Cybercrime and Its Countermeasures in the Indonesian Legal System
DOI:
https://doi.org/10.70321/ijslcj.v2i3.152Keywords:
Phishing, ITE Law, Law EnforcementAbstract
The rapid development of information technology has provided many conveniences in people's lives, but has also opened up opportunities for cybercrime, one of which is phishing. Phishing is a form of digital fraud by impersonating a trusted party to obtain sensitive information such as personal data and financial credentials. In Indonesia, the rise in phishing cases poses a serious threat to national digital security, especially with the low level of digital literacy in the community. This study aims to evaluate the effectiveness of the Electronic Information and Transactions Law (UU ITE) in dealing with phishing crimes and identify the main obstacles in its enforcement. The method used is normative legal research with a statutory and conceptual approach. The results of the study indicate that normatively, the ITE Law contains several relevant articles to ensnare phishing perpetrators, such as Article 28 paragraph (1), Article 30, and Article 35. However, its effectiveness in practice is still limited due to the lack of an explicit definition of phishing, the difficulty of digital evidence, the weak capacity of law enforcement officers, and the lack of integration of handling mechanisms between agencies. Furthermore, the cross-border nature of phishing adds jurisdictional complexity and demands more intensive international cooperation. Therefore, legal reform is needed through the formulation of specific articles on phishing, strengthening the technical capacity of law enforcement agencies, and developing implementing regulations that support a swift and adaptive legal response to the dynamics of digital crime
Downloads
References
Dewantoro, Naufal Mahira, and MH Dian Alan Setiawan SH. 2023. “Law Enforcement of Phishing-Based Cybercrime in the Form of Application Package Kit (APK) Based on the Electronic Information and Transactions Law.” In Bandung Conference Series: Law Studies, 3:892–900.
Dhadha, Tegar Pan, Laras Atika Rahayu, Dewi Sito Resmi, and Dora Kusumastuti. 2021. “The Effectiveness of the Role of the ITE Law in Protecting and Safeguarding All Cyber Activities in Indonesia.” Legal Standing: Journal of Legal Studies 6 (1): 40–48.
Indra Utama Tanjung. 2024. BASICS OF LEGAL RESEARCH METHODS. Karanganyar: CV Pustaka Dikara). https://scholar.google.com/citations?view_op=view_citation&hl=id&user=rToGqjUAAAAJ&cstart=20&pagesize=80&citation_for_view=rToGqjUAAAAJ:Wp0gIr-vW9MC.
Majid, Marina Abdul, Zarina Othman, and Muhammad Isa Md Onzer. 2022. “The History, Modus Operandi and Challenges of Combating Drug Smuggling at Langkawi Island with Its Links to the Golden Triangle.” Journal of Islamic, Social, Economics and Development 7 (45).
Rianto, Rianto, T Riza Zarzani, and Yasmirah Mandasari Saragih. 2024. “Legal Responsibility of Online Media Corporations and Social Media Users for Broadcasting News Shared to the Public Containing ITE Criminal Acts.” JIIP-Jurnal Ilmiah Ilmu Pendidikan 7 (1): 393–98.
Sasuang, Rio Heronimus Kaluara, M Syahrul Borman, and Nur Handayati. 2024. “REVERSE PROOF SYSTEM FOR CORRUPTION CRIMINAL ACTS ACCORDING TO LAW NUMBER 20 OF 2001.” COURT REVIEW: Journal of Legal Research (e-ISSN: 2776-1916) 4 (06): 70–78.
Setiawan, M Nanda. 2021. “Criticizing Article 27 Paragraph (3) of the ITE Law from the Socio-Political Perspective of Indonesian Criminal Law.” DATIN Law Journal 2 (1): 1–21.
Sidik, Suyanto. 2013. “The Impact of the Electronic Information and Transactions Law (ITE Law) on Legal and Social Changes in Society.” Widya Scientific Journal 1 (1): 1–7.
Sutarli, Ananta Fadli, and Shelly Kurniawan. 2023. “The Role of the Government Through the Personal Data Protection Law in Combating Phishing in Indonesia.” Innovative: Journal of Social Science Research 3 (2): 4208–21.
Winarno, Wahyu Agus. 2011. “A Study of the Electronic Information and Transactions Law (UU ITE).” Journal of Accounting and Management Economics 10 (1).
Yudistira, Muhammad, and Ramadani Ramadani. 2023. “Legal Review of the Effectiveness of Handling Cybercrimes Related to Personal Data Theft According to Law No. 27 of 2022 by KOMINFO.” UNES Law Review 5 (4): 3917–29.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Zakiul Fuad , Mhd. Azhali Siregar

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.











