • MASTEL (Indonesian Telematics Society).

Id-SIRTII/CC has the main task of conducting socialization with related parties regarding IT security (information system security), conducting early monitoring, early detection, early warning of threats to telecommunications networks from within and outside the country, especially in security measures for network utilization, making/ running/developing and database log files as well as Internet security statistics in Indonesia.

Id-SIRTII/CC provides assistance to improve the security system in strategic agencies/institutions (critical infrastructure) in Indonesia and becomes a coordination center (Coordination Center/CC) for each initiative at home and abroad in addition to a single point of contact. Id-SIRTII/CC also conducts research and development of information technology/information system security. Currently owned laboratory facilities include a training center, security simulation laboratory, digital forensics, malware analysis, data mining, and organizing content filtering, and anti-spam projects.

The information system security's vulnerability can be threats, disturbances, and attacks. These activities can cause economic losses to the cessation of services for users. For example, the loss of internet resources in Indonesia is the consequence of the accumulation of garbage information packets due to attacks sent by irresponsible parties.

Id-SIRTII/CC also has a supporting role in law enforcement, especially against crimes that use information technology. Especially in the presentation of electronic evidence, Id-SIRTII/CC has the facilities, expertise, and procedures to analyze to make the material of evidence legally valuable. In an investigation, Id-SIRTII/CC has a central role in providing information about statistics and attack patterns (incidents) in Indonesian internet traffic.

Monitoring National Internet Traffic

National internet traffic monitoring report featuring weekly traffic reports, monthly traffic reports and annual traffic reports.

System Security & Vulnerability Threat Warning

A collection of articles about the early warnings of security threats and system vulnerabilities.

Security News

Newsgroups of Cyber Security or IT.